Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
3bc7a691a526da3306ce74509bbcb0d2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bc7a691a526da3306ce74509bbcb0d2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3bc7a691a526da3306ce74509bbcb0d2_JaffaCakes118.html
-
Size
53KB
-
MD5
3bc7a691a526da3306ce74509bbcb0d2
-
SHA1
bdf1a43c3a8990bccbe7b994f3e2bd7fb2ae7255
-
SHA256
923a52f627e2da0307db819e922c761c75f41f19b553ab32f9ff30f97b5d6d44
-
SHA512
fd4dc3f9cdd87cdbef2e680b8b317b19464892bfb562d8468c714041494031fe5db122dfad0fa78015ba4e10dbd07d12b63f90c87f5d4bcf868e87540e40866d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUZrunlYC63Nj+q5VyvR0w2AzTICbbuof/t9M/dNwIUTDmDw:CkgUiIakTqGivi+PyUZrunlYC63Nj+qs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c8912c4895993accf0c647b2a84c2e062eb71bc2a93795896b089b343a3c769f000000000e80000000020000200000006c88d0bbd96aa64e5d8688a02d8b9e22e1cd6c83e3e16cc6e3c7fe8cab8f064120000000001dc2cff7b933048b4984568b9cff7f0536f55782353f35d6f1422c8101847c400000006b56a8832bddedbbce68d8980e36e4fc993cd61a8b356cf98ecc27923ed940aef91a5cf63a6589050f2e5b9eef3a73e0b646a41b0ef04f6b419071da58a2619c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001e390309d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BE60CA1-3FFC-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426915645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30 PID 2372 wrote to memory of 2496 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bc7a691a526da3306ce74509bbcb0d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596546ca407da45f2ff39934e23b9735d
SHA102fbfe26af89257f1475c1ebc1a039f56b14e9d6
SHA256e6cb53178e66542164105bd48d648546960af29bf17779ee2ca05b3bc62440b3
SHA512685a7e070651f6fde6a61170aaf6be0fe49d558089ed76434aba933690b1d6c4a0feff0b3a6595ffa4b5d74c301f7be58397201fba631c43e042e82c84cdb13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b83ff3b1174a26ba0a870d17898610
SHA1a036bd9d6afe762677e409fefc20787c8cd03b40
SHA2566c6ac50aabcfda9db1140168896a134307680989ac07e644ce5966a4db4c9413
SHA512fa2a219a3f7790e8048d39bdf54d9e234efcb34ce6406194d51ddb4347b6c07b006b208a8580616e36cd05b23cadf36e0b85681bd65565504685fb8baae02868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b64a0c80b4facc06595806172a8ba0d
SHA16b4ad4d9e69f0f9d0e23aa7f2470e13a1b2a71f2
SHA2562b83113e3d16f617d489537e5abc7f1056deadc5a5e4053bca3de996eec466ab
SHA512c5e5ab0f551a097e049ab9a17df41ceb7d190a4fb675ac6edbae14728625d0f7598d447da75b9b15d538ab6bf5c25d5253134fe90ff0bf172dc8c2e1d8933406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f351ecb802d21e1e53294b04693b7d04
SHA13b1256695f1abca52b35d7b7665f26cf35a63ce7
SHA2568a84e5df47aa20239136a72a7c168ca54c72b95aa8a8351414e5629d0d5e023b
SHA5127bb1f3145d538b68976bde571d95ee3de41fae9780df200ba15d7ede228f1a7fd519c8edcdddb410ec685817a0847568e28bf45bde857677892f5431053d27b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8de0651d22dd3c1cf64025b25324f25
SHA1b1d75f763412e3e078216a52599be49c451be740
SHA25608b46c0c775138a731b6207e0e4bb229a3838259782c005bf3e9d446fd223436
SHA5121ede22392fbfa239c9d77457b04cbb30359c000c2db4b9c759bc3ffc33ce08830aa7d81ab011b6e4009feadd98d7b016c3be3b8a7038fc083f8bff4e04a75e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dead7ae1278d73be049a7ffee224058c
SHA17bb4d89735f1c7685c6f0380e1855b8031ca667f
SHA256e980bfb97e105b65f12a7ca283de6b60f24036631b9b29cb4a78b20856a71634
SHA512f60d44adecc8f530d1ef5c49c5517337c2779823a7052596a6c279be4a84bec42f0aad19f3c27b0808e5a5a03d97152d6da3e0c46c8439435b7f62a0ac275ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c287eb681fd3ee332c175ebbb6daa4d
SHA1ebcb9fc6fd0a5bee22de0ff1de2cdd4a7239021f
SHA2563fc2434a3a8de462e36fee4a5d48e6097f1ae147c3bcf7eecff1c60062aa92e6
SHA512f50c8a04e0069b12824845275a7cc0912b56404a62a8274f3a63bafc523d0edb414cd03f2593e2d4e4ba97ee4ed7da15e9617fb5d1337f2a81883ac7c5311a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50503673be72d8fe8529db00aabddef97
SHA1b25064a3fde08a39d3df9d60adef063c6124db6c
SHA256a305ac25c7798aa4ebc8861582b729afa485b496196917c9a372d767da45a3f3
SHA5123bc439f78343f8ef8167d686573c8b99517d81419f1ac6cde3c84224107fea2a5316954a7551b7fa1fa20060035e7574946b936effd60e97268cef3f336ee857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235efcc35ae2b5f57e5ba4ec1b3ead12
SHA1835f19179db6d7394cb6a892f114bb54345626df
SHA25634dd1b433f17a864691de46dd317c78623debc50ddb97c35a8c7db555bc50ea4
SHA512c32e80ea1b96acd69aaf8c651e960d7ce1866c07c873c0683219ce4c2126b79d5bb602605a5e8969bf46fb9e3811008a864fd277f4aeb3724be7f6ca8a99ee8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea12758f62ccc2c9f933fe58280ea6f1
SHA144ca44abde10af090ec5efc049dcc3b13e09d895
SHA2567321f1361bb604baada63b9e754170dd67f2884d687c9dcc23a59ee862dfc6fa
SHA512eb24bc5a6f44210fd559a0c0223baa6e5d34ef10d93fbdcd07c5a390a3e02d7a085c83211f52c1c722554b3a597402497255d32a66f841a2329ac6aab98ffd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906cb146952db7cad083deee0d160c1d
SHA1c9831d4df28f39ff51295123103e100976212ef4
SHA25647d8abfe725f384cf445e6cc963d7f36dfc7e70b1f4cfc699111f0d3c8925e1c
SHA51263aa90c6528836e40b582a923871cc3ccbd97f6d73333ad62eda96a24d4254d103fbe14c6f6aeda0ba5f6faccf42aa3c778ee657987406d6cdb524a4dc603417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e92c1aad7fa3b7f37dadeebaaa6ec4
SHA1952e490bb911f3391ac7f0f33a86758b639420e5
SHA25636746142f9147b86324049e6dc81d4728798fd64ca16203f8a645894cae45ffe
SHA5127aac434b6b1a00b4f92e1fd70d7cc2cf563cc169d0cdc3af1b7d8974e4c22cd7efed407ff627a88be13aa84078dbe4fcc478d7f7e56ee2ea30ea116af3169021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab12b0eeffe8f0107b3931ade2df604
SHA1e816116c9d14a8ae95b0de69f1ec40c5fc3f18fe
SHA2568c9f6638c157a4e1522d5dd186ba9aae81fa1dd395833cf34db9c73f0296a5ac
SHA51261e49992a1902d1843754b8e1ff973802118fdc4907897e78b4224c26d6112a889a5e79c9f136c189ad723cffcde01412f84f6414ebbf79b4748862bd16d71e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03dc7b444b534e2184a213cdf16e8ae
SHA10490383e2f4589568e0b3df531e79ba8ecd3942e
SHA2566caac0a610055d96c153a57bc171a54ca695339d8117afa0e563d748478a8249
SHA512d45f4fb03c9edfec25805f395401053932e9c0048003187053f78cc5ca0cda66529e4c758b05b7c4338fc6fa6adb8ccbfea7b302493c05c225d4e50973c3ba14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866513f83d4d539d1cf5dcd6a9f3949f
SHA1fdb87b5086d92d1a28b8f39fcb00d893b3e11961
SHA2562f883adfce31b5c8eb810bf53466e2893331daae8a26648a7d782b01dde0b781
SHA5127a1c16893ef77dc83c05c0772af6e3b5e7e669a3056abc7180759a5d0fe459ecafafba12a75ee1df82bd6c04964d440586d5e9cb81cb21b45e50b6d6249a324e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565433a5205b461dcd2d65ae02ee84ea8
SHA12d17363a37f6647c601e8618615de40c08be6291
SHA256eaa145e7a1d496da32e76c41ea3a7533f269ddba3a1d969ef2af038ee0d83067
SHA5120ce2a092e76f15700784311704a7c3b65a5dac5476c77a4539e75f6c7f9b146758627f9020c9aa9860aef815a774b630b0e53c39a0c70cc5fd7d85261ea77df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cdbcd5f12d397e88f09d9baa5c29278
SHA1831b91652854c6956639c1b2aa67b27f8007e97d
SHA256869b45d0d02f0dc123c41afe069874bb46c8830d2d4aee55abb4397b6124fac3
SHA5128a172710101f399f6a0967dd30fd9bb0492914f31b30a47d31e98442d6b142fce94f31a0ea7fa58b1943e16c732ca843cae139cf05661f8d0bf0ab2446e0c3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54210e4edfaa83fd217b2e58ab1b00bbf
SHA14b8f48d326039a62865d306fe77d9982062e09ed
SHA2561f5734cc021edcb3764018e68e4c5cc6d886a18a3b3b7a8dab7623f3aeb3b9ea
SHA512ef78f1e1fc2c61040401dc95a723435e11de2143da2eda9a3f15039b27bd2838b7c09a9a628f962effa3fe0866f77bdf9a641a55d5ef600e1aa8249071874219
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b