Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
3ae1b669f7126a0243e39c2d74ed06b2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ae1b669f7126a0243e39c2d74ed06b2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ae1b669f7126a0243e39c2d74ed06b2_JaffaCakes118.html
-
Size
28KB
-
MD5
3ae1b669f7126a0243e39c2d74ed06b2
-
SHA1
113562fac9cc49acdff339da011c69bf2f14bb17
-
SHA256
429cdf4b76b01203c295dedada41b170bc842aa9cb93da6cd16ddcedf8de074d
-
SHA512
9b1858cd61edfa8c0f4d4a4fd6320fe0a11fc78a91e7137517c38149ac5679e478f6b57ae1528dad28fcbf7bb98b261d38abd42951e6172c65cf4190572bae74
-
SSDEEP
768:Zcd9QZBC7mOdM8vpC5I9nC4WwAwXwqYPd:gQZBCCOd70IxCbwAwXwqYPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0287315ded3da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b13d5fa5a63224d8845728e79fe5249752d7b93edefcbc650a0844167be3bb15000000000e80000000020000200000006546c62b77ea6f70846bd969509d323af4e5f4aead463992e251602828f996be20000000e96deed02c6737e5d47bfdfd2d8444ea4483623299c0490d09178443d4e770384000000052cf3d1eed5452440b1923ef80a317b51035a91741c9a1041d78fa84e857d111482eff3e8bb633c84fd03e80dd84aa59fcec38d769d0c0d4c1027ff92f0974e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426897207" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E0CE551-3FD1-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2708 2724 iexplore.exe 30 PID 2724 wrote to memory of 2708 2724 iexplore.exe 30 PID 2724 wrote to memory of 2708 2724 iexplore.exe 30 PID 2724 wrote to memory of 2708 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ae1b669f7126a0243e39c2d74ed06b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518248b13b4c354d31d0920f13cc3e48f
SHA1baa7bc80ed15118441838844c94a917ff10160a2
SHA2564ebcf52ad9af271a839d197e519e4c03bd565c0815662043fde85f9256af741a
SHA512b9209517e0602411f4c234b407739dfed2c20c0985d8801c191844e4b18f928e2631e63fd248e8ca614172db4ea8657e663bf10c37d877734d189a39ce9bcc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbb76612f822495a7365cfda3e54834
SHA116cadcd9c378303ce30d07631519ae6904ff5bfc
SHA256ca7de4f1fc678938a8baad35f8a05cc650254ffe795e9df78608d7f89e004701
SHA512735b4d4e4c18f1b1c4319dbd03daf365a07c81eb9242f4015611b6b065ad8bffaaabd231d9e00965916b1d63835322a506d55007e6b676c829410593be0e89c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e975369b05a59d9c06cc71000d055b
SHA10c94a9f0689b3891aa5d01c5c22f2c120ab914da
SHA2565f397efb3ccef88bf1f4c6850d398c8daa340e3e098bb6daf8f0325533a9d5a7
SHA512c02a42d80534dc4940055e9eeecdca38ac2b803fa54faa0e060afaa79bafa051abacb23c43ea6bc03fe2c79a9ec9073f1db47c876a2a77dcca1ed71b4a558f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98c705e80153d2e2103165be679e5d6
SHA10c4c049443ebf8a7170685abdab261a65f34bfc5
SHA256f762775eebe7d4057cf8c8cd75d0532db2c46f3cf0e55063f6699218d2199b76
SHA512ce51e8167503d4a69377206922ae4861a28f2e43f83c399c94af507a23ae184f2027062790335bbc22f5859ad01b80e2dc6ff3f5847ec7b1c791b2037add0c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e84fa91f00d6dbc588675d0bab8b91
SHA1afc95f9e04fe90971905e129f2be05e6fb67c824
SHA256d84fb77d298e0165aa98160037dcada22e784fae63cdef80c7e4f61fdffb0278
SHA512fdb401449d4085eb4196b31c3c796d764d6cf2d6b8d1ba301594ad45f3be7f8c2a861e6312577c9170d3243b56f64328b2db589eaa2e2504b6088925417088ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578560830bbda22b85f18ba9bf407d7e4
SHA18829d8fa1e529653021983b1c3bdd94ed73c0d72
SHA256c2ddba858e96ded3cf701bf660704339e791d0e27f2142ca5d05620fdaa25278
SHA5129fcc62d365a26404ed8db9cfcea9a704ad4a29c11e99f3c0aa8de62c2d6721e1c68be8d3244b4e0b35943c9b9a3d376077b516d2b74f002a8620faa1174d1ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991a00677e3b15cc0c11c8a3505d2c76
SHA1e3a951c00a8cc6c246654b4853472f02fd74ca8f
SHA2566eac4f3de7db7bd5711ff394ff5e9bff9aef0fb0cdc3f779fa8fc51ad9f0c697
SHA512e6edaeec69ef784d4b3024ca0b565768c8ee78da7ce41022829ef17752b80c6d9d22345825b0befefe9db780a77026f8d94de5757d6a19920005a4dcd162003e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50528279fa72d5fb9668bd9d6a15faabc
SHA17b737b5763be441a8608b3f304caa20e29b1afb6
SHA256c983aeefb026f450be19a3f4ecc6fc4e6305699afc26e2646092339ecd17b36f
SHA512aff7723e60f02511314cbd256ec570e40ba29535ea6b62edfabf8160969b49991078e983d7e97daa091e5d10da04b780b51e91c6f03f904eabfbdb7f417f4dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703568cc5aa2e69ced90a7e14057ee95
SHA10503195578022dfe58519814ebd5db46b1f88ecc
SHA256c9104e670acb184d36bfcf7eecca43467a32be89918f70b5515ab7c472a22fc3
SHA5126c541f315236e7ac888218330f170ca48cef5179a36c64405ab04cf850295309b90d5b5bfd66bf270addf52365bd45bd22f5fb21ce0672a3bdc12d1db84ecc47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a96e77a7e7810de4095a719bafda0b
SHA13a1083f1e2c25619c2441a1d855d64b728547343
SHA256f695d4b857a42c6f91517b11bbb795faa242e8d2438a13c2474222432650c10b
SHA512914823b7c9f8daacb421a7c2e687575945ba3110ecdf68d6f62c4a3831f0e863d57362dedc87212af2d74bf316e16bcdb31a7863b0805938d404ab19e08d47ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f2fe7f7367ff4df5fb481f37e67533
SHA11efcccb0a558db9dc058ffb9d456aaf5d55d2fe1
SHA256862395c67682d4d7261759c0b7a56113084a2f8cc5be97ccb720c5b8985c16d7
SHA5122f1cf56b3bd20671eba0756e96f18b978ce969064160460a790725c7b003fe78f446a4b1110213f788700cc1ea500894365f5c4f8a75e87aafbf8def1322d320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f790033c37928195dacd87dd4f7890ab
SHA11a8c1fab949d1fe874084f05d7143b99a79d7ebb
SHA256c8cba6ab24c21262ae0836ec76fd7fcccc03ff9619b97b4f9db236b8b5da4d11
SHA5122a0e4fb3da1f304ded281449ed9185111bc72edfa17bb966a8f9e3e3fe3d0799516a56b7400b1aa376cb539b8301c2f89c551ab34d200f106aa2f2304f000171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05356446c7425929a2734398f83ec5e
SHA1ca219cd5df8918c5c49e4cac78b816ea9c2ae128
SHA2566abd177a2a5a0782194028280a1cd3042707c1446c20a6dc273fc5a3f3c99c97
SHA51242c4d11eee940dc40b956d468acdeabc5f45362a94c5d3db9cd9e9bf5d29aa5e3b43414506a412bb9643befb8d6508568ce2657f35d6fc3c8304019d194c7757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545bc997aca2badc34e52fc17f12b8942
SHA19fa957a8d3aa44ecdbcad9b81678a4339ced4969
SHA25637b4a44b2ba6e88f6cdabd9a7c40e23b878bb96eb750a9990875401ffc18068b
SHA512bf1beaae3d2ae9bfe25ef86de7f2814aad2a68416ecb8fe2a951813d0b92da61667d38bf5e4856761768e2a9f512e11293e6f69afe272c697f8d901596ec6d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed20f46e4562ddf44a58e43e672b8d6b
SHA19edf4e155fcefd4256d971b4b43cd8952f3920d1
SHA25620fbf491405b123f37a8611f2beb1136665954371c2cb041dbdaf09bdca95fa9
SHA5128e0968ddf52e4791ba488953d1498ab825066b01e0cd26a9502a56488cc9698ca991e5054372c8f035845a7a80bb846eaf63604b9e81a9bd508ebd2e41a7689a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caad4c7bd856e23f37c8551de5e88448
SHA1b6bf6971303130ab6f60dfe475c35dd8cdfa26c0
SHA2566358d1d2c723210aae26867a9c87e15e536559f43173d2357984658864533468
SHA512b673a92b164fbfce814700093bc6fa0af59083bc274ffbd6daa74f3383996a05949063f330adabebf6b0064af7c1f771f9133f2bc3fb6b0fa8d1591e73834705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6bfc57dacfd33daf0c384ebcd673c9
SHA1a1febcd44dcfb6d85ecf10a4208720f08cbf171f
SHA25664cec1d8397dac8b04b760ca81a9008d7c43dc9da4c22dfeca8258603c68ea3e
SHA51241c3b1877756beef7a9f76a1e37b2aadc246818f37763e1c6d93b80fab46abb2d6f252f50d37a8321f3e1f4363ce734d4fb76ac35da95f0f0975d4ef8dd79d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb89f2e2867a3d5fc96d2d3b93731370
SHA11525f3ca2e4d390f7d6354995f128fbe539cb262
SHA256d3bbfd14a9fabd13843d7d8023d66736173cb9d425694687294e3ce5b97eb8ab
SHA512598db56de6b99db92cc858d6699fff9434f0f51f83a7e06f0bf19663e109e03676037d3ec4b86121e88148f9a90811c4bd4f12c43512b2333baaf70e8e519f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b21962207096c574051180b62fa4ce8
SHA180254f44794b9225887df115cccd9da478b4b51c
SHA2561a24d17fff0e445d25f9131f4bbab30d2904b3c9cabbe4f86ac8a510f537d7fc
SHA512ed2a383b2819ff7b8cf1abbec016e1a4373cd0a9bfc317ac512605c6af95ae87450277defb85382b53a93bd9bb9ed201810b1b74cb841fb60aa84d550337a05e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b