Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
3a65553473c49aace0f64ecb1160652e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a65553473c49aace0f64ecb1160652e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a65553473c49aace0f64ecb1160652e_JaffaCakes118.html
-
Size
123KB
-
MD5
3a65553473c49aace0f64ecb1160652e
-
SHA1
1ceb1db60268f4228d36dd45982f456a126eae40
-
SHA256
629d3c3d2ffeecf656c75fca7f6e9aeb7dec557cc4e35d68c43514b5a14f3769
-
SHA512
81897adb92251cec7b88226d7d094b547cf5cc778a0d2fa10381a16986425486a94c55d18990425c3ec26cdf238e63cf3ba5f84ca60ca3e8ad7c85563f5bbded
-
SSDEEP
1536:mjUk9xXjebIgymp2Q45WqOmqE0gHm8Ece4afaUU:rkzX8YlMv0C3U
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000047aac4946bcc9a8355872c53fdc6a11ef65622b4a59e8f72e8081b35a7dba44c000000000e8000000002000020000000899247b5b693acc44b6dc35d13997eeff554e138ddb1682dc6e132fea9d73967200000009ddfd4089efe1118ff16c2f2ffbbbe68d21d451bb6b6c1f657dc298ef27ff4d9400000007985beeadf56bd00323bc7b0e35484c402d5a61a5db70a3b83e6a35fa33c682df39db79b861875dd1d57c1ffc87675766c7ec55389af70eb78d27539f5b33cd9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426886863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29192C71-3FB9-11EF-8340-72D30ED4C808} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dbd119c6d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 852 iexplore.exe 852 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a65553473c49aace0f64ecb1160652e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14a867bd8f63db65e20e624106c7a59
SHA15cac37d26e0639060ddf0b7a79e200fa3047fde0
SHA256fbaafb2b3486601597958f617194e5ec646a74f3b3f181657bbfafd9c92aad1f
SHA51213091336d1ea45985582482d89cd3ee865b79d7ad7829a0cd234eca480261e8f9f0ea52074200338e99946ce35263c49ba0ae467ad3e6325a6195c87b247c022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8860549f9f58620570812e56affa5e
SHA1211ea3b6ea54245d6f44fe36ca5149cedf96f00e
SHA256d74b70ba56b40ada4070848f814e24fba5a4e806493b707856a808b650e70fa2
SHA51283757177ece99b56ef041db1b1de70c72b0602477238ce35f9c35575b2f09a822070600816ecf8766699b6f6eb22236f4aab06e8a999b6954f2f0d8f0f871571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342aab4acc4336c515efdf1bcb9dd746
SHA178f31c6a2201e23df4403ee04cf77b27f4c8d842
SHA256ee58c7dfe3185fd5cbc373224a0a2cedc8483c5e0d8b24d17659397173d86d52
SHA5122283c8d045f8daf3441dcfa56e5c013a8e27637d4d30a59abb8a7327058ee24762516485273afea706661582fee56a72ad7602eaba2694dc1ea2b2011b661904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56492bba0d54f309fcfdcbbe6c6545ef5
SHA135cfc67f74bbb1a4be9a47a72a231e85d697b45d
SHA25667535ffda55cef0e8d198eb0afaa26b531bfb5cfc780459cefaba8da9c3ccf2c
SHA512003cf510352422d1dd001575fb578517826d355e700775e18ddfd84b98595bfe98b9b7aefd87796f3494f2414315345b355fa524f94f890ddcf18698162ad6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53651ccfa84bcc719fd628c1f228a6b0b
SHA1a0fb1aeafa374f5ee9c0a7dcbd2894900fe64d1e
SHA256709eb4b7acf6085cfde03993301cdd64e99056e9ce8129fc541a4091145cecc7
SHA512e6a85b125d86d5bc64416eb1090acdbe07a347969ef997119c6f01aaacfa0453c065633d96af2469a925aa2b26208d968ca65acdc385409942c3a602c82288ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefc5bfe2f4dab446cdbfc51142fd4cc
SHA1236d2836b7ef5ddc1b0435ccc4fb2720a7d214d3
SHA256f5c91f14636d60a2b28ff0e29f272a5b82c0d75e3b7e8c378a58d5bc8604a8e1
SHA512cbfd67b8b91d6dbade38d459a359e96eb58f6ba02199dc1ae00b7944128c1165ed71c467dbbab3ea7f7ecef00f758d61771418a8a8ba3d779c349f53a9413a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211d53a314e222991391d961e39bd882
SHA17f3301c088940237e571026d58adc4f408567e25
SHA256ac4d79f67063999ff7840b624b4e9f33e87905a43164d0f3d07bc536571ff5a2
SHA512d7852801fd78f43a71244f0631bdcc8bbe96345d3c4bb6b51790cb57838a95782c6484d0bb904bad7b418e4807f75f69f3172e730bf0364407874aac5cb1cbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854508a2c77a48d74a37ee189c348ec8
SHA1887edd4ef7fb631b4a497e113a8983336970d491
SHA256dc645a24c60bbfc1d35e43f75ee405372e7a31fd40965e4a8a9a7ddff3a3e29f
SHA51264a79cb23f0d0be04d2c7d30e34f02141fe41c9f15e4d4932bea4820deed0f32b418d163ea46e244954f3a1aa891b831b73d07e90a53ac863b9083d7de8683b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7955c14f72b864e88a9782ecd30054b
SHA11ab3d46142e16c5d47621c61f465358e61c913aa
SHA2564eec1302c79a2ece66d43806a919e138afb937385867ec7fb0dbcd6d76ca9351
SHA5126e4b63feaedfc772f6ba671260a509d145d2148911479e2a6d1f5ec84198d4801ad295c226669f5401bd4ee5a64b280955be4e5e18c844c7a2a1d1b48eeda84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c084bfe4bb47962ac15932def8794cdd
SHA134ea2cd46e43abdf4e0fe119209bfab6a3019ed7
SHA25683b6421bbc13a58029e909afe7954d6b88e256c168043d847ba15bc53a5ffddc
SHA512520782745186d7fa010b374a005474cf44cc82da661317fc3e3e3bb92af7e3093a555e544e3a56fbe14637298c90d7fab97b94af7cc4f69e04542d7803767e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925e8e60ce0817837bdf68d7a1f004d5
SHA1fb55d031ebea7af026ae95212eebd50069a8784f
SHA25669de8df5483e43a6ae8156f658747f0cc1193ba6cf82db1f462c43803c481cba
SHA5121b37649400272ce08ba9a9ac2448ab9904986aeac0d5406805d89c99a269630d4aae54236037effa3eda5e7eab14b27ee6f7def8f6445b12270d60c8b2f4775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b111cf4e9ca50bf2b9d526850dcf2db6
SHA1adc7ce5d76590960df2f9fb527ed34ef582f8c1f
SHA2568856c337bb177c5563bb97bbf6365d6875a10ac81046f4c22dd1104bfcd60fcb
SHA512c9619bd3faeaf010d4e0e569bed77938ef27091032f3d8d3b65844b7444154c234567272b3fae8381b575b68ff7cba4c413ba6f971aef0cd1f424170fd04c1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f96d46b48311bc871890e5e17935623
SHA10065f79cb17664b223d81f46c7a96b13d48a7fa3
SHA256559d7415249096b01a13b374bdf4891829d0ac0ef6c6b86b7fcdb4666a2af299
SHA512701aabcb5ef34fab8c69ef9a276674f84564c7161d52e98181d989ec318b86054353f41de0366a1b0fe234274f63186c6ba978b00bb22223e785b06f960d0d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999971c597ed2a0a71a61129e01ae1cd
SHA10adae2b88b71312a3d48b617c3db6c43074fdb4b
SHA2563987ea8320b2ae22d1e307f3261fdcb5d2f8ad9ddaee81565f1b040aead3ac89
SHA5125f5089a56b658fedaf1607a4c3c4578c0f1dca20c6b1d5695895c1aa9652c78c7d26c96d5dc83f131ca6e5a5f0311b996af9ef7add894f410fbd146ce0fb38b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e7a197eabac56262916b24f8d1ff5e
SHA18dd72afa888a2e4a7a01745fb773c2e1230def9b
SHA256c280347b3478ac40e92faceb76d175bd00762dd9e322708dcc8ce306e5f2e359
SHA5126f8ff6c15c759c0bdd944234b21994a897953597a75e79042992724808d7d733a69e58a14594eb2d4e276ca195ce62e0350d0f695de56d90b290432f34da1840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506752663bcbc7563657d69b12ab1b64f
SHA1fbc48ead841687711e651a4e02417ca77da64e03
SHA25640990c7760a59a74f6771ef053d2b651c73784f58f0aef921546ad5a35a8e61e
SHA5124205d6c4c5f389d27c6dacf36aa01daf371a7594bf8b17e0b9937f54e66f49e43d0ce1b0c38e43c11b00f84ee2a3cdd7f0de0f4bf08e5b4820e3d104bc00ad31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf97e5c90a34c3b8e3d0f32c2e85490
SHA103b01c160040e147670d9d65d224d0c6c40d9b93
SHA25673a52219bf315cd959fd3a99f653212bb62cecefa294f07d56ad7e253c64d2a8
SHA512c99234167f455ccdfd856ec2924aad968c6b9aabc02c807388cb81d74398aa030fbe3c2fbd1eade1a7f3cc4404b730a4110de77a7daae957cbcd5261e874ba33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bec76ec7b9147660595c99dd4bcab53
SHA1184d520ac823f84825f71187d9e41a8b9dfffc7e
SHA256dc57f238e5c8e23b14816c5c268fb5970cf49e956afaf0e0980c99655faf706c
SHA512f771de85f36d9c8a4f2dad452500f93cfbb55ceb6b9b3be7bcc2a7464a608cae8478dbef48d1588797d284750ae54f6ed5a72dc63e19aedf585fb3d532f05717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb0ccccee54ea25d0b5c9a920adb174
SHA18933852947bf7d4890ea62ae028196ef9d64e8ce
SHA2560bf463de796c8d7784875c792fee1a17c9c7825b384e4a22ab936bd961fa132f
SHA5121c10a982210bcf4cd881d33d3727a98591f3f5cb02c46d79e44753afd186107d4c7d111d3fa7f83f3a8c546d9798dfd158644d8251607d76e8c43800ece11188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51074743834cfbde542356c0e87374bd8
SHA1bdbea882a2c8bfbbd8eae563f0e35d3d7d60457f
SHA256044eb35f622f3abdb66eb85ca3431d27939594fdaf68fbc964f9b21d314df81d
SHA512afb9af7c6d2ed20caecfd8a5b898cf05a2f2f1d419cb2613c6f7aaac79b89c44b2d95bc33809b53b4505d618eb5271a7caefcfc2948070e435841240e0469973
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b