Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
343b4550a4df539529b2f8367ea89994_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
343b4550a4df539529b2f8367ea89994_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
343b4550a4df539529b2f8367ea89994_JaffaCakes118.html
-
Size
10KB
-
MD5
343b4550a4df539529b2f8367ea89994
-
SHA1
b81076fbf5ad53133e7683f4416bdd40436771a1
-
SHA256
99536ac6f115988dce6fc3d21429b5ce2ead0eae5b29ad4b05a12c029f1edd28
-
SHA512
6bd64f5cd5654e533dfe3d8f403617e81fcf10a725aa258b6e909cee2ae88dd7159bcc224b8cc7853a977ff773628d16378efaf8b40b54f309975dfd7475bb1b
-
SSDEEP
96:uzVs+ux7FofLLY1k9o84d12ef7CSTU5GT/kP+pSps31DvMdlwe60UYRDvMdldlVy:csz7FAAYS/Y8SgaNUYRravPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c635a7afd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d2679a6773587db389438f274146e9881111b0635e9dd0d8197bea982382c7af000000000e80000000020000200000003ec9674a40cfdf69d9ff3d7fbf4bb9b682721c0ba4d8e9104e9caf54bf1a8bb520000000bed03c5a2f8063ef526e874e140b0d90d23e1afaa2dee2c304f2e0864390df034000000030e0f00afb1b3a00b1be350b2f79a44b6025bc8dd556571bbc5997e5e9afdfaf636e87af31fe68b9101ee265a533bfed7cb868e653ac09eb66af0e5afee6d0e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426767318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D230CBA1-3EA2-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2720 2172 iexplore.exe 31 PID 2172 wrote to memory of 2720 2172 iexplore.exe 31 PID 2172 wrote to memory of 2720 2172 iexplore.exe 31 PID 2172 wrote to memory of 2720 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\343b4550a4df539529b2f8367ea89994_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a857680b09ab28df95d7bfc53cedfe0
SHA1900a131dab4355e2767912b0051f3740e4765947
SHA2563666f42992c14e60ad9558b70f2943ecacee7056a0694b4d7a42497e6b399c6e
SHA512d29435f87e1a851f1f6ae77095619235f047ef634e849cfa1b43302c0621b2ca0b8af24b215f9b57be0f120c7ddbedf55cad87b2f7f00e002ae5e256ab33962a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15aeb692047d80cf65dba72569e5f65
SHA1c065704fd4d9d928c379cbee3e93eed8a8ffd304
SHA256f6fd7bfd87354dd536e7a7dc48e645a6826db56bcb2b50372fbd9b9d575fe28d
SHA512a7c372341d252d2bc8b37c33487fe0c8609d907a29009be9428e8b337aa0e470673ad9769cb28e55e76553a6c59c8add9b14754fc62f4503a15d40577f2d7fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54667012fb047b4690654b767e5efcb6e
SHA1958edad5e0b8766a3cbe547eb42ba72ed29e7fa2
SHA25638081fb57c3217573685f6be95b4abc283c13fc977700af8d0bed0f652a58df9
SHA5126d17b370c116a67e73879919d9ad5ff23d86e672dd4d230ac403e3d132f9f3dbebe5df90b310906fe079809cba36be6170abd565de72b42f0c4c85199c8a2932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580159f482081ceae420359ed295525d7
SHA128346939244fa78bbb94a3d8934de0aa1d3f1a93
SHA25678b8bbd54e7b297b6254f10a1eb49bfa62f6b1b66f525bd380b32698769621bc
SHA512a9698eaed5cc46f2596a580117d3af59a17b66662bba41b0348ab44907873d9da9a1d7cadfd7c1556122399b271671b9a9df99bf95d1d00faef06116e391b980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d9d80b7dc810907fce105860e40015
SHA177dc619d92d29e9a7becf6d3afd0784256d6fd41
SHA256617ad8a9b6b802a41d13c94386ff7c52210cea1bfd3a4fd8cb54379f63f8a756
SHA512930bc9fdbe069489bff438ea5744fb9be80cb26b86cf1be06b3844257388023bebaff9a0f9872b52291a6d371f5a50fbdcee8ad539da5633952b7e096326409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5fcb42c749360ed7f9df97b8ce84d8
SHA140e85eacd4007ef91fd3e3fc8428ddce74fde493
SHA25650d2bafd4de34aa4f2bde2b94476282974b01e6370e2bbebadb30afefbc650d5
SHA5125edee4d4782cd441ac2afae480e2a0323a6540df743b5a64222d7c421c8798f3bac390a4344abb234f5b684c36303f2223983ce75cbff0cba02c1ed2fbaffaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3282356441b1b2651f153b8c9676d89
SHA158cb41f95b396197913b4ab570b7d305ed977cf4
SHA256bf5379c37999dcf55dc1c81ea0948af4a195d0d944fc18685d2dcd3aad4f76c7
SHA512e3e16a33600f1b297e1736ce8fff823da85d09727807acb3db34a24bc18146602d611c6efb920692a48e10696a896006aab7e96db97adc7836856f171e1739fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57591d44a6ca1d8040a69325b40ac2472
SHA15e0bdfc6fa46f27a6d3ffe3315272ea0b39187e3
SHA256b09db92333fa6856fa207d8d3b0a8f8d234dfd59cf814577aade8d03e4a47f43
SHA51257e6c5a04d7a462fa652c3271cbe99fa7e9fd839c1788944411be46a575fb9fd6a68150c070a78d123bca37eeb4791a133b949e24d5bc1812649ba7e9e35fbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74bc5ac5416543b05b0dd389f974cff
SHA1e83c7e386c49c2663f8edd80661e8d9de65b35f3
SHA2564ac39dea7540c5daa285b95e65e2f77762333127398d6dbda24462bade9dd2ed
SHA512decb1d38d8867b71165d60073e4f60409c8b61fb47c34b9157eec6d27122efeb1cf409641da432f8e0922d5b4a6b9a44dbde7bcc005f565ec84712d4b54cbd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c343b443277a4d803402f47927b8d501
SHA1f5ed9529b1e20989af4f02fe4af95b9f03920ea8
SHA256268c59a0dfa0a431c4bfc036729a7d44f60320bfdd2a4eeb6a1d85e5b3b1c52b
SHA512d7ff91e0085e72e19eb9b8d32467959c24fa0a573a12f709ba2d05c336ddf46ca5f8f63f81854e93d8f96fda36b09c69e2a2207678d662adca7aaf680b973b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5f6170a164afd2f0036e786cdae49b
SHA1a5d6c782bb9951cf519c1db08af61529ef89c20e
SHA256bf230921a946ffebad1e86d2666c9bb8b4e9c33bc9ed364c39345052aa5bda05
SHA5121e0bec429b32d46e77146ae63ce6c8b954dd3ce5d2d9e63a40099ce0a25742fcf833bf98e3016e3aec351bb757f56ed06e859ab50fe5ea31e40abd7470c85055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2565cdd5a634adf48ab9fc09f3d3d43
SHA118f9153d8810ddd6ad572417c6f9de704810342e
SHA256b41e024a10a377bdb0650459db4940c4cb6169d5dfb168c0b812eb6b62b2a275
SHA512e1b464bbece1534695acef4c75512da3068e8b9f0e78b247d972a19710ec2f5b9a524a9a11f934cd5b882a1c003813d773f23dd42d2ed5ab449fc06d7fb89d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ecc69e1f09751fcabe7fb6b4b867a3
SHA170fa111db24070af8bfa11588b5af7d965cfed6f
SHA2560ba77659074957379b1b84ba27bbee7d4840c790bbe96e3f8352f75417083212
SHA51298e81fe69bae08750df0d51ed6f34a45fb1837bd149bfd47effcf66dc8494f859a995fed549ac8fdbf262adc2ef3513d2ef6c0e93202e1dcc02deb83d529742c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6a49c27fd7c902be096e0283498664
SHA17c68db1b43248d65ab52bf3564102d2f5b89d30c
SHA256ea882e5a502a383767797d2b8f47ce3961f82ffd1afb30545cac8e83dbbcfd4a
SHA512e5800a534bd4ee2af001412489e047b14286f472779326b374b6166137709808690777d663ec64a6881c5a433ba07ec973640b4652bf01b8ef97a6f221e42900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544d52c97aff9a45e65a6b3cf8a130bb
SHA1c97c5e9555c28834a31fa8d16b4c330727c61086
SHA256ec419fd56172757919af60a14147a21e317b984b9732ac2a1d4acaca7729ba80
SHA51287e20a3015426b91958d369dcba32b9e32c59d4f47d87e67b3cae17382f6392a2562d58b0cd6dd2c99594d59c440cd052cbbc984f809e4271ed613365aba16e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500ac7dab1501b3c4b04ee83c3fdd3f3
SHA1aa3cb9fa8f87cc1948c92d37d553685f7edb224c
SHA256ca09e51da1067a5ce0d4a99b86461dfdb67746c85a4f4f95ff84e8c7a0542aae
SHA51297bb3c074ab003c466097417bd13e0b935e38820a9712057e7a56d7bd8b40bac25714a1ba6d8e8813602512dd3ff3d0fb120eb29cade5b2825d8fcb2f712466e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9ab6d0ab4cde39a1936c9ef39d0d16
SHA10acae9ca629b8cd866106926fbcbe43fbfb82862
SHA256615f2f913272bdee10f9895ac14871ca3bb7398923df44fb5317359cecdcb850
SHA51207e8bbee21f3e7e5c64aae6d0e86c95365dac2c3d770c2a94c1f12dfa4e9a720e6277b29a14f7f926f7e965b8191cf1f70fbfac187b7dba240513bbe0ad50c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a92502005fe8f7a0d96effdd044304
SHA1a0b09f8cb97fc8268f95c5ce5e02b94a253d8847
SHA25640076fdb4995066081eed7eb1e8cd06a90c534b0cd50044fbbf5fde303730f10
SHA51219f2c232a27142220811c9c723a4e08cf58362304851c8be790f59d0c51152e975038ba25a3e9cf87cb211ab5e2ad50369a7817a57ffa66568aeb78ad092ea25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6fcd59e6362fedc76b57f2ac8587a5
SHA1002db8e3dd234367a142946bd3933c7cd6ff8546
SHA256b7e4c500ab9b2c27f023a5dfc225f1954be1cfe26d94ee0fe008455ae09e974e
SHA512349a77278452392501b90066be40cf2023f828ce3a3ea11b1fdba56a312e37204a0c28253851f9e65527d15c64208c054f98050557c66462aaf32fcaef6f29e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b