Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
398e0fc53d98fa1f91db37f39e2e45ca_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
398e0fc53d98fa1f91db37f39e2e45ca_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
398e0fc53d98fa1f91db37f39e2e45ca_JaffaCakes118.html
-
Size
6KB
-
MD5
398e0fc53d98fa1f91db37f39e2e45ca
-
SHA1
2f3381cdf96a9f597e2e117e89d6d3b7b37702cd
-
SHA256
aff16bd0c83f481381ef75a998f15d4267929ece24eccb610d56a16b63b8be9d
-
SHA512
d96d2478a9a4c938471f2992dc78021b916f915c265b07012f2f33ce392917a655d87918a3393f1c8708aa8fe1097f566ff80360d9416030f2c7dcf3a4055829
-
SSDEEP
96:uzVs+ux7TeLLY1k9o84d12ef7CSTUzPh3cEZ7ru7f:csz7TeAYS/w3b76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04ff5d6a0d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01FC7271-3F94-11EF-B1C8-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000002b79f1cddbf00df439addc6776d536c78872cd5e1db120ca019d69068df297d5000000000e80000000020000200000003d7bb0379ead1163f5ce993a25150c41156a6f56227f72c5b708bbf54fa344ec20000000c8c45b13cd54ecf676d79ce8bd6764ddd263f32eabdc0e505cda1faf61cabdfd40000000db659abaa56c151e4cd8955a18d33f56100c714923653008ee3dfe322d230ef1ad7aae8f6ca050b052dece90124ee0f5358339bd4cdd6e9acc28c34ebea2e3e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426870906" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 2768 844 iexplore.exe 30 PID 844 wrote to memory of 2768 844 iexplore.exe 30 PID 844 wrote to memory of 2768 844 iexplore.exe 30 PID 844 wrote to memory of 2768 844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\398e0fc53d98fa1f91db37f39e2e45ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57584fbcbbede0c821978dae62cdb925f
SHA169a06ddb2f0ce0a0e1716128dd9c8ac9262b0cf9
SHA256f0e9614a4aa4391ac38c53c548a1bab53fb966cc1006397fdb9152e5d924615d
SHA51249ab4f29db4942b3d4afb4f015f367d1b7e72f622e7360a801b5034a3d04a572bd6998adaa1b2adab6b97706484e1328425fce95b86415d060692dcba6990d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cced913e987beffa4c55f2a476be059b
SHA110bcfe9567a7ae39515ee37bee7d6b6a696a2263
SHA256bdcd14148a7b86ede2f65222735b01afd7a16551ed645e3760d084d99df1d7bc
SHA512591a7cd7d77881e29163eb652c4d1987c3b635c93cdae5f55d0ea9979dec0ff9c5af351bfe80f199003c7bf0621b51651a0881b55cb7f6a87810b876b1217887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4149308898d746edabb6075310c727
SHA1bacb0eabcd25c302f4afab0b095de770f6c1f759
SHA256c8393bf8e45228055030cb6e5a8d6ff8cc2f551ce0e7cef7b32d06a68ee91f51
SHA512f4c984a990dead161e8798b6df4d1880f16e81d5eccf3972a9b8a581b9ac18bb2b5075b28ec652d6ca877755b0aea5fe401945c2c2e6f24530f872abc64808a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e45d25a2c196d9e8894305dfb022ba
SHA152742ecfa7f3421adfd9630bd855494876dd0c66
SHA25653dc81098670d6f339230eee3a7538d289d31449d0d03d68bef31ec62ba8b13b
SHA512279253bd2fbc382c874c2a09eadb79ce50405c69b79dc9a63dcc96a469455d245a48a7d40db886e7cdd7147c1175bfe4687494a574940d5e51685f4b95b3af74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c5e4b5ced7fbcb6adb83ef2cfe6b26
SHA139f24a77cbe6de72254cdcb49f8b8497294f8934
SHA256a358ed5fb4a3d79b5dc40281db748eda7d7718b1f2b00b76ef0865354124d40d
SHA512027d531462dd5d4e5bd016a487ce8070b4a24a3e4f23571fa65a24f41ad73ca7dd0b09fd80206c22ec6620da4ac5b914183c3b230a4bc794da0de383c5985344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c1f4b1501a6d46bad453fa7e1bf92a
SHA11d152b26bef671bf21d58da5cf1c1fddf8b6d0c9
SHA2561d42a5a4e65cb91a33a14e21a81fe2f3fe0bc2ed076c80e327f35a5bb6718203
SHA512e89f834ce10a574e0fdf12192418923179a1f11a82dcc1b484843060fe7758dceb25f996fdafe5deb58c23a2b5c1991efd33c10649109dbe072908babba00378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb00c731c9eb7f726a754da23fc0c08
SHA16f7316d6a095b27a487802cd0e3370c4d285bdfb
SHA256eca50994e476888e3238d609e36e1797be84f1c0958250dbeb84f5af17b01401
SHA51245c7b4635fe18a7f8f83c412c370d762874101fd0d150da364d491312978dcca2795cf84559514bddf04cd98b7dc6f0dfcc636950e3258219a8ddf009f57b7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df467091c4d38ec13cce5c74dd2fea0
SHA121b6e4798e5d46a42b0994566be5038fd4d36d54
SHA256c9ffdddc0c9ddb31a5c99d0706e72fb17e96552ce0914ffd57e235937a68406d
SHA5128ae58130b0d3c26fb724d4bf76f27889826bdf033d1a49a36d6203b2f0d4157cf849a41d88a69964cd9f048afdd25cdf720bfdd260a5dfcb86555fde4db72eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cff8abb3d3d71aeb3b04cb7b78f16e
SHA1c17fc58b977f196e09c5636b185d130897dab918
SHA256b701c8807cf0ddf58c87fb6dc6f28c1482c575cbaa77f04d45a6e4cbb41751a0
SHA512f0e6046237dfe15021e3b54467189a146ed415b7f222fb88a57e5a93d446942a416082594812f5b099226c7b42d5537599b6fdd4a397159751f93c59ec080096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579876b9b3962ab99c3cdb6d53559b141
SHA174f86f6fcd96e4ff575fd375ed2541975a53e4cc
SHA25664ea5174e1d915f7daa25188dc4d781be5b63382852704765ea4b88af3071dd9
SHA512d6a2b06d5665c18ce7230b9302562db8a858bd8234444e299162376bce7b5e400937156e50f05227bb924c58aaa0f4de9a6728cb9b2be90bed36227bae724fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d43c4e3fe4a78c4fb3f67704851c95
SHA1a0e9ac765a3a37a9d681c2bc8546e330abc5f4bf
SHA256e55a63d8e5fb7a0c88ecc9870bf54c534fe7906d81720907c0ce3eef0dc415c4
SHA5126247ff153ff9bfa7da17eba71f3bfa57ed0af5f44c75136dea729f483b69603471aefe1e43ab15f297e1e6758c8dff894391e0d021a2beacb92155963fe6231d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd0b64bec0083ae35cf08b0f7eaf768
SHA1d919313b2d59cecdbad66c47af1eee1de15fed50
SHA2562d4da28d72c8679af9dbe429a13426564bd7e26d00e0e4b5a00c2b797cebf504
SHA51278d66940562fbf0bb786b5f4dcb37077c3b7d2a7780100f03f2b631e41ec65fafabb1f9278a5ec71feaaea3ecc2db421f39aa215b722f66a1a00aac0138cbfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c031608473ea526a5899412bfcbca048
SHA1accb35a46872dccf1332a4046c40f7ab0e9cd092
SHA25655f9eb2c49579296c49b5c2deef28375d8472d77e6aae0e3c2503a4f4755c8c6
SHA51205bcabef8f2295aac293db747b2600ac03444954764b66278fb0987a02f57fa5a4179ce32b274613a390a437706a3b3e8887a8c3f68faf29947871857b608be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717d89c3c5c030c3945f8373602bca89
SHA142ee7a9d462672d8b6476dc8a6d2d04e909cb3a5
SHA25631509fadcb9d8c02a91d3f0360ab350643d22e75ea23441902e9fdd903c23626
SHA51211ad2f52376b30f4d939948d9bbb8b9f0cebfbf0ff4ccb365db5acd66d8bacf0753ffcf2e93dfa1287435981e47c5107dbbaac96f00e68eb37ee3752ba0acab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d24a4dd3cf25af2bf0d92fc760e2ab
SHA1367f98ee99d8f896d9dac84cb2e09a01ced3a731
SHA256b94eb0157f8eef4a4b0d67ebae3207b9adb1dc86ec7920730cff515aba253b9f
SHA51228c1b8a071aec50322da38a6935ecd0f5b7071c5c0d030a6f81c86b0991baafacf7433a3b2b3f487089cf0e8f8801f1996ffb8454eb15f321379eaa96dda584e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521959a98535f1f89296d24a34a78b3ac
SHA1e16d6b6454d236dfedfb8344449ac8cc61e976e4
SHA256c7cd94f16a07fabb0e3e96ab4eee5130d41c6f51e69441bb5c7bb5504cb687c2
SHA512ec81b02fe5b11d5380a905bfeed01c0d651a94e8355a0674f9423e9da201ce27c8ba17ebfbf1e2ecf3987a1b401d13f2054209b85f5df4133a82add534ee9bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd29e0227d46888e3fa2974d6fbe2b8
SHA1f612feeb7927f4f92873c0170dd48f758f4e07fa
SHA2562ed1d6959117f498b7c669a06a56e5afc7afe205052db8c9da447f700fb038c3
SHA512739878a9891bed99f3ece9a089e1035464f796612bf761db7a0997d82619ec212312e4cab19741416ae801f105b3e0698fa2cb4ccaa7536f1cfeff32dd22e868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584889dfc28f85befdf06c4eb1a72c798
SHA110605f3bb07d143ffd1ec055e4abd0648fb864de
SHA256d8c62eadf56a67545cce154068c4392b3ba8959a5f88c961e9ea87f1c9015660
SHA51286f5cf3ac62ba107ff7065cc09022595d4c896bb427ac5ba8200f4c17e16556a50e32ce3511183671ba94042e3f205cb93ea216f333abf322452ec60bdcf2434
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b