Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
3174f8597baa2687eeb3978919473e12_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3174f8597baa2687eeb3978919473e12_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3174f8597baa2687eeb3978919473e12_JaffaCakes118.html
-
Size
178KB
-
MD5
3174f8597baa2687eeb3978919473e12
-
SHA1
929bb001a5245263e974952ed6ebd727c575c706
-
SHA256
775f2f97c1c2b3a78f5c59fc585319150d4759718105cf5f682309bae105ccb3
-
SHA512
3e0461d8ef4652a96523706f52499a6dc413c5d773f13a88cb8df34caa9c39ab202262c2542f5b665d5e3b21b6d8f4399fb04f326d8f628b73f52d018caddcb3
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcg8JHAONvLKOQmycZ5AM+4p:s0/VLbyQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426713535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{990125A1-3E25-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000001820405bbea4b132d42476e31fb6df38065b32a978ae1d0c733f5944ab340b9000000000e80000000020000200000009c8cfcdf45be07b2435434d2e32b357c4dbe6fef9e2f5e25d8ed88aea038d7ed20000000ad248c7dee063628eafa66af03979f3d2ab5322a3614f131bd9471283674b36a400000003b5c12e9110a96e9b85c05eb20f12120642ebaa2dd5952c1c6a6ba835e5f17e40ebd8aaa01a8896d6d184d2d1a333ca4e5f072c8f2a47db9012817ec8badd0ac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7030468832d2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3174f8597baa2687eeb3978919473e12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575de15f1e30c1752c4cc6771217702c9
SHA1efb88cd27f78ac795201a6046c12fe790a551be4
SHA2562cadb4ed40492f4588e6a74c1c898e0ded37c87bb3b209b9ea2dc7a741309024
SHA5128b229794a588538483399422ff7deaac5a374bc4f9d729d17cc10d86e3d86b81d53099b2724de8506a15b9d0410713b9ccddbe4a43cf5cec897d76e48b88407b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b623a706aa196c82340b5520172084
SHA18fe82a9126b844306f08d537cbb6028bb86b60ef
SHA2560a9bde037b3cc52baa1b27a1b60566e9395851ff14dfb14b9755ad7781699296
SHA51263c1f82627afeb03e889ec653e265c3741237304f365f2f25173a9bab4904e1827b5750b63a924a0e86af15dfe80532dbaf87f5a5478dfb51839beb07e30428e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c9f6f9835eace844d9c44579532729
SHA144a959cca78d0375d011ed04dcb679c5b04b07d5
SHA25610bf3b215f016ac671ca934feb8bdeea6ed52259b6a5fe359feb9059fec43c0b
SHA51227cf3e987a763f07fd7a4b0f7b9c44f73f6295847650acfb38774feebca64d6849f32bdd78f55b9719e016992f4d683fc8576493df1bbe66a64278b02d19c3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5e4d7f2b527e86939e0f00a612150c
SHA1073a7c4ff21276f7e72ae5544775861737341ac1
SHA2560d300620dfe6ebb1e8cee3d1c7bfea4cc2d3ae95a9ec4b18b25a2d5a1fc8213d
SHA51226bc0bd1b4fd5127937ab7843ea5c8dc6c8cc32af767e855c97b145be92e4eb3bacb39309ea57998887bb7babaf845f1cb232c6086dd9180b2945f10aaf531a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490167f4b793a580f9db3b5f28c5e81a
SHA17d55cb34b5f356717fff2eee8f3281050a2f119b
SHA2562fe7b9b4be924438b1b0b2a5f64fbeec6e2117ef897a16d63a0d40861dd4d938
SHA5125c2710728e5b04aca78156c79c0dfc9dfd5dedb3463748f1ff2477c8b579b6bd5effcdbfdadf546274a9a66917123ddc7f64125db324b86648a7ddbb60ea8883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f587f9fd5a35e3b635aa11e0b6bfeca
SHA151ca64d948e7cd3c5667cf64a59b22457594ca3c
SHA25608e627e8cde2ec72dc2f847f3036eb6c847ab75301866320c3c6b4d64784ecac
SHA512a5a927016e52cd3ec8f767dad4d8f22f7bce1514a3a5edb4a76b392cfe97a16a888abbaf3a3cd76c2f225730a33fce782eeb253ef6205acfd482189e8f63ccfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561acff3f36549caa73ae91bd23a77341
SHA10d70dc552e4d8473f9e809ce64f4745a288a4765
SHA256f96b16f48e1ce5924af6b871d381cfbb1bb5ecd941f73c2e57406d14c588fbcc
SHA512ec13040eda8f346d6a485ef2daafb76cbbcd8dd5bd9d51a8a6b926be5467b7cdd01c51da0c0740859985a955536b4178e8f57924540e7a24900e30a695ddd68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fed18dc0f1dddf81c5b895e009ca22b
SHA1314c243c320c4cd95e5685032f082c3a90ea4fca
SHA256e9f0282b61ac76e738b84fe66c6df698477ec97c7f044782cfefb6a838c5f9d4
SHA512779b77a9b742b36c7028a2a940200d10ef7f435c7113590e5e6576e9b895921ac5cb9734e8f9e5acf24653239cd59817fd4f25c5a8b6640b4928cf8abe2595ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fd66aefaddbdfef572f10fad96cc29
SHA127f47af7c583f98505ea916a668f02869a1affa5
SHA25619bce01c8813ee0efa06db590bd07f01f04f081c22fdb1b54025ca69cb9e7cb9
SHA51298f6cb7ab49b00054a972cd7c9f05fdcb11cb6ed326fd8fc1e9578d5a919f60e213dba632234f8c22da54343a9be5204a010c68acb8446420ab272ef1e6c5a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ab968371676d0df2e060bd3f657a5e
SHA168d8daa3893ddf0d642fd9ae8a8b6dc00bcccc42
SHA2562e4c88c040b6c614556ef15b9ebbb9dedf0972177186438d01408884de77fedd
SHA512ae323d0d847a0a87722564078ed419218c668c28fcf70de8609a85c1786bdd13780254f438630045027accf6c7ee57220efcce20ab6ea628b6ecd340953a89ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb70a3611af05256a7d58ebc7fd57ab
SHA10b8a1002de3af954186b0ebf1df8cd6b15e643e8
SHA256aa29cb1873240edcd6b1fbb92077ded17df1d3c718f03a27e564a25b5f39c44c
SHA5124e1a26d6b0aa181a94588b2428f7e066db0b77320d683aee8db212e2afc5ad078cac92872765a127f33e02cc39a42760405499180149bf2446b3b6452549f1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0099a0526f7c6c6d8f3b5efe7d41775
SHA127da98e798a01cf111e2e82aa9cf58a491c9a83f
SHA2569ba3603c3f24d6cb8f2b35249a8738598d091f155ca444646a57e68d3c97ad07
SHA512bf766dedcd6248d7e1e9e2c17dad8b5b83ba8834e4b587978bcc0089cc1cad919092370f8f6096fe0f8be563d7c34c0f56306b12d15dce15d6d9d76757685cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50303682d283a3c0d2c576300b5222f20
SHA1a839132e5405d9f1981c28e0eebbc4235faa5141
SHA2565ca77408aba4a5607728d7e853ac86ea25e26d5030887d377fec60386c6ef015
SHA512727fe0c7c0ce59a27f7c7b3bc1955b65c01579d86abfc055b56195519862d12963563445a76a5a8b8e5eae9937c8148b4df5e6e64e2d03db2b05b547824cd8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a15b8ef1de20739c185d840a16d46a
SHA18dc042d1fa48fe851b5fe90fb5bc84e398dc5ba1
SHA25649830e7fb0b9dc4be322bd94ccabb33c3f1125af90742705bbad3a0a7b680e58
SHA512c97dd19d19abf55b3cdd4210306e1baf69e75fc71a206b408645f7a8fcd6e3e7f4285f3e627102e79f0e26a0c86b363cffba066d7fca4744e6bf22df9314f8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f4d0582c7a3dc63c437777e867925f
SHA10079d9a24ba750a252d1d885143d6b069988b52b
SHA256878debbcb4dc88406d1c0fafd046ec9d9d1333c434ed0990d231dd17d806a7e7
SHA51250d75741ec3e7036e8514055bac8cae2a306bcaaca522915e070aaf89b4f6cb23d42257998f0c60ab052e836e1f72ecd603ef67c296d9dc731a73fec9d1c4244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bdc775c0502de94d5fdf0607a55b91
SHA1df1d0259e809436ae91405721fe4392f9ab26969
SHA256b9215f1a0f65a9ef6e8226535ae95b038daf83a30af17c6047c15a5949b1c849
SHA512a65a793b108bd6056b5da833b303d4e76c2dc2e352f1372f89d6b4ba5974cb4c049bca7c0be70edea8696dfb91021cb045c1a279b05cc7e082a33c9721e80049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2e876efb7d55a71325ea9f728d2637
SHA1bcffde404f1989bda69d8d9ce06780b8459aa338
SHA2569b52e15f032261b4edf158c57121c24441e6d1d1031ec310cd39592d6fc34ce1
SHA5124d950b41a6c38650fca49471c28bad1856e0bef9059bdbf83135211cdfd562127a70627d1f85e81a1934fdc58d0477521abf7e6e820fc2782a921108fe75ecd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e5499ff411cc86b73927ef70015465
SHA134ad677586ce37f5defbd59259a1c1820c0a033d
SHA256544702ed45dc3bcba5ac983308fe7190fa7462c5d4edf558d085ac3ff527b73a
SHA51210adee04e80eeb7974a2ddab41b22339ae12d0ab46fbf4d9598cbd4cffb4158aa091cd5cff7d30f5af27b90b58d5fa0222ab61837baa6b1247d0b702935c8ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7569b97ad1ae74f88059451dcecb12
SHA17545b33f5b24f268b162cf7e3d56fd5a9ec95e7b
SHA256889b6591ad916097d165afbd094dd2ebb4403815b03875af72fe74949bf422f2
SHA5121984abfa3353e9d845b6fc2c674ecce2666f686134ee5cbc0ccd30b55025890f74bef4b28be1faf6ebfa074f1bf4ae9e94d8eec83df66b094a58074367fcba50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfe8abfbd42f33d083ddba9c3844cc6
SHA17875677bba5ba9628e7e2e67729c592f17efb1b8
SHA256eafb5c155c57e9b39ebc6cc9b13bab9f249e346cf04e8b5e8e368fb9bba1ffeb
SHA5124b36cab5cb9a218c7278e595e632bf8e61d066746a4a032dd40c606d9b94cadf9c6169a1371a3237800ae400d9ce68239d3e3cf059c717e42906ff8dc02139ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b