Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
3209b79116e6e7b1e83cb4a11390c317_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3209b79116e6e7b1e83cb4a11390c317_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
3209b79116e6e7b1e83cb4a11390c317_JaffaCakes118.html
-
Size
9KB
-
MD5
3209b79116e6e7b1e83cb4a11390c317
-
SHA1
6f01b95f9be1b03ecf08945e11633f4c0dbe6a2b
-
SHA256
95213c29ebacbaa72d9d1fa36d9267d16c0e0a900174b549f623c88278470b1e
-
SHA512
7412419acdee012366a3f538435b2d42ee6167f9f8ca39c6e3d7715de6d890a0adadc2118fea8b9d38235f3a26042b18073e7932c3d8347d10571620b4bc14ba
-
SSDEEP
96:uzVs+ux7w2jLLY1k9o84d12ef7CSTUKGT/kPsrpUlVHcEZ7ru7f:csz7ljAYS/7AUPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F872691-3E41-11EF-A251-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cffdf44dd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426725358" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000caf7c00085703bd1aa92737dd86b36eca3ad438c85ac5d76a5f0d9860b34e7b2000000000e8000000002000020000000f84df9f732baa5410ef73576edd95c46ec888843471f9587396a20e0b5091f20200000003a697c46e7ac03306b636c46003b35a6f4e36fdbfa67204c67a3141504dfbbb340000000c3b441b8fea78d1222682e70d7f0c0383d3c56ff97387b60405aa17e60843898f414f67ee11206ea503cf5910f6b35084036e71835f5bcf2ca4431514471654a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2420 1900 iexplore.exe 30 PID 1900 wrote to memory of 2420 1900 iexplore.exe 30 PID 1900 wrote to memory of 2420 1900 iexplore.exe 30 PID 1900 wrote to memory of 2420 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3209b79116e6e7b1e83cb4a11390c317_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59488815c9378f5e91da34e81c034a679
SHA15a12ac23908a4d89d71ea11751e07c19b77f8863
SHA256c9768f5a21e66799bd3e56d89dd812f6c787599b4ed8fd5a5d762d624841401c
SHA512dcd9b079d74fc57b9de599eb7fc4bfbe35257360d286c3aac998bf04bc624be150d69f7933ded2eee1b497a0ccc5f72dc35f3a5160f52997b05ea02fc1db758a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52580e1d1182ffae945820764dc6b1731
SHA1b26bb0e0c8b5c805bdeede089ef10fdc06376b6c
SHA2568c7962d6d47a402d77eb3e3255374e0e84b7699168a8df476c72020b0c9c0360
SHA51248d61242dce6aba8cad3b263fa57ebb16098917f8687e5f113b37a322c3dadb9d4d166d572bca5f8febc40c1d72e96258f7f737f71de30271a54cdc0154c1265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519350b32384e587b550dc24267cba7f3
SHA18b05d7f2bbdcc81a3e6b0fd042e99f3db21fb053
SHA256381bfb74b8e87a93bdf602e96ddebd8936e0a3bc87c1fe599191b2f8a64a0b1e
SHA512ccf5893cb0dbd5140d066d47cbb80d4278a990468d0129baf98f5a6dbdce3d2ed6f6906a946f0a6a3540ea808b0af6b3b342a28a00678d5b13bd62ca3c9f7871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9f804d0e03427d499603701f30a145
SHA18b3acddada899fcce8b54e65b4f660fbe629259d
SHA25627e60575eb3d8ff18776641ef78fb5af7433bc6d0defbbc1c9af26f1dc8cf8d7
SHA5121ee5625ece164970a17f054cc5d945833efbdc7afbc1725601fc9da057e8a559ebf85f66ae44cd52c88e86571c9e0767aef8733f91a13da01d887f0a2bf5ce6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f61f4fe8420e9dbb31b09fa41aecb9
SHA1fd95f67cad9e6c9c0b479787f7a7f76456d1b6bf
SHA2564719c30dea0af2dbcb1ac33c6280dc3a7fd660c775a937b680dde2bae427f004
SHA5121e5d97bb93e5a6538155406660753d6c3f7ee1ce9e1613e5b2fd6f84ab49b0b1347a0d95f88f32607aca5ca550aa61d19e53bff22a841fb2fe34cf6d291888a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038de7a32d9d7887849371b263632d96
SHA124f07df3eabf2f6ae98a8619e0b530f09b9efa95
SHA2562075be08fc47bc6e1ad823cb85a53a26c28fc0deac587740b83d7fcbf3ea4dce
SHA5124d8d1b49ff0f67615434cca19c3ce391161af9849157317df52f281b793ffb27f64aacc9802309b671f4109bd3651b6c7b19fb790a14d443596209f601affee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84a12378cf6ec45118812999783f792
SHA1be50af63a5f1e97834d5aed1c22914d8a339fb3a
SHA2566e04831741866f575c0658326726aba324002361a4e83a88890b7edb189bb368
SHA5125292eebc69d6103a31f359d0ecfb5d1dd780c04f283dc0e2578716d9b60325e7d7c858263adda2ae2d9866942b339865bdde658a9e0195c87ffc963e4ff1bd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53578777d58d4922add2d14fcd89fffc7
SHA1fb3a7c8253c13ba807d52de8073ec5d160bc3d98
SHA25643096e20dfb26135a9dddf863dc544f1fbd07c0b82efb3af337c944939acba9c
SHA5120b1ecdde898025e5108e4d2fe54df473cca562af57a78a1c809b27220b3b844d42d1280055f52488f233ed5c7b6795a07aad0742bea3ce51d3821814ea2af083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e402ab5505e63d42d25354df85b3622b
SHA1a81d686703c857ff1b92e6f4738098a9a6f69209
SHA2565143464fe97ab535090d7b832f18424905c05910b9b3a9edf47e3a82609e091d
SHA5126586a2bd8e083487455c3dcd5ba1ac35eb49db497fae57b0d46cabe86f1ba348d02cf2ba44080e43ce69a73e810f1c270a6285d83c6e1130ad0df8d92b90b871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed60f7852eb05c6a1aade964f689ba74
SHA1d1ebfce9ad7cfb8d1d611cc2bbe10e87a4161565
SHA2563b29297bdec2457e90c73254593e275c3e5b3310f121f305c1bbd884daf4f6dc
SHA51264278c9aecb08420c0e25e9bba390ea24782931eb26638e239c60084c31238c867e92276b57c1a29d780c99c527ae1f41b21921dfcf89911415830bf739860d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f336b3fab18d6b5f22b5e5ae20271c
SHA18eaaf5f32ab1715408c7bbd137b90e147ef28bc2
SHA256d1efa2d8a3e750f63e698530dbdc320d3e8ea5b011a9a02c739e74f2c1d9f73d
SHA512a794f9f104956ec9625ad1fb72f8085b5a55178bb7e8296981049306c049c8cb1ae1bf03581852e1a66fde3955f5dfaa3f0e4de4206c853ad8608191f70ea0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872822397d993c6704a02a03e5b5e674
SHA108c0826f66689e720ac0d81fde18b3c3cab169da
SHA256db623d76cbdd183d7ff4b860e281cdaa69f329e1b77c994be6d412e4a2c0cd28
SHA51261c45b240573edf2caf9613baaf64d5a29abe68b865c4f8170aaef571922d373b55deec7540425f0383772e6a8320df22e2935f5d57164512f86e423a588b7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39b1be2266e5b6c96c1d8d1aaa0ce8b
SHA128a876a13b7a8f95ef1d4b64fe4ad45f9cbd4b52
SHA256442f70034d88b7521a3a05991f917ef5656eedb1ff0da88ad1addedbf63dea04
SHA512fc080b2e46f1d2d5b5b90319f13c0d52b3120248a1781c946ada9e0a827c7704194a0875e6eb1ad87f4e9456b60bcc24c761e300e216ceaf96a576985b917d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d92c4acde2938426ae38cac56e24c72
SHA19c62ffa95d6ac3992caba8696bb802e7ecccde00
SHA256f7308c96ad7bdbf512109442dd17a91ae843bd3e6ac7828669ca4ec544f996d9
SHA51286d55ea30557cc5268bd16c6f6adbf0dde51ad65ff84d13f2f2ec3f446b78cb2ac3c25bcf95c542e2c623567755d580e8f2aa31ccf9a95be2891ed373c6a91b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50a956ff47ae5dc1cd001499382c88a
SHA1ab196e7ce0010a900880bcef5f91fd928014ed0e
SHA2567de1abfe8ccaab3127f2fca0b0673be9d19d3d56cd7194a8146e6af093aae210
SHA5126f1abbefed8ecb4cf9c21f996fb1ad53c54665a3937cd95f0ccb06af842091bc54ce8e9b39dc02de7df9f5d516d8ebadf74ead181fffc08bc8dc233a7e0407ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb13545ddf475a65051149ae5d4397c
SHA1f19d84639f724c83ff5ae9f96df980fac413fbee
SHA2569cf3fc127cf005f553a3cfda1bebd88c1b27fd1e6dbc35a86dc69aa1aa527325
SHA512eb1ed1003c6c83d40a4ebd45c23920eb07911976b754aa2204191cac11164b0354ae125fb1e75b96e4087290996a86ddf41bf81bfe7e17898447f6e0e6d6bd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91acb714f32adac12ad2759aa6c26c9
SHA1b5fd0f58dbd20310733794b78671dbb479a6ac7d
SHA2564f0a9463472425784fb75eaec9beac83ae7b27f7d50a8ea7541379c5a16f1b18
SHA512f2fbb422131f8a0c510098ce7759ee4294e3b21c3983507a6ab2dd4ef0737c755fb098f2d519d026bdea3e6273c44a1a27708f508daae8d1e0175ff6d9f7a9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe793ddfa94fe9dc165f806831a2d1de
SHA1f6af4af0a4c4d7b3bb52826c36b376f382e514eb
SHA256864db92a697fbb739cd660cdf163132d555d0a088038f18d285ff87e15a011f4
SHA512490ea1615d7558b22141ce19475caa5503cbba7cda02a4bf4f62b3b58b463d7932e8adacdd80a43c17ae1bc106be60110801b810bc38c7117f85e1d9c9df3298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50557c49634453544b1c3276e4b5db48f
SHA1d494beadf4a0e18de205d0afdf7b2524edfa08e0
SHA2568ac0d811620ebcd2a45613cc3e253bf6ecdc064054e98bcc4907b1276db2070d
SHA512cbea7ff8014ed41f05277d2b4f9ce278ef684c6b85a28981d80e4297e2364b959f056f1e8c52d692a50aa2a1ec87b04db585922d664470cd11470e9596bd2389
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b