Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 12:24
Static task
static1
Behavioral task
behavioral1
Sample
305d01a291a7ebe9c9d8b5eb1d2ac852_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
305d01a291a7ebe9c9d8b5eb1d2ac852_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
305d01a291a7ebe9c9d8b5eb1d2ac852_JaffaCakes118.html
-
Size
53KB
-
MD5
305d01a291a7ebe9c9d8b5eb1d2ac852
-
SHA1
f0e611e00f4ef263b81a399ac842c482f8103a9d
-
SHA256
d8a80bc790d8eb49f23bce4fbcc0f8638c6d1f487e6387a6bf8e99414668dd58
-
SHA512
d84b56a2baa7e5f81c3513da53c56e3890155b499582d583918d136afa1031ab67a0f3448148a1b036f67e946f2eb4664885c964588f591c9769207aeabec918
-
SSDEEP
1536:CkgUiIakTqGivi+PyU0runlYs63Nj+q5VyvR0w2AzTICbbWot/t9M/dNwIUTDmDC:CkgUiIakTqGivi+PyU0runlYs63Nj+qo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000727b4aca458f004706b5f762627c66de79bd39da75808160c4a749ed206234c3000000000e800000000200002000000080ce858d11977a8349c3b38303d791c13df28d4422ff1abe5a74457fe357e518200000009d7748a1499ba1fc9adeb54fc66e83685eea4bccfd84166883479207d1a41d8740000000dce496857d54ae3215264625c62d0ff50763b4f6c45230e44a4dffe4ecd70a96e5d9a08d8466abd3451a407bc02978341d4a8d9147c63ff685cb790f4eed04cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426695566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02c1c9a08d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C338C551-3DFB-11EF-82DA-D2C9064578DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2180 3024 iexplore.exe 30 PID 3024 wrote to memory of 2180 3024 iexplore.exe 30 PID 3024 wrote to memory of 2180 3024 iexplore.exe 30 PID 3024 wrote to memory of 2180 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\305d01a291a7ebe9c9d8b5eb1d2ac852_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d006f18dc266ccb278dc8eecdcd14396
SHA1cbaf804d283c3fb48e1d6155f229b14b543398df
SHA256eda89366f7c6ef0eda6f238512d5cd709ba12ac49adf7a7a1534f8e224b0d723
SHA5128eddb52ddb7c38bd43406e89d38ab653b0eeb7b8287d2e2819ec375d1707f326aecc4d08ec09029ab10b4c50d5b0ee6a28f3f7a8c9bcca41fc729489c963051b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311a74965a05fdb02bdb2903ae5f3289
SHA1398ef88b980e06f505b52c38ee97c25aa0f8c5c6
SHA256169e2fe0a203f9283d7059d293ae68b5ed091e894e089e3562858a7efde9b240
SHA512c797e0b92aa9eaff043a93f7f672f72b333b6b1455c79fb14a6f5ff6b19e6eba143016e1998b0010355607db9d44472752376ef6bcfd7b91c163f4b5e1266be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea6a7b139e8234ed95aa30eb1606e94
SHA1f15afba132b940a6f4933a60eabb183db8f10052
SHA256e05cd90ab295d3196fc4a3c19fac8c144ecc3106d63f6583130595038507c199
SHA5129e4103fb5d501d111b0aa1b8b6339d89d6fa04fada059ead7760e50f97fdd8bdb4fdd70ae7048614c1f1b6221fa25641299bc5e4f5b9d80b7f3c1a59c6454f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95f0e91bac9106ccab8272bed536b08
SHA1f0d2fb176518232dfcc6981bd2f5174396962503
SHA2562f07f9bef09eed574c5952fd999f6a2e09295ac3861d4defdbe81f46a60b7a38
SHA51251d1ac252f6eff9cdb52ec90eff9c3891afe2e171f12f1919feb367ae8b1729b26c9e1fb07d711c819d009f6e7ca746bf53d1490d1b8bf9978c60f6c5c6d64b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b37dc1a051d19ea240fef0d96bb1ea
SHA1c36fc2dbf5cb01e6e58a09ed5c1021222867ea4e
SHA256d327bf9565f1422231edd7b6f1c23fe0671ca2e4a0dbd4f4f78cb68197131ba2
SHA51262ce97b2fdf2576c414da9bf31ca9e9cee83fd2fc19b9eae0c4abb6d4770aa070849dcc03eed836ba930ef27eb7fef3acb7572b3cf38f1ffb12aaf03163ed784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6ce6be2a1e9da8d64b601cafc0305d
SHA1b1d767c380a8f268b0e195ddecab8bab93f80126
SHA25637ddcbbdba8b25be235316222123fe2f5338dac76406a03f858c0ea2111b1979
SHA512021b931d0ca9d2dd8536c96d340e362c077540ef85947c8f656f3f35548d938470b1bff6795f54befc3a640460ed3261da9dea5d52e6525eccb3f001a006f5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632ad9f4ff454575a29783d691373894
SHA10e2a828d2131f062dbc240ddcb5d3374be51225e
SHA2563d61ab2000f046e7e0fb032606a92c19ec8761d3799b6e35bd496f6e9447f6d1
SHA5127d2d790a5faf464a32c0c0c15899cf5a6198eaa7ab9a47e2bded97cae6e877580e118d0c868c456359e9cd6a757d8856a82fc5bd0c53219c4b2869e0ad10783e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf75bc1c19b092250dd974bf3667d1d8
SHA1577f816f2c4b4317bc94b93cdc6cb0e55c877f94
SHA25630b23b9de61c2636e569f36b2bf8a1b3a750e2e2c5eebd6749c528c8d0151df7
SHA5129234fe6c2cf1dc4030a609efd391ba1b2c505f162508cc6a3057b4464f3165b721d93aba23836defca7d3d9399b611eac68ae1a7adfa31c9823bc6d3599ed9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bb1dca65787d9ef04a0fe1de863229
SHA1d483c336d5df425239cf3646f607b460271a532b
SHA25676becb051dd4689f5ef427517e6ca3dbb724086c2409ed2e987b026c58ef8a91
SHA512106df245e1951123cb17ba86ecea0f02e4ec4a13c37c8873255f41a82f13e35b349ee142ce8a34f0282f25846a321cd9307477f4b8443193f4fdd70fbae07000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f969b2a9329f15a3b1a20b12dedaf8ac
SHA1efa5f0d869c83111950456c3f04fe2b2fc5a8d8f
SHA2561fef7ad8296ebedce18534ca69514dad8ced35b8069e237aaef50949c93af749
SHA51237570f27ce8c79b04b6087d4eb1ffd7a24488d684bd00c9f8dacd7c86eea3963e2ecc4df22560fc2d7b11eac883c956c49d5e0e937f4306eda7c0eea36cccd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a6ca39b321dae9c685b1980251daf1
SHA1ced28e524a71b5a85bd60bcb468ca38533cfcc42
SHA25600ae3c941daa1113b8892afb6c106a9730b7eefa88aae53c2bb835cd9eb5fdec
SHA512da54c6a01e1c9c2f8cbe951a55df1fcf3e887ea9f7667391b7c9250727ef11a3c1bd0d0e443c524d812ca79705716efb986c0dc5adae672676a1fe1e9d606e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dce75551da91c0b9c05147bfd08dbe0
SHA15ca4a5794305df46bd8363de0a5a4c2aefa0ba52
SHA256469e7435ae81a269fe06dba8ed0b4edd4226c84a67b40f17c99949a73a596600
SHA512a7350d6e7b4baa29059af1891ffba21964d6ac0326c476ce33f2affcee24c4b97ec91a44baade2e6ee9483c6160f3eb0f9fc5bac53a2bbbfa3fbb2e26be82dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307fce33d178daba8b9a0a8481b58115
SHA141726865f0969c3d99fc7f5b648e2df20c4a6331
SHA2567596fe552ea0e22349ec2fe97e0b73ca73a191af58e11165f9fe3a0cfdb7eca9
SHA51204da97a6b79443d9a3361a3617de675a12722f7af254cb3e92ee712a66d6c2c5ab510f16f6e6f3fba363f5384e02a00949abdc7348e18adc2ed70bb0dd718055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515190af8d8f5f1011c395336293627ec
SHA1686fe08c67dcc6d2d646f8351fc7560f3489b677
SHA25626a81c82833b6b93c2d838eca3eacaf69a822da424c122a8f5b5ca1f9330f1ca
SHA512213c28c3ffd89f48b4db3b8b8366a3099c07e08bf6b2edb6e2f5fd8b7a4241f7ef79e952f3a68ce6c79024784c41cee592f15b249ab8dfb948d560cbe9704d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ac7fca22e2c97e2942b2efe94061ac
SHA17fec3fafa8d900c574c2add71e3a094841ccf7ec
SHA256fec9ba9c51389a830b0ff34f5dc97c460da78b43db102f69a6d54853a3ae4e99
SHA512953d0d507448390e213bb1c281b3fd053e549eb94fac874438ec7d88544cfc7436c779e8645eaba968ae2c497a011fd13162be4a0ede2c17bed5272b914c51a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6dfd2ac356c65e248537b2de07a6dc
SHA1e4af08ffc08b79616b4e9c4d8eeae5d5071086fb
SHA256e0844a5f4359bf715a1155221e7934dd1a8398d521071ab5a597a1cb5cf55db9
SHA512e8c5ba6f3f5b8a425a7c501a92ddef6f09b4d2b8d0f0aecbc8396b3dd6c59ba4f40bf29dea736ecf97362f2928c73b9fa562657c130a9c715311f140242f6190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53009e52442c2e552ab7136288e54a3aa
SHA12e642e964fc90aa3ab247596ecf0585959ca4d69
SHA2566e1cb6c302e533f20ef2f67afd5da3d46e2f0468e80a7b80e297ee1613642c41
SHA512d9f3797089ea8674b6133a8f33f8d6d00e71d18baa81dd7d890db4f9df4f79d1c51766fcc15c738ce5274b2e885620cf589a2e29e860318e4add6170c2754f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d209e6bb8978d767fd518a32967460
SHA176adaa2136280613e163b5b25f47a673729f66c9
SHA2566d7f88a87d8f235fbf3dd68524dd4829e4508c9b647c0a64b5e9b9de1ec32ca2
SHA512202e804c6ba3fbf40a2d76255e8b7ab52bcbef5f0bdb8c5d1de49e618616eb622bb26249c67c10fba1aa1ad13e658ea109aa400431148fce9775885b7f31b863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53865d47ca062dd1108071cdfd1d7778d
SHA1cd1dd2163f77a100d6f56ec08555120e269abcfb
SHA256e8ccfc4fb2fe5bbe33a3072d9a4692132d743d186ea06b67291320e93fbd102f
SHA5124b7bfc98cf2a1582b2ae3ddd29cc579a6cd53d784fd6c1e075747beeaddc96245abcbf8ca4adb013a29dde6da9f35c0a0903871a6798c4f5a190015498b72bb9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b