Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
35abfb9498cda500ce3a8b3514b6e5a8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35abfb9498cda500ce3a8b3514b6e5a8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
35abfb9498cda500ce3a8b3514b6e5a8_JaffaCakes118.html
-
Size
10KB
-
MD5
35abfb9498cda500ce3a8b3514b6e5a8
-
SHA1
5870f04138e52abf0eb18afee1b41e90b8957d7f
-
SHA256
c03e944948256aa4b74ab0df8737342a6c01dce29fcfc09dc35e5519b6d83394
-
SHA512
0bbaed5bcee451d32146716600d0e95cb9d76612831bb6a742f885d3bc666c36b28228944bd68da68b16afb0a6a8cf6eec1a7e155d2a3c3fc8b83a4d3b43c8d9
-
SSDEEP
96:uzVs+ux742LLY1k9o84d12ef7CSTUeGT/klUpM85MkOLomUkWj3lVHcEZ7ru7f:csz742AYS//sMUcslNjPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d141e1edd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C23C041-3EE1-11EF-8EE4-CE397B957442} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000fc96378f52ec576b4949e97d29eec94f0c63e12734c5b01f6bcff6af6bc7eeb9000000000e80000000020000200000004c88e9064235e70cf59cc241a9ad80b08ecbfc513358e876283976c10769eb87200000007a89906d0d56db53a1c98aefd0652852ecdb9e753617b6307a282889b3f016d440000000c14f69f12c179f7b276f3384ad30387288c8c60b110e8b3c17eac2285cbf830e2bce4e1230cf8739254e28956ef33352a630f4335f077ef82c79f5ef774ce860 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426794045" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2248 1744 iexplore.exe 30 PID 1744 wrote to memory of 2248 1744 iexplore.exe 30 PID 1744 wrote to memory of 2248 1744 iexplore.exe 30 PID 1744 wrote to memory of 2248 1744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35abfb9498cda500ce3a8b3514b6e5a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4b47b9e18d6c7e2f57c0e0a7167350
SHA18f5af2ce09dbcb4bea8220006d355672479a1c4e
SHA256d0b76723cc649062673a62677113884d614fa4d49c10cc26dadbe092986598e3
SHA512323e10e8438e86e14c5f19b3b67ba2fb1ba6eda0a1937206e5a09c5d975a6189b17667f3991acf17b3b5844fbd85ec1ac4fd59d4b7b61450a9d6e8a58eb56845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d54ca23b5238935146c3ccc7e784ccf
SHA1b909c0f9b4b91efcb27e812e62eab878f57a32a3
SHA2566b69f28453c710b8a0d2a420492506086fb0b34dde7f4dbeb891ce0385413370
SHA51240debf8f306ee722ba8acf7b2b73c0c7292051fb0e690d674cd3ce3fb4f434ed9fee481ffd99148a8791c6bc2399831f5726f4cf716f67c9446b2f33be9385a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7095ebd6306ecdb4c1579bc70381f7
SHA1990138fbcd124ed09e502bb98e44b8dc0c2b5fb0
SHA25674f7bf1d2f65b003d2f7bdb9478f8da2ea161b2b5d0aa53c8e7ea265ea5a501a
SHA51229fb54587aab275281118bb83420fd579af62f6fc5a41d0ecc2e353cc06c0c70f7053d05d4728f5cf1da5827c16ed5c04367e1b06f6e709549f06ac25072df0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2f6b6657c47ae2f9a3c89e61d6bc48
SHA1bd5100d8c6f6173bf050acc0547f2125de6d03b4
SHA25677f285a6cec5a5262a4ce7dd55ec1df08c4836582b3c5a17abc85dfdbfcefbbe
SHA5125aec4cfdf9e71261c2036ab63451d464bf98fe2b286f7e356a4665e27af3f9d4a5f2f02f40fd621a6edceeb20ffbd05e70dbe4f41b22a4ed4d241684af9429ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646d4f7d5ea895d6e7d50ae339710e70
SHA1a2cd5b457fd1f5aea4629657dc83484235bea16a
SHA2561c2b366c05b7fa88e22a338cff3a5da990907a7d9a19de54fad0757be7bf05fa
SHA5129cd8be2484221a2b87e854da5f8aef26375d97b43c09c40a1a3b7e52563c9a34412ff7e60d5a22520518237ab71c20d9d0ecdb46786338b13aa8d4ad0120a1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f71f8d21b8a6dc26fa1caa03258312
SHA102c935f66d45561afb41514529a50b650411424f
SHA256577ad197425e5ca804d5307a5ab677a36a50348110ad6ab12ef170ea532f4a8c
SHA512ec62b35263623f5b819117d55928c23b41613783ff2e2d6f9e7cda8958d19ffc7085c87266e7c215840b3a4714ace3278b00cb2ca87016ba810f98f72aba7457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b789c5d6d19df873b61af72d9c4f9d13
SHA178e0993a5bbf6319d721db48b38e463ff751364f
SHA256e2c2e176a961ecbaafa9f4ca5f5758583105b30455f7064f6eb542a146f5e7d9
SHA512e4c0e58ebe82906adac7bf7cad210ee0d343286d6ff2c83d724911d8169089f35d7badc15f21057b869576d56c679fb81c9c63c25fec57d0952060b0c334a540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a1938a958885f5d925337928358c5c
SHA19be14b7c20955f7d1f35cafb8dd2f887f116f461
SHA256f806ec59968d479c5da974ed13a019e1c54268f401e208f75b6c861176853725
SHA5125cf4431d0c91bce65a3a6a93bbdf8c188de5ca419f48c30da01aa6148aa5cb29b377de675de1b8d6ad63c104413e2b2f1e75ab2129ea3ffc759ba10f527ffc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b136dc41e9a719e4abb07e021a5bbfae
SHA17507abc1858a8258ca16e06c71bd8574d1f93119
SHA256c52f7f42ff51582c370b55961b56e6dc1b9478c3524cefb1381df35d04174531
SHA512aa9599279c1152255f019fa34f1b3e912516b3710d18374af2fd41536e02175958b5c932cf804dd6158ae505589e71fb5d0a47ef1f20f371d1926613ce22c25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bf4e1cfc6dfa0caa451bc89fb9daca
SHA10ebcedba174042edfd0493c52e5551f3422b3a17
SHA2561b5183af04c1df50e79a2145fbdc85f9eca5ca83b560fc9207afdfadc2c7ae52
SHA5121ea85ebd6887c1da63ad4bf9ba3322472a227f1584ae29c190a6227553c2feeb75d9a5631b6281c3fefee190cfc8e745970f261d32b88d4011a818e4b8689c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5d988ab6046ec9e1f15e53637fcc62
SHA172cf4cb71496b34f533bb43aaeae15b3eb2456a5
SHA256af367f6024a11dfc2c38c217cef0052ae5d246c5539dfe4997aee5282b4152ac
SHA512089afee2ad6ed21cc06cabd6ea769c0d5f4e9c13d07bf2b8ee438abb01e3e1df953b292e57f79b3fc57bfd8a3cb411044c862a455a51ab9fef1032f42c635f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f994f85b99e567335d290efefa573302
SHA10706e5fbdabe42ed62e4ebcee18e78fe86699bb4
SHA2569e83c4d9bcd50e944c007e97c56fdce621c0aeab1f00ae0109300d4c84a886ea
SHA512b323d8e4684ca08a9161c79724fba090ba0c96afbc842d435f3a429734bc9f2f1c2d96f2dfb2df92eda5327873f4131c90ec50deb81b3b8f4a45f98c9583f75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad70d13d5a359fe09fd7ce2c5b4f7a27
SHA195c161c0cb2165a1d6c343cce42b2fbdc37ad85a
SHA2562eb9d550fde5563bca9beb1f87a9de60dd875ecf363c501aa049d049371ca15c
SHA5126467ddce2fdde3f54e605d96c1d85c9440d8cca7e4a1b26154c6d951a28de38715841dc205f5850518e42a8339d73e5d3e03c1c9c3df370707b3c6abebc7d412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ae3204913c9a322481db9dd2a62ab7
SHA16b64cb05d7d9b2b70c13f65ec5bddd25382004cd
SHA256e207c5b307551ca2e1da69cc340f804b6666e22ad437085b340a1a9d2f135989
SHA512267c27224fed41e26cc17816a3a66dd7520ff693eb0171aeb8ef14b94b2ac1123c02d464d42407abd52597926fec9bce308c89bed543a29241c18e9167902bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52269a02361ca4b797c2b9b2ed4e95c6e
SHA1fdac9bbd4ccc450ccfd5f2037ae629792f341c1a
SHA256f4c4552a773f74ebc68520ac121a10f09bd65d4a7aa733185fa0fc670718eb09
SHA51293464b64051dd47626667fb4bc612c96b0fa35cefe9bd3af602116c6c0b55776e5dce2f7a9b02968fd52fc6f4a11136621eb9d7608cd1ea4ea8a401ac186429c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c618eb8c04a2d4bd1b9c733d5f8ddba
SHA16051cc3e8d3ea7d84e9a8467dc2fd102f59b0295
SHA256f2547f77a25b8de2ed5e750ed8b1af182211abf730be9404f5bbb45e8603bcaa
SHA512164428a565a416e3eff32d69eaa89641b02a119b0098cc4cab15e81dd9d2d65ded1d2c96303e57f1066397c21afdf8ee0320b0ba524c416ffbd90881911857e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ff2400bc280b6b3aaeb1bca9fe3b5f
SHA1db77856f53e51a7665130eb53bef9d7221dbd08f
SHA2563fb69f0fce352f1356d0ba5637a80a7bd35649b496a667e339952af374ef05c4
SHA51290cc6b3426d492cce6bedc4ca340988aa0a4d727d988aa4863c03ae420b523e7eb3f40f23448112b1c4825f7a410d0d553a224cad315ebabc3440027f07be8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bbd57dbef7b83a0865654487715172
SHA1cf1862d16f8d4f7420d2d54f107fc4563aafd2c1
SHA2560ca3150e7547d3b888da8154e287ec5a4d48f6e5244a6eebce777681abc024ff
SHA5123245a8ed405839293418ab6d044ea31ffbac29d7cb4229b2542e001e700b71122e236d915433446b7152374b1713bf4e12c5e2022e7bb34f5d76393b22e520a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9670775eceac5fb6cda791a4bf52f6
SHA1d2d92fb59bf87f7904f23b33ac0e0d42eace4c85
SHA25613d22610a040c6c1c00baa225b61b62cc554a00d624ab73eff949f6c79e774d1
SHA512842bdb120ed56d09bbd32c5781a4ed803dcdceaebb2b47de2db3569c30c10236f6a60db3ff37beb3df181bcf5d1b0ce26056d98d9b3ed46daa84173020d7c81d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b