Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
35cbb569b6d2b204033a3aac2b26c28c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35cbb569b6d2b204033a3aac2b26c28c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
35cbb569b6d2b204033a3aac2b26c28c_JaffaCakes118.html
-
Size
6KB
-
MD5
35cbb569b6d2b204033a3aac2b26c28c
-
SHA1
302ef9c5df3c1b66e9aec6df94dae058d92809b9
-
SHA256
306609099fbf25f87e70f614aad1db397d23d9e7b37ae2b70566b3878824de89
-
SHA512
12495e064d66cd6c75231c3deca209f7094d210e996a5df9a5483b4d37e4c432a976cf928ce20a5b8f85d85bf60b1085f2a57b7490b4aaabeb7f5a82164423be
-
SSDEEP
96:uzVs+ux7+dLLY1k9o84d12ef7CSTUao/6/RcEZ7ru7f:csz7+dAYS/S4Rb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000062b9f21fd80ed4dbdb26beccf0e9a7f1ce6930eb66271eb0fc4b54371dbb0bf000000000e8000000002000020000000c6e3a7ce86b637b898fdc9a6a8837a66128d3332f777fea0567c7ea721f5edef200000006c6087c556b1262efeab0b78dfd258fb0c885050ad24dc218967d32815a881e040000000b46bfd515e427ca384326f22b6cd554895be92fe898fae1294b4384bf7fae6a51e9b307a807db9a16d3f5d5b343eaeaa5c79868cc8ec4a466943d5cfb6547769 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203dc03ff3d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426796309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{522DA511-3EE6-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2772 2388 iexplore.exe 30 PID 2388 wrote to memory of 2772 2388 iexplore.exe 30 PID 2388 wrote to memory of 2772 2388 iexplore.exe 30 PID 2388 wrote to memory of 2772 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\35cbb569b6d2b204033a3aac2b26c28c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52902cc67c96e1318774e94e9cded4542
SHA16f5fcbb2cef67973e989c4add05609a46bb3b9ae
SHA25608f71d2026330982cff1348ca45740499b950a05ea90110dbca3d834210b0bdc
SHA5127469c91b142edc49301d4a2ab4bccc41f6c797ac788dce1a3ba8a6a3d96cc5f7f543c0ac4510875498029a220a0028020ba176a5294d10fa43975bc5907552dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862b722aec72ea653e7c28ca3137441c
SHA1f43d99fcad80aa3f052fd1a3ab754ba59b3ae180
SHA256e8480d8726792aa00ea605577851f9e24721986ee40769d0f2a1d0fc27dd924c
SHA51230e6ec646bdb192f5bd32f84f372d79da023cc9289c6c7c589b3efe67aad4b843ee57337affe3e1089a4fff0945daf836d38d3985dc910535715a19a9483086f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534054eb122e3a9ed656ddc5598ccbb4f
SHA150740e5ce5fd9798d4169806658f3b03fe4890ff
SHA25653bc13e111aaea0e85143f92953640d046fccd6577006794ff567ebf93225503
SHA512a5ab01e1671b7434a273d890c14c0208f80cef93066ecdb1d2b1491326f4f539d035c2348487252cf505893be2b5fcdff76d5594293867386fdbee146fba14cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3ddc1bc316bd685a51fc2abcaf6d0f
SHA1af3d2ed7f6f5e65d96f481070b64aa7f8e66db6d
SHA256d349c24a39e7de032d5ca2a502f429165874ccadd62290b5ea5410c1f3acea36
SHA512b8ac9d0bde8cd31d20c53b191b7f6cf1e6dd89559458c8bbd056050c0da9da610bdad6a6190eccfb39d208f358556c3955e309309957d69aad2790519d7185ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f73f1be1f100b967e0978e1055c1af9d
SHA15b25e2ccb012af9860446f734c098d3c83be68f3
SHA2564f74aa596f86181ed9ed25a75734c8d101cd3847a7b2450e0f417a5ddb4c11b8
SHA512d689700c8b4efae8be6e6e500098310cb75a6728ecfa8ee0820fb9cfcebdd739f53937205a74b44e653e0ce3223d1f83e748db5cce9a236562ff397b277ca92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b6f1e2952939cf2b82f15ed47daa46
SHA136c6bad41de1bd0e3e1fd949997de0a1efe58600
SHA25612431a053b2b90ff2e2a4b6f2634dadc7c7e4b55d240331458f51389632603c4
SHA512ddf4f255f9674341a1929804188b3e9428b2f396d104e5710d3085d1ecc145f1a36ecc2bb32f2e05b79a5c1b936ad12a17ab7f4571d769491edf4c79d88b56ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d30d3492e7436e90c4fe2552800117c
SHA147306d130361c03f8efc736fd426a590691bdff3
SHA25687f3d3c0ade372025ff8bb059dff66890c0c86e3428c5c31bcf8006026d87f5d
SHA512620669ac1e222f76259fa731d649b8055c1b94425806aa923a4c4fdf465ddb4a8fbd62840021784fbb4459a3a38ed7bed7141c9e8fb5fdf0c5c8e1a92def534d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4c30fd2494fa8d0afaf4e67bcad99a
SHA1f7e8b2ebf119ca68a86b7b3ee257383041933186
SHA256c8bbbede442cd1f83b328a54d478289e2ff5fdb4a453c80ced2709b0fb124c28
SHA5125ee7ea8d44b506818747c24b263d925a7d0a9e1abf57ba4ca05df5edf3ddc3f660e170699925298901ad0115465990f997d8ad3bdeac8c9d542c4e64fb69fa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d322726433a33a9c9e309695d52f5e8
SHA1febee7de7111416e2ded63958693c3c1ac7faabb
SHA256bf5c009bf2e9933cd81c5d6e0cc4d7fdf578f721d77caf829dee9c310593f260
SHA5123080576af032e02573527dd1aeea9fae40a60933f2c8e306b75bf5d3f19ff4a6287f16eca98e9caf3dfb4d763c3b04a876c761b51d613179f9776a2433504397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca2f2eadfeb19e6cb2b1cd654ab60c1
SHA1c08806ef7f2e9b1335a463f76779b4ffc3c43f78
SHA25651bb3ed114050279ac868097e8f60f6207e67be6a98c9c8200dc5bf94775ea0f
SHA512d94112f40c4a57d509b60235a7a3dc087082b52506895907fb4564c827b1502830634810abeecd8d20818c5e5ace744f08bbe519d6ef3983810720e9b2fd1287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec3353ad73d4c0d9845cc4fe88f4661
SHA166a386e5b739cfd580158436af754ee60ffdb9e3
SHA25615e8b53e32a453845c1ffe0b229fa1c77821776a3e3349d3483c383e89dfd617
SHA5126abf993d4d628ae54fdbd8cd7c91248ccd2d5cc3e4d2ae1b5d9a4c9362d030a7b3792140c28f500d5e6e28dd2d7b5d4f8a144f8fe85d61e229a2c28c2a282326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda065b0bf6dc7da4cd5b658c52cb965
SHA196171c989023e10f0335bf9d0f8e3eb349d8a5c0
SHA256ef4beed52461aa72c236ca0c529da1cd2d119a30c9da845653f820c600e101f1
SHA512372b878ee9575056e0b1a6e7781365cf5df832baf4df664a8f55b588f5c39f4b6f9a0ccb34ccbac1338c91ecf944d4e2c3ddeb856478d350fbc78715b0fffd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb2f1cd2f9bec4c0d026071438fd8cf
SHA185f08639bcebd6f5460568e19e877401a23c1d85
SHA2560d2525237cae8a1828169c4a2c6a6750830c811da95582bed5d7d2c941418aed
SHA51211826f065d3699081c6d3fcd7de96e4a2c8762108ff9ed015796797dcbacf5c83af3918c3a00161509fb7a7c6f34b3b9cee4c1c206cf4e4645a9e7176ece54d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c8d7b69a705a1c95445758afa8c581
SHA159ed9e3f5c443bcd6eb79f50d57ca58391e3a234
SHA2568ab5e1680d09d3274dd5d0bf50d3db89db91a0165ee3e02d2e3e7906f5767d76
SHA5125271c6419b867f1e003a1496b9e9fbbef40ffde528d02db5f7a9fc5c9cc840c8f94855ef7e7991fd07491a0cd5045c7284847887fcd4516e8a7695231899dcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55863550efd42a90ea8bb60f59dc2ff2c
SHA11d8f0a40d74e7838289ed4fd39765d533f7161cb
SHA2561498bea6a92ef43ee02a2d36ad6975375a97d6a6b116af79b049ca59509ce722
SHA51204bcc2d253473c3182c0d420813170fb68d52657ec4c2f7ae4f8935fb0b57ae534e12efb605559f3ee7a53c8c60dfd1f9eaeb5c80b927314fb712c48cf994d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e38c5cda13b60b32f4a9669b6565d744
SHA181354de2c21880942241dea72ff4c8624be00b26
SHA2565d11dda63d11f686814301fd32b796d558e1e584676a87682e72c1660ff088fe
SHA512ea43ea7463a719ffe047064ea4e8ab79b034e05f4924ef8d739e5bf8b0d8139c0f306233e87c53a6330a51ebcc87859fda1191967b993c21984e277af1f872b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af316b62e622e558b838194b7b1b1767
SHA1ee21298fa9af50f966a7ea284f02f5f7ad76d9cf
SHA25613e8d1f968f5df318b3262685e4959ad7d345c5822eba24f733b749b61f3b988
SHA5123c0a3bdaf0a395b6eca51c2ee4908215ac3c3dc7032b12130a14ec0b0aafad49c99de5f979727064b995c0c6efd2bd8b25a861c2b1bcddbfdf887837b2e6a181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b922f2f2f9ad0f7107ab7703a0eef1
SHA1757ffdaad80ca7ea7bb2ddf9762ef118561eaa95
SHA2561dc51724dd80c1e7137be3d589a2f7e67f8f9d3aedd36deaca19448c8ba501b8
SHA51299edc3d79b6b0a4cb046d828afec4a5d89ef882ca1ae740134ad97a374955157c3a0bdf264552a7f01065f49272ce1f0ea01699be9d91035d6fc5afc2ff965b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b