Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
3129e6c932ff929f6d2b020e6bea842a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3129e6c932ff929f6d2b020e6bea842a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3129e6c932ff929f6d2b020e6bea842a_JaffaCakes118.html
-
Size
21KB
-
MD5
3129e6c932ff929f6d2b020e6bea842a
-
SHA1
9fc2bbcc28120fca6f02fee5988b4d724d54128f
-
SHA256
a34b1af6917a41f2738a9f31df73be87e270da3be6eebf8e093429b14a1e7521
-
SHA512
887ca9aad212335f3480e50074a2d83b071ed9435d00dc9910f663263b2f33b2489fa7a3205f511e714c81766be24ff10b7685f2f972432fa3a2fbdbd173ec1d
-
SSDEEP
192:ydYak/aQaIknB/iBOPqAp6BbBLDQvzR7SY+jK5GiPLccBW9K2oBe3Mj76OkPDbVh:+GmJFGBs8B/9o7K3vQb8hLztp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000095e9e750b527e192fe7bc8bd46e6304475e546d33927ab055119265bb97431b000000000e8000000002000020000000e2b1f92016df202914bdfc17420201dbe2bb40657466654d5c8df87e58b490ea200000004479a3264d4bbf10a148dc989da01cff198f08fd8890e14a9eedd17c47d98a6440000000462d5e2963a6620b0dd79c3c75264e0f00fe40551487aec36476130d66054020a3008ec46b867f5372b70cc2bf66efbe8fd970d50bae9feb81612526b23d6e97 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8A92521-3E16-11EF-B985-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426707253" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b642d823d2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 900 iexplore.exe 900 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3129e6c932ff929f6d2b020e6bea842a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66002dbe5a1bf5097ce12a1f9725384
SHA1ac1f8421f7b18d951cf558a6f324d74147846aac
SHA256b717f282ea858adaeefba6bf8819b9724fd87ab1c7e0309ab7d68ea92385c906
SHA5123fd7c3e515c49f1918a31650db98177d0805d3e7a9488b37023f7e1990daa6985617028fb188a7ce4e6254de691fa0382213370106be5da95bec59dadff51752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500df93cab1d5396cae48c117b6c11b7e
SHA1ecb82fc957ad83b65ea03467e2503591aa767fdc
SHA2563fb6e5eb43000ed43c674f30f32834cdbf4d3089c04c796dd7165781c9465b7e
SHA512823c1a5a903e7a2ab3c7d4f29463e2b6f06c4d6d9fc4c2f3703f64011d91e5ce6012eca5eac68f4dff48b367ba67fc54896194cf5f032b65e05473a3308f184d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49eb0af13f16ab0090e7a6be38fb0c6
SHA19a7096bcafaa9411af0bc3e4684a7a52e888c4ca
SHA2569d7db40b8b1566556242846f99e1ab3894329b01d8795bc08539b2242e1e82d4
SHA51292aeb27c9f0365318f34770361fb57f9ad5c560b48a6e4c944af64a4a4d2ec5696150df21d592a34d0671e2954c0404d73928de996b74d68ec0f6b5b5abd7224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f92cba5280b55bbbf822af21cb6d99a
SHA1aae43ccf291bb56afe3f7077d3ada2c93ebc15a6
SHA2563bc8df844211d42d5ff79749987a654fbd35bc13205a7820d6dce80ed08ca1e7
SHA512f3b25a070997748ce85ebd337f3463706b7525a61dc8065c2b8ee31ffaeca8900864cc3cc42df427491b45fd26a34a51b9e71c003444806ba0de9a34c092c894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8afb27501fe8384571bbbecf5ffe66
SHA1534bcd87b38df63bd12c72bd75c2c3bb6cd4d9ab
SHA2565958052e12574bacedca70411710b287f1ba861b09cce6252ff7e3acddc3e550
SHA512fd1ad50dabcd9d1315d4505df9bca06a70315c14f0a826a6279e8f8a917344b1e1ff8635e44249e9a989a0009d0f5142df9e2ddd3698be00145cbfb2b71a6ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054e013b5cc63d1e3d34ceab3bd5c50e
SHA113166c638ae34de7f6cf503af5ff93515f0c1f08
SHA25664a638b0c056bbf636ed2221885988b769c7f0beb860973f9a3558529b696a74
SHA512cac9030fcaf9cabd1b6a1fbaeb5348cfd56609aef0cbe2999dae5ec9a4edfbdf5ca8dfcc140e5e45ffb11319c7699df4cc55388096bb8b6562697f87f022b55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133cb42c01bc85b3152d3f4c76d63f69
SHA1509e6f06dac9d7fb1d261dbe00c26459ca1e06f2
SHA2563d1dcf27d784efab7051c2267d6091faed10bae9a0282af4bd89855d3e607846
SHA5120ecfb522a03a205789a47d2e51b49f4bd620ed68a886776710dda8e423a840ee75b644e1d4ebf6db67cb9cb8088db658ef280d9119445d42f5ea34420a2064e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6c5f9b1dde8ebf993cc32b8683d01a
SHA1552b10c5854ab1049f3ba8f0c9545b0e064e4d5b
SHA256bbcc9739b3b1d844dbf2a5237cc35a948cb20b83b0cb50201e6d7cd6b6732eec
SHA5123c189cdafd391bb9b5a2eacb3ab977c5d8c77b36e9111c4727d0dcadc5664b20eeee7c8255b501a25ceb02404bd1ba68154509cb11cd2efe757484757063a331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f85feb1e85ea696090bb0031f28b0a0
SHA18c051aa1dd30113cf49e70809b3a09aa309f3b8f
SHA256ece06cbe8d0cac0f93f37d0e5911cc06cdd390e050eee12cf15acb70ed1ba0c8
SHA512f1240b375fc5d2b11d883eb9e3b613814ba9f01469726c3485c4bfbde3532647b53c95fc16e4f5418cacd7e7871b9d211f00732b9ac5365a71e5105b94bd78f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c32082f85788cfabcd791e1a780320
SHA1f6dcc0e42a92c91eb49d9cfeefce4cfce2403029
SHA256c59b13f30b67b9131c282d6babed6ce10d66f88de094aef41ce3e91e14b965ae
SHA51286633c860675270f3c39e08370958ccbbcb7597debd70f6c32cd6170b4dbf32afb738c7dedad2bf00020b23a9a66bec9b77f49f2f8a64e4be7dd85683565f21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6d16ee57b3f95fff7d569eec6b6c68
SHA127a4e3723733358515121f1d46cdf13e83a5ffb1
SHA2566b6c59b463d05aebf3b6eaeed48c87d752a3939bee9e10f78f507d5bce80a2fc
SHA512991d32795a6465ef256a40bac933752b8df8058d8782720275dcbb527e79c35a7efeefe1c22f3854def0393e9355fece5cfd0ac839bcb97d9c781889547a5f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89068835bdd2742637db315fe759047
SHA1e8c61d4b400549a6c27b02d38bc8d4cb7ac4a648
SHA256cb5ce16cbfe35b82bc752de482a08c2227e7decef9dcf72110bb5902c511efa8
SHA51220b76b32750e19e5471ba574d9f32a8312fe3e8147831ef0cb466bbc0fc1ce4a68e1de31cdcd1499e0e9cc84abe13636d9f26bb9744c20cf0db8442b91ad2f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c53e637cf0646e6a78ff2f065657c10
SHA1ba59bdab0f997edc10925cab9d0fa38d03bb42cf
SHA256a511fdc4e4360498945fb80a4a3526feae0d0dd872747e9e5be0724ef0c63095
SHA512127ba3bd5e8103484667631d15f57eae30052cadc8cc749e99d31f499e32e9ee26f5dfc7de08445799574ce6b0d0eeb028ed5718d4977398b412159d4f5d8ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d824f346467c79027e888cfb97ce4ffc
SHA164e05346c619fbd9f39499a0248b32b6deb58ebc
SHA256de1979e870eeb39dbff937a9df260bf4b213851a1fa0e647221700d819508824
SHA512883f0256e8e147c69b72810e3d74976da9d53440e027deba890cc0a4aff6be3000296981e0f0fbcba5ddb6594eef1874776c026700e57881c6b887982d68a4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0eb90af02f4fd19af4d040d1adb1950
SHA1e789ef839f6f22ea1795a8af63783470c6c29a9f
SHA256e00b6107bc75416204391daadb3592de8f3e2f582e869c0b14e1502076fc010d
SHA51230b73891b5971fea92f42927b279dd9edaab79ad2a6d72faf2f32aa6173dabd7607ebf7248b56d50941cd21929b1379505f8e68eaa483772683f4787ad78f9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e688b684fb81c42e1334cf2ea0d693d6
SHA1bf31ba0daf409051b7318fccd763acba21aac5f8
SHA2565f7c537a7497faab22e3432dc76f859fa171693268ce6a180afa535b73e82ab7
SHA512091f8c73858e64340ec0c5013dd86d58c93ec004389799f29a0768bbed5737ccef317e7c205ad82376f7b57916381d5e5492283e9f8da2dc98465f1203d72dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dda124313226d9bf4d894ed45ebd2ce
SHA1b709acfe3257421932da6c8f84d283f20535dffb
SHA2561987a58355c5fa6563c565f69736db99daf096d5b363152e4c5175bb535a9f4e
SHA5128e8d5ab8833bddbd5a90f8603d5ba7ea338e82b1eff222463762ef10c9cbe5950e2f3ad55a01bea70e7dd271c396e3337479234b6dd6b320d35f14edcb72d391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712c9ca1d1498b7738b676e230affa9d
SHA101fa93325566dbd6b906f66396df23320b52d07f
SHA2566b6c04130b01aa8fb15f334c7113ea93b50ee94ed542d4688503ecb3edd59abf
SHA51206edf86ceb632f40186c6a2db10d3c040ff77aff4dc629769eb8689827b0eba822b6683aedeab2cc8559704c00f4e36c5fd0dd1557eafd030ed4f97094a3f613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b434c7e04a9851b399702d28155e1e03
SHA1374307af5033f37f771330f852862f6a7571ac77
SHA256bc446956823dc390d93d8c6c21f604f39328984fefe68326629e7013d8e63791
SHA512443d1e10e9b5c171493d3f66b78954c836e0271b027cfc58f53f688be6fd5d4373e70c9191e20e2cd2fdc31f0cf638683a3d58f23da8cc2e1a2743bfed260e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52491cea3463e1f4752415e8d7512ebf1
SHA1b1de7b813a80119f8b4522ddad8d9d86773283ea
SHA256de2fab463db160000c3ae22fa27515fc665e594cdd02f91c8b83a29350350e62
SHA512f938325bf440d39b5fecfce7cbd386aaa454d3b7d8b5fe4b761357c089610325c637861a55bb4c5f3deef4aef117060b63e7aa9c96d41d6c7660dae3a32a4fe2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b