Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
351e1defee0b1460626812c9a15120c0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
351e1defee0b1460626812c9a15120c0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
351e1defee0b1460626812c9a15120c0_JaffaCakes118.html
-
Size
14KB
-
MD5
351e1defee0b1460626812c9a15120c0
-
SHA1
047a5a3ec13d3b28423bf901db0b12ff52374b8b
-
SHA256
0e8889d037d720981011fe7f82e49bee2111a2f7a55fcc0ac560e67097167658
-
SHA512
c62068cfa13e03bc48f95ee6662eb84a54b96ba5f8fb14666f86a9402b8d5c94903750bb0809e7725e97fdb0d0036a72873ebff10deec727eec9f3575a3469e0
-
SSDEEP
384:wrtODMDV5JwK6nrJDa64ZnQ91TAwIqp0nafbho:UtYMOJ2nQ91TAwIqOnh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF3EE301-3EC8-11EF-A533-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009310abb29227d1eb3619d7fc0982beed1ebed1999a7aa2307c32da446aa7e515000000000e80000000020000200000002ac3faf863f3c9830bd0ec007ccef9739c36cc0cdb13eb23be688ea8a963dad7200000002a3241757b76a1b238491e052524d386a342721d322ba137584759943aed73af40000000fe0507b70f9c9465aaf737cf3419077d1ba2efc6c2ef0b7a6dbcb717d575b12a60046697fa5cb55beab7e01d53ce7f6dbaa0974d5d34831f9a924afcabcfd82f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426783688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c026fec7d5d2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1188 iexplore.exe 1188 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2748 1188 iexplore.exe 30 PID 1188 wrote to memory of 2748 1188 iexplore.exe 30 PID 1188 wrote to memory of 2748 1188 iexplore.exe 30 PID 1188 wrote to memory of 2748 1188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\351e1defee0b1460626812c9a15120c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068d4df75d79d9cec1c7b07705f53e42
SHA1e5e574394691846620808efe4b77a205771be018
SHA25615040319e7b9a4cc812af164fcabc970cadc768be3eacb00560e3c05c928d7f7
SHA512004bb22581d22dc70447fc6a65fa3ecf5333822576d9a25f5b6ea3b56df66195d10fe0ecdd5623fba4fd8108eff998546852ec26cbaaee08411da65aa262af56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7190a7f0a9eb2ba59e3bb8b904a42c
SHA1a097ea4f040016d944c2733f0a08dc499127d277
SHA256eb911c0100f334f507c289cf43d31a4472fcb966c6519e0b032438fdb4932451
SHA51252a9a3309680751586e9a4911440e91e7752f99ec9789c96c545061af7d75c6d55fb42bae3714f923c3d32fa72bc341b2bc079642758d95824c01e626eadca29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50131e284f7213a4480c0b562f1883fc3
SHA18b4a6a7e61a93a5d4a0f47cba8d1165e347910bc
SHA256a428186cb7359e8728f2afc3d587c9e100ddc86e17e15a5166b6fcdfed5e91ec
SHA512e50d7eca7a574c9475f71a7ee69912c413e1141628440ca4017aeb4d0395d8c79532bfd403f57b4ac6e2f0409591d7fc3321076e9c03a35d349f83b9b80e84bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575fc08bbc2c553f20ff0f001ae8238c5
SHA1f409fa0c646ff550fc4dd1875434aa8cdd315acc
SHA256fbba3d2246dee9f3c3b0ee5a68d5ff497b783b41ef53329fbde6e8955bf1e404
SHA512b463db407b7d2a63bc497b6ac147b83ffb330d3cd90316f92dafc20ae0664cc05823b7f32361f226956de488195bd680adc8a55e13510f60a010a120ee7296c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c45037b98eed549fd68b5a1e4416534
SHA1f1a905208ff62802329e9c2cc7a687bc04c73a4e
SHA256fa764a231256bc7b1146e4a05ad07b7e6685f0ccd51c00bf3f173e6e41241e55
SHA5120505805d73cf2613d88ec3e9334d53b28d752cb200023ac7e571ff284f9009eb9d30f7c8e23ffb4d7162b203bb416af7e3301586a5af9683eca3ed1a83733fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59738b29799fdd739b4d8193d4191fcce
SHA1d37caec86d84fc2c6e2ab68679392e8d3f06e567
SHA256af4df47684d419bf16f2bbf1fea7cf7c6690e7a027adc2225d69ad19e5ac2e21
SHA512409ce4b9f88e55cec32b8aa5133cc9c31e3a5200da38f6cb37a604bbfcd672626dcdde78f9154ad993a4c5dbf1c8f742634b79da6f06afd5be83eb67ec6007d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbb4d2340f6b495732e56d5f4254b11
SHA1c5d83ea7f53383ea154258ce83024ac30c62588b
SHA2563ebd87ba958b78de5b48ea091d8ba77d397f0406effeadf3996c82bce3d372ba
SHA512c5297702da831d317048c08f5a0dbd98206d50d87afd3034f5ee1284c7e75f54f80daf654a8d1b5d50a7ef32d4d4bf732ba58e00c9551d52befae0d68a2427be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745594477fa2c933ba7a0b4a599307db
SHA1d014068e37b5ea63837b1a3e197772d2e618c9f2
SHA25686af9e3934ee780f1b8a0d4eaecba15f56dd62ecb79d7a95e1a8d28f228289fd
SHA51265e9b0763bd39acd3d08ab49dbf3f9db7551988247b2d188145c89abcd453d63b0f6bf04cf51177905a81535c7ae9bf5b9064694b7f428febdbd952c8ae959cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0336a57923c6477eae8de20c330d0a
SHA17050f4e3d379bc276567e8f574132387cf602e97
SHA25659aa10d3c2083528747b01e058e724571a54e1765aeac0cec634fe9166546558
SHA5123396a7fd9600ce8154666fa6353b1354229d3916c79ee9133a49c9da4046c683d1e4ce091d16931a9e029bb182e5b2b70725b4e8a964ba26e02e2f210f31bdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541878804942722d2a530bf2d3f35702a
SHA1b2ca372adc2824bb3d6300006e29f1b8040801a9
SHA256f121c848c4566d6f9cf98f4bb6d6fd7507525c9861c9147135cf7c51aed7c583
SHA5124f105231d7d9fa81a7323d5992d8b3150b2341b64d2d3afd6f15ecc3212398769d66a3cea98f1bb719585f076087afc5766097fc4f8319055af306705ad53459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbe14be1de98327cfd3e4c31d3b2671
SHA1a99e83235595bd91ac61f2ef3d3ba43039a80365
SHA2568a1fbd5a88f937f5c13e92830a7309b8b437404aa16d3086fc6bfa4778902ccf
SHA5120c038bf6d371dac232ae6202531ddd7aaf9c41df7eea005c3e476067f5410ba70f4abee79a47f934fba4974fd846eb90458fa3a973360c8b90039d43224c8517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb6a50dfd611417f6c6ff2ebb95ca5f
SHA15f8082e101fbaed824a1b9248fa4ab477ccca31a
SHA2567bbf86428401a7d7ca38c59f470971b81cb081fb4ef5c85ed723f59f5d1a189d
SHA51246a3a8e31cb2ee3975d6a71448f27837ac8a629af838f33cab8ec4293d852b5bbb1125ec468584f7acc080fe40e948e2b19086f5bc047218408641960161bf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40480da7ea86e7f61dda705a0aacae4
SHA1eefc74aa1d28f1525798d79a6e7e2f71a75751d6
SHA256edc9c772dd1e24f32490c4bc2fedb7f86b9a273f26ecd3a9df6d2aff8d7e2242
SHA5124ba1ba6e285fe4ed114ed6fb2030083477b61712180da35f63d2be158900c9115373d83d4a6d332184fe4c88470c9038e768884c358f0a24540cb040e011c496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d61a4ec5bd3f7a0fa96903803b11f2
SHA1d01620e5b446ec5c1ab1d878b8e4132c134e8127
SHA256b6f4f504d033cab336b445f555628892de3fe2ca6fe1929f24648bb5222dc092
SHA51225413988aaff0ac5b07a2c76393b784c19b68dd14a1d525f25a3ed3e8d7394422f595749a30f1c5e1e17c23994cc41afda52c601a5436c9ac63f95a804594c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a25374833ff61c7f583dd38499d9b41
SHA1391d667531f1c6864aba2c2c47e4dcb4403ef41e
SHA25641a087a6fd1e7265909afe74b70f9195debb438c6782bd51233d0bbf42a36170
SHA512efcba4d6a7355a096db08bec8156c9e893fc1286e0e129da3e0850ae5a5c5c9a64ccebeebb362e255c2252c40c00690a41e5882ebcf4f78d8606fa6e95c9da51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7ec9758fc5c3a36ed1ddb93c9484b8
SHA143f18bece14f1a3853fc57a599310d984355fc96
SHA2561bbcb6292dd154e18c597aaeaadc8a5e59be40d07c0918cdd4112bbcc6fc815e
SHA5126f52ac86dd6ad2ef6c6ddd4e3a3e1ccd9556016856a5b9c3192dbfe68d51f17af4cba4c7dee1e531c24c339463c99d4c06a48df4d87b6a5d6827b67a0f3ade5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022c64f946c6a861457dc018f96e5954
SHA10d3eede35a83371123f139cb95abeab5f3126438
SHA256532d313c90c3e404be8c72c2c5e7bff56e1fd08017c0b9c6be9948a729e26a59
SHA512d3bef44c08a629b00f7e803f86252fb7241706740c23b0dc51c368b8530a795cd25785043a86cd2a17e3bdc5b427610069b5dc5c5507f012bb528fcac3441e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47b9e8fa042e07a48822d50c2b7318a
SHA10e947a80b420f04c1106a07a61bb2f44a4b6a4ab
SHA2563651d5a582ade0441ae216e718e8115a3dc9583654de2fc3e70fb4eb4adf47e4
SHA51218fde3eb014487fb9ebf30ddc8ea6677f0e8aa1ac225111c0996b6979eefb02f9a84158731872db0d560b8c2e0939e0d63c7ddf6389e1c46ec070400eeee08f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658dcd01bf90fe40e9e4b04f872ea3ca
SHA105f650371fffbdcc4094bf1cd6659da17fb60a32
SHA256b9012eac42c533de534daf458918a203d4f67f6dc92748669f815de4ad258522
SHA512baa618bc53d8f004f057bc2ee1034744827fc38fcb34c0becf769c9f8b3d8e0fd0b11309aca822f792a50dfbf2aafbc9dfd4e820216acd0dcfba157952644bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b7da437a0519e47c34ad2a50aac521
SHA1acb3d43978602731aa9f4ac45fe007a3e25f744b
SHA256bb76099a7c4085fd9b8071a27a1c290fee1136463206a01dfeca367ddc4d3bf1
SHA51281aae5a610f5033c08f839c6c5c49e242019d130779a209069aa70eb0a641d01e9346e346ebb45b0da0dbe44955740d454d7647c0cbd8281d0b17e1789d9927a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b