Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 04:02
Static task
static1
Behavioral task
behavioral1
Sample
37a1c8ba5ba4a693d957ddaf4031af52_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37a1c8ba5ba4a693d957ddaf4031af52_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37a1c8ba5ba4a693d957ddaf4031af52_JaffaCakes118.html
-
Size
153KB
-
MD5
37a1c8ba5ba4a693d957ddaf4031af52
-
SHA1
aa1d34fc689147288f6de8fdf76320a15e82b427
-
SHA256
50b4d1216aa5cfc60a00dff8a6a4625991ef2d465b3563dd3b9ac356fac0d2f0
-
SHA512
585bacc21585df9f84b8e3fd84c7f1bae04511d4db8bf0f50b875b1f7b28e599b1072864c7581230a448e574bde49fb34bc2175de2bf6597d51c1e1de2e06715
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc4gwHAB+LdrfABn0hcZKVddTp:sVQ+L0E3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6990B901-3F3A-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008bd037b6afa95070198dedd3f5676ed8d041e9652df90a4f766e660addffb1e5000000000e80000000020000200000000a5de1a00fa772ee58a4547198d1e13bde2455009c537792537378a28957269020000000a96a3cdfed06f5dd22f2bda5b774821d64ff273b54264e6bfe43905fbc6aabbd40000000e71e42e2abb3a41a2a71269bc3ec79bc396664dd94c907fd17fcecab57a173d2fc26113fe9ac20267744bc53ae88e3b7745bfc1a054a6dba42c1c041063fe944 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e1255747d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426832426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30 PID 1544 wrote to memory of 2804 1544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a1c8ba5ba4a693d957ddaf4031af52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f30801bdb1a044fa873d93eb820c48
SHA1ca338002b7dcfd01bc90af526269c045c58c6ab7
SHA256602faaab262df2339c88fcdbdbc13ee55d4985de5048c9ab0da84a97d9fe0039
SHA5127113c116f413357f046de933ad4b8f9bbf940f4a34aa090dc6ea84c049c8a2292a3ec1366ddeb1f777d43f8074663f259d0a70c6878ba90cd474f9d0c729b11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af58d2044a2edd9cda9be6f483bbc459
SHA169aefef4589f68e240970ca8b7774dfa7f25aa26
SHA2569589243ff6ac7f4bb2a98d22019182e0be92d8f91821c8b58fe243f21fd7aab3
SHA512516231d843286293e498e5f5f3a6c48ce7c3a192c640ebe5b2e3baa7a4bd54c48101b1238fcdf2268bd70fca5017c0cfd72d76eb0de631add314b9920a53197c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa9ed4e234455ae49131533916ede5c
SHA1ad41a8d49448931fed23b7df81d7de232a613d9f
SHA256dcd3de1ae4b90723403fd038d6bae480bafbb39a8706f2bca70573bb81828456
SHA5122bf8f59d8a5b4d7e143fc2193584f412f3247d1bd813f93b09275897d402c8d647e9180a8df69cf7559926302422c09237b02cd061437a6f1bcc6945929db6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586193d8336d871fc04b26dbf6b325300
SHA11ac39d9b0e545ceeecb7e1412aa5d1488293eea5
SHA256dd6f68dae4c181b6c19ba5d50c7145fa30a1e0d15e15234ce6fc8981fcf869cd
SHA51212cc6a72653ffd5f91b500bfc598b140be4486a2fa1f59976e328057441edad01f18ea50b4445c86a86fce47c73254493d8e796f4122e38b45bc92234de0adf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a793f5b846db8916b2ce4a97cc25f0de
SHA1451fb7fee2871d2cbd30f47bca40dbb3ce4def84
SHA256dbc67348e986c5c2a44f3e772253f42d0e2a7cf00e3f00f758cc1e98079b60ad
SHA512b3909d58ca1a495a80562d3c3cb341c90219193c89e312eef7b59178108e9947884d93f8b9769cd1a0588489175acbde391cc0abf9210e45422639166ae14554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ae66cdaea1df27c3e6ce3efe41a4f7
SHA1cd8e956f0b8b9a4f9e30c79cd39eac9592a8a097
SHA256a5a01e63ce133f95920fbef90bc747cfbc98fb64e398dc503b13ccf91ddbd7b9
SHA512ee42b818ab4e2d6c23a4ba0471b500c6e87bbd29862e20510a6a46fe99cdadcad17559a54bb2591259fb83a18cae24baeec2e6c002964258610aa26c20b8c722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e229965f5d65f2fe6873ea22b5f5af56
SHA16ea462e4d7071be353eccf8ab31967861df505cf
SHA256d6667efdbb02b26161b8520698ffeb6fb26755078081b5ae9b3ce22c1d6c8d65
SHA512bf10ba7665de073992aa032d163d958a2f21bf31cf97e9e9bd92f43f331ad499eae36b0a75f9994b19acc619e20874f756987c294c77aa4e71f258d18991ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568337648872bb9d9bc9e69e18c57b064
SHA1f2ce78b4f52bb3a2205b39239d9a00fa2d16273c
SHA256a9a0a6fc6f974b68f8818e3b7949f2aae440a12d8e3fa2de3c0bd68011ecf3a2
SHA51257e08502a852e7e7b5436c9f9912f597727643609c6d950a49954b7c9d3520bce78479f379257392fd272abbecbd85eb3fa90830168f1aeb451905111ebb412a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50420feda62100e746f4b61be85ef5c29
SHA147e8dfcc9daf79c67bdf14c56dc6472d13cd69b7
SHA25668869679fc13474446bd2503effd6c65887fc884185c031a6bc8203e13a7171e
SHA5122964c9e3fb048c07bd7d3c02d12f397e2b0ce97250a3c64c1abf9eda6c288ca9293ad8ae2bc59cd3230d8eff4c716f520c13c26e32bd6e96d5f62b5e27ce1eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548054b0228bca52d06c271801e9cedf2
SHA16d39c420053b8ec7b42ae4b59e6b844f9f3fba59
SHA25610690d2869741f7fd008b623a967050201fd295173a831c2eb588101f0b72da7
SHA51256414eba425c4802411a4dab5818f7417685181d0112492848c83ae07cf7f7097a0286b80dadb4cc831a60d3e341693655cffb9755ed71fef2be4959749e429c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19f9fb216b9a02a7568ab6edccd6723
SHA13225080f69a8bc9d3fd4127b228b56ca3fb0c928
SHA256fe47073e9f3bee5c98e2ec31c2db5eb3cebf0af24755f2f5b5ba46e99112152c
SHA5128e174cd8b9812e8689d8f6039c61b63abc8332e8cc6b3ec123de1c897b1f2777bcd3e91effc359a8f802ff1d492a437f3f6dc8f6d55500ab75816eb12b9f3ea1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b