Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
636f21aa8332b9d303089782baf88f05_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
636f21aa8332b9d303089782baf88f05_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
636f21aa8332b9d303089782baf88f05_JaffaCakes118.html
-
Size
28KB
-
MD5
636f21aa8332b9d303089782baf88f05
-
SHA1
a6c83fc43c31628cf2f968de12624e72d4d98a1d
-
SHA256
15526d3417e32d4973f2b056324ee303aa4c3fff137ff8b901bae403d8fcbed6
-
SHA512
f75bb020dcc9b607fd28a5dae9892655fe396e702587564d21a2c93bc13982d275ef856b0caa40a9524b6d240e36059c8f560c1945a1564dc7e9f9edd2af8f89
-
SSDEEP
768:Zcd9QZBC7mOdM4XpC5I9nC40wAwXwQaPd:gQZBCCOdf0IxCdwAwXwQaPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107e31a640dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBEA1B81-4833-11EF-BEDD-4E66A3E0FBF8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000016a64de66f0336d9c028975c64fcdd338ea1b6aa3047d7d2bc31ddec4f8a7c1d000000000e8000000002000020000000fe03fce0e471e78080b60a1442069393cc599cbbef1015e4766cec0e732d87f9200000005d64863a3fce3f5ad036be1a112217c23c3b218b90526fec7be97a5025b6aec7400000006f82cfeb063c0cb3d7ff6e9c457090e13f0d537bb3208ab0ec86c883fd69a8e0da5730dce2ec5c93a94ebf1d9ef3d518c05bb0f1299cb905dbf1a4ec5550a062 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427819145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2812 2492 iexplore.exe 31 PID 2492 wrote to memory of 2812 2492 iexplore.exe 31 PID 2492 wrote to memory of 2812 2492 iexplore.exe 31 PID 2492 wrote to memory of 2812 2492 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\636f21aa8332b9d303089782baf88f05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2212f2405b0f7655ce093b4b555e10
SHA11aa06c1f43cf6b214164c48abd77b2a16cff5d43
SHA2561f99b34c61c4e3498ead0b7c6ad1ae11834aba828cd3813f70bb9b71b9c99756
SHA512cf99306688e07fbded4c4640b93e6a3528cf737320862b8d81005c416d735615868ea8096d70cca3e7c8312cea835b4b64c27f33d138c3e08fafee12e2f4c01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfc0866a7d0d9a0d63fff7f31bfd99a
SHA11f59dd890beb8ccfeac161bb03113f5d114e683e
SHA256cc22364674f27f84c4278b1b854dbb750ff72d10aa3fd37cc19d4d20c8120bec
SHA5121135fb2a88871411fe1e71e7052475907c5ffb263d0a13a374bd16eabbb8bfce6b45f94e1c51afaed2b7551af0ca8466a2531644d662799c17a467feee950bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a386e33b143d7f27f5730642e8f96b80
SHA14c01675b3ee64369f0bb7b408d656e7ae76673f7
SHA256dc3ed4db4fe298bf51cc090246958f63bca166a433a8b5b92f8d44ed523a6bbd
SHA512e1fd40a10bb7f9ad66dcaefc025a126fc391ccd91a366febb28d7870fcc8d88f75120c655f05ebeccf969bec10976d1852fd558e74761b3f68fd18784f923d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f3c931a61014f0fad4495ce277bc1f
SHA1a51e2b3c0a523aeb89d4da15bc3d2ebf99fc1f1b
SHA256922a0008c98980964012f8a9dd09c82d0396a86336a40427bdbe283b2246519b
SHA51232b63fc9908665a27fd2880bcdc1211673d84036dc97fa73eaeb15490096f361d568a234a63f1fc01721e66ab03554de0b760fb25fc70277e4b45ef0c2d8eb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bd683b0cd19549625e7ba45e008bf1
SHA1cb8c0820ef11c0b9e1a0b07259527a79ffe8ca0f
SHA256d108408c10949213da2d224dc14feb4a98bc0caf37586637cf6274b0c88a0883
SHA5123c26fa8fbb42ef63946eae0b593719cbd26d8b0af24e4be869a718fa75324b905dbc048e510b66ed34f4b58d468ef305903ea2bd919e843bf034c628bf6f1867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f718e6da95658174d98e018f97051bb
SHA1784262a417701adc3248932d258b99f895e4a30a
SHA2565933fe5edaeb6bef3d46989a024cb2f5b044ac33eaedf541e549607656403541
SHA51264ee9dcc39de1b2ffa3919e2455c94214ed50ac9c6ce62ca88eee6845c64b522b06e7d0cdf18bb4d7efafc405225c97b603df0518d1fab4be05d8678a3c2e332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a200cde101d8dff3e54591edef7b98
SHA12fb1c6c47ea1a243ad60905ed3a9758c3a0d9f85
SHA256d353e9a0fe5926c8713618246bc02da9b322b4894a2f4d3a3f714d9f707b1571
SHA51293609dc2ec8fe08ff441e4961a09f7e03123f48d2493739e2c00c1f898c448a9480746bebf8e17b180ff9edb6f00f1bd53e7b5435f0179ef453df2bc778668cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601980e736e1f9c18ad9a527f7f7ff7b
SHA103d77b68941c93e6e54471fb6c89e42b098393d3
SHA256906d16bdf84a66d4cd9eef403cf5b5b6720bdb6cf620f50aec8483a8e8a27ac7
SHA5122010e3607f2e053df7393d8a8c4ebefb53a206c485357fdd398a3f73ac4ad1638fd9ee6f3b21d3a113cda556fcf8f4334693971e13ae9c3e20a5b947ee59dade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff2656c9115ee922590fa8452a09660
SHA1757d1b4257bbaa72799c81c38af3ab36f04529e0
SHA2563161094e8ca54376d87c3c8c6be6d539314585bc1bf2f8bb390c173368042d56
SHA512e6c0d84490abf9773130f219af11d9c2758afdf761afe7445f44367d9679bf60a5f439b15ead21a8d66de20b088ab4088d57ca17f978d5a28be57a8776938d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50899cafb7b4fb28d6b7d6f53d6dea523
SHA10545983d2274e0477bfe30aff350de77c7f42501
SHA2560b5c894bb0ec45f09beeea7e0127a9a6c5ad6b52f25a8fb319a81332c26b0f7e
SHA5123db06f1640353b3da319bf6ba067240b874153152f4de87155f49e2ba1f9a19a3eadfbbc7fff47d59a44b8fcfd49fa91abe38b01f1d83cfec69c692055a5f341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219a329ebcbd93393a9cdff6aa4b3e58
SHA1dafdbedc0ebf6c896256e03e7fba6b2c5be589f4
SHA256155cf61c26c894d5c8f269385de7e704d0a773d2dc2667d8feb64cb502101294
SHA5120b8c25422a7c5eab68a0ec5447ee0b31a92a84cb7e73a22e6cf946c09a914cd544b5f1db5337ca8ab4605e7cfb52fd8d53db2c96a5300a4202d644a26297288a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc87548f1f40a637b2944a48b5a2258
SHA188b4b5e9584adc0d9f1bd51f1091f31b8c92736c
SHA2564205d09093f83c83a6039dbcd4f55a4c21e1233d1c6080e40f95bd3603321cbf
SHA512709ebf484735438afa065722492e3176300411f6f9c1c20abd9a7865340d77802033207e3ae80676258ce7a9df77719fc21f25cb08a44780ce4ea64403c83e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af7435db5ee1d9e703adfb4a9224986
SHA125025e155a9927a1b62f3f5271cc7ab9a2979e74
SHA2561ba0b33ae984cd141b576efa57cf0e79890c4aa22df1b4f6d1f4a9b1662dfd30
SHA5126095bd0647a672e61f36f75aabca021fb31a59156597a9b43b5fcbd35b69efdc2c0e4b4b31b4ba7c550837f66d1b2fe08a40c67be5ccd1c50489d67a1d32402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efde50fc29d806758b6626c2e31cd96f
SHA1ef510eafe5f124fedafbc40b7a42915be0401af5
SHA2569e77bc00d4579f76926d79cc09156931170a9deb4c03325fdff47c1cb070ec03
SHA512bc34d47b2dff37519e4ef6992e2116071e8ef78f4acd4c12b10daa80107b63ea1e44bacdde9888feca6afdb0efa01d5773021de93c15736e2b91d21a1d8a1a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e717ffd0348659c211381d869dfd34
SHA148f1d4e6ad766e7196ec703b0101d4268d9a81c0
SHA256d585f375fb067713b377565c5b367377d67faabafd021c9423638839a0be5bb0
SHA512d29e0e024a29fffda048f435a6e04d350c875940ff5d1494bbe58bd46719c8336d74b6489bd592752e1a94cffebbc36b65c092f95aa383de2a5af9e1e5a954b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf3dac9146af5fef34153ee30d094b8
SHA1a9fb4071759f47f8ca2831523f6b06cb09b1d4e5
SHA256f8ea2436050c9902112ba6b14b7d92b4f1a721bd7a73f330e193e9b48be662d6
SHA51215817da90ed126b46412498dc4895b59b2b055f416b32590a94fec95be8e19c8ea5f5f0e031231a01aa02bdce711ea8f83a385859f7efa6faf76ca3335309c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335159b25ae2147875df06ef085cfbd8
SHA150e10966d7cdc8cd5d928b1a378cf47c8c67e743
SHA2564d6ac1306788e36eee784fba08d826ff6fe4347285ed3d44f7d8a72f6bb59069
SHA5122bd5552bc63734703c122e0cd4441d0f0c51bf5fcbc0a78744f2687374444fd58d20bd7e2376625dfe06bb063bdd840f242414242956e54e2f301e018d63ed82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502722b301749798c2abd6de5852d535f
SHA1c7b8f4d084a233cfb169cf3a06b5843193f9c20f
SHA256a3ce659d143bd847659045bd8cc1fdd321c9a579bfbbcdc5eca7b733a50069db
SHA512e30e1769634fd4e4591f9e525848a67de7be409e2bae25e63c0afca64c3e148a4a0545c1ef2c3df3fa577786e62dd4b73183e6692432dfbff229e24876b77eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedfbe013f1de44c0f5f6e10a9ce545f
SHA1fd9ef1581ec5bbef7dbc709ceb53c263a0bfd208
SHA2566b099b16735517360b45b3979323813a72b1cb75e4e431e832adbb8a9f55e928
SHA51236d16024162e3d9f8afcd619ad2c0c1204a69b4adc50b47a7a3a0827a80048cb38ada146d2c86fbfca890ff61677b22d6cd3d57fa7b6a1f9d14344b32f8d78e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b