Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
37d4ebade07405c6db219d47945af269_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37d4ebade07405c6db219d47945af269_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37d4ebade07405c6db219d47945af269_JaffaCakes118.html
-
Size
57KB
-
MD5
37d4ebade07405c6db219d47945af269
-
SHA1
3b24ea8ffe1cc3a8725ff39bb4753b164a1f9cab
-
SHA256
cc6c8fe4b155fa5e51cefbff8028ea87f3c2db53d6b3d4213abcacb0b3026e52
-
SHA512
f221572dcceabff5236a534ff0fa966cf271676013c772ca83b48d2138989ae0a5361aee47f369dcdc337c8dd7353c3adcd226f69fd6caa26043f45724f9036c
-
SSDEEP
1536:gQZBCCOdx0IxCpVPgAMHQu1HNlrgg0avXOLsgs4JfqzW2j7BQBKN80Kc++SA2Tmt:gk270IxigAMHQu1HNVgg0avXOLsgs4JU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d078b85751d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426836762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81FA28A1-3F44-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ed624ce52fda8c6f0d8eaf668d10c1e74e12fb90ce6f8321b0f3c0cf65869aef000000000e80000000020000200000009d61e59ad6f4c11638c7fec5d7116b9a162d2664c053e80f5d4abd3a2c5feab220000000cf8290a10c535f04291a0a767599a15d41db5e1a72f0a3bf29e07becf4cbad444000000053cca01af3be26d435fbd151eb1d84788d7b4ec7f5b2f05677bbbaaca0bbe98c21f7d5c7d5e9708fb477e6fb2ab6abc52fecc97c8720d08092793c0bef049e7f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2816 1620 iexplore.exe 30 PID 1620 wrote to memory of 2816 1620 iexplore.exe 30 PID 1620 wrote to memory of 2816 1620 iexplore.exe 30 PID 1620 wrote to memory of 2816 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37d4ebade07405c6db219d47945af269_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa582b2b64ac99db725cfebdabea3289
SHA16f92513b64249161194451ae04f2d7a9318124e8
SHA2563bdf38541d924b8758abb31698c71ae8ec19b1a08363f85a16ae0878c111ffee
SHA51286a3762447441799ae76af8ed01b761bf39cdda73baee5f97852b0b845db0db998fe38927f06945331dcf974d254354668b51b70c1af6651927bb721ad043633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d167e6ba3c68436c5b949227d770e834
SHA1dcb7dd7597dbdceae95c352408082cfd2ecb28cd
SHA256ecce62d4027e2137cad87332a25f6da460aee8a9d72af8bd938b9370ae877f33
SHA51277c9176fdba253cd3d20e5b8f4fdacd92383860e82685b6acef85d15cd5bd6c0a86823aa5ed9837794b55666c3d85dfd67416b51a0263ce0ad5caa02de7d33f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545c357696e0c34a9b3c98ab991bf50bb
SHA147b294558bbe7acabda6c3478945e839f25e184d
SHA2564d9c80157b6047f07ac8dd58ccd8524351a10fdebd161dd4f41c91ecefd9b525
SHA512b68bfb38f6fb0cc133482671d118b069f409116f2adf8b09d6fd53ae7e8621ed12a3381129299801c940eac2fedc0d1b7448e43554d0086b7c9a7b720d4c6d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5faba8ff5f6ccad8ff71b28d24bd25b47
SHA165f3598716b48dcc53c1de5747eff24b25a8a3d0
SHA2560a2c99aa7171de4c6f0238bef0567e188c824831ec7b143fd88accf1472a4910
SHA512245791ea58b212c55f65b9e15fed43dbd0b0c8407f1fd60680c852dc6f607bad41643d57646cf72405c703ce2370dd896e9af0eadbd3635300327403e62e84a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52eff2796dccb0be77f75341822602eb3
SHA1ff6049dbf8d1d9e7011935561941f7a693523b47
SHA25650e5799d6a9a583fe01728352bd7f213949f05a8473e95677846c65fb2ebb0dc
SHA512be5cefca9a454119169abd2e9bc83315edcf603b9877f29680bd7bbcba4a119448133ad21c2cd99c9b840844e3346ab56dcc37dcec70e829ac9b5a83eee2e0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55de03caec10dc2aeb54759ce76a7a66c
SHA1bd5b58af3cba2ad79c72d9792f0f07a9d4ab1313
SHA256fed7e43633ddb85eb987a96b0766e2fb7a0bfc8f07b16072cbabe09d306627fe
SHA5125fea2ef6f851959813c27fb66719c1ac17cd4948014b11e8012b7696bfc232f624f35d89e872f72c40213a78c4c315795fdb3448ca897f0bee481c6c653d7e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b6e4cda46a20d291f8f55ff4818e696
SHA1611bd19008b551817a2fb84db104868ba935520c
SHA2566fada3f3a045624711bc41faa864652112e597e63c2ccb4d1535041f861f7723
SHA512dd542da06e819d04535a007678d93e33656b0b18c95e7389a1732568d494ef4e43b5d075656f95336c689112c6436b8eaddb43a1f1ce82cddb7e5454e1964a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59cb18f2e0d616ff48a6cba31533f6c29
SHA17650c74e0e64c3d26bd60bc5d08f74f498c5bbd6
SHA256d4de08b883d78ea0f45fad868fee1eb526f42ce44d4eb0295acd8f60e963005e
SHA512cea353825145aa1354c31b38056d6e27d9d964275d0d766b45d45520724be6003a12df4b8ab20522ac9ee658092c6915d31923f9013a8c43a4621be5004fa83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae0f2b32256ea3baf93372ae36874fe5
SHA1deb4d77085e77a2b6b805bf718d6be6a68fa78a0
SHA25618ce140431074f4a6b1f11a3ebbf137193d913553950722ef274eaba42f76d8c
SHA512e002889bcf47941c6c64b348829e46f6559fdab2ad9d774b49ae7713552e987f4a1b72fcb1766e58146e8245eb10fc8b7e3c58a072eeb79cbc0f95c2d2c015b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51090ef25311b48d967214d585f7df995
SHA1688479bcc0db1ad6a2873e32274b9a5789981826
SHA256965fecbb2ec1621832835ce7f3eaf7aca5d1d9cf8f0030846178e84165e3b7c8
SHA512e9aa4d51ce9030ff11532dadfaeda043ee2f366c659d2bb424fb5b15a50b043334f496292215c7c9aa02ae51c408050c4c42475a4277940b7afbf9881a759e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5853840dd253fefd8642fbdb3fbb972cd
SHA152946e4d95861654a7f7afc1bb4b5b84e1acbcd9
SHA256836af4f41d24f75541e9dd43c3593cee05b97fe55a0a6b3575aedc6b1d9e99ab
SHA5121653cce618ccb242cd89ac785809050d21c4cc02ed7241f6d4748c04c3d3fbab2bd7bf07a31329d4a4d3a653a3832c5e9f98a6a1e734c1194bc570542d2f1a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55dd6468e5490b5e706b2c6e493cfcb4a
SHA1e813889a9f42df12020729251c06dcc675801b56
SHA2565ddfd413e1405a58e0a28451a99ab7f2842b9e5e505d0c2780cc27c463e65050
SHA5124ad4f6ae9f6c916ce9a5c30cc50df3087496b5c8341bf68869d08abf4037dcf360ed7f16863bffbacc5c4d19d8718dad57ee1afe43b8633ad619b80b88efdcd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ffdece731c060ade59686bcdf96f52f7
SHA1f2e4f0d14a8b08450862972cce42cdc171c56a88
SHA25621009a2e286596d86876859d4387de50d087f065a47d0db4223320a3ba8e0810
SHA512d982e5d8a8afc7bd8e92cc18ba4a2d736d9e07b4e56bc5397af71abc981bf91b7ddcaa1173a5808ae4aefb8d1871abc40e86507fec4d5862d70f6c86a6668c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1dd629b3c28a83631bfa645ea01be0d
SHA152bb8640350e9d8e952d545a6d745a136f8bb65c
SHA2561fb094eceeea99a2ca16cd0e6ce9e67de33235d651f9cae8a2d2d26cdd662e22
SHA5126e9a23949e29d37570afabd50ac93c6acacf9f12a5c497000b8b8cd4a73491c90dbfa996adeedd5a4b5261c5d3c900967e0a96d34dd8e6580e63f410c49a1c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a85bdcaf30c2c8932288e9fcd03b4eb2
SHA1dc852eecca4b2664c9064443952400c8df9c1c6b
SHA256c56700084063a93e510194216576fc62c314f4609b1f17e3599fd83100e7df67
SHA512a3da67991863711f5d19aa46bc1ff5e38e32ed8abd18346d865686f7424afa1ae6294f2f9ecedac0e4c37cd271cb08aba63154c4f3169317eab80bde99db297c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e7f4b6209442c8e9c79b1289ae8ff75
SHA15d35b9f36a50cf5f81823f97e08cb14b2b80c937
SHA2563d620065678d141a1b3a0dd1c0f710c7e43d737205298bafd4622d0dbf3abc93
SHA51215bd7c38768c6a19ef2882d1533070a5c3012de7d8792b09ee43b171b9799af469bd67bcea9e315f7ffa27feac8eb256713b762353ccd516b700541173c736e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dced6755643b95a9009b3e9ae101632e
SHA1eb77ca8e57533a133bd812f26fb9a16f8fc48b3d
SHA2565e3cb3cd86253cbc51ebcfc8bf3aff7a48654b17b8c16abaf5de4aed643dc4d9
SHA512d8af7c06d380fb8677bebed81bd9fe0de6692312d69e12645bd99f764ef32e37538eee9ce0bb113f47c0903ff63a7c34c6b88bf43f9ceffccebfa32a0cc5f14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547785f4517d5f6d7b84a01420932fc5d
SHA165c14cb36575f1ef798a5d0c72fc5b79ede47a4a
SHA256a929d2886dfe27d24158f26c8614f519d0ffa0ce4bca0563c4232dd00a60e052
SHA512a06d474c976029f9f2383f76a511a7f14acecbfc782f25fa79313e8fe1b61bc8ab28307a5f77b5e549f9deff23281af79bcb2692be38f0677d4d5b6c5a5878f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d02ed65295d72f96462182f3e237a73a
SHA1fa4ea7287c96c3ec5d180045ee742e022d0a26a5
SHA256ce27ec34a86f109b4064aecd6c6ffeefdff9f60d6a4fad41cd0f61cca7f2bdf3
SHA512623b15e645e0be9beb79b288438dba86bd6ed49454b76bd2fda3ea0b0757773a277975c8d4d7b05c30fa4c092408d84d2edf39599115f079bd529bfedbb85af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53701a86d5f98ddf1384d2ffe5129054c
SHA131536b5491fdb0ef949c4c1168b57e7b0d2e4189
SHA256dfdf33b3cbc44c35dfd647f7e5835c52c5690983939fca711867c6be9351f597
SHA5129881c32ffee351b2c37bbada8f4f902136f28b82454f823494d6af5b3b60a21b549ab55cdda157c844da1367b81653f66b4a34d189774ece9f7af48da13be943
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b