Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
35e4796486bb25f3e7ccc1af364a31f6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35e4796486bb25f3e7ccc1af364a31f6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
35e4796486bb25f3e7ccc1af364a31f6_JaffaCakes118.html
-
Size
53KB
-
MD5
35e4796486bb25f3e7ccc1af364a31f6
-
SHA1
50e8801326084f9df386a6be298595227d1ff0e7
-
SHA256
918244d7839d824725326af7b589a73ba8dd59113524b9630c682446075f5fff
-
SHA512
442ae2ab13ae9d101db584e1bbb89c732722ab039d96b069a4f253b2b8a28c736bfb41e92b3c38bd28b1810c26615ef586ee905743fd63887d2c2043b60e9359
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYD63Nj+q5VyvR0w2AzTICbbjoU/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyUfrunlYD63Nj+qP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A2FF751-3EEC-11EF-9B1E-526E148F5AD5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426798980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f13d61f9d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e6438937bc6079fdee3d39e6d3b3e50bf557f27abcc3b332df06dbb517a2baa9000000000e800000000200002000000046f7462ee8c06fadf77ab542f402fbca613a7bf55aca39405755910ae60a5f112000000090a57de239119b45793679b6525db9aa51db071a3ce1d5ccc7329df91d2917f540000000aa0ba7b96d25e93afa3afad34a60591d957556e8ab31e7ecae28d370458a6980e3c2dc622257dae788f9f13968357ac572aaf9fb8e486c55abf104f94b8bf6b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2396 2516 iexplore.exe 30 PID 2516 wrote to memory of 2396 2516 iexplore.exe 30 PID 2516 wrote to memory of 2396 2516 iexplore.exe 30 PID 2516 wrote to memory of 2396 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35e4796486bb25f3e7ccc1af364a31f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d60b7acf0db6a6175b8d7b2cf2c92a
SHA1f2d067fe3f2ab7034e8e6113031c058723d02854
SHA256678bfce9ea65655046a57f78e360049b8a166bc4c3a74173d878e778ba033582
SHA5120f3d1f4663f6f0fc86b022b461dd66c9076d2c25b3dc2b37c72faa268bc2f5d2955e23cf0724a10a61dd3c0d10c2bfc6876cd0af3420fd218067f373d04e567b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ce36a2b75eab2336b3fe3094ecdd46
SHA193a1f4d4136a3ad87e81f55cea2abd6f5d386dec
SHA2569de8d407705b0d6ba0b38c2f38719d4761db2f874db5fa7f129336d2a28cf089
SHA51273302df4bf63075b5c2f09f89bd7d5f8c1586631ebd862038d4f33e4cd6fbde9c8c084ab87e690cd5bcdcfd0c0f9c712ed3995b1d1a6e7bdc9d7d80346854f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2b93e4db5ac2ae35a0caab7d11c024
SHA157dd39153c3f7e4f7362ace70193a77babfd5789
SHA25631600e0215bb5ccad0e7de869be90f7f8814ea3631d4a9d611ce274563c79a91
SHA512168e08c06a13c5b7f85347fd72044e42104d0c298b0250f628be1f73ebb3fa2b57b49dd51b398335b26f6033d082f3c56fd8ac9ae398a11a8d47036d11f0c332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a95271d9b39c5cd4330b78fc244650
SHA177e259fb4c600359f0564122ad7d1f7b1e2311e7
SHA25698efaf7e7a5d8ad7e6cc97006fc193233b01b56efa284a270799ed88e1cfadcf
SHA5120a825243ec3dcfbe1a3cd433280993444a1a6ef223a5ccf45f988ff5462a016d2fa4ca8e5c1d2cf63018a9d2b5d7ef863467fd515e9f778b3ea33db9295cbec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572477109c298690d7af3800a8cbbc065
SHA11490c608504def1feb8f0d6938e61c154213115f
SHA256b1054c719fa7b9ffa216fb1083fc40b7ed0364bccbd8de0f3172f3b1c1bf8171
SHA512dc17bdc6eade549da8931984d331f07920d6536056a6d29ce81513c4693af5a4809dbc710afff6d2661752bc637fc40f7a51b42aa12658a8c1925c013fb48325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15b14aff7cc2812ffd6170bab12fd1f
SHA1f1d9df3c04c7f53aa262ab9405c5fd2e135c0fc4
SHA25695f0e8fd8bd1cabfaf0900a03b9cc802156ce78b15cac187ec94b04e2a414f50
SHA512d5c0b0e28dd17d533d4f512034b2a2c2e3f24043dbb3def84ff0a03abf072be96dc21f64465c683463a42806026141bf97248bd1544f902ef90f87ca04482ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4eb0b61ef7aff56d294c8bbdc641ebe
SHA1a3b3a4fc3e59b21dee14ee3636cc16a1875958e7
SHA256e5623b1e577ef0fa4c91fd5d87913bfc5e0c32260258fc7e53b68f6c61d6f3f4
SHA5122c9db6e9c19039f3cd9202a698dec70966e317050cfc18cfba9f35b39622751ec7ec8c9c5c004ec94c1b0965d93c5129de868d5cd22fcb1bfd9600b1aadd8b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681a005dff200d2e09a30b4d0d8c3c76
SHA14c0c9b183ca57e6814330461b748313780ab76c6
SHA256f5439aa7ba91533b5844da72f562018631d3496fc9a8c79a17f959479f0f75f7
SHA512d2524e1f8919d7eb00151d532c5f745905b4cd0130b55b0d59abc524a960d1db097c5bf8739ed5283361136081dfac7de594799d37d3e02a0647f19c83196862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bafd257b2f936ab6456506865261d7
SHA1c56eac9ff7af511b06b88d3ae42f4bca408c3161
SHA2567788d7f619b9502c3a18f13744fe0dcfbf4748e813fee87cd8e4ad3407bf9ab3
SHA512eda8466d83a41b6b8cb2dc8533da5ed2178b98535d1bade8e2a53033c37a073c4e6ccc2cadd47a8c1574c67cb6c40fcef56df3ff4668f7e63c1eca04825befcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf453c5cb02f73cd47ec132dd9441e5b
SHA1f2e6e72b78295c6028369dc527742a002726327e
SHA256d4b7168146d5ab5f1eb800eb03842566d8e18043b11ce4e4d7991e6e9f3f2188
SHA512d66f587e7a36ce276086b5c67fccff7faceac497d05abfb6f2d8e04fe9ee80d09118bc883f5e2ab6f6ceea8de141ceb725beb96e88aa9ce501af898c984dcea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079d5bd653910a9f01c08fbad24878ff
SHA1299865f5f624317075374301b7885b147e2661b2
SHA256bd217d7ccd18d5172c629b5ec8a39d798b3fa06640770156019fe25868770f31
SHA512a76b7fa166937f5ca6981bce490d0cd09edef5b835f54bd51100b370fccd1df87833d450197659a5b279ca14943051d66174a958437b2917d4cd81b18cc65ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52659374bf5d92d1dbe304da3b7f6f496
SHA1f6c32132273837dc1202e1a972231f20f203e85d
SHA25687973d5b581cb57c7d02d68e70a8d63519dffffb948c752841fbe09ede3a35e1
SHA5122e94ae58278f917e43cdf73bd8d7494dafffd737d7d01022e875ad346c9d6afc40cd6b18dc297c5cad4b299150fd2b4a5d3e307ca6184734cafff16d784dabab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adb0de875d1bddc22dab2364b44a421
SHA1beee41929b92b191e938163cb75d386c384f1dc0
SHA256a8b0869d36c74c107284ce1c6a13a739eb0ce0ffaeb5b0a5912492e713f4d3af
SHA5121ef3944091a7207fff0adf39ece7fd1e8ca5fc24529811d12ce369e387e9a4084b2a4be38b71b229b66a01be15bab6285fdd91bf0827ea0e23bcc267e945b005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a350d45d6882eecef1f86aed89451e
SHA18921974d2eec04e5970af5a26939b1ea5f206fc8
SHA256de688466fce3a8db55304afacfd7214180e63c567541870e50c97752d042cf1e
SHA512e43200f25ab058ef4e6b2095e416548af0f73e69613d6232ed97f473d3042a18f801cd45b78bc9697f17a8d313dd951e12314610014119f56277c834ef4d6877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79e6729bf43ad2086ad83877e695683
SHA164462a52ef2b9962fba7fd7efa0703758161e4ca
SHA2563e962b7efb51f42f66129295b3ee24edc8b472894946e65c080baa6f6959e36b
SHA512a812194ecdc727c6a2f640e44b19047ccc4f10dcb35a1da01cf0042679e2ed29c5011a1772c90546c3a8d91770977cf4aa4e1ffa679108848fcbe27b589088ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395c5ae781bea3cd73b3f70678f91780
SHA10e315a2913508d4537c2b238cad6925d1419fdeb
SHA256bf6b27222fa3e40e9befe99af87c3d488fa681d0ba0a02586e455113b6e31e1d
SHA5120cba9b9b8c6007ffc8e0f88b0d48dd59745a40af151c8c8e3c7028928b5143779d3a221044f5c5b743a16a85f942d6dd88b2b129c83688ca07b5aa607425c80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128e7b867584b0cdbd5e4c3392c99ef1
SHA1170b2ce1f840e1300a805b7d596d7a65c245f945
SHA256b9037cacb0c63603f795f704a6c4cb2fd6576161cd94a76947f12bba18bd8d56
SHA512713f598d0a9aaea7b284d5b38238e8ce8dc3b67999afb7070da03ddbf053b379d33019d8c2734bb3e2208253d9c45be6d2dc89b2f63df82e83e0c2d68d1717a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6dc9ee13d931fd3c6c1d807f0cb13c3
SHA11c3fd5a2c82969def750a248f1f413e1db97f30d
SHA256d69cb87701c86365082f2933ee598088e80f05b77f0e727f5d87ab40c402f7d0
SHA51296ddc63e2069464a252791f9366bc9e38d07f7580847ccf33f288ec7392ada52ec76fe4e5de6df1ca94f60ddeaff8c9d2af3db40fa5fdbad880ecc36e3d529ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726e870dbffe65068fb80988dc4ca69d
SHA1f931f413f44417922615fff5e49067db4abb8f1b
SHA256ece7984b0aeccd55ab29a95397e5c4a574f2bc6f2eb6f2b4243ae9c8bea6f4e2
SHA5126f84e91d8058c8384a90de2658b33d9a5b78412da4e8174a46cc0ef73d4625ac61aa7f8a7be5eecddb00005ca861d7ae91481d88425957a6f85a4ab7db4c86cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b