Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
37d1ca735de0d90c54499ec5d81f487a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37d1ca735de0d90c54499ec5d81f487a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37d1ca735de0d90c54499ec5d81f487a_JaffaCakes118.html
-
Size
30KB
-
MD5
37d1ca735de0d90c54499ec5d81f487a
-
SHA1
efaa8cf3e836411febc6cee4034f9a9a580846d8
-
SHA256
2fa2fe46ff88bf2611343eaf1a61af9852a019365c6056dfafbc6e3ceec5c6ce
-
SHA512
633be07bb3201d229a058088bd35efb2479987099b5e7019a49cc837cfcd436117d81beed61b5d805295277e1d42674ff7c41d1d041a7afe58ca32ba787e6951
-
SSDEEP
384:SaysBQAw3QYQBpw6tdt6p8zTuH6PlirgGa+qCisRBJKVDFDZ2FjbUqMCNoIx+v23:SaysBsQYQhAIlirgGyvp0b7Zx9r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2DE58E1-3F43-11EF-B892-EE5017308107} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000390dc54c7fb9f01c2f15215c192b90940cd3f5b1ead675fbd22863ad8ff6d75b000000000e8000000002000020000000c627c0c167109dfea6c1255c8c86bd2c03693ce6457db81d1b0b07671e45a07d20000000471a4fcb39bc4871b3997d41337fb56144f0402dfd7b0c5eb6c61ea2e83a2b494000000054f9032fea8f9a588fc0699b300182dea2f4c579717602528b327de596491e902b0ce65c0792b44172e754ee3d1212e2563c51d6d77d000b57653c9a94c346e5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f034c6b950d3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426836495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3056 2676 iexplore.exe 30 PID 2676 wrote to memory of 3056 2676 iexplore.exe 30 PID 2676 wrote to memory of 3056 2676 iexplore.exe 30 PID 2676 wrote to memory of 3056 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37d1ca735de0d90c54499ec5d81f487a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59018ea9f6f425b4e5acf51f9a5531310
SHA1cdc47394c4a5ee3c0a384339c695ddeec71e7652
SHA256f02db95f6d30d2fb7d1c60fa1595c59f118b4b47d209d054e5d581dba5835278
SHA5125bc628224efbec8578a26c63a6c6c4204d717c9771dd228e07ece6eec9810160d086395705465e0954b212bccf0c2bccfcc266f24615889ebff3abefdb38e94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573eee1ce979f3013f210d1a32e6ae7d4
SHA1d3b385804cb9ab9f1c547ece234140585edc3724
SHA256e70bc1a01a2f415cba4783a91760a7baa8e79d274255d87d574357fa51ae2a5d
SHA512ab061ffc244a74fed809e48ccd1f6b826f8f640ca3d7fb7e85c83a69244a340aea8645dc03b96b1a5178a2c8a42f91c66bb9ce8eb977c2d077d541a53ecdac09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370dbd1e41421d011a3fdabafff7fa7a
SHA122b4e01a0284c9d136c05e13a9e9c97ae68d763f
SHA256796b3e54563385ef9d0367d6fa910aa23389715bf65a59493050cb769a5abf66
SHA512ec99503214eb570e53cea022496c92b6ff3af170c722852ee22947d0ce8af102384b233f5fb956f4f707917e6aa4c182b3cac67c4106f7b68b9f33cdacf3e4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de5f25f7641f4bf1e55c7ff60630049
SHA1fde86642033ea93d61adf085dbe0572c5dc19e24
SHA2560e2742aab52876d54001056f448df402e1c44613c6a3ab1916dee37b8d946314
SHA512c28a210d8123131ac33c295dde6609bb25611525f6807fbcfb5dcf8a9f016808d0f3dd18001b0283e3612d28100782dd2163eaf16faf44e23abeb138567684b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fb9bfe77b391988951e3dbcb29ae59
SHA1c2376a2043d179703cf2445e7e83e80a26634947
SHA25632949e97c0ff9b63943ada8e1b28d5c4c0d15362771d066eb4d310a40ac91c3e
SHA51220683b203e917594854abfcda56b84ec1de444b141908c4ca397a83db20cf5b8b6f9b7ceeb49ea9ec30e5c82b816f951ea17cb50271dcbccfdca8a3d529b4ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c2c9ab32f24b101cc4005a5cda7098
SHA1fbaf87dad854f0f6d7c719004437f2e63f4917b3
SHA2565db9ab31153d96ca65407ecf85cd92346da0bb8b28ceccd194ef8ba2f9c27e74
SHA5122a22adc8242abc609805ab989a6d0e4eca60e31953d7d536ba3b57fec6a2b07a62f2004ecc103ab32ab3a066cde320efda205d038d1f01b3b69b12625adbb92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94b5aa6b8566965328d11c4a3c4a21c
SHA1efc9c582787f1cdcfd375844e44d3a1b534e4094
SHA256fd771c76dff944e94ecd5fe69e3dd3169b84729292cae73c8f7de53d05556e14
SHA5127f045dd71ec92c3245d7b300640eec742622aa66956f2027f2450842e92e26bca50f6947b6b0a760528be9540c76ca357cf50537969dff38630505f592c0830b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bfd6227dfff751f07bab48ddd192112
SHA1825763cfefcbfd13c35e3afc542bbbc1284e2030
SHA2561beb12e3b18387f716b69bc29f2f3bdac1aee50c21f1cc160167a61e9fb9630f
SHA51251c373c93f770b09dc288544d0520d40147ed2f659e64f839947cee9be389ba86d5073ee6fb7d72389f99f4dfa3d631886b5ce67e7de667a2051ce93823c8c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9491735b855ef5dada5f4c1a6dba69
SHA150ec64c29d61374729df6e4992eb6de8b3d1392f
SHA2561d9ddf015d78ca41420cf118ec41f5e0e3f86da49b0ef304e9b88c1f81d9ce04
SHA5126930965aa6cf38adba128a2396c19b4a4d6a17b1dc492821b6429beb429d326ff576f3d74c49a5ec35c5f16e3cede52f154371b7553fffd8a9dfcc0176e14d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3389365532db64e9ecbda246a7cb62e
SHA1cd12f2e2a420a42e3e929dc40230ba8fd481d5fb
SHA2567757ed7fe5fd383db01cd9c70676069ac383ff2c8aab17740078e29777041de1
SHA512ff9b20a76c05dd767d2a3be2f4b77176ccdbaf773e742fa8aa305ca27d6a1f51e123e7a29d52bb39f32155cb7aefb54b246daead7fff00dc8ef20661893e5868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209bdb177c584aa604b0f746846c8d04
SHA1df99c8bbe899092f2c8bdab5e24ef732163c90bc
SHA25600a327adc6fc6055ab399c8788ce049a9663cfcc04a2a5f9fcaa3205c7a2f036
SHA51272f631306aac374d09903ce7a6a1ed8260e9b242149677d818af36f4f1e4869ac2c5ee81b40a41c4cb454646ad42ecad4e47f095c25f84a0db24e6329522f96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893e1aa3e79652453eea5803d2386a2b
SHA1b8088f22e887c1e1d2e5c70a526ae293ad1bfa59
SHA256663416b30fa8b4bde833cc63a21494ae9f6e765a959287242f79240c282e0a05
SHA512d7a7fecd606ec755b0bf77daa2f8d10d6ffcbaf67282d5de39a282908ef27b9b606392a6a98bc5f9eaba3a7a57f1e13640cc44ab91448708858968de9f7fbd9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51631ad78b178b68960aa22b3f864b97f
SHA18dfb62e0a913782b8ee04d95ee745963d5c22437
SHA2565f30532eceaecd211ead0c720bc9a8d56ef6c9384eea679af2b026a006a360e4
SHA512e58d40e192b359d814acd7410a344be93870365bed315740dbde4a26f91cfdbfaeaf5919a7257781ef29c2dce67f1458bb5075c58fa413461bf0a833aab6d3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd86039a2885d968cc5ad3d751657d5
SHA151dcd254c6ce1794cb88e2dd9a56999f1a0b37b0
SHA256ae42be5c1be124adbb25bd989fbdba5e2421ae7d0cbfd087d14f6222b2d135b0
SHA512a7a7f98788927512a5c51442cc0a0f198fe8c1d0c1d25a256a75bc3636547c10f760a46b218e4c4f8d238692e69d35d17a1a7416c9a948064790c195994a7f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d912bd3c3bdf06798e46b6b09c68e6
SHA13c1d28ef0952df82bd7cc48d376794ec7f3fee34
SHA256ee5009beff0945609540b96649e18f7a53e6b52a99f4095f30a0b22974cf5808
SHA512a09197cce54b2d2a31e414d955b0cbff83eb31140dcb00d5c6f9e411f8dd23ece84f6a49fa2515727556eed48c8a306609e6e07f6cd207c9b26013fe86f57a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220097e2c9db2af256cf5f6003b6ccee
SHA1b6dfb0ed34a3bbd4f73b763d1c834f9596d18ec9
SHA25665db3014e53342089527821eacfec7ba6c509052b9271fb06ce480d994e69cd4
SHA51219c7da2798792aaf86dad2c8bf4ffefcc5ef32636b4a2936c8dac3ce93043007a9c91c26d4fb3ac3bf75bb7cbcde7a2871c16991e63c259b5db7ba5382023a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f782c6400a7f7ef79e0983f8bcfd8f
SHA1fd281611feb9018509478c41938ed00f3801f463
SHA2562d8ad2c2b79719e19cc2ff87d8d693695d857319176b31eec46c00d63f3cb504
SHA512de04cb2e283feb9de1dfaa97b6b9f3d30d407bd8a81c6b6750bde0d1427dbd542e98a69a0d74b7e967ccd3da646cd45a96850b04f33c4c560bafbe63f0aa4b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589596fbb3f6b47ca546545f432a52cb5
SHA1366191f04faca0b8ffedcd659dc3a1c628dbf8a9
SHA256a00aca16430e56825403e8220bd5b43e62763792b336acbb0e1813ae53421787
SHA512242be165985e60128baf725308e3f89dc05f149cd1e3dff8b5ca067df478f885ea973cb1c6ba31abaa8db07e1a0378aee983829f89acaddd7023ae7e2b523074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070f60fed51b2907892f1e9e6631f755
SHA176dd3b92cd748948974bd5546bce35c8c2ff050c
SHA2561f50666bb37d2714de0d6f815e1214c51b910eb4ff633097e6417bbf5c2da966
SHA5125dc02a349eb9538a3a5246ab933f1edbf64a63f589c34b0afaaf3f6ae0aabe161d524d86f3da54be6938d6592ae84fd09f7a13d5179e5b32c058e28f8ba30693
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\f[1].txt
Filesize40KB
MD53ae6c0d19d441ddc26074602e6d85cbf
SHA1fda9294f0bdea11dde4bc0ad09ec96ea2b131b78
SHA256bec42f44a99839eeda45a3c29aff2cb34c3918b90448dbaa2cade7b17084bec0
SHA5122178d5f2f9b98d9ae5ba03e4f92f2d856eec188b7d45e94ee22db90be49cdfeb85ae0cbb10396306aa233776bcaba414b7002f2cef7b3b9e06d3082be74d2d96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b