Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
353f6b40d7d6a2bc16d73eec4fa32feb_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
353f6b40d7d6a2bc16d73eec4fa32feb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
353f6b40d7d6a2bc16d73eec4fa32feb_JaffaCakes118.html
-
Size
53KB
-
MD5
353f6b40d7d6a2bc16d73eec4fa32feb
-
SHA1
f38a85f2fc6b7768e4de271ab225bf17e54f5fb3
-
SHA256
1a01daa281b764a36562383c1857d4dfba315773fdea789561214126d14d5a48
-
SHA512
7be77d240408cc34552209329656504e7452d45cc4d76d360576e890159e5defb0e77018569da6b426f4594289484c69b307e26c68002efb9ea8036a51f10d38
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlYQ63Nj+q5VyvR0w2AzTICbbCoN/t9M/dNwIUTDmDs:CkgUiIakTqGivi+PyURrunlYQ63Nj+qC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426786083" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09f6c5adbd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8386F661-3ECE-11EF-9168-6ED7993C8D5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000483df47c80fec2f3be325f2cf23433eb3a7866849e90beb62d141bdcad055dea000000000e8000000002000020000000fd29052c656df9adc39ea4ca93654deba0f34788d01c24c1609f2e7d30ec24cf200000003458a2868014a72b5c359e3dc134509a285dbfd8ab9e8eded64c26ebd084359b40000000245963a696b85b220daf2e34b0d1905bee37fe17480d5fcc296530a358ed071222be0f84e5d2875217a0fc8bc9bdc68119324619737ad5d80d696d828d9a9df5 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1296 3040 iexplore.exe 30 PID 3040 wrote to memory of 1296 3040 iexplore.exe 30 PID 3040 wrote to memory of 1296 3040 iexplore.exe 30 PID 3040 wrote to memory of 1296 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\353f6b40d7d6a2bc16d73eec4fa32feb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010f54e4a208e659d949efe10c56cf3a
SHA1f0891a8be8128cb0097213d6b58518d2c5e9151f
SHA2569c44a18d118ef64909cb39459a9f857c09441ed3808f3dc6f35b772f75214438
SHA512d56b01d0166cc0518506cac1b0a97955d8da98bee1ee4873414461db85e13ccc684bbd4988d7ac29b7e900806bde1359f7e7bc4d1c30e3e91a9492020ff41cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c14bdce1c56812dc95d499c7de7735
SHA17d32389b43b7af23a6644d2732452b97ba651cef
SHA256a1e5117ddaa839d562f1f570e0d8139b0d565459347f47c2a1bfbe7e518d647c
SHA512691ee626a6628aea18af95760effbc027fe0b404f56d762a2751dee9f632908e34d43b2f0bdcf1719f22d252468d75dc2a4b215333abdb4c068b792a883160c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d35180eef3ef567f96173897267db8e
SHA195f723b6223816b666195e3a1a7e723b3dd910a0
SHA25600fa25490f3db091e9c42ce28657a541bf46c38db2efd2e909420b1474011010
SHA512adf0bac43767f7748512ee60216eb9e7f8659c322ac99c9dabae03ebba0c81f421524b914356c9084c0fe457093ec5475d511cf2fbcc14ce8109cb18daf8009d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61cf7d008f8d2983ad5198de4019785
SHA1e64e115022f2e6d7cd08c03b59466813e9284e38
SHA256c33c40b623a91566f692f55e7cdfd3a5b42bfa6749166d45150710e8720f3f39
SHA5127484682282270870e54223977d1546b26464aa731a3c5393771817281884800cc9cd77906545fae421daf25bd035a29d72aaa1cf861380844f334e4de80b6801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd0d461850107f125641c7ac9f75e7e
SHA19583ef99f8b65958facf9afb6b37b26f17f4d131
SHA256ad1e4f4917ac4a3cecd2cbf9d3c19031b8a65fd3cf0be7942a69729d55be202b
SHA512132db32779ef788ae806143fd5f85e2088aaa65307f84c63ecb7d97e6b41d3654275ddb0962e7eb87b9e1cb1b9e59a59506403b9e3a2acff9bb6bd85b1f05614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4e6836f1369ab8ee8786417bcbabf3
SHA1820619c57de6682dfc71ebaad073c64a9ccc143a
SHA2562f3185765339bfece2575984d85da3c86e4025591efe40e2c437ba693c40b98e
SHA5121c503fccc4d612af12cb70bb9dcf6b2858bbb8f321d8297de336e8c3e57a85542ec88052e18ea569a8fe57554105ded69d182e824f16a833a1e8fd6ed11b2687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd646a22f56984d061f2b62da262b13b
SHA1cfe01abaf63ce7969bb53f58a994767a5b436391
SHA256275b2bfc49f7171b9c6f076daa82583711b61516c0ab7f561fb93ae8b73997b1
SHA5125044c4323ec35377e782e34293fe36cd5297d01dd4ed90a141f6b5745a1f11f51975de44ab877d85a9294069c5e402e6d2e0e4aad36986980025d1e376cf97ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbe698baf98e89923c5bdcece12ed8c
SHA1d30af2366d7905b4fdc91b0f9ffe6fcda2612775
SHA256b5c28d54cc280ca2dc7757faee67714ea2509d4777c7a1819c84b2ad2d64ed33
SHA512e3449a9f2b7433a4c5be8a37a5772d2fc25e9017cfe4b94b48ee55f0b269da509f4344014154936aaad1f65a8775b7a3dacd520b42d57b35b91aa2d06b3be90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327cb81eb7b38315654dd1a83564b855
SHA14eaad94fd023874da20fca359d492652e36a8ccf
SHA256f75026435fd8891239ae0757aebb32c39f45f31d4ab38bcccf325610df7dc06c
SHA51225330c5785d615ddfbf944f192305201879d3f7bd47b75abf3e5b627bda95841b269f4fe6b29c15a83cd870734aeee6b994f317524bbba6b1bbf054f6e6b6e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d71154a6c4fb9c34ef6e79e3bcc8e86
SHA1ee252bd4092126387e212536560d60a644874e8e
SHA2563f66e3e49e55bcc2f06e652882cd9bed039ff773adda503f4bb2aa1f3750b63d
SHA512562f3c4d5b41627f4b389383704be7d62ff641d602e6dafee8fe4df9f759eeac3f5703bf38416d4ee56d475ac5f9a9828bfe1444a36717cfd997fb7203bec6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fd55776ac6a72469905246bcf7045f
SHA158623dd8dd94a1f7afa1d1056815f7c5541c3c0b
SHA256ece4e4d4e89e8ba36f2b16c620f9cd12337e61942ad1d7caf992e1df91b31cbd
SHA5124003ec4cc6cff4749f9c08bcfcb027de5d17351d00094ccf072a7917f5ce6df3f217615dff37fe114dc67eac134274404f71084e2b83f6961ac24e05270ecb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fb556acdbdd63b5ff227b842a061a1
SHA1d3b0eb261ecc6a8690684cb0903fa6262b1b1c2a
SHA256b06bc14e78cfa068888f4a09c3a94358150020394b4e3c94b6a63186b8fe2a44
SHA5122dbfec5dceb1b840627dab12bfed9c3e389b8677d7ef0d6c72f26d881caf67f3817696ebeb1c3baff2ed26bf84478cb25d7b16ad19e64b810408bde35e94fe80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598747934f1e70cc046b034f64391ce0d
SHA1a7c60ca0aff31c0fdf91da532cd918882fe017ee
SHA2564d31b96161dbcfe1bcc256991b4ec3740303246c98f37f9db716c30902a29931
SHA51265614fd3e05905b0817799a37cc1935b56ddb9f33c50dd70f6b458d331a42ba45aee46094076adeb71194eb43dcde92f14627ff2ddd46164c194cfe25ab7f6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506c2703515380395c588fc8acbd797b
SHA1288542dcbf1a2cf30b6985c5665a6473fb2a0884
SHA25690977fccaf16b6b698d59411300f61ff6cb17296d461236dd83f08e95acb6f59
SHA5128b9fe7ed48b859db65f65a8707ff73bb4cbb30d58a7ba622bad3c6bd8eac4c9ef82774130e330ae39df674e5e20aae25cd274d27a7c32445b6e659c5d1be3a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efb380f3dac8baf281d76baa09c7298
SHA15d268c0f9952e22121e9c09da48a7b721b8c4a06
SHA256a0b57ae805fe4c06c52c7c0bda1e86542a3b959569620fe034ef6a1188b9e04a
SHA51244a0b33e0c4df875eb0fc021b67b394eb83cacdcb2884b3df078787cb1713e744f69ae95f146c14d05beee36a29f43f45ebb624c2f4e162d2ba16d9af588551e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91aeb6d903dec47885511d0c2dcf039
SHA179de789c49c832dc6099a63557e99cf7f9aae5fa
SHA256d0df43defc7a5bbec50b0ad84be40627cc804a7a5e0e0e33536351ae79b9c385
SHA512d1ccf0853b93164cd9313c744a7e5964aadc976a1bda54b400b4dbedec5980a3edd05ccecf57c9a124bd5a9bf11476f9008d05cc94fe6aee16ac40b4ba7582a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55361e2c2aff531ea5def6b20a0caabee
SHA1d0e67b573a1905d5382b0f73402b8b40aad35b72
SHA256df490ee55c56ef3177dc0e2a15e7a0fac847f505198589c1c3dc6aec223fd69d
SHA512d5a92a409862e39048b1b01d7275858f350d1e40fbc08b3db3bd76e21aa32c4f8ba7e11f88150dab13cfa4eef8f6e70bf3a342acfc4e945424b83ab8e6679aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41c87c63881b18785d71940bc05c96f
SHA14228e6559b0d26fced3fd055bcbb8bc33cd2cb6f
SHA2560b095b993e42952d49f02087d870d3aedccb7b929d4a0e54c57c3e818aa575b9
SHA5126038e0eeda312cec23fd52c175b7bd0b561f3919aa8645298117ca409748b9bb71956d536e1ee81475af72f829716dc63c9872165d6e8fd323957fec8f8fb05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829d8103399c6fe8ed899864cfb4a2e9
SHA10f4ad58d797cb1bb17de40a230f69c3d125a5315
SHA256d6a57cb3c0c709046cdf48dda90d9ca8d56b5ec29dd51d1457b169ad4a2777e3
SHA512cde24dd7b9abce3e56584e0d9609baa3d58e6f55b448352e89f42f9445081b228473de17495ee6ef9490486a487813dc46c5784b54620d0c2a7aff042fd80f5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b