Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html
-
Size
57KB
-
MD5
3a69ad06c8d50a2fef48f8a29ba06562
-
SHA1
cd04b143dd3218a52ebae4b65db5ec84342d3526
-
SHA256
175295f0581526c7f32434c1be6500947adfdad1a006cbce97f276b9c283921e
-
SHA512
a1814e70869cf6dd31034dfcb57b08949ed8bca037e34e9ae7ecfecaaeb9108acd4935865e7f73771b9e7279b3ddd0cea8261f6530ed2eee673a36b21058bbbe
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroj3wpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroj3wpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000dd055ebd7232e290e175875736cfe032d3333248885809f60bfb818c605f3ed3000000000e80000000020000200000007413e22cacd69e08151d346830e60125c0c5702668e547bbf9adf7cdb6d7a55b2000000046804865ee4625696e29262b35197c1c9ff40ff426b8946ca298673c6a6b7cd640000000db03ba24a8b09f8c2fe02a4fdd3a3c4c8b74e557e15dd1e5229e71933327f291f5a906c54dc239e7a9a8de1a14b7aaec933f770107636876c859a1ad8a792520 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409be300c7d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E175801-3FBA-11EF-B6EF-E6BAD4272658} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426887278" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2760 2924 iexplore.exe 31 PID 2924 wrote to memory of 2760 2924 iexplore.exe 31 PID 2924 wrote to memory of 2760 2924 iexplore.exe 31 PID 2924 wrote to memory of 2760 2924 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a69ad06c8d50a2fef48f8a29ba06562_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52859784e44eede1a635b6875916f617b
SHA10874ebbd169b92938014f992deddcfae368fa8a1
SHA25656632b3d0c2b1625e1c6baca76613a157e472446e671788197000936042a0a54
SHA512fcad8e667bdfb538de51e5a3aebbd2f6d4f802f5ba5025f70e7e27eed3d0a2c2cdcf50fbb76a8c27020ef44bbb1e87d90b755d70709157b581ef81b0011395ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501241333b2c03f6ef006d5e1540eaeee
SHA1aa76ef1a05fc5bf2d3b057ce97fca35bd373e26c
SHA25679455a197f84e1d1868ad74bcd03d79530fc140cba5b447640d6727bb08b6139
SHA5122e32ea6f1e35a793f0f72325c4c8897b32da6585336f7c6c3cec4fb3d61e72b7d372e289b5b0670a85f4ba0689945f78b79b08b0647ea37b57703751895d78d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de448b225c03accf21ffc523983e193b
SHA1a072de5950bb379c8638d1f8feea62a1e2eaf650
SHA256fa89134ec16319cd4477a6d5e5e917af139029a00ccc603f7e08b36c3b29c34e
SHA5127cc04df58b31ceeaa8398804e7a53cc8ed1af50f8130fe522ad46a759d6152f882573cf02d590acd91c6f9c5352c0f7c68c78e1b6689f5308a8f1dd488750e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d44594fbdf39d9c96f4e9c96e1e3301
SHA1746bb869c890c7f6b23ffd7d3d06ec9c393bf74a
SHA25636a4ba582e5cd5c897489bb296abb85e0419f39b16b6232b66afae532098f3a1
SHA512db3f2b423da6ab3089b73cc5209fec105023285abf519c8e0c279ce090bf6a3b7aebddc866902a4437e5bc25244ef4d9c4b03e64073c3fb3d2cc16f0d48bc111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d0171a2f4e0bfc408573eaf021b8a4
SHA13cf2b97a0d4526a427daac0ebd888ee0bb2ec71a
SHA256b716fccb9615dbe952ea4b40e50d3035f0950e7209ba88e87ed1534f824af1e2
SHA512f79322fe67a9a78d2b9b035dc61dab33ff7e03effab0a127ca2f5fdfb5b576a362f3ade2f2184c47c130462e052157dbc11eaff4d512362f240e44a3177b781a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59330f4a762ad3c930dcdad8dd164ee35
SHA18a0209fcb1ab4e028099e30cbdf57c70f79a1bc1
SHA25680e54454c99789ba4f7ed870aa3d6b12a74dc3bfb6b95edc2262e939f3d5da7b
SHA5122b2f54bce5f29ac16b3fce0a69e4646b82dbc00aca7470d7815fbf408e2aa03934b288befa91549c105b5bf5fab34280d68770ddd9ec5d64817ace879dc487f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50458e417c86d6afe4d16c42bf4c85311
SHA1142688b88c379b5346f8a6aac2da20bc6056b10d
SHA25664538cb018f1b2e20e9d184f7f9c28a5e53949ebf4997bb8701f0413bd7a75b8
SHA5129507d738d25c9c877561eeb1a38c137194cdbe94326cf29bcb1916f7ea9a3f3d78cdb7833e1a410eb23f7de5f338bb3aa5af6bc1c3ec8dabfac07392585df45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3125ebe7a98222f53edac1b855e5b5
SHA18cbe88831d74c15573ee55586d94c03da7e1be4b
SHA256e0cc6c6fe647d7c585f2a7f258cb3272e8ee8dd2b453bfcdc879041e828fa001
SHA512f78ef21990457f1fec03ec6017f6612aff4bae021a2d6360c1052e11228f90675467bf40a0fd956bd838a931a54895a383f8a23def1455d52670cd9d05b7aeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b9914eb02fbf68d0fe2bd80fbde31c
SHA17998989e51cc1506845c3f7bce635eb80f0ee33f
SHA256f02c3eabc45fb4a506db23320960f3fddc3525fafdff815502e0d42fd6c03095
SHA512719c3f0c096e0bb86c3fc847e35665c388a03147914ebac4d37943dedc23e3baefb3b0b08f930eb7888ffd7128d9f07fb5243d8e1077c3ae079719d3ee925fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8a1e2048cfcaebed4c504f7038580f
SHA1aa8e36e10d6b8f79fa0a6f5bc01919109f7e6279
SHA256c99f5e4252b60a2771edb1d331e8785edb718cfc6c13f8ba6fd97cede65367a3
SHA5126f2eea418c5096685d788621d097be187310ba5dae5ad0da2cf3ea23feba0f390b8eb796488419ef1115868b4e6140e393828e68d954f9d4ca5f1bac7dcf584f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10030def08c3cc5cc62f4e13f144cce
SHA13f6487e6c9f0399f5d457d89bc9bdc4b9d909fd7
SHA256d20fb38a0ca64c23987bf311d44c26a8e6f1925fcec87ebe8ff23425b62b8320
SHA51222ff20c94326cd381f70668be13bd3592c707b9070fcc890b6638c00f56b40ca9a0ffbb9d8ed6188c56db5ddbb2810735a91d259e744e82a7d2cd667cf5fd4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986a3d983411b3dfe0b034988c6422fc
SHA13ba82d195717743ac88b67a0a4275f0669269f13
SHA256555b909ce225dbbe831cc387b1dd04b1b5e586de09db16d19012f311a8081436
SHA5126f6f175aba1992a6ec4f6d1204c5a621fe21411c25f62e20146a7ac77f679bd9a0ba9a9a5188b6905bfc3e6d454e6f0bbbbea73b1a19549e38cad604ab44260b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830627618798bf122119981ed0093d95
SHA18ccd7eb6cacc531dbf216ad4fd57d91d67e3f9a7
SHA2566b4c78c019eff286fe359f2996ba422c5a0215f56a16c45a066468a2900958bd
SHA5123b4bb37afe1adced2b25a56b8250225644dbb03b554efca1cfe13d445a590b4adef588a29bca9f6fb371d05bfb02da98199544176dfed9b1d7e554a1de8032bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bf647369f19e9bee599a47e5c51702
SHA11c7dbeaed2972ecf14d490436380f81c2e762201
SHA2560009f6934b0386dfac6c2fa0a39df5cb1b07ce4906a38369d3d45da40816e90b
SHA512345a48bccc6f3ed15f90a88be7e3f8a076309e8f7360873724976892340df73b35e3656397e59c6ffb4062efca22c4871b52eccfa4e6fab5f9db473204476efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db942bbfa736b2301df21c3f14bb44ad
SHA18a21e1fe0cf6d5dfb70ffdd4accbb4bc65a68c79
SHA256ec879dfd60f9e17487fbd3eb43241114dafa040ca6716973cd483effc2b54070
SHA512edcd28441581093e82ffd3954b3548114859f5513615b91fd7a5191313cfa633b203bca4d50bec53e4be53973e816a5c0c2f220a73065a6a1e36f50ae1ff3d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3dfef21257f1cded858c02628422c3f
SHA1de5f005556883d114ad4ff33a3d797c4a11a38b3
SHA256f2f5af8cebd74f80d12623e61e0669707d037169b2a46cdc306ee4925d4c3429
SHA512a6041de276e4fe8c86451e1a55ae063c5c5f8040db952e45768d56287106261e5ea195112230a5a19ecc731c4209080c8e70e487882f07d3a3dd938990503db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7e692b6daec4057fdbaff3175b1675
SHA1e0b0e1255d20cae4d466c498e05bde53017f6c82
SHA256f3564ad9657e891e2a303d494d33e43b46c79d4071b1703c20c134f1fb04fac8
SHA512b6e1b6a3c9e1e13e8c45c70acbad2be36321795f3299ef5c9e9ac5515f7093df6aa4791f1f0d86b36d0d3f8a3aa4fb1487b0526978b8fdbc512d43f4789b6327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbe5200e9d521e843f890884ed2d96e
SHA13c7798dc7166bd16958511c5a4cd55e32d792c31
SHA2563816eb1ea10a1174e314b343c0341aa032c617320c52317c96b1b40658241f1e
SHA512a3967b617f69ac675302cbd4ad3058a2989b90d6ba06b961cf31480d101650cab3a618d6f85c25c4e78ae2a00f47949208a5638e51237b343522d6b0ff86fa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214026bcc5ffdb6517e8103b6b67ca08
SHA16a859e3f82e4178eba18bd8ac08eea263393ab0c
SHA256e3c2f85e17a306efeed1545d6869a3b5359ecce784ddf99b0844b30a28a90b5f
SHA512f4658639f1398b3eb16297e860e41f5b6e961b472cf67ee6bb051d41bbf12bfb34ca502482cce1e35bc6e0cb3944ff5599981eeb98338fbd02f4ff099e3765df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbde240f9618cf186e612bbd23c43584
SHA19bad1c0aa0dcf3658207060843803304cc639a60
SHA2561fd62af17914db53bad671907e4fb28c48c5fb731445556ef01bc5989b5e9dc7
SHA5125f1915345e72207f535ab314ed18a583151430ccc7ddac7fba4d2a049abd4e7c4cbc7792c0d3179b228b3ecd6d6688309a7f15fb83b7c68b695993073b8e29b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\f[1].txt
Filesize40KB
MD5ac0c812945e1d13ff4b05ea7a23be44a
SHA14307ccd3dde93f222e38a6c488fe0c1cfca88726
SHA256560321654c3cce06d166889d5d441965ad0e1c76df359e17a8ed93ba310a721e
SHA512457aff634e35a3c666ce20de550a5ac874ba6181ecfe87e29ca4b58d71e3bf2ceb652c0a0762809e7d773fc512fea64ac40c5f4fce0644389d668f673a6655dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b