Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
3664ea228a3cbc6666741b2a13695b48_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3664ea228a3cbc6666741b2a13695b48_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3664ea228a3cbc6666741b2a13695b48_JaffaCakes118.html
-
Size
118KB
-
MD5
3664ea228a3cbc6666741b2a13695b48
-
SHA1
eccddb81da64d18cebe286eca7ff8cc6048b2f47
-
SHA256
90467ae73de9a4a80287a93f45d10a04beb195b391a024a5fce6f3b7d0da57af
-
SHA512
eee1eb73431c7b8011eb3f97324604797a05de35c9f4be218004c0aaa9255247a7184baa356705ad05ef3f772ada3c9dcfdfd19b32c5cd31872b08b596efb787
-
SSDEEP
3072:gk2l0IxsNuHxbW0hpjzL48m1/8nRA/C9BW1W7PUi7dfSoJcRpuFxdMNkRlLjOedy:jTIiNuHxb7hpjzL48m1/8nRA/C9BW1WO
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000066295d7a687b09c929c1dca18a1b289c4e432135bece1fca13f9eb762342bc0f000000000e80000000020000200000002411b82b8380eaa7f1cfae04d51f9e126e41d0b75d9da8cf0552f139ce64ed7f2000000058acb52341b2df4afd7a9195eec2278f33ea7aa8cc0f8a544366aa189926a5ec400000003f3fe385665cf20227a736224d4e4e8dd9f0048b1bf70abca47048a5dca7c1aefe7f49bb33cfc5973b2e5a7c42c50602bd56a023b181bfcb75cef32171142ff7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426807672" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e3c49e0dd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5DA59D1-3F00-11EF-B707-6AA0EDE5A32F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2420 iexplore.exe 2420 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2420 wrote to memory of 2140 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2140 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2140 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2140 2420 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3664ea228a3cbc6666741b2a13695b48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0063f7937538164ea8f1dc0be8369e3
SHA1b01c4ec9d760ce5feb4f25278af9b7e6158b9600
SHA2567f41916fb03be278ade193ac700abb9af2ee4558181d9592439b5444e1254dfd
SHA51210315cd00f7300f855aa7e285fb7ce9c6ea13d3ab1d3531c41964cc3bcc54d4c45fe28f1ebfd1c87617f8e1a55997d5b554a1b1b291ee6dbd7c88937d10de888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f20602a43eeab1d1616c90ab9433a1e
SHA142efc53c58a1061c02970ef56cf4b938e5bd7f0e
SHA256c62d645a26cad710fb5d107b1f4930b2c2d4e32a39d465b8b9f88d465c180e94
SHA51243d309e869ccbc4edc8b39c1a1dfe9c69748243d785cdaa5cf7aca2ea56f39c4fd5c34cb61faddac304a8dfb2023928f9c17f54300fb40294710245516376251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845bba883bdbf6a40089339946b0fc2d
SHA117cec61c2ee67a7019b7f0c95624e010bf3f9e68
SHA25640464a77d8758ec616482bed05aee5e4835676e399deffc6ebbd76e619c51a6a
SHA512da037567507e2970e302fe4233a89cd031056879de25d3e8931078d7a1a45056825be3ee5a8676c9d346a4441f149e75e0e111645f109ba90b89a8103d0b18e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551198bfb38183b28d8c7fe17bd3cd99e
SHA13303f098d9ab9afd4655d1d458fc11f33b5aee23
SHA2565c1232e0ca6da2a9909364d8a70614816e5a0e87dfaa9bf024bb550c805758bd
SHA51256ec3957868a78ae2533b1801035449e075245187be3bfbdd412c3a4e7150a5db6f0b3e233f3be22df2f48f3ff0117682194810c9274d56e4f6ff911def72ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13d2fee526406fef0e1ea65629fffe2
SHA18500dc4b1baedb94e588ae3d2f55cdfee356408c
SHA2560a952852abfe3d0202453c38a8746a3e6f0a7874ce39e01098860fbd6e44f121
SHA512160ce903d6bd70bd63e3b117d8ac2dfeb459d5673c346ccbbfce5f9ca1e4f6da7ece94c4bb606e82a93c7d5af8719cfd2cf50b5085da3e0d3f432eecd3d114fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182c2020aeb4e9efb3683950c39ba08b
SHA1fe12b3a1cf218bc3c6784ec895b9cb756eb16d36
SHA2565876fd90acbaf2b9ca4bbbd4d6e8d1a510c3b5678ba2af0d6d6ed75469c76b8f
SHA51296522d5ca670cf01dce0d834ece8043cd0207d98c252855636b2406b3dba7293a58ea03bf431732506e0e227acfcba913596fbc69c3da57e094349fff25d7da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae88a9bb9e68c23adff913ffd8147fda
SHA16757e3745b547bc124dd10df8e8ea64309393bde
SHA256c2463cf964dad8127fd6b6f46ac1dc532e3f13a5e7216450ded43768cda581c6
SHA5127b5584541c45c71cc57807c04fa62b64ef1dc1ce4a7235d667af8ce75dbfc68a4165f41536beb9f8b6c3e336064703e136f4771e8380be946d51e0c5b727a33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77a213848297258f8cb0afdadd761da
SHA1811f172b7468ae12714ed3b33b2f6d54c3576cb4
SHA25601839e9c532648abe5213af25627e3bec3f819d0a73edacd0a94fa5239b398b4
SHA512fdda0bc63b58945ee81cf2af5efa4184face77e7d2b794addd6a3db40bf574b9e3d1ac3b86c2deff97b0e0f79aab6d828883accdecf47940eeb1af2c6f2bba7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7dc57a8181d7dc52e435eb10eb5b09
SHA1b005fb13c225515e4bfc1408afffff281da80720
SHA256fdf63cc8b1d07f056ba9ffa034a48c6bd1b170c970b57fe75d6ecd215885f66e
SHA5127cc97660f144772f0ff85ba7fb724a84da263656ec327bd45cbe7a6ead7bc9f762eb8e74baaf794e77dcd60c70c68cdad7d08514e12e926f77e35b1255cfd599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442decbec21d583c1fd38337accdc941
SHA1fe62eede68d90864fa234bc639da235743dd1e77
SHA2568fc78db0b39b1fb39e1c59b8ee3c1aabff725844f729606765b8466934d0d083
SHA5129e795075651bb3d0528da2482258f3cc4039ace798cc21b0baf99571e0a3968d40e0433d3a66e09ab368988df2f08e718f0d7e68be03028b0623607c56efdb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf0dd4d5a6566377a8e791766eed35b
SHA1baa482b5707cd939f83628429d0808fc3846e74f
SHA256af9a007c485a69a3332623023684555352eac5511c153ddcdb26265d67e3b19c
SHA5124fecb4583cac9d075d7e1be0f4be320a8c120a6d186b9909b5656ad04c75be2e31a623602853d21629c047159d1851ccd6e616d6923ce623b02879b90b74a780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b43acc267e419bdf56bb914810aa87
SHA13acccc3cf609ba825c6331027d6908d64643ca8c
SHA25613ed7a206a596bb8bf1608b8a75811f91bade753af0fbd311bc2eaab87af6dc8
SHA512517a0d5732af8331286991ccc6e91e17ba01cf3558fc4acbcd091ce02e1849214290c72acf3f329c394670e99603199e6bb3d629fa3208d45bb18b02a105f449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac6b31e6fb2912580abd8af39965978
SHA166cdbf153b078e932a3ad7db21eab028697368e5
SHA25618fdb62ce3380c59ac84fbe289c99b38844273d3f4a67b45a67d9fd6816af68e
SHA512b1d1fc824d62c1dc0a4680fa84ee170b904c0a7a12ad352a8167c2c22429a9ff6e1a19a47dfe3821291c0926325603370d64d006c06e21e4d84e9d10b015b40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844af3a266511ce36a3f458c3da423f5
SHA1bde2a239675f3519ac48002109f7264d46890583
SHA256c07d19814a587d90168502432b03ebafea62a80915ae93325c83f6e807826259
SHA512c12175cb4d0716accdc852ef648b3121669dfe0688489cb6759bfe150f7e56c3cc960c12e7bd5cb9b2a39435e6014c75b5b44b2ce81dd83d38d3ea6986426f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc723d439c58194989179cb2e5de7c17
SHA1647da71e3f897bd527371b5173b4a3e13161e7c9
SHA256fba0d5bc74a09b07976be6bde06ac965d3fa16d555b256cddf9b68efcfb1a840
SHA5124585dea8241b1dbe382d723fda0e96a635ea1813baa9f555ff4a61ad24fe83cd8f2d137894f99b16f2cc39de3cd35342746abc7231b070671080b74509ecc5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c209a128b5603b74f619273acf8c75a4
SHA1eeabe9c7b47baece589b150d512ee13b7383bf4f
SHA25646b13316535b5b6d1cc02b103e2c3f5a376107f7bea8dff4b4c6debd85abc9b7
SHA51201c374659c8303993f58f1097c2633a638ef4f248834ca9e824e8e37d4de91f7d4e4cb747e604e170e61cb1f5baf4642a2339f88deb49a655f0e811cf9f90235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53473dc2e7d636c46416950ad6cb18188
SHA1453d269f92f3823145ddbdd831186e61bcc55c45
SHA2564cfc3644010c11fa154d6df5da47eafd1f05c0fb1069d294b735476357394114
SHA512ea676440e848a6899ee07b7d6abb437475d17b66f413109c0919abf905bca9dbe3008db794c0e44780524bce78d247783fb1b2ef0ad4c2bd9f07fd798fa15367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5b947d2a1a55486197fd2bfbb162ce
SHA1d031e636d312876fce5ab367bb9099473ea13031
SHA25613db34ff3a95dd548470a40ba3fc6847d494e6ac2ba6d028cbb9885ed6bed9be
SHA512995acb3783cf96850af44e86106b36680a817a4319e366c3b163357f52f9320ec9d5c54fdd9c24653ef8f17de0e6d0620b79becf54ff98a9cf298819b68093c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UK8J8K8\jamitallthewayupmyass3_02_02_hd_l[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b