Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
34fbf0c5eff3e6fed999be4f8810cdf6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34fbf0c5eff3e6fed999be4f8810cdf6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34fbf0c5eff3e6fed999be4f8810cdf6_JaffaCakes118.html
-
Size
5KB
-
MD5
34fbf0c5eff3e6fed999be4f8810cdf6
-
SHA1
3fafeaa477a9fc29293916c3acffa108d3e1baba
-
SHA256
5b19cf82178f3ba5d20ebb5c0e81ae9719b1391def986ee86fba0e7910cec3ee
-
SHA512
542e738d1a53abd31b3d80b4318dd934236b14c296ee5ab3c8a615c7d8db39e28a37075efba664bbe656809a45463f673c9f6403327febaa4bdf414d0f142e4f
-
SSDEEP
96:uL7eBzn/eXgURAfmUg//c8s2dr1UxJ1vbWLyIv97KjY8g2ANp7Wv0fULrEgZHaL:qwz/VUL/tvtXVyuNp7WjLrsL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F9A3491-3EC4-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ac21d55aee383f15658983bdc9b6e37d7d34a1a6dcaa479e4a6cb38397ae8911000000000e80000000020000200000004500cd71498533935df45956805bd8b51ea563d4986a8048bf2e96d1ff9dec2020000000161445e35eaf00b777c11a0aac9b109d9efd41c5f18dfaf15bb235afe5c89e9240000000451c6aba73af472f04c92c6a34667e7f27a05040e61e4015315bdf96750507686f34b00c3fa5f32ab77b6e0625512642b0bd882fd1df87e7f5e78f01dd218618 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002debd828427b0eb3e71614108c2517fc18ea17dddee422a1bc7a215e7fe0843c000000000e8000000002000020000000a19082139c4ed8a9468709143c9e5a39e8854973501ea365e1033b2b5d9cdf5a90000000fffb41072ccf8ab048c6c988e2637b392307c148336832e8e134af71a3e7ff26c9abd103f3fd51c81062aa5a497cd2ad4e5fda9f229ab45045d65ad7cbe7b84e71832d337b11bd37238cb6eb2743ec87e33cb667a6a722439f0a94b02d1810f1ac04bfe0e683fef047fa676de813b3f6def7919f837057eba13a0c5147dc315a15378536f7aeb7b60b4d7c340c78183540000000b40dfbb641530afeef3f7d94a2fd6a953d604c0c7adc06a9bed8a800272e7570369c8c1d51dbcefefdfe20ee9d92c4e6724b05f1182a974c0725798fbbfc0f06 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20961a04d1d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426781648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34fbf0c5eff3e6fed999be4f8810cdf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cf2c3cbac135bcf2af5505c55cb278
SHA13eb7bf68246accd7ffbc6be174ffbcfb055f4613
SHA256ca93be593b78b90e8275d24bc24977aa41df62355c2c078c3aef770ba5d5a56d
SHA512e8ff833884bbd8f5a1c59ed964444e00fe9c19c05caea74d86756d17df12ef99cd51533e6c88e8b640166c2af3a74f8768e0f64b51e446680952d6f551023583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eae24761197aefe756832c3fc289ad
SHA14b1ea920ef764ab959a960d1640039497cd3469b
SHA25638772c5c05f46b0ff62142cc3464ab9f06d7598653997825dc53b29df2706342
SHA5126d10971a99316e6cdaf06dea04f12ccc1eb74cf7755ffa842623dc77f0cfce0c7f54f57c73d633df22b2b002dffd906f26e96b7e6c59f42fd2c027bd271922a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe83b97df600c94eced4d7b8a775372
SHA1ed1ac7c618338a9bf0963e810d13d441c9977bd5
SHA256d5a3a67a145b44f67d8edb1c16b9f5b6187fde2099bd2224aeb80693c7e403dc
SHA51268e2ee689f73142ef999835a76ea51e0702091f4fd6368faf91370b0970e0b3a9926193b12386de2d0b219ad3149f2faa583cd0e940e66e9bbe461fd9b6f120e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005d5f1d0e3961becebecef4ff685469
SHA159e8191b19e2b470e090d519e372401398b310fa
SHA25679a14e08f1b1df374979a798cbfebf5ac84e8be253dab57450d42f0a110d31e7
SHA5120344d6a1e1597ae9d1ac0a57a31709ad47537141e9eef3b442293584c0570423fdf16d8b3a2aabc18623a3d9ca696ccc90e98e89e7b714704bed1a908db0fad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1a19249fd979a6f11649ae9dfe2c43
SHA18dfa296a41eac04a9eb3556038ce612e531696ab
SHA2565154e421cfb6e6fc19d1e6c14b352bf6fea0272b3994ec1c290cc19a5fed85d2
SHA5121e11ba4166fb6bffe6d072a68004c54bdee63d2e7ab3e0f927660943614b8723f0ccaaad5ce2b5fae54452c9868fbce1425e55b76832c2161afafbd6b25e0486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a21e8d4b5f956b4a78e512ad71d931
SHA13631d9f476d4326eefa51db2813f7a8cb395791b
SHA256e02cefda76b9c1e439e30e9be92cd11fd736160895587b92114a5c6611a72867
SHA512fe827aa143b53e825d2e1efd7ce74794b23c8fb83189d67d20ad17eadcf97796d2fdc0f1a97dfec4bcd76ac0c36375506a529c3e20fdea9aab7a7483111b9bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9d1755f8feaa0a1cd379ffdc9899e2
SHA1a57267b5d1bdcab607e548720a20eaff3c5e5f5d
SHA2564077a8a086a3b970eacde3843561dccf432a9c6b3409f12170788425582d2952
SHA512a529a3443ad0959bd09bd4b7ee335e783a0ad90c6c97eef5476fba26905052fa782671c1d353c1c220eae2b49faf50db9180db6f5e74d36c4bc84e74a9dc8717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578eefbd690072e55be299fc667a98ca4
SHA1e6aa78e7895cc797683c2e205c32883f412221f9
SHA2566dcebf5cb095127f88a5f72cba45ab58b7ea265c10158f7a1da160bbae70770e
SHA512837f208a88baabc1f1897d1965a8551623ae0b748710460aef6318864435be14c370b344000163d5b1374950466c639660385e0378cbbdb23d7eb8ec309a2efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d6f6dc05659db291be92df6fa46d37
SHA11d057e9c64b1f0cc0d54d51d89bb985b38fa472c
SHA25681232bc5e280927d55456e8279a745b75614b5bfa7b34090bb350eb319107390
SHA5125c374b25d526b9fc003024ede78038e28677765cf003de0405c199ae6d52315143b8ec330236b9e7e0b48593d1350e47562ec149fa8ea173919fc285c18e6e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b4c6c7c6710612e28bac530c5c6298
SHA13bc1fcc6de94bcf5fa88d8f0cc9a85732d060bc7
SHA2568a287fbab656765f632c028b584cecadbc17bf01c7efbb3373ee0ebab1a1ba72
SHA5120bac24666f42137defd3f354661dff89a29d0d5659f4cd297038b0332c931c0818db824681c27c74a7d02e2fbadc4769417d99930940acef7d2212efadb17880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f2fbdb1c582b5e013dca24f92bd6a4
SHA1def2fd5a5c57edc0929bfec0555e4c8dc6afc2eb
SHA256dbc8deae189c5da405df2f59bc24a2f74f16bcf549437b58e089e0705c899455
SHA51206febd5a5edb24a5b7cb3dc996ad7788eb49c9325fb243251b92322c68971a0773898da4ffa0a730b940f36c190d0fca6b74d0af277e9a075f805f55fd2770a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385ede085d6ad1991620cf5dff046714
SHA140fffa3d83d3b86dca1be9070b4a3ea179a77784
SHA25685ddd3e18cb61106bbe91701441aec1ae8f65ed730989f996fee6715c3b98027
SHA5128d56ba8d09c738293a014ba94fc02230deee15d14870274e7551465081ffb9b738d09c99ef0f3c40f8f52754f1f72d10b834d7b60de3545691617ea023598d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56399d03f6fbcd705e92b0cf2ec0223e7
SHA1446ae42f2abaa94255f85f780fca050f620393f3
SHA256f327e9b1fc3793a530475f0b3812088961e2d79d6c06798d8905dc65200722e8
SHA512559e8c0770ca4fe1167e78c559a7aa993c7d2b8ae5f0ebe63009650bd9117b516e0f6e41121ab96999eb76465619cd0c8536649a3060004a8ce2e5bf43b602e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9ea6a7464a04ed2365b8167027e59c
SHA1bd6c2177893b9ed4fc57fba7732b2b8d9fda32c9
SHA256cd7fe34db63326ed6450bece31c244d221252c59510b5e0be871b043c1509338
SHA5121d34c9ee13117dadcc274281e977696ade9dd0be3c3e26cc7e92412fed3ad9d9aaefc9256ff4d8db9ad5d36fcf51c2f7564562f6adfaa41d32c018dc5f3465bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523513a529da31c2a88df5b43d0c6fe96
SHA13ecb162179b50887c08d8b4058dbc234293251b8
SHA256efb98c7a18037e9e9d0cbf0a00ea395390b4cff67e836a98b53f47dd289e6949
SHA5129e2714e8b0e2caa17f67b522a9c2ee778915a6d30a62ff7e81f31a4b7c51defd36ae135533d2f1836ea680718e28d38f75894326df61d1babca99a5c0f9ceed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a264903e12dca2abefd68a0b906905
SHA1d8ebb4882a20a000a874ac5bcf0efa3dcc0491af
SHA256db909d81317ec0197098936b213edfd8ef7ae5717b99a03699fe8600f74b9961
SHA512b3d8c08fe08ba4577f5434530604a122d71732f5d393038fc521a7acd19fff46d39cbc23d977022955cd8019c714a30e115721b12f0594215a9dae22dfbc432b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771cdddfecc5cad5ecac1fbfff844b10
SHA103e0fd0904d050b6554285d539abe96170a0ca91
SHA256c2ca810d5ac9b635ed02260402d0da3a6c71a08bfcd8d8fdaac3d64b29b44d76
SHA5121e6b46c0e1c7657311fccbd0123007b4bacef5bceabf487dd350809c6c5b9350beabb8e450937b7f37b261c678668310686c8aab6f69f96cdb148565f4bc4272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262112988255779f096ae3dab4d4f2ee
SHA119fceace842547b28b3b54d6679c8914d3fe2315
SHA256e4918c4b1945335743461d30b7b0e44da74916b317aa0f812444a94cb3d70b40
SHA512d3fc95da63a76b44acd02e9607de723c3bdd1d779d98c7cf2999337b92be11785f8ff560b1e688a31859c99be1fa1264868e8c05c1777698b8d5634a611e6578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd434105429a7c723a9ca37a9eab828
SHA133540d47750085960ed373855a5df273872a15de
SHA25601b9d2d065940a63b6278bfd6bd57881987996ad8f0302fb81f7cb9d2387af80
SHA512198ffa82f2fe47b1bc6a7d3331b1fd4301dad7839c194654909eaac3d461e86c6ba41156762fd47ccb8f853ce7b81b7e455a87d1a194a88f5e3e8d67e616063f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b