Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
3b26138c8ca618e2b41964ba3e3c7968_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b26138c8ca618e2b41964ba3e3c7968_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b26138c8ca618e2b41964ba3e3c7968_JaffaCakes118.html
-
Size
53KB
-
MD5
3b26138c8ca618e2b41964ba3e3c7968
-
SHA1
28b45f0317769379800cb963e1af85260e06b357
-
SHA256
d4ab0d58661b595a4b2dca1eac6010f2adf90d6cb1315a2fb34b57f9d91502ff
-
SHA512
add56ec4ab0127de2b6f81ecf893cb3b1dcbda7c0db390235890dbc04ee08c5e0eb59c52c551319dfc951a6a19790163694a8ef374ee102f6e20258055190ba6
-
SSDEEP
1536:CkgUiIakTqGivi+PyU7runlYd63Nj+q5VyvR0w2AzTICbbco2/t9M/dNwIUTDmDh:CkgUiIakTqGivi+PyU7runlYd63Nj+qO
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f4b189ead3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008cfc52c5e422681956a046f5f5ae5fb66bbe73e3d1bddca1415f5e323a6f7de1000000000e8000000002000020000000b1a53f34c88252470e8b24a8063b0160acb9434c3f9845f13e25a4b6f95366b720000000e0f95c74316214021eb56272d0c976b6ade56fa8685ce566ffa68c9186f1f3f140000000c596371fe1f6e63aea301cfcb51333029aeb5ac4cf73df8192c93761eba611c498a96041f184ef4e23688e5c35d8bc49b82f680c4416cadd6610fdf41d7188a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426902556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B24AEDC1-3FDD-11EF-98DB-E29800E22076} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 3020 1380 iexplore.exe 30 PID 1380 wrote to memory of 3020 1380 iexplore.exe 30 PID 1380 wrote to memory of 3020 1380 iexplore.exe 30 PID 1380 wrote to memory of 3020 1380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b26138c8ca618e2b41964ba3e3c7968_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5e3fa28f676fb58076863a6476c826
SHA16a281a839fc105ce0fa9546d18b007c747c4b408
SHA25686fa5ea5e5e301aad760df95a1a0e20bb3f74e1a288a9868657d3c3ba03faa2e
SHA51217055a9396ff7774f6dd786192dad492977cc7ab41e8f4e22468e32a3c940f6432ca4f75109455f5822e006260da96b9a295a95553fc736f4fc31c2b06462c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c057ef3ffdd43809a2c6a078e9963bf
SHA10a04e1e9b690732c1ab0e166dbd9c3a1dcd8267e
SHA256dd6e2780834feab70317a9f3233347eda6cdea7225d530103b7f5c27bf6bccbf
SHA5123135e327863ddcf9b1b2cf0c4b74591427ae6f38bd9818a09c48847f3f8662d11438012e2915b6f8061689c71a3e42a75fc37cc404d25c18c0eab5119a6a0b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9a041e3cdccced654fa5725a0cd145
SHA1cbacd85e9c49e87420f7ef1a9f0790e9bd239c8c
SHA256b2958a6a9d138633448e83c572e81e9c61c122ae49c6abf5a4169ad4cf911a4f
SHA5121278613abcd648936d186eb10664763be36afe2e547628d1dcf9a10a2a55d1c10a7e3747e1af45dfba0ce74c956c2dedae39732675ccf86a685bcbfe729eb9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f8f4d58a9a1ecdac4252e5a2c625bf
SHA1f9790a267ccf95d43c8fbc7c147cbf148b1ee683
SHA2568d9fd2c0e06b39764da2742ae6b1dfd1c1e32be192a427a5f2df0613d0de6fa4
SHA512c307a83bba13331ca3a0e78acbc94ae0a9fae72bf1d113fd83b7db6332790cc3304a13c0ecb99b15e4f1ef8ff371fd2fb499342f6cf8e5c8c1d00d46bc95c409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58977811c711bf198ac68598719a56b09
SHA196bac856a5252442f434e0400a3df67c06ed7cf9
SHA256b53896df1447d34129c70c086043d08e8311ece9c640cbb997e4c2d60a5bff92
SHA512070e09569ea8b3d6987fb6a19deaf4738d368042ca57785cd76e74d249dc3c1152b1f4ed8dd82f279666cb5c5396001f0f438b52f3f301fb91d05d65ffa44ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb464ca66c172e8ac9c606adce95de3
SHA1d633a8d547a8c110bb6d249169d412fadee8f1a7
SHA256c45c01de7e52af780b9606e3b5658e50d0db01f098e325ccc3ae9bc0c00f4321
SHA51240a951d94998bcacadd11eaba420c36dd73d4e1d96643b9c43e70a478d70b2c472ea31c365d530fb7b72905b1fe993f5bfaa49d0b63eed8425e8b4442027d4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa67bc622554a089277255cb4cef89bb
SHA1c9c8238b86d19c314230bfbf915e3610b8fc0925
SHA256ff1649e04ca8bab498fa7215422b890bed49295f22b3090ada4f8c44c9f3efb6
SHA512485a47e19cf07b2bb12faaac5a3403dda99dccc7189b1d4f6606164a7e53484242be5165850c6634f7038900ee44c4e96170cb9a9ebeae32297b062852982aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cb7617bc5d756238eb7c7aad4284d4
SHA11da1ec2c5d1532f14b779ed97ea9b7b6110d9b74
SHA2569af1e608a2105200e8e0e7d3a4a03fe5fb4d05155bcc66d34f2e25a2d4ebefae
SHA5128800fcd6152ed1edc19c89e1cbffc8c8c3860376c41568ea298940ae2d0d0b448db0ee8de1f67c0acdc952b2aea2a013dd8c10012cefb4a002098bc2ef06b2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55750c97b127f5ca49890e8f27e5beb59
SHA1314ee60048160f67524eeceeea891e9e99d08e40
SHA256356b89ccd699468329b739a527cb540b8c36fdaf9c5bbcfcbe3a9b9ef0d0371d
SHA51251e610433916498b5bac0cd76649f97c583f8e3c9dc90cbb94ad856d9fa6d5e9e52770d1e2e48dcf1074ecba9451bbe9160f871ade3e4be9347c87e552984fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817ff99f91d77a890fd29d50b50418af
SHA1d361f33eca225b108e1010f02cf03fafc3896c25
SHA256ff63c2abd638f090ae2445f9891ecce3a52ab562bf650fb87589e08181425099
SHA512927b6046f355ace350fd34f7bf1bda098cf9aee7888ffeb1c790ecfe79d4f6f7ac7d830fe1bba913542f390b16e6ac13ac578faeecb8a0da9da24717ede32200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52baf4c7f00654bb1fc7711d4163c2a9e
SHA12ce55000f5ee75f561f7748f2165ef7a91995550
SHA2568612e141fbe7a0971d2e12c2fefb70d6332fb5f9249386256435b7774b94d61f
SHA51282e2ba485d2da48b9a9fac805fd4f898cff0bea69e6720f29c99c01d43d150e5ba7d7642e577cf325d8ccd7f4922b26b4898caada7d72ff6f5844a4bef396fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e57dac859a767ae3f3e5bd1f39f0753
SHA16d1664bedcdcbe3379e67815adeca6f2a3ef4531
SHA256e67a9243d153f9b9e87d0722df1f01bf77c83a5f3caf454c406a1fd4c4ed3358
SHA51226f80b44ab172e0515c910807e8a682375ac20f3d901643ba99c2cb77ef7523d3ca4e93e17698fb030cf6be1863fea1ab3c3186f66431aef124059d404e85284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59379808661d52da1111cfc16d70ed5e4
SHA1fe87578962e4ae33bdb2d1eaafd53440d5bbd4be
SHA2569f00b3108025df296848c56e34fa87d470176a25979d1be28f6970021c4cae11
SHA5129e5cb32f572c5ac01353184067a034de2c118b9851356f83036169f6e08c06549537699acfbc28ddb2285e5aac166cc921fca62a55ed0e48a1e47b156e1620e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8c0d79d6e5975ba73613f33e650532
SHA1e3b20722fc25a1fd9fa2290589e0531be47f8bab
SHA2564a35b6cd8045909ddddf3f054f1b4aec6b2150d6979e4d6341f0e5447d3ebaed
SHA512042423cfae7969b4678d3d1ef07c1f8fd9bd557a3daace2f0e4f40bd76d65244e6e8b0cc7081d177a699863742d2b29d17e5a55c7cfc40865a21c302b465fe1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0bdd4ec827610f40c185d0dd58c419
SHA19c24f6775cdb9e325b9c6dd690d074a8180a1be2
SHA256092e5b92894443ac5a8cdb42430ac2996abac507ebdc1b0711845b70e1289a8f
SHA5129fabc2daf21e97f326062fd51d54e92829d473f5fa57240af1229d2122aa9faac0cfb6166b3a4d06de3430e62a912d320683828f23fcf4d8dab6d687333362ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d101c5cb82a58110c61df84036825be6
SHA1ac08484fc06e50e7fa5cdd7f8d2fdd4361cff946
SHA256c3a6683eeeb953e0ba8c9c5c8a91781afa725e06ff3e907465e2630560d1f8b0
SHA51271423fceb798566017e8cb82a1ae0e9a6198e06d35436c21cfea8cf0a044fdfe9d119e9e5d07d4d4b49e342b0e78e8612be9cbda471a4d38e84eaf9c43dfbeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8eb510bb8c7d873c3f51d91510ca910
SHA1a4d07de1b99e2ee8dca7a7c31fa9f87f02a81adb
SHA256f32a3602487e8010d9a12d841ece0b22e4eb99a3246477653d40b4e4a0a3696e
SHA5124ff6adc5c74542ee5efa158dbb6e7c9c0b0ce3b3cb5fd6065b1675b61e3c2c45e186e12c4cf891d75763cda4883233bb757043f5efef64e61c780157a062f7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b66d55a86c2e111dff75b4fddedc8fd
SHA1cc2e24f7d044b2d17e90dd35873348e739d6de33
SHA2560ec475b1e459465ec115cf84ad3d26ce5e055207f6571bdf81faa4ace7444492
SHA512931b6090f00621a79b53a33e124d0f33903f714a6a888b24cd1d85518793f75f21ce91bbc4f8707a5f29fa821d6004535649a76a2e709732f5902b0c3240505e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c294480885d12a6b6ab1ff8be6ae11bc
SHA16a7ae2c359c69582ea37c9290fdcc245293587a8
SHA25656146a86e46dd94bbbbae6174bd6029a610aacfea23a69c7830f8cb8a80aa6b1
SHA5121b4eee2fcac9663138e286d9f7354043f4e0293852b21489636fc0d4b8c822c9a37dba87aae1801f5b7a14ab1edbda76c02905d9f9d4fcb4466608b1693010a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b