Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
374ff1165bc752cb935ba7fe784431e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
374ff1165bc752cb935ba7fe784431e6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
374ff1165bc752cb935ba7fe784431e6_JaffaCakes118.html
-
Size
61KB
-
MD5
374ff1165bc752cb935ba7fe784431e6
-
SHA1
f8f175be3786a93b83a35931c62d83eee5536138
-
SHA256
155f3fd704ade473e066bf8468b267d53541499a1f436fe4a94bfa43c5a48ba9
-
SHA512
f114b5375bf688c1cdfbbb673a50f8f9fed0f3a24be644cb60a6211c1efd67e05ea72753276c692c08b1adcb668af8cb43cae7b8349d8827a98a40370123323b
-
SSDEEP
1536:S2C1RUE424WRVERIelrreDbhejpveZnLek54edYJtzTxv+:S22XYJt0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6020E51-3F2A-11EF-81BB-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426825737" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000625d084172a05f7e3531561889000aeebf4c16bf0d91a45192924fd0b6dcd71f000000000e8000000002000020000000cfb8582564b70ab12c31a43861e55f0791b93de673daf5d8215ab3dad30c7a98200000008d25b5efa6610fdeb6849108b3fd31bdea1a74770c03736fb6644a394cad904a40000000f8b769ec165d42420333b9f4f1c93a79a286a8280d8a2bdf8e06caf86c78eaaf07ed0c3af371bd398429188b813980bcec00f435a0f5b06cb48c9928f5091228 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a02feb37d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000056a4ea4b65c8407d35a9b46b5d64ef799c40346442bd81bba6553135f364698000000000e80000000020000200000008664a11407a3d69a558be643de55a4ad3c1feedb22afcbd0a4a90ce4ff1ec6be90000000676a1c6df881eeb77ebfa203a09133dabb03db5f053a91f3718b18fcda9b2318b09351108b2d9fe60dec4c36b29563b8ec577bbe4eadd70c1d116a4183f523ba7678c87d09e21469439df332e5bc4303eccbec0849ed5e71c566e67faa4a4d6ef1259d7c31c1d57a7c6d3c30516eb94070ac145212bbad373a16a4a77cffd20e7244f8cd7078ca21e2c03550ce44882240000000bd69b247fc21af3997969d77a188ea741ef1842258433c4c39d59bf4dc5ddb32b39de6f5537069467d0aca2ae719abea5cbd1fe7591935ee5fecf7b335050d41 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29 PID 2488 wrote to memory of 2588 2488 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\374ff1165bc752cb935ba7fe784431e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714cc4d5d36044cc73781cca98baf081
SHA10275ea06ffc674d5f7e4911b943523a08ad6de96
SHA2560198e6b30aef8fd86f4dfd774ac75ba60877b607addc1dbec44ce91ffb30e345
SHA5129d0b42a505d6126eaff8dd8c8ef19acc99971ff64bae4f0288ed7387be9fecd90205f5d3b1f8708ec2f4c10164cc51b1b534c8dfc6e8450252cec512085301b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b78d8fa45efc47151eea09449600f64
SHA18a52fbfd80d16483066e36958fbfc05a1cf1d901
SHA256ea2903aeb2f411a6a77298c0b81f98eaa8d4a7b23963336c9b2249dd351e7c61
SHA512a00018a84f5517e32b0a1d4520f89d4b482322a4857ff1f587439d44e9b0fced1860eb68cd488441b6e8a9b63650c8cd6d61c9e80f8f3a99458e4ad5bc2e9b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523056462717431761021dcab276583ea
SHA1fa92b06090debede53373f5bde11ac01b6dcf2e7
SHA256885f65cf7c416d86261f19571f9fe4d8c1bd587a13e257f1e34656e51ff931f5
SHA51215288e582b54af606803f33768e9623900c8d3cb7554a87137016e0787bb124d37d6be62266817711e516788244e1b7a62b34d82b7fefa46dd4f9e741237bfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901b2873a92022ca50da263db8127b32
SHA19f799ea4884fc0ad009cba0792d35e8e811476cc
SHA2567e5d073b1769ab276c9faa517572db67efb8a44c6c60e192c3cfcf000228328a
SHA512db94946e067c73629e80e62360db41bba7de8fe72de738c4f288a792c1e244e5df2379cb4954f77c97a9b927c637b2aaffd98350172b4c07ef760c849c184e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031eab6c999e2025699076b213bfe526
SHA1e86ce5eec9d21b72d9d45b54dff6c4a0945fba0a
SHA25614fe1d449d5b6f4bd5da029ddc780eb702d61a3d4d49538ec58c2b763d5b4750
SHA512536091b7ecb86315f09589a8da43cb0247e50d9337c862598fc4cc3ae8b12243f331c59be7ba9ca17e22ebd0a6007c03c76d8bc09e91efa63fc80002a8b9c0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0f390d08b0e62dfbec8cd387376597
SHA1679b8d7d03d0b8a5c7d9e64823afb2ee15a4b6db
SHA25614c50b98ee93bf189004dacb20d01357aa20e5b5bf004e33def4bb0451a34d46
SHA5125fd2d13ec2867ad26951bfcfa87b6eb7ca6318041139f242d8c0c654594f27c172457baec8e5c32b1704fae09705b1664b11ae9b0609f58bd419c53ab32f31c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d633c1c99cd5835eee1fae832f3a0b
SHA16d60b178681d3237ba1a32898194dc8930af24b6
SHA25639c4fd1a1d0f94f5a792fbb191f383d848c68a3cefd6c66e4c8e836299b05d1f
SHA51264b1fd3736f8d3397a03de159a9353431f61ca1cdccae2ab557aa37523aa6dfb916844e96ad91c890cff46512392d9350f083a12aba7037b377c39a873c978a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a675b628f7eb5bcfd90ef76dd495f65b
SHA1fd165c5f1fefd09d5f5618067ca7e3021c54351b
SHA256c13c9124921e005c2f2d28b6b77120d040fda7aae1108e454bf818c47186a110
SHA512fffa18f866febfeeb7de20602370fdba29a0775e7c30c22de6653105c8035246e5c2eecebb3af574618a3afad47af00c8013544b81522ecf2e2a4252403f7027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494ae95444353233ccb5016947aaac89
SHA1b77b91007615e67f67e79dcba8e6e98cb335c769
SHA25608efcc1dc9c7970be2c66f61279d574aa4addcc6e8d66a072567e43d18bacd5d
SHA5125fe384664150a0cb85048e9b3d95a4cad1979216e9fb30154260d46aa7e059914d23cc40fa39e078004a79a4af0d9d469cd3d20c6a313272f11db074031ad21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0277e48ecb9b16fd87264cfd049f385
SHA166010a3339564e84dde132faca803c3b31cb93cd
SHA256146b33c9f4b3163b0258fa1c850e6314ed1899883a6344f65aeea51546f92423
SHA51215db83710a6cbd0043aead35784654c8583622178382d07229c396cc606a5c4c7104b91b168de9a3968120cb47de56be0fd649214ef4d45406237885141eecf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e068ddd46b481626c8f5bac8de74ec
SHA1462c0132e7706b6f5dbd0feb953dd20404fd679d
SHA256e3a5dcd8a48c1454d8fddfbfc0f45b297f09ac11c5852eb5881f718fa67df315
SHA512e101ab520faabee885216167294974def7686c015d7bb06600861b8f92a657fc9128432b523cc6b621adacf6c3eaf44b8d5f414ced4b77a956771a7281e1c40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c5d7fad4700f806098583fa3fd99a3
SHA144e27f681aac2f36f8473836ea2a4b0471554f7a
SHA2568f804be3894ed3b77df6799292513052337679ee00ea94df288f3c83712c92de
SHA5125fff099bc89fae707d5aefdfdddfda5fbfa98de684a6614bdddc076c2d8ef1551e8acc36ab357aef70db3d38d28063427a04fdc5093fbdcb44beba0a5a15dfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3bbdd8732ef8ac6f07bc3af9641063d
SHA168daa369016b670c662b0658e4627c5299180172
SHA25658b8961fc7da670f8d99c05d2b5b1e6de51a2d20a3a6799cf72cc16efb53e673
SHA51291f1030a18c31e91ee2a9a4c5f57f3f8e4eefe50903218a752298d2ca164e147a7084998296266c1a49d8a4b05d48267c3868a72239a86ebd0dd86dacd8dc4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f6ee2b37d8ca4b5804837ee5942a9e
SHA1c17eaa6c3da4670ea8389bd74478e824206df111
SHA2569ad177e50c7f7e2c1c8d46bd4cc876da2036a2592cc04c04e27c73f74c626898
SHA5120235c3d5fc164186dd875693fec38527bdede0ea85c4901f4e76184506fa9c1b239609e02badf856f666017cb0ff2ed7e40c9c0d710e7783cabde54fe41e3b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e640595b9ef59305cf97df1443537fa3
SHA188a68f193f8a7af2f299bcbab135910528142bee
SHA256a3f61ed5e048820d7e943c9807f9c0004b86f6b29482d81124d2b45060dc0285
SHA512a5655bd0791d6ab8e85ead1e2ac3ba19aff4fdb367d0b855555965723c648f7dc5d81df2e7a4742bb519884e844bf98fdea239f28f0755598a2811b2e3a43b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd2b86461705820a3dd785e488a51f7
SHA1636b23fd2e7ba824241b342c4d08a81d0b54e110
SHA256e42870316c6aeaf1b47ff93f1ef8c1fceeea7e0aa5d5c9e94c6fce2d68ad7282
SHA512bc9248465936f163c31b3f337bb991dfd3c03565fa3ad6d85f280e45632759307f3e7f7963983d81b050b9fc4ec914706d58cd18bf43053ec43fd76a6785dc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd476d85e11bb09e2006afd91cdbf54
SHA1306fa645278d39de463aaeeb6054056ac34aaf8a
SHA256f4c9288abdcc4fc44c5b91b3cda07f24938b52dd427056fbf4bc78e2f04b0c34
SHA512b759f449235e8906c0bad1f77bb40f1270b654e4d1d1d416f2863842c0504be87f9200370102ad60584edfc49c49a72a35027be03e54a49c83796b15a80b333f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54473a09fd0ff75b1911b72b46b28a483
SHA10f3deee21b5b117a3ee07eecab4f10b93dd41fe6
SHA25616e53bb9405c3ccbc6f35d409dd003211a587e5ca8473fdbc02838e4c04c6164
SHA5128ab19d28ac0c05ecb828adcc22609f475304da0a62cb58aef44e21cc25b19c8894bec9b2eda6cb9cde13067045203ef9dc9fc256e42e7b92221f236a58ff1652
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\f[1].txt
Filesize40KB
MD5a191611ef8d4318ab7bf3ac533d6b968
SHA10d650525dcfeca6a53cd816e232bfacd6ceae258
SHA256b06000e4987586d31e3a78b9d26cf3715d1e6b568c2bcc3d7b429a5255d48651
SHA51262fcd8d0fcb004f00295a33e5481a74881228fd279251757e65affa38cdde1011bf35c2e9e36f76df587c052f84eb5b38babef690b8241b02047ad7cc93dae77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b