Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
383f4d60219d4640a40006f384131d88_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
383f4d60219d4640a40006f384131d88_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
383f4d60219d4640a40006f384131d88_JaffaCakes118.html
-
Size
53KB
-
MD5
383f4d60219d4640a40006f384131d88
-
SHA1
68b4bc2bf61d233307a2829c55bc22170451fa99
-
SHA256
c730ff17f63e4349ef740b5bf76f813005606690e947dcd09bfce63a8319aec5
-
SHA512
5be428ec6e841d20b9c9bf4c412909a0db2b0023d1f8f0bec41fc4e195efda8fb4be3d73294dd42d0391722cbc60d0e429d6792f80daf8ce9ecb4d2a29cf39c8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUSrunlYU63Nj+q5VyvR0w2AzTICbbkoF/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUSrunlYU63Nj+qj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000002a65bd2cd20106f510a806d87f758106536da3a160d0a2cb2acd3049a931481a000000000e8000000002000020000000aff4960f9afc96ef2aaa3a882958c6b888c3179099ad3bc73a7e5d6d7622f6fa200000006c6f1f8aed5b15a4f807baa20d072a74737624ced838a648d317972482a1641f40000000d2d706b9c9ce36ca31874a089fdd5a0c73ef5321a456d1cecda9b16ef7cd86cc79c9d8b731cc1ca968af76e6a974f21ffd5f125b924a08948fb959706ef75d58 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426845488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D23CC2A1-3F58-11EF-BEE2-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0152ca865d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2948 2508 iexplore.exe 29 PID 2508 wrote to memory of 2948 2508 iexplore.exe 29 PID 2508 wrote to memory of 2948 2508 iexplore.exe 29 PID 2508 wrote to memory of 2948 2508 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\383f4d60219d4640a40006f384131d88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ad16bc9282aa7b334b630dc01a2e1a
SHA15f591285399bfa09758ece7a45b3fba48881f84d
SHA256559e6af4c945c72277e0b6a7d1285e6a66031cbb3bdca079e7d8967792377ac4
SHA512d8194360eb8a90a03aa6c0f10d0e3430e01037d94620c6e8d3df66927eb51a3f88d8dd2357869151006660a03e32f720fb74cee72eccce64093288df8c8c516c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557fce63039cf209498d9c245c3c8babb
SHA1e2a93ee3b7e7b0916ec65811b865e8391553df11
SHA256bbef6fb5aeff9bc9b3e26267473b29fac4312cf925b859ede43865e9fbe228c0
SHA51271687282bfe6a1b21e61b1896c4e79623c7ec2a09d83772e0a2f22b45f1a8cd60c9c1424fb09eecb37f9f793d9ab2083cbea556f0103a22e3acf539ce8b65d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a518848eddf9e0549bfcfa84ef4294
SHA1261acc66cb9becf893aad1ddefd6c009577f3746
SHA256113a28cd01a14a55e3e8bad92e10cd80b14705a97b6f6957c8a40b5748d7cd84
SHA512a0cb828367a291585bc634d265325d8231a6c670dc2eba8dd471fe1c2245e1c1e5281d0ef8900f79cea5cdafbd90a7b2ff8d46b29f9c7d2816188e3d66a54ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba239c873750ebf2b18cbe06df23c54
SHA14c42ab295a5f7a758c9660303a4ddec5afcd1d62
SHA256a08c548aa10ef8e12c78bd5f567e833969a93df8414f2aa216226dc49ec25666
SHA51266825548d93b3f77c7c77fabd165687f048d6d5417cb16b5da53bd51a2b6214fd2616c7f77286e4d7a2a8d51457cb72591bc129fb37ef43cdb2ef6042588c92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150d40e90ddb724366f7d9437de90f2a
SHA1138340b0f3671fdd4880eb22662334e93e2cc355
SHA25637cbb9a5014a06a4a1094371506ef77279bc8e3bd371046c547a948a145a26ec
SHA5122421e4d656bba13e6815b34983017ade3e33600831292ff4b00632cd1c0f53be56b76f7d655610b99376b085c0fc28dfb0bdd1cd1de0e4b27a8362037bf18ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8e3999e043793504ea476dd05db0f7
SHA17de37a090f3030dd9b0da2f966edc7c231d8a190
SHA256d025e291ec0212b0bd0eb7e059d2fc173a780a4a345d2f5a481808aaa9187277
SHA512af263f6589d41e428ade73c8a2cb16712a05e6f7a184ee3e2a6ab8b83fe9da0a593d3710086fc55a23d710358722d1b2b2a455e615e37a972380b1b6f48f3088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e580841f4473e6d954762784c04e0a
SHA122205613dbc088181f4f14dd4a144eed1ec9ab9a
SHA256041b0ef4cd2d64b999d3e2fbafb6f230cb1bf0fbc8c0ea3dd98fa78ef42f4184
SHA512ca46c9f1b0be79b96129c6c46f3e667c6fa02fe28e4df33fcdd1ce07396189961171b62ca5ec7d3d56f335b305b7e52a3c1642d553635901e1c6964a9621f7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaba8d3e48d29d4da40375bd5d823fe
SHA1d59ee1ae55b6be0dba161ccf6d44c438095f0512
SHA256091675de2a11987fb7b95b49498278c8428ab542c77a2bc823121b59d4e15e36
SHA512bbeb5f57dc392b55a7cfe420fd3596056c2b733b070b3ba4126ec1e53d326ddd938c3ee7d5c8241b3e2eae27e57df33eb887a759c9a4c91e7fad6074d7424d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b323ad9c6eb945f7029f085fb4b1baa1
SHA166be28b73e277d7cceddb001fb3916fcfb1fb21f
SHA25615b43a5681c7d7d08d69bc5c653595adb33338e4a4abf06c7ebf556a8e9dcb38
SHA512cf79d16f5e0d5bc0024b3482edd1e41afa57b3287d2276e8edd7a260173e2848a715b787dd51df5f1b505c087db226c34a06a6ecf0782e18f25ddcf92dbce989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58123aaff54eff00f792c4e66d52b4e39
SHA1e033f8ca84c790b5fa2d14fb46e4475b67a68d3b
SHA25689ebab9b88ffeafcf5124285fca91eb246f88f72c8b06a1e13805b5f0b23d42d
SHA512204bdeeb514b30b1d72d96029d34bd853962144d6956b8a0e67ac96405caf1e8d7a06df9e5184adfa85e36df63e3a7fb8d986dfd3b757f21176b3ae3d8faee2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf3b5398de7f3ba47cba25ae8c618ba
SHA1031df3fafb8a2341ba98221bb49a4911e442d310
SHA256676223453ba1cbb8803f6bb67d660391ad3071d95bcc7353febdfa3ae5ff16ef
SHA5128144c63420ee7d57e9f527e2763494e26187c02fc446e274e21688bc3c86eef32d9a4885fc6d95ebb0110118ccfaa7dc7894611f87dc804cb219f82837f14a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55925b81587db7f33f12e11f5ff0aa116
SHA1981a871d85f1e400a820ded0d37fe7e95abd0e16
SHA25637ff99b159b639a83b0ac28c83b8bd4cccd6011dfb806a9a99b754e822e1e275
SHA512a302f72da10e199d0a4b978e6e62868bb1ff954faa69c5ac59d6b43b6eea7c2d1d5c69104ef69171f70633b0374330c9e96ea00b7a44f77c5eaad47563bd0738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b58aff1b0e47d90d166da0a8d42887
SHA1c7c8dd053a6811e563c291f802241aaa176c56a5
SHA25650ccfe312bbb6cec25bf9933459360b6eadfc76c9aa07576426fce5236b76822
SHA512ff04b344de954aa1e4ccaab4c8969dc15973772bbdf88e2fa08b3b4d1f794684bbfec3c05674fe5ab2d5dd51f36ddc5147b4441963ee427bdbf88926a4d6ee0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d628cf7287f3687f3aa8143401f680
SHA1b571491e6ca0333612d2197db9276182e81c7e52
SHA256e873248c202e929cedc6d2ce29d926dc8b566be8fac5fb0d8256592aca238e25
SHA51251db5db4fac984401be41c0bce347affea61de6d3b9fa935f1a4237cd51a51df962679fcd3b5fcde7541b3c43beb2ffd7db0bcd66add6cba7ccde18c469e7468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53deab95654a278ac9dfd61f607939dcd
SHA134c9cb64c62f7ddd9ff9f92c1a398c09c88aba06
SHA256896390a7472af3017066ad2fd432ed58f70199b8728a46a6ae9aa95d2cec1913
SHA51207e04b8aee6186cd40e9e1da8bb41f0c52d74ec30bfcfa9a7f7dea613ed90fca3cd4b4dd8c8286ce394c13b0b07baf2f7e5bba1f924cf779427d9954e0fd9b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd5b7b4f30f333faabd8091a81928c7
SHA1e60efcc1d4f98a1546d1b8f336565de3846d1c84
SHA2561ed3d677e8c2377d7711fbf57903e5ee4e44981111d270f688242d6c4dc4a7ea
SHA51258fde427d096c73d2d0f7fb51f43b614883855ec5f7c0b3f6465f6d3d555dad25f5042c4409cd25354ae61c97b31e6d53f9b14c77b4bf6fbaeb59f6272e7b0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b2a1022b23f6e1644f27dcd90a283c
SHA154428686eb8fe6f34d893c4a818e0731d9194f83
SHA256c6b8f5bce61969fd63fa866a4bf26919781dae5af93b533e9f16a4919930cf52
SHA512b469d7297d75de6be3518b19387bd93d8685dc33b8a797b4d691e5d4a9ac7e032bec0556533d0f659e0c2c6d76350fb1072e94b78e9d35658f5a860681c9ab8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dd9e745a27301f6a65e3e91baae98d
SHA1cb6373fe715e4c462fb41933f3a8f1d317d09aed
SHA256f0a699f764be181734fd304150a9e831f127c37c3b40da92ded0795ae1107acb
SHA512c5b9cb2193a3a67b3548654ce0e5d9470c1c6b352c9bc3210ef1a0c191a0d46d97b39ab569b6eb05ffe914f14dd17f18d7fe2250c29904e900df6a47888c358e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205855f98f3f31b9dc26e980f7379e9e
SHA1c6cfade0d8956a17189675138328af5d28f4d86e
SHA2568d3fb910c25b32b44e013134deddbea3030302d4f5552ede1a34b5b7e5ca9fab
SHA512bf72d9b4717e33a4282d27e4eb1f5191a9c3f30dfc66713341f5145794bb9c8dec8f3c2227c5b75eb50cf92a322ad40bae72eb6c4206387912800a8f0dd152e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b