Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
3a579152a43385ce8db5ee6135032a3d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a579152a43385ce8db5ee6135032a3d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a579152a43385ce8db5ee6135032a3d_JaffaCakes118.html
-
Size
527KB
-
MD5
3a579152a43385ce8db5ee6135032a3d
-
SHA1
c4ede7ed59698b0453d04f1352fc3a97d4b7e61a
-
SHA256
eaeecc0749a80460cd9045f54a66f784b856872b519cf156da78934d993f3f4d
-
SHA512
ee1416ccdab2b7bdfa5802e7b5a3eac8f729956cadc0bef339191f19ab092a23d07141db6c5f1dd559130920645fa5dc2ef5faff70a7b00c1b83fc69eb7ff1be
-
SSDEEP
3072:STr+0NX0dGITdasm4rcVoiA71ARurhoD0ApcKTkEldcFIss7FcHqS0V5HH4BDL:STaGXeNUsKcKd4FIb7FcHqSGRH4BDL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426885841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d035379fc3d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000d9138dc9509682ce6b86fc04291a55ec718adea9d71bf419eacead6df0a370a9000000000e8000000002000020000000ebab2305da8ab7737e205a73508eeafef6b53175b31758fd0a9c1867a466ba49200000000e2cbd7091fb3d92350b4f94f8d39738e35733a7e0712285dfc79078ac2075584000000008ea1b3ceec1af2e904b7844f4bb944fe4954b053155d629c1d31e3de648e39b5d538e2a86ebdbfac34356c7c1878884337bcb5f39575881f0722ef1656a355f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7FD9811-3FB6-11EF-BBC5-7ED57E6FAC85} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2760 2220 iexplore.exe 30 PID 2220 wrote to memory of 2760 2220 iexplore.exe 30 PID 2220 wrote to memory of 2760 2220 iexplore.exe 30 PID 2220 wrote to memory of 2760 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a579152a43385ce8db5ee6135032a3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca669cac1983b404c71499ee400de1d5
SHA179c7be9f30172a4169f2e500ac43063bf074839f
SHA256c6d31b0e23acfc58ec07cb4bd6591ea56b8a1c30858181c9eb79495d8240a72b
SHA51245b54b5d7d42dfc26190f2daf09116e8e903f5c47c8f4c62310ef8944042a02b3ac1933b15f59e31e1109a86f8b01d5558b251b639b1d962c0a0ba35bd684132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519af85097c2a7e80dba4ce645532fffa
SHA136d171dfba5c45e46e4f2a4ba25faee17acd1351
SHA256b14485f2fa61eb9242587a8937e01e4eab71c938cb2aac9875a7b9fcf5321ca1
SHA512a4560bc73c06252d66404322f9ab2bde321dce041d323f0a6097cfb25ef1f4fca70e22509e700ee0e1b99d9377823a7775eaeb34b40e2855c7b3145dc1389c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70e578a376f52a4b8baf19ef16b51c8
SHA1e1eb872156ea246d92c62ddfaf6718ff13f6a85b
SHA256de35c9c6ca13d766dae9b80856b3007e02bd55797585d60e230a562b712c7fc5
SHA512d2c6ce1e598d14f6ec2cc01bc6056b7feac91b917a368f8c818e7e59246ec4068ccbf8fafc6db36f82a457dcb769d765248ae47952765f1e3620d74fb6dd0694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79d9b669c794195681c3d37e0b33d75
SHA10d3498ac25647d4afa6ab52ad59d4957a08eafa2
SHA256f6b958e515014d8877add11828f1177c441f962aebcaa595823785a4c1769983
SHA51283351874933671acd9ff8cdce4e91616f0e3278a149f8f5db07d837b1591b74cd34984863182155634f36adc846a13961ac7aa0f29504a55e0d9360c4f150805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575028b2c68340df913191eca22a4d0c4
SHA183aae922ffada7a5b64e3bb4a7bfdcbe552763d9
SHA2566e453e4ca00258a66e7f6bc485e036309958ae07cfaea23fe4d67ea665bcd60b
SHA5126e1eab740666603f68b04c3cd622a99b04e4e20246cb84a989058f2f8d19a264dfac8ed20af4f10bc820baed74fc911f7c7aae2252095b8ad7fda518f760675e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed4616f8e41761e1a67c1e08c3fe64a
SHA1ed27d93d34157b71e5f9ce1ca7848d7e062aba5a
SHA25617925319f9f4cf79bfa17ac588fc32987d5cfe74a95fa548cd554138d365a64a
SHA5122f376e4b42ad6051f46d24f7788d3ddcfd25c0b8d5a7c5c5ebad2d765ea3f0f2448a204f794e40ae20db9491acf704733fb0906c006653ce67e21699575c9a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f4618ac8de124ef96e63d3b4439d97
SHA1c2dc51591474122f02caf6bfcab0bce8b35207c8
SHA2561c2ba008d22f77c79f77be99073838e4d8baf9f67df50550df4231611f5051b0
SHA51224d7db5d5e76262eeb135f32aa734fba9d4ea26d51879cbf385cbf9744b20afd504afe0a8f85dd414519d5332005e3f45c4969a194e447bde27d2b51ec9d8519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9cd78c0249bd7d25c5fc77927ba3c7
SHA16a960e41ea7277a838fd11e7d6bcf8105f4d51aa
SHA256a404fe9d28c2b2ca4423c1fd27d69cfbcc53ed8402f397e5b3038b60928f9549
SHA51275997cc33248602985946bf0d10e969a913389273b8c4e4c6eaf6b552d4cab3e3c16605a3d363ee7ecbc247a8f90fd14d030d9fce7f008a1dfec9787a99c4144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bee21aa8028e2715dbccc751b8ae94
SHA14e98b0afe1cdb639476151c58f3ec1fae1e2e862
SHA2562f381ec6d7cb7196c49166a9afbb2c16c0132b8a05867ef1ac98f63178443055
SHA512900d125000142b9c39f0727d52ee6aa7687f3ba5aa23cf7bb960c4e84c3f9ee8ba0e556f3c634a2b00b812e8d43d896bde72cb8d6e0a41ae21bb5192d913a1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37700ed0809eb21ac2c18622d770e7e
SHA1cdfe15f0d5d149ffb14c23cef890d0b43e79b7be
SHA25672f2e922ab89bea5c91386457faf9579736966f9ae486d9b115c55c746f284f2
SHA5129bfcf1369348f6cf1a14a5ef0f3940add0a99fd0933bc86ef1c2c9eadaecd29ea5d5c274e7ecf326fa44dffc9df3c9620c2bbf174b2b8e8d41f9b9181b5121f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b2b00c2c51ba480505e5717eb0a82e
SHA19ab6785ffacfb6926eea299dcff2518436015ebb
SHA2566158a2c531c2866a607682a4a2c17f55a2bca534ed53960f1331c5fbd5636ae7
SHA5126f0429112f847649b1a5f324773e8ac8e52a1bae22d4e8417568d347828fdf797b90f9c774a3ffa81e089c74f0c53c8f6b932aeb607a2930457782b3a52ce131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffa2aa0daea22eb9a07c0b00fdf2393
SHA1f34ca7279a1d5721585005564fa3362bc4c9a46e
SHA2566246e834d6493008911f98deae071cf9a8d30063e474b52c7551e7f95b636418
SHA512d4fb3f7158907f9cecb5fa5d1f77a4f4e3a2d305d5ece4f64d21c4398932f5cd8798b5e27ac9544a08ea30f1123af9546143dd35cb3d350949631b04cbfcf481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bb4474b0c1f049de50bea72afa1cf3
SHA14113e4ca45bd6cbfc1031857869e50be6a0da927
SHA256c96bac57acf9b061840af6ee936fa1362bd5326987ae37b51ec49929f8b6ddfb
SHA51272f734a2bff5dbdf0e7e4ffdb802207dfe81d2865f4aec50b4843ba22b7644d4504c51558c26f0ca80fce3f69b13030f302f039a646c23a97dec9a1e6980c6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55441275b6aa1e56770f6aab15d8e80b3
SHA1a40e9924e6d2deab7ba6ac45b62235b779941fc7
SHA2566be668a0f5b468e70d7ae118cec65424d0e67a2c4414bcedb5a0f3718212f0dd
SHA512233cbccbe7ef80a90762eaa13dcb5c2b7734542d24b0e97fcc1c8e32de534ae3e2d97f78902b10e9417bd6197673744df31f51d553c36bc0457d2454b03d4978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506df00a4fbc4b57da946140b5832bd76
SHA1a09649e9cf827b5405e96cd51ff75b894ee063d6
SHA256191a5c1c98ad5c97abde0dafabe61d78ad6fdb676130848e03705a02f89e5e11
SHA512d170e1d68539ebea512d66c63328c8dca4df003e7dd6b20978a76597223d0d9420905d1ed281f2b6aa803d6c7ead7b93e220e990fdb10a5e68fcda6a06f426c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523907b448d8f77de4d184575f1877cac
SHA1289331cf051ff7d8191e7e976c0442f3c8a0e761
SHA25658468ee31fa9e4b2929abb4dab1c4458fb397a357a499788b1cd9ab861d172c8
SHA512a5b3bd38547588c6bdbd83970d8535b7e4bb8779870118925eb40193c5fb8cfd759eb3b0b21770b7f238d272c5cd18b4fab263ff4da80f486989ca3cfce5e905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c183f5a8653cfa2b903e4df84c9036c2
SHA110967b43471b5a67e36c135b9c3d990504889c0b
SHA2560bd03339c344a5bb283010ccd128fa5d8a36de94ea978a5affc7d2a79bd4057a
SHA512abfb53dfc0a5a87afba093c86dff8f4f92539cf63b8d835eca73a03cb8eb5ed41083f011453c99bf5ab758c4fb79bf6de2c5d90beb085a177ccdf2b49259e0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25dfb46d13703fc4383ed3f0d71136f
SHA1565d477341fde5274f188812a736d7432c33a1ff
SHA25679aee83b019ec51f263de2e3dd7c41de919dd486c99cfe2c2c52241b829f0152
SHA512d884cb854903435bc7911721c7f095691958c52fe3968044e8442650c2ed76f9a8c9f720222fe63799c283b3123ea00d1a4c81be524b570a81b915bd809e6f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1208dd0bfe380ed1748d2670805073e
SHA12df9c1a4670735b79d92f57da6e19c104c3942e6
SHA256d59bba3b881f4dcc85597a55cc3891d75ea6d3fc94852c45b264d8085a835dda
SHA512fba4f29d24560e097c3953762a94bccb84291851bb7a7e38f8dcaf6d163c58a2d5d911eebd6cc943dfd9fd1b8d2b7cc951a6da4ed04ef8ef92c397692fef350d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\asen_mock_r2_c1[1].htm
Filesize167B
MD5f5d40b7259645010f9a248858ad14178
SHA1b3051d17a6ec8c9e166bf09a62b48261ab86957b
SHA2567f5007068d2b56ea9735e2490d60cff2e72cae312024ac1f6c91158eba47d05d
SHA5121e82bc2d067f726670b3e6054d73e57868f6e7c50eb979696bf927daeef699f2d8f8de201e8252b86b0e9f86dc69e5037fc9fa08ef6c271b033f29d4f0f4c1aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b