Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
3b8672814943091a2975ebafb50baa82_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b8672814943091a2975ebafb50baa82_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b8672814943091a2975ebafb50baa82_JaffaCakes118.html
-
Size
8KB
-
MD5
3b8672814943091a2975ebafb50baa82
-
SHA1
364dcfaec79236f6cbde2230c4746fdf71591a61
-
SHA256
9ed9723d98ebec92d71b2cd9893b08b83a5d070dbf4db90057fe9005c92caff6
-
SHA512
6bc553233bdf72233dad14b0b4a767da84db991c096e8c82782ba331b9104d710ce719fdd97b39f1c311f1f97930eb4cde06cf9acdf78e80ba2d6c9adc2cdefb
-
SSDEEP
192:7hLEgZ9o7K0rICrcLTC8WazlZdJ5DR52JI:7hLEgZ9o7EChazlLmK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d95e31fcd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A236F21-3FEF-11EF-B1CF-FA51B03C324C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000080da0e65c941a6f1cc9434b00cb8608a7c59009ec18364f368f635a24546173a000000000e80000000020000200000003f469938e03f2efd9926be982c28b843051056dd51acce77db7e18a3e4a29b4f200000009d9c7d5a13dba2bf171f7b10c9d22b3b2accc68a45fc11e221eff3661fa416c440000000852d931f74fde012dd622219da218259fc758747455d88d28e5ad0a55b4031f2aa23ac77739957ac160300bc2ccd0e60cbabb68cda785a7de473a4e2bfcf6212 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426910139" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2212 2396 iexplore.exe 30 PID 2396 wrote to memory of 2212 2396 iexplore.exe 30 PID 2396 wrote to memory of 2212 2396 iexplore.exe 30 PID 2396 wrote to memory of 2212 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b8672814943091a2975ebafb50baa82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5a127df6b0c2fc808e964ae9af0e31
SHA184074a2ca02153bccae1c083714c5c0275d0b01b
SHA256a7087f804ed4de30c3855ee5f054cff5be6073f942795d2a3e5bb7d68a1862a3
SHA51229173db1bcf7bf4473f7c61774a10dd0d51a005670f49de9f580e169ecf6c6b3642dc19f0898bf2e995b8385d74e4d6566d0e127811170d38201ab2335ceee11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b57db35c431fa3935272b2ba3e8c6a
SHA1b58d9740a368564fb91e83697d80269548ff617a
SHA256e94ba8cf59e83352282cd7c1fe47e2790934e8c7983d98070f47c019098a9526
SHA512d4e704e41d6521d4c74726c0629ec8a6adc5093cb790ed676e074cb00b15fbb990c8346ffb9469d22f0fa7cd8dfeb74215565095346f8a6eff01bca941728d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd66f0a05c9d0764a928a576dd3c334
SHA13c2fc9f9022d8290f04eb4dc253367cba74a4e9c
SHA256a56328272d9524ac12fd6cc26ba263c5a8917d447f1853b4b03dc7ef623e7fd1
SHA5122cfe0a5d89d8975a73c8200793d02e9ee36b335f6993cef7a2553feccc7325ece2de6d29c9269f322a74a968d3acd82cd8dff984a9881915fe8610c4bda282b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7de6a30a48a91f6c6e72b7ecfa998d6
SHA1694b85e3010f286c65f866b03e3530e01287408c
SHA2569cdb874c5775da48126e0fdbd1b0073d5f9b3863e630310615b0d257509c091b
SHA512524d912c11c298c8c5ab84d18b50926420101d254f1e54e7f4ab07295cd86945f269eef75473d25f0609631bafd763cb0694080304e58b99b111ccb8c8035340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590600038342a29dab1b50a29cb6f3f03
SHA1cf15fb4b46e5a4c6ce23d0b21cc49b2defe5e142
SHA25640ac7b395b5ae2a165d19e78cf8f4744d22c1d736558141d7647c002b1e589b5
SHA512218d5208e939ab2b3f11c60cb7cd6d4362235ac7dce98a4cb699c632fa6e2dbb9f7d3d17fc1d6f26038548dfb0545c1114dd5496f8d4d500e56ea9fc7394b147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4631b7ab6617071740e1c9456d93814
SHA11ad3c672f41b3e77a764d23b6182ba5a70048b67
SHA256a4c66a900fc9d7ba485b075a101e597391348d84d5e8ac914595ccdf74c94e51
SHA512c47c5b7db86479bb7e1b75cdc35f0def5fc2cdcf4b5808e6773849f138186139cfb4b161060b3eb391c18798c2b786fe148818a45f89e67d3103014cfdeabaf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bac4279395254cfd143f0f5aec7183
SHA12a783d36f190965c152842024942f19c376b8533
SHA2567106d4170c8a02103680a013340abf10c40b5b6541c50e8cdeaeb4c2d139e39e
SHA5129adc0fb26b959918989146a52bf9e45c60f6bea60e37122a66bdd5699f652c2e674165abc240c5b722be371e77b97d1a282569b4ce9183226cf360fa0af91fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7646130ba162b0aef64da916bbdce87
SHA1a5fc3b0b2a699c5637063dff115971ee51db4585
SHA256e6bb99fb03efa4983323f732b22fff81063cef7997bbe560a5f0b8547b17b9bb
SHA5124132aafd436bdfb2dce4bcb9144b1d363cae86dfada78fc4cfca78b340d0d522a593d04b2c2bd8f1f82bba3c36ed166ba74645432405a2a7f0b04422f34ed31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57380d922c1ffc2871bdcc587756db90a
SHA14dfda86fa217a38ea6424752b0f1b6b7d25b0c8d
SHA256cf27b0bc5f8a77dbc4955155aca876fcd4299de742c0caa111b8fdd2b64599ed
SHA512fa1c25278c3475d68cac1aec745d6521ad1389912f2bf0b978e9f4ecf23100082c1b524ae25921221138b7a5f7621c9605b36526a9bd46d2944d8ac693486e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5caa169edc049fddf6faec8056ab632
SHA1ebba518a3b479aa5a756f66d6211e63311edf0a3
SHA2565403f92b8615d8e76ae14b6a4665b4bd5e1d4318c3be0a76768b5b97750ef804
SHA512e4fa6e07054671ec4a5b430cb901fd790ea8567e55d1741577b4098342c7aeb9155d59672da221f2bddaecb1740cc107e8c2ce240d3561c288b95f5f3d415ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a30d337311b950f9ce631f7d7dbe52c
SHA1e2df5fb5c8a6681613caf70a948df14fb6764442
SHA256446266647781d72798a210dde59e5bdaa73616ddbadecee6c5e29be1c7b43f69
SHA51299293d7d57d65608a0b16ddd9e303d40bc80f7038acdabebded63e25d97550582ab876b212eb265f003d33f653be0db165c3eeb552b38a0b363a5bc83d178df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555580ea90bd749393b23a32a78cc85f
SHA1250b13734f7b0a7af4ffb427276a94655a75532d
SHA25692b85a7ed766df6ae38e7cef843cda85df52efaa91d676597b4e7c80a29510b9
SHA512bd37d81a57a7a2de06362d9efecbdc852277e13ab5139e1e056a2f89896255ed075ed0c877067049d7438a535a6af441f24f99257f4a9ae5096a1be1c8ac7cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e780d4ef849ffa707509bf7eced0c9
SHA1a55e3c80606ae5c39c7208d852fda0579cd58bde
SHA2568733f47fed48149bb8bfc063fbb3fe1e026f50cd2d387569b8334b25c0f8c027
SHA512a3858f8e94022fadc3bfc20e6b471633dac3182c2ae86a504f0d6c5c8ca6be5f7d008240bbfa5165b1e5932016810a43c4bbea8b08991675d42bf9938ea7c2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d673664bf692cc03a9b44c068d28f9c
SHA15f4b3ec27c8b8938c6aabdd1a22efda1cb26badc
SHA2560834904a53352e2d9fd0cd56887318b3d97ab27ea458ffe3e4dfe5e9c57d66d8
SHA512aa2d98910f16f3e03518a8f4ce5bedebca9a989bbda754d2ade629da845c684852bdff7ef8a299eae343c3eb98b27bfd9474cd95c26934eed3dc9a482c43e2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590949bdc9b04fdc8f4be2ed591b2f460
SHA1456ceec350491a4a462599ab2e6681b65d8c799c
SHA256200b3a0c83436ed8a94bd1c4ceafa2c9569d4a738571b82628b5fc56bfba41d9
SHA512b1205fa0abb2a980ca3468edb6ad8f034412a4392cf52678193bf210d7cab253338fe6e889d4a23158b7058a9e0cc0383d09397618f6af5be978cb6a6fabea1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7af569639b70f82ab5a35f0235188c
SHA17be1e1e709b2f689ddf69cb06f4198d0058e95c4
SHA25682537cd4812e340a6a38f25412f3f38111ef0f9b13661e78fbdc27e58ce56f23
SHA512dd12cc22f567a205901c75ed767ccc080ede58836d703e0e2ae5853bcc6dd2703ab04b37bc7e7b2559035fb01a1f3cf2340f0f56f17daa261cf5347b90216c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e153c70f72ac836067dc4dd04e7be1e
SHA1e1f958e00530e9098aa1012b6d52745abe4bb836
SHA256f51907305490a73a89c560d5cd2cbac472402f98e01bfe1272f832316bbfefe1
SHA512cdba7d690d74e28a89102d2f31b26a0b136bb116f7137184d93460b9d1dc82ae0b3a064b34298b557848f83e6d68d538e715f1ce3903a77424816f48a6480355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088b1c710e057cdffb907286aae839a9
SHA1c07665f7945ddddc87f99dc56da7d0896b551968
SHA25666cb67c0c5d4c22c1c81fa9c259b1e78a4d55d47100674ade69d7bd158750188
SHA512c3bc079aa63700f0ca99d0ad06e3b4058cb904d637536c516903ac3cf6e0461596955dbea03d2fb1fcc148f8b6448205a393de9cf808f847adbcb5869cae3c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565fb779da17af631f477744990cbb4e
SHA1188c41628c24082717048605793b9f4afb9ebe42
SHA256848e176494c34d95316e81e1528b0637b471aeac33fdf5ec60c57d4f49617c5b
SHA51268b7b506813b16c2c0a5fe2ad585305e1332a8f75c2dc6d479c1e89224cdb70d3049ad4e3a8b1658e385ff8e2cc82cdd854f09fba3487e4502e0a6070f6f5e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff0195c529f43f0f6640ff4d11a2957
SHA14257077d56f0f9ac647edb20ce118386f9ca1c05
SHA2567cca614e7072d8fb167519894771c0a1aa37589a73b11dbcc54eb6a74a7cd27e
SHA512cf842d3255befbe015e531e1dfc8e9986cd3c726a94b5d8e89a79f3a0dd747317d2079f86a150c5cebbdcc2d1fbb1501dad5b638b0d8d04032bf61942696a184
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b