Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
36540a7003229aadafedde177456897d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36540a7003229aadafedde177456897d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36540a7003229aadafedde177456897d_JaffaCakes118.html
-
Size
119KB
-
MD5
36540a7003229aadafedde177456897d
-
SHA1
c00d5a890c7361b52cf6223776f3986faabe5544
-
SHA256
2efdc871666521a44e1d6fe4d80056e8330872bc3081247457bb916baee6ec80
-
SHA512
fb27837695a3b65cb333b8290ac7c5be8b32211881030d395a4076d28970b0122be0cd41f4f590cafe46cbc962d0453dce68314ff442f0d3627a72b0ea6e4f98
-
SSDEEP
1536:eD/uqZL7pYXZ+MDuX8ZVMDQwXZgMDQTqZgMDk9UZVMDSVAZQMDFOmZaMDf41ZgMN:eWfUrfUrNg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000762a1acdabf8e803c52fdb9eeb94c49f6aeea74f5a12931cb7427df57dcb5201000000000e8000000002000020000000a9a6cd8136cfc1f8426012dc21aee465d842e6b15dbd78f78952992c052db13520000000c5089da9e8ca2568244939b94ed21f71c63c11762808873128530a1eceb1f9e34000000070a2d30c0bf0fbfeaea3687b355d6e58946ecb43c2c404661b0b5fa111a12e755befbe580847b420454b3632f7273342141b050ce7d40b69e187d0b4286fdc3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426806510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1268B511-3EFE-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d5b5270bd3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2440 2116 iexplore.exe 30 PID 2116 wrote to memory of 2440 2116 iexplore.exe 30 PID 2116 wrote to memory of 2440 2116 iexplore.exe 30 PID 2116 wrote to memory of 2440 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36540a7003229aadafedde177456897d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb34c31d867ab7cf3bc8324ded6eb487
SHA1278570064cd0215900d8860c5a94007725f3aa53
SHA256fd1e3ab924d801c6a085c339e00a6320481d5421acbba7df922af1fde1b2d946
SHA5123a747095bbfbf98fe26e3040e629f29c17373677ddb6426cab5a23b47415a349d4eb6872ad30e9f88d89a7c42bf1d35171794ec5cb9a94735f8d03c3c3256272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d537394f613c6bc165f0c8f1fda0e6bf
SHA11e59af0e0f02c77af5e5884bdcd95b6e7ebdc0a2
SHA2567b196a6a17766efd1cd8569c44b87e0847c1f046e86ebceb55c6eac889de005e
SHA51251658033ff0915472f89de33216de7aac5029adc03849ee79d4a40bdf34398149a313f871b4ec0c3c49d5df6dde3c4cc2fda26338fa017c0d12a1be18bb4ecfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3d00093db0e4f3507d77ddc54c2e62
SHA13cdb4b02842d6475d9043d4a4d5b4ee4827a7ebd
SHA256c03e582b3faa2ea555347cc631eb39e12bea0f00c839dc19ed08a124d7d60171
SHA51259418945d342d78264980881eec892623eef08a47816f0ea4ce17da6b67f6b3f7da97c0c16fb35daed7c733e2f9e7c98d04a410a5528ac2a135456c277483c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59009005e7451ef90a7c22671c5b6c098
SHA1b4bf04c8e7719bb10bd4ca304f84cd3fc8bbb67e
SHA25650fe1416ae9768d0f99949eb07f4ce1be8cf698a6305373c3a6471b937d7a3e9
SHA512c367d9cfd6c947e0c5bfcec66783de423e2a8924a7f7f25b5fa9656c216e7b0dd4241511000d8e06613b4ccd2f74cdd13a737f242802e2fdaf24dc5c703f3e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172f9e6dfe10db83e89f058c33dd4bef
SHA19406e0d46c5093e3f33e04136c9ae2dff656d0ce
SHA256f4dac01c7818702c5f21058b2180e4968b114a1e25c251a22e64290022778b97
SHA5127aa6e99f1930e29c3c77d20a1f57519ce97146102b2a3bcb36ebe39249d43b1b5361010888b41a8585dd832d2a9fa9228e39a7f061895f835d68fff28769d610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55085807d60c8b2a72e0a7584bab80ab3
SHA125554460da5490ed93da87e373467c0f999e0898
SHA25611203cb8001c2614ae8fffc3d399bc594054efe1c5e5c811ac85b780153519ba
SHA512cd054f972df0c56c2b44b63da15182d86c66d4209a9f70a74c01b217873128d055bc8255138eb8dc81667d9743bbe90824ca4394f5b759067d6a119aacab22a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e353ac50740fd8d47ebb99daea0bf690
SHA1c690f9d55fda93abb14c710c7c510ee6fd2b705b
SHA25695b3418fd1039649cc891f8d72c9fe5293fb8f2fdaaad1fd71f5d849ce1df2c7
SHA512e1355780ebb9795108f1904e56aa3e8a7c9ea49e7f6e6f4a737765bf20d7d8a1d4879b5a4335652a8458eea546c2371e43629f9220b823d314a9c6c2c6da733d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051e11196c0041a6bdaae3a6c26651e2
SHA1c106955994ec0c6e6ba96af5e7c503df80fed00b
SHA2564413098def28583f0b1483f44b5c886781cc72a32e64969ed120f3dbb2dbe555
SHA51286c39ac6de177196ed3df6fcf8484664026c2ff185a4434b8b08aa2690ed430d319a68a4a697200bc9f8a13c87b15218c94ec4822469dc68c138c1811f3aef08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e206b4856d3c0247e24bf45532f12a
SHA1065d234979dd975c7613e03894b3f3ad00810587
SHA2568881d5c033a9f2fe505037e302b22f73714f32e3c1405567331518cbced4bd2e
SHA5121250f79a47e8154bb3beee6eca9d04d3cfeab3ac177326d99c42c5fe307de33d0b065300bd9ccea177a7a953ce7806ebd97ab3bf59ac6b642b146b42d7fe95dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ef4823d9885a2665e8f04da24a7ecd
SHA132670c18caedb0183864c4e5e5e8f6ca85812f6e
SHA256134811934cd5141f87995aa039d880b59a562f7fe4207925863679b69486d255
SHA51239d18dabbcdac651b0ec0b9fa92cdf3635656fc71b0ecf45077155556e66006e0cbda3b852ebda28175cac8952b21abca34739b163e9f03932c25ca3ae298564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af69c8fedbe08a8a1655e854101af71d
SHA19891e765f4a6ac13037f6b5842b580b7ae4034f2
SHA256953d7274dbf290e57e01ace61431e9842282deae46012eda66d26462381cc8d3
SHA512b641f38bde3d6755f9a9c4f70e7cacdbbe7624b086fbe101553b64a0e3ce672c10652c25963d6bf9db6a7f89a09e5ac0610e8051503498aca9a1086a6ce3183a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be25cb030c664065782522c1384fce04
SHA1b7a8cdc8f365d97f59a72a67fb1b74ae3d291295
SHA2564fcaf7970977b73e55c95a33dee2b6abbbebd9ac5f201fd7408e7c15c5032deb
SHA512e221da45fbed18400935a0f22a0dd939c3b7740f510cc3113361dc3c281fbe3b7e27dddfe5f8cb7ea7fdf61369401173493a7fd8a7bc8ad2610a0f19d1d99347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57935f0b26f3156fa0fcdf394ad81480c
SHA117fec931c6285946971c830d20db72505de6ae56
SHA256a39ba1deef17d7ff4b258ad9bc68410a80c06214680d789d2530dcff1cc98d02
SHA512eef5de6d5fc24ef7becc2a87d6aa055fb6d9ad2fe463de2532681739d44735e047f69eba94bdcc43607fb8078243fafdecb7c47dc126ae8837227ff92cfa4b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760ac522571c54f5a1be03fe13a37f00
SHA107c61bfcf3d4c94e791efc4693c14b263155c60d
SHA256358aa557dd79329ad1977fd56493feb5b57c354aa4a842764130b327547bbeac
SHA5123d468567b015ce8e7207d7a5a8b4f5657490554743d8b368c97de9dcda76e0c27abb2dbd144a14ff06a73b294d787f2eb8b442834afde870cd1dc1687c9b6895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4b09e1278635a49b4ed20ef34825c1
SHA1ecd6468a263d3cef76071f1bbfa013986cf27b2f
SHA25668436de1a173207c92624acb020730609ef6bac43122bbcdd89e137263c95068
SHA512c212283978f8bf008dc6e6815557666c97ea5c0baa1f1ddc94763981d1c7a3c0be9d3a0690d419182021023bd2052c80aa9e07d3a577ce9d099e210ea6f6274c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568eb51fb3ff59ad3c8c998d384b143ad
SHA1ea4851c37e14996fb6a4b93fb493b57f0a01d2d2
SHA2566db7ba9d97972ed0b1fd92ed848463fde402d9a51acb42d6a3ab08ee082b6338
SHA5125aa1fb52a4aaece1f9321aeeb4cabfc40381fb5387a89e37c88339bc5c363479b2108a033186c5cb403e41dcceecb7fa8f8749fb857a2705fc18770dd3c563a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31c2edeb19eb95b4626cc975aaaea98
SHA12575da1d5a62f084043371cfc071172275a286b7
SHA256128a9deb007e50e40bfa1f169bae476bc9e9fadc7e7ff4cb30748e4f8d411ec0
SHA512302e176b8ae0abe68f483ac09181584ebdb4f67768a550339b29c88dc68a147e10d0b8f0759ce8af2113e4f782e7286b6d4507ef90dc6a43915823f3f37cdb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7815ce97ebc324cad4953ea69ee87bd
SHA178d3426289897b584bdeb2b97156b8b707fbda36
SHA256a382315df041007093d7d00abaee43a7abe65193b3efc3bf254d8f8d77f9f789
SHA512d72f61b612f18a7db59e8ac93fb8f1a6830dac36fdcbaa2f6cdfb37e89591078dc9bfef42f21bd1428918a38130fe6b49b8dc7ebe912a3165b91b7818e73a143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dabf103b75fae7451eb0076eacaaa10
SHA1962750dbaf8274c379b72424a112ef396771e202
SHA256f75a03572e9ecbbfd43feaa5f8aff66b7917055ddd42e0ed7887d81c1c13891f
SHA51278bbaee26feb945f0df94e70bad3ad9f109b9d8a167eb6448837eca53bee50ca66bb382c34d78354ef4ddb7564792dd0b1cc97fb6673cd90e502fa2d6504ed92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a743515dc1a1476d70dd61fcf355f6
SHA1eb85fd8696f62dce487dc8ebf02786e35e6ab8d6
SHA256a44ab4a60fc6aefcdaafc119fc704c17d8da50c9894fce726f5ef6468a9aec4e
SHA512d1ef3c032c01a630e46f0b47ffc60a04fba323f6d3383b8e2c05812a036974f4f2397583293f64c4b3d98fbd8ecd1cecc3968689e2bae7159c3ceffb4f2e1a4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b