Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
3f0510d60af6514fec3700911491ef2a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f0510d60af6514fec3700911491ef2a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f0510d60af6514fec3700911491ef2a_JaffaCakes118.html
-
Size
10KB
-
MD5
3f0510d60af6514fec3700911491ef2a
-
SHA1
aedf7ff046565f1cf4ea77b836ac8a8706727528
-
SHA256
9240f16ac8432a284c62f08727e9ef28ae6d60d52ad9e8e2454acd252d9e4a78
-
SHA512
0a0b6aee493a3e8e90ecb075e5d16c6566275667bcca01a3a4623df7c52e78289632a9c7feb593783c9128c9602774b9508c3c8dcf886a40d29f7349615e38f1
-
SSDEEP
96:uzVs+ux7I8LLY1k9o84d12ef7CSTUWwGT/kpWps3HKaU87Xh2p/UGUZO7Xh2227a:csz7I8AYS/XgaoCsZzPHb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000a5740500bbbb72ea5df6633c3a6d2802c5d0cc97d71344d6a72c92fed6247ba000000000e800000000200002000000089b32e3a11754ee963d2823858d8588739f56be931f3f0b1f28439ef6e87e75d200000007dfdbf5946834d742daf0a5690a2d6a14ecea8afcfb16fc9e85f85e4d58a4c304000000081eaa63106ca0f2448dc1c51fcdd68291f11baa30d2a0372cdf49c735bd9246bdcaebb9eb920f74778dddb466e5bac51c903302b1c080de9b78dd8a6d6f1e0c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CA88DE1-4099-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7012b511a6d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426983104" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f0510d60af6514fec3700911491ef2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad167986be9582499930c3f8b551a728
SHA196389321054d3e38284b4b516be6f1108fe454d8
SHA25640fd3281ca009377c090c80c838d99d370131be450ab0255fc525537229b8830
SHA512624143be70f31d762400ab458b9010dcc39a0bca542349844222333b39eeb27dee4ed3044a85b80fe99106d09a5ef4b5423e552cc5435426e710c11cd8d7762f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55163da21ca1cc96c0e9423d46b62bd6f
SHA1319118e6bed3dd006415f555d8537edf1ea1c29e
SHA256fb54edc13f008d3012bc14f2f3cc8cd3c87b75e2b3f04867a74d5968376c7f66
SHA51269ede65b484fb83b8ee91d535664287e1cadc2e06186737f98b64b7fda782a178e46ab2a58d77d9467b45547d7a771bbf29682f845048e4071c513ced0e6fd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51718321ec01ba24c1c8c87c8928ede36
SHA1e400cd3b56f4bce6dd1de27ea0f15e16068a40e1
SHA256d444dbb8778222b5097b8babf60235fc3041b4062acee3a2fd0a8fd77db77851
SHA512f3e38e67761fd80c46c4561b8ff641860a17d65e983ddbe83269f42200cd7f4c157884873c7bb298bfff1259e0c551d6b5664560f169a14edfac3fd5fc3a4ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51866c60800648a7f010d64d6d36c6ec5
SHA120296840238d9afbe5aeb2f173046a1383aa1cf6
SHA256cb0dca4285a1f79843f27b6eae1d08982cb62ef570767bfe88b742d35a9faa03
SHA512581d5adeaee528f8f712b25127c94c2704f3e5fc91c825c64795c5107128e8af5e4c20a96f15020a1bffb8727e9c309311501ae831e5e3cc1ee93db851a0b395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d9680b076bea3057753a77ccd722cc
SHA1b7d2f20097b361d15b16215d727ecfc30d5c1dfa
SHA256bb72cdae6429f96a77c6328a0d304a78c0de1bf4f247a55c1999b4387523e064
SHA512f207121d941896345ecef0dae1787fe1ffa17920c4b8449525b585410739b9125a0ec7c7c39c36b6f8ccff6e1963ee208e99d934f37f4c3926fcc1185cd0e088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc4736c786722afb42108c63b183154
SHA1eede6d397d4d1e8ee86ecff07c256c6a8a610d28
SHA2561408b7357afbfd1b98af4844fa41b0b7643b418277e4644569cddfa416ea0779
SHA512f09a75cd3209dc00e6073f19a9da3dd2ab71a4e44b3c813e79bd2a437cae5e0cfc1e9c94c7ca379188d939948a3cd6c4c8d6986d64150b97606b7bcc408478c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c29bd50352d541563d82bed11246a88
SHA18a83936c1619051c647412d841104835be27b540
SHA2561f659771d3a70f4eedefbc07b10f85f8451c7dbaa1e4e71db725b7292af1a6cf
SHA5123885e35aea8010d128169a7dba8f28b4a7bedff2ac714b140b18a98b700393748901388977fc851337ece270fe3394558a2bb06d19ad5a81311544c5289984f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cee227e6f68ccebbec36c2540e35ddc
SHA1c805eb596ddbca6d8bed388041bd96f337642c4d
SHA2568a787092419cd3b2e2d62a20af274c53f6aab58fec65e1d9062e05ca4621ec4d
SHA5120b0dd6d20b13f8c97390633756dbffddc24c478a779a63d5b2bf7a26e650de5317081f103270ad524df5ab101a071ef51cc0d4e6b91d62f7556723561149522b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f85c8567d9a6e0b900e902c5a3fb6f
SHA1f1360fa84060a0a66ac0d27a0c1f6b8303300b23
SHA2560b2985cfed8e92af4f2940adc991946fa891a6829be80de8d395b9a709f3f10c
SHA5121906105cd099f4c946bbc1796cb153c6be14f5f7f572a116d4fa684498b57cb525c5b985cb236db9ac3ad255d0bf26b6d0ceec21a71174d2d0ed4485e2f33db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5400a4a20e9e3ee982d4f7ed157da6
SHA1fc27e0a9656807752ffe9518fcbadd9e46488227
SHA256ddca0b7f9f6b297ca4a6d2f36e2d1593127a7a09a0969275ee5ec442b617187b
SHA512d8396353af4cfb85724aeae449f10db5c7527124ff0306875f145deea1029de66d58a6df4f66c67288bfbabc2cf7038ca06fcd912a6460371a5a418070a5e8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d1281b1fc737e90acaceac3972835d
SHA10e105c9080488ca368167c6391ddccf23c135311
SHA2567ae5e8212819fa7c89bf1630031c5515df9ee219492c0377916da2cadd874936
SHA51205ce1c0c404cac53bfc2c9eaa0910a527b2280dec2336957ebe44ee4dac169bf50619b331abf400d8ca7d7c2d1a6f85926c95e174178617df9255934caee8c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60287fb060f0d6c3f124094fc55f9ee
SHA1ca29df3b6f92a5b53b72a4b5af0fec4f292a0e06
SHA256288c26714c9a077792710678c5844e89c60c2e63f7f86a1715010e06bd7d1207
SHA512dc16fbda64bbfc4c1952e57d22c46fdda311683f53af0241d6a3c94b2ad5f1554a59cc557fe4e6dfb2108b7cecb83d19a01efbf12ff5b790fc83e554b79bb134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0400332460348aa64822836e82a5204
SHA137afb43b16d0f22fcb250acc4eb7f09acfe1069a
SHA2566b8073b66a2339358e0fecb913a8a5517a7f36233ddd8054076ecba25d817226
SHA51208a4aac47269f2f5e5c577320fb03f5f10c9f64d63520ec1699e35a50051bdd4088a9644773509251ddda3a9daf5392a47744631844d9ac4645b6efb6d143872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6908b34a728603cac55c9beb15809b4
SHA1a95d6b36267cc1cb47fcc0af6593937da8602f4f
SHA2565144d5e921158587b4399ea23dfbe6cd2505a04a9dfc3149603fdf36bb5a595e
SHA512eab8cce7947b080d5de164c353124dd3fe1519a72bd8726b10dddc16847360aa890d0534c73495b95f3129a9e7a04fea30aa4db2d221d2d181afd6e9979722a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576de3ea9b89d67704aa16551d164aecd
SHA17751d4caaac29ef01ef24dfc314b52ba46439142
SHA256dc9297d1b551b1741848c7ae2b1e2dcc6a9e76d354b137477ce3ff434177316c
SHA512423248ce5f7bbeecdf94abdf9a588707c2aab824436529ca39773f6ff09fdeb4fb986beb3f93ed8c72273494c81b950095fca27fb675ff306f5f5d4bb8583f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c522a01dbbd7d2a97f239354bf4511b
SHA1e75f4b8dab1d4cf8caafa878b08637f200b008e3
SHA256c12460c7a0b62282e8052f4b0d1dc6e2678100d6e44c5dfbc97c56b19ab5d404
SHA5128d3838834e858f649d0fa95ac0e1ab06c0a7b24ac04dcbccf7906ee9f70a8a40d991a2511368267ec1939b1f73bccb25502dd42adae463e917cce12be1af6b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3e543e67a4e79aea165249a00302f6
SHA17dbd32935033e49c2e507eac13b6249724dc63b0
SHA25643b8613ebed012e10fd0005dfe73475224041a366e6d16e2d6769ffeaac8a285
SHA51296e055b94c70b7a66896f41c0108d9e4683b0fe1ddd650095f8b857b584b77696797ae6eb8a1cb1749279b74ac32253864220be23fc6d62c36231e1273e5af70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a92ec968cc606c0634960310ad1b94
SHA183910b8b9be23495cac358102a9620b649e8d1ae
SHA2565336520e12f8b16b5d8e8635f0628bc715b9ff128aeceb2cb49712fa98ce179b
SHA51297860d7fcb4e4b280fb4a6e451e57a921b6a23fec7d90b767108f2788cf6e489b1748e723c1daf50a8b36a15e447049fae9cd86282748dd39202835bd0195282
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b