Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
3530c76cb3faf72e6dbe614d938a114d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3530c76cb3faf72e6dbe614d938a114d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3530c76cb3faf72e6dbe614d938a114d_JaffaCakes118.html
-
Size
57KB
-
MD5
3530c76cb3faf72e6dbe614d938a114d
-
SHA1
3ecc4473e078bfe6d438b1fe5ee01b6288ff8607
-
SHA256
95fa1af60e0b52fe7e31fe4c4b1f9e98f35f4ff3afd3960df6d07f2effcfa753
-
SHA512
c235abd0d3ee82784706320eb031292a4aa01ca7a3d46e404e234b5b4fed0c33c0046090ae9b791ffdb8f77b96ce8c15f6ccd51cbddaf8c07904d65f5882e89e
-
SSDEEP
1536:ijEQvK8OPHdsgjo2vgyHJv0owbd6zKD6CDK2RVrojYwpDK2RVy:ijnOPHdsD2vgyHJutDK2RVrojYwpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e895b56cec92121d34665a556d267051d70fbb013251cde855e1cefb36d2c923000000000e80000000020000200000008115208b09a3d155eb750f0fa6f1113d2ef21ecedeb523fbeec2c6fd60912d9b20000000623763f3d4dd6492b97fdeea048afff03fc2b1c96265028f28f89bcab97f01c3400000006e1c535e03725ea0247c7e14c30c0efca422e53cdb52bc0c0cffcad3ea624c57cb87945248bc631985169e98c4fbc946e7edab4af8a345f58d086bc6dfbb92da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C8BE1B1-3ECC-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50861306d9d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426785079" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2692 2680 iexplore.exe 30 PID 2680 wrote to memory of 2692 2680 iexplore.exe 30 PID 2680 wrote to memory of 2692 2680 iexplore.exe 30 PID 2680 wrote to memory of 2692 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3530c76cb3faf72e6dbe614d938a114d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD52be25426e942353c14d46686a3849e8d
SHA19e7d2f5d0c8838947b6b79e0e7dca2c0643610df
SHA256056d8110aad8c92bbd01d0bd2d1fa8c2492d940ed02b57a7cd3f78175e3c2d3a
SHA512186cf8876e95715d3e6aa5c445d3717a070c4832ea5d5839379e97e75562e99ff46330f18569118807c7c92936fc03886e556ed96750fc65e1e7495c74f4cebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755b8ff17ce292cf005c87258f4999d2
SHA1db5ec1f2aa466533ed7150bb0e0d60cdf21d924e
SHA256c7b771536a90bc7dc77116e93256fc9772e6d3a305b732a626c4ff8efe7047c2
SHA512416820f4b9c3e3e6979a10c087a0d4deedb14aa2239da7c3da3957d5f443d706aea91394cb4cd09719cfa53090757121705e68220419dd4053ba821f58679fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bb2ac25ca4725da340325150eba06e
SHA17a90ebda76cbff45ccb77bb5a8ea5688e9d1b735
SHA25669d9b52f5399f7e674cd521b3043419b8a6ae84d5b0be92238d47962e8326003
SHA512db8ee16f19f9d7f268314f087513b97b562b37629402ebf009ad8aa3a5cd70fb7ca75e8d96beee9004b81dfa442ea69a30e11541f44ecad8c7bfd6e9995c90bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e076534245594871208f929442e313c
SHA1307b7fa701c850034b561439f2d89cfa359a128a
SHA25631d16841718b1b1dc8973c82da4af4fcc54ab923702a5d3c52e23103ee12d893
SHA512892d0c8de074c8f5662b9cd3a1b7b443f61cb6bace6572790502f33a011e69bb2d45c92385595ec28369a072423a3c69744cb3f2467933a42d0eb430a8f1cf94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9779fb93cdbfe26f85e5187f123c10
SHA184ffdf58029a92dbd36c4bf5ee9aa6e173d40940
SHA2563ba03265ef8c1cfc1a9e6004abd5c70fb5af5e5088c09cfdfa2ea8af7689b879
SHA51297c8035662346fc58f96b88ed814ef67e9a15907707a104f0b76ef7b1f11c69a679ee0a00da65891231986451819505dcbaea9c570a12b652623b58cde5b3c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5eace8a54334d05853b90435ab2d314
SHA10afb2cf844bf9b7f02107fabaafbd241adf29bf9
SHA2562c56bda2fae881b7270a35a56a53b72ca95aa0d9be2dc19c45586a3dfd8fa767
SHA512fc2e0eacd8975334746c0eeeeb4e3511138e19a7c7ca27f140ce5e29568004343c7021a6782a49ee65cf506beaed26a0b0f8dec0d25d596e7bded1a0436f01f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571bfd3a9e28d633bd9d7eecb23874758
SHA1e37fdbe531d411cd6a091a228e945748c6e26221
SHA256c303215a9737a4e8200369c9fd253e95fbf6b23c3ee0034c234593082df3e816
SHA5127191aa01a903a3d78458c11910479340b360f9c7268b03acefe048713de1c56430433ee93a32dfe25779243d95c1f4464e0e7f81a0b8809adec2782b6df9a920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52870f0df93958f1af0439b8167c96d66
SHA10a673b9db1dbf64879a3a84fe2fa05556ed7ea1f
SHA2567e6146493c7196810c291b4c3dcb9b8811ca4720c215c3b9fdc5e0f89bb85c44
SHA51223c9afba65932daedf5d24476397d3bbe364e9901a9262d3a3312c52fb0430c128f1344cff8b9a63637df71c9373f464aca300263d50e713965f60733125ee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a6c33b0a101acf76f8f8b4f4f9b122
SHA10398695c2dce2b47cefa2ef8721561994e24abac
SHA256cf589c88b284be82239fb39318da8654d75c744c9a0fa2a110abbb1856f6402e
SHA512bdbb1eb3b91d92d668f0cfff8b43942932a063320db8bd269dd6196b7c27b1c130edbe2c9ed199afa83ae309dbd852909407863f82bad4c654d6f7f93dc0b328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aec290e6b1c035cd030c30648bb965a
SHA1c6d101fe5efce716e34333aa0ee7d80207794c43
SHA2560631757dff4fc38047d9d35db4e3ea8ed63ae07244df6edcafad027dde5e9a35
SHA51244cc9105bae0f4183cbfa531d17545a9839957ad7b04b8edfa8183ca24cecd80f9dce1a2094f6a439810a2d2c7d3965a626e3582356f58f067ad05feb5229bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f8f15da960e6ac6e3234c9d28682b1
SHA121098eac72a8a2fc17375129d40c93e351f44c04
SHA256e782823c0e4ad392f6e4aa6f40da0e4cc6f4b90d906b0384a52159635ca97ab5
SHA512cebf075d60d445c992179f7f061e1746ca9e87befc613c9eaf7490bbbe9761a21ca16463b5b5a2abaf967d3021f7bb4e1f0a55d7664bdfd0abdfc9732cac2c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b490e3b0aca0a675f456b04cdbc3fb6
SHA13fcfe315cd440a18f861ac24402c87b77b2300ee
SHA256ed59a93baaea376d78276514ac093d3d525b832fdd4a74181b790bf2611e1b2c
SHA5127a65efd264154092c10111dbac45c40f549e87b539e8bf9dc37d720bc671ef4a1ca5177e5b7fa9785e2e0f7b7f0062e10878a290aa25c0cdbba2ddaf7bd1cebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b368de8f9bc105b6917072bf0a55a6
SHA158deb016fa3899543753d89d5f0f071a870d1766
SHA256892e7196a22ea6717cea72cf8571a5d5a8ba2a05b9d019baf3cc881d30fbcbee
SHA5122e46ae3abfe16bb409353e0fe76ab419c07527cb3566dd6cf441d0a1aea2eb5358259133a60d0f182a50f0f164db9bfccaa2cb9be444bf124016ecd6451b6770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9f0d54e89ba27cc65d2156ae6419f4
SHA1d05d5b96be03e36ea7f7ed1b6b13c0e86b824d41
SHA25675156070891f1bf30928ed566502aeca65d786db441a13d32afee0ff0481042f
SHA512f8c205b28582365dafc8732691549bc82ad0523496562923644df25a22a20d609941da12ae3628503594648b78ef12fa38353070d0d37dd00a25ef7fdfaf416c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db44f7e55a00d2c142e320f57ed69108
SHA19ab0b45e1eb540fa781d4e14a9dfa762bc4bc273
SHA2563541346406c9cf9594bb1ef34118e4d562bad8095f92c1047a6ebb9f6c748bb2
SHA512a3dc04b4f7e981aca7fb9cc65863feaf845ef11b691c8945454d038aa4c65d17dcfa90994a0e1c3c3c9037eb936ac15cea86ed14676ea3b5cb86b68daa44ec1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e03131dac4ca77b73ca4190c9fb34e
SHA1db57b4138814ffc5848700aa92d6b0daf8884a16
SHA256ca63031063abec961236cc5e1b2dfe22b689a14a425f454e9ae0a113c43c94aa
SHA5128eb03dbe4a3c8504d156a8b4b9e068bbc6877581886db5d1ef565ab6935f08df74e27762a19731a451072ef2338c92393894a64c177ea41b5da39f7bf66bf0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd9617cfc58709aee3c126bc2a3e422
SHA10fa5d6c2d22a49980f97a3ce9c5db15b0211336f
SHA256c73b0b5243b059ab25ec0b274eb95605cddca3fa413ccf04eb4a1b913ec6b5a6
SHA512b81c01778d21dafc396f023f64674dadbb946460c64102f11867d73581854d14d8408f2b200540d973021b87d2415259d9bbd39677f880f07ce191b2a12b980f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\f[1].txt
Filesize40KB
MD5646fe03d3ca61f0648a3ab70b488f032
SHA19bb18596a93669ff431ad82edc1f2da85fe9823b
SHA256e6b37911a34ebb85ab2b6d312b15470b34b5afa5ae3467ce6be6cceacd601b56
SHA51236201a8ac785aa3e918c1d48d5f1c7a168eaf46e861b4fc6a7ca5b97475618079f04b9c876d99907401693bddb18c737ae4650f0cb1616e5f428ecead8ee8b96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b