Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
34f866bf36538d2efc55bae61ab3b465_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34f866bf36538d2efc55bae61ab3b465_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34f866bf36538d2efc55bae61ab3b465_JaffaCakes118.html
-
Size
57KB
-
MD5
34f866bf36538d2efc55bae61ab3b465
-
SHA1
bdaa8721155bddc1d5a014d0057935ab97b4431b
-
SHA256
43c99951f5d5b76a15ef0b7dea399df559c0597c8c2548872fa769b37c1e4178
-
SHA512
d857f42a4d165dacf8e5e02e61838090393036a73ad631cc9538a67a214f92c633641fdb082b6eedd5299dc5cbd5f15922520c71f9903d7accd9bc66fac2980a
-
SSDEEP
1536:gQZBCCOdU0IxCF9gaf/fsfBfcfjfUfFfKfMfiqfif7fDfif7fXfIf2fZfhfRfSfc:gk2O0IxcHk5kbc9Sk9aD7qD/geRZpKrI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100c604ad0d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a4c3f948d0497cc0b83156c565685ba02d71d2024b8eac695f98ea6b00f80e75000000000e8000000002000020000000c8c002a1af48cdd52ec885877264e9973d0596625ffcc5bbf12ac921b8a1fe7220000000f3dee3bcb114a6b6d7b46357029075e1e947e69f38f520a931ca751b3f1c27e740000000aed78a21bf930063a0d75d6ad60dddbec945622166f65512640ca51fa519b56d7c3b29fb9246790bebf8e7e42e59dea263736d83ff7c68832610eacf97e7f936 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426781334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7436CCE1-3EC3-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34f866bf36538d2efc55bae61ab3b465_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b3e8d5de9c8b01511cd5fa072aeadf
SHA154d03a0d6190b567c0fcabe7b7cf9f9cb5d7c239
SHA25697af990036aba3f93193254b4c64abb361978baae6e7591f785b31f078b6cb25
SHA51291da048a9d84af3f14ef5657ef076c25c710015874b61579ddf100ac22d1fda623888eef7a95fb492b5d3c6bde8370872561675c918207b106082828762ad25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eba5615734917f9ef6365e5228e173a
SHA18232ccf5ece6234122e5fa3a2b1117f3cf8ab12a
SHA256c839e641c161aa3be85093f5a72e5d0c6850e63475f8e1e96061177d7fb53d27
SHA51265123bcb3f931bcd19dfcd81d069c67636dd427c3b2877ff7c5a952aea87667893b696b6634c3ecf3a0e902785f8a752dd38727c386fe3633908bf5fffde7f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626ce16b2060f8d7fc4a1e6d44007309
SHA19586e411fa77790e776b4ff47e397486d610527d
SHA2563a161dc4a68ecace7373cf8807fcd4bf604bf64488f837619a23b3e87a9b65b7
SHA512712ec68ec8b32120f6172df46ad37a1711e4d1c61681e1f47a62ac9140b2b45bbc12937eb528b1dd73faf200e8a1603672f9fb4d37cb6ecefb766addfa21e034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fa9d81d40f6553942f0e5fa1bdf244
SHA1e3f3dffc8c4406061d6c68fefa9e1eedd8d80927
SHA256671ecfcedb1be1056b9d3274bbf8f2985e16e152281001480f6b8e1613e72aa2
SHA512922e1d3828424e892769ba9f2047ca25293aa22ee05cefe8468f2485bebd22244971a91dd0fa14e857c4064febbb42f24f76d72e8b6999d16a5ca1e153e40375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50521e073130958bbbe04bc33a47c79b7
SHA115d2f4dab1d3f6d710093f747fd254643b40d741
SHA256f3b68acab5ce7fef3971c206119894b3700fc1c4c5ff3bb0c066f6ac0c6faed8
SHA512dd1172083e10a798dbf25c73cd3b077667a099022650b8a1317e1c4a3622c2164a00a4af5b52ee8647a55450d8cb37f9b31cb73d2a480abfab1f5faafe60c196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec53d4350aa82867608ea30889b4ffe9
SHA1d292bd5d742ccee735d40df3939994cec87cc84e
SHA256e82d269ab8c2d06463d93d7f9a4e7f83ceb17bb06f1f8618f9613ec2f9036f33
SHA51293e3acf283e056f3b19e8a5d1b83a384cd3adad45622bf2d02cbad65ae14398a2ae6e69a52683dacc1ce1ace15306d13909f9c806fdbeaf1f0167611b1f1d8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116c0037ece00814fa461a1767e93d5f
SHA19e6d60d27ae1d2c9c8065ad8379f1e5741404302
SHA256178818c495a7f515c282a80feb97df67e75d186229585e0e6f211da6e9b06c73
SHA5120a32cfd7febba57ef02b760019703b8465e5e8ac392fd8c228c2dd283cd7844bfe94dc15ae3c03ba60d28272cec4c8023c77b053d853704d35b66c311b85cd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5cb06c4694c9b364e4f58cc83b61ba
SHA1bc33839acc786c3ce5309cc9e218f58117862161
SHA256c4d10b2905763530c0fb39598d549a9fedda5bfe7454bfb9a771e00e0ae7ef54
SHA512ca557d6d4ee86901f4dac08da5169cab593a54ef7d0e133d042e51477928644de78dff2ea025c9a95b8073f68f1cefbffb9075a9482d9e04922c55f151404575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b33c0b6147477f7ccbb339c6f3c7e0
SHA15f80bf8fdadded025de54d24755cfdb0d6c933f3
SHA2569416df510e2ba0874c22f125b6ba8fd184efb4010ad5d6dabf581930c59e94bb
SHA5122fbbbfc475111b6f04305fb2c406e0b1d768df6ae877a575d34b984691df177d5b5a08a30a211450c03215b8d52ce90ce78b0ca484ec89568c7875b3d68f1c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cdc9fe2f69c3e09fe5daf714270c3f
SHA165bfbb4669070d73297436d363ac620282850ad1
SHA2568d1c1c9d6f1d26e180b0a7b9d1eb16a2068b0a680950b361813d5bd8f2c196e0
SHA5129c5c40cb6f1b2fa0732279c8e7cdc0b2408e9ab52596a7f9f9c4544d3af8ce273f81eab6988ed85bb3b3a41b1c01dbe22bffc75f0a18567ed496eba84d2068e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacb9ed96fb2f3cd4346c4157157d108
SHA125e5bc33a1980d45824fea227010bdf62618e744
SHA256bc83ad07c8eb0889f70f87bebd772810e584f2fe628be9ecdea9eac1b7b54f2c
SHA51225709d94ced726e323d3d2c2e2c5fde1044ec32fdba5e8c8ab9446b8dd5842bf321a69e10dac0664d23033d4c9c375653c4f350da4587e429a4a8db6d77f49ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e752581ac0428ef1117f97f87701fb8
SHA1b27634175cd1cd254b9ffe3641abffd4421eb751
SHA2562705f44600b07c324ff940e4f54d8a71c33c1c7583e20c8887e755f918a4a2d0
SHA5125595230b0cf4ba5035989ee7972071d1e1a971d5f61bc827c28f48e16d0fa45ef77df2d62b1686f804dea4b85db2ad7c9a549dcb136a15804738d2b9ac57bc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527988e416f569f7243dacf8b1f38391b
SHA15f1d0ff93d312caa4259c2cd9c52e23c22cff228
SHA256f757c160fc544266785a62afad0b5695d8403e3da22956c94aba71b318767f8f
SHA512ab0c831f14404f5dab4d2a4b84115ef32bc889f93265b71ccd4c381abf1cfcd2613ed3ff143b2dfd9d6e1ed472684c9e4a33a1a2207ef9dac4fc475db129fb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f04dacd48ae9eb13a28ab2f5f81c52
SHA1f19d89b2ff0661409b219d60645a7d731d6c9d36
SHA2561fa377cbf85935d939bf772c21ff071a04ec6a35c0a44565f80d3164a8fb16a1
SHA512217b34a628d563b1f5b080fa98554697923cd38671fc8ac2b1db12a4ae631d74eb041d7cadedb8c1cbbcc6f491b4d64129cc2b903d9219fd8017528adcd0327f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8ebe6b89693b8409987d3faeee9ccf
SHA171452ed5b2a9eb20b19cf60dd38a73895515e9b7
SHA256309499f4d366b8f7a567258a529cc41a4142422fd4efbed06ea883ac909a6c52
SHA51239ef937105b57b52801107aaa3f3777bb5d198ca76e9d81cdd784a9e0f270944bbf1cb61c25298e60ac3101e20d96381db2947a8674c75c4b6da6cf3392a3a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac22d7c725d2b295870d40b33bd5bb94
SHA129e48fb7fb758dec416f9e4b0376eebb4052890f
SHA256e150e18003005ae4badfe546af264310033ac8d7cdfb2b2a0de96412375b3485
SHA5127ecc2103a26aed282c54b5d282afa15e4a7eca8511705d95b7f5f4f74b2e5d8966f961096a2af23c0a6430c9565f084c72fe0a222432df4b1d22fec9858b9449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd176127a8b5503bb63e1991931f240
SHA13462da48e1f85a2ee8adf20d12594da20701e072
SHA25691d89cc3ad77601c6bb6fda87bbd2b4daa89a92d031c8ca8da51597d4706f7e4
SHA512af7e93757987cfb9407f4b598a2efd10409642e5580203a49bbf6bb0a41e12203f5b8ad57bead01ca47076fada141fc3dc92ca27a352311dd569bd4ee97cd31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b7a92c30e10cdd20d7cdb51b398b12
SHA12a2d397470409d74005a118f892a1dccd7c9fe88
SHA25661011f0059678c657c92c56dd0f1f6a76b06db9bc0b83ca50a976fe4c42eea51
SHA5126a64ee0cc9136d5f0c1f2dc88ec391647cb5c99fbf08a3d61ae129d17cb6e68cad05f825127b146be6308383f5754d864f7cd3aa42cb9ff8f84b0b085d8ae3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afddef32f84f521fc0986dd1fc23555
SHA116167cbe9335dc2569e420e8689376130befb782
SHA2568ddd63d32b754075c4faf359949f5681a07b6880c6c00357e5732e1c2c5e2762
SHA512f2aa631b6e30887b18b63692e75c8b95acc6f995823880cfc7bf8c9e27a033b71b0c8f699dd5f9b6b0d0a67d47402d86a4b50f59d25994c1ed402acaddd5cb2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b