Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
-
Size
26KB
-
MD5
3c5d75de3638e0d0784988b049343a79
-
SHA1
562378aff027bcd1c9a0e05e3e5205dfba30831e
-
SHA256
c5fa7b40881e32b4b32017d2f40cbddb715959b3e4f42b74575a9ae6b64f1067
-
SHA512
39c68c62b92996a6ea042beba4a16855dc533c6756b50725f45bfe53f4d2066e4413f1295203cf531009f1627aa6fd43eb605c092ddf0ef806a7d63ac46af407
-
SSDEEP
384:4+QfPFd9QZBC7mOdMMKBKfpC5IgSnbmFe7Ac0B6H2kJvAgo0iJAWPd:Zcd9QZBC7mOdMMXpC5I9nC4BIP0iJ5Pd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000950ed60a51d26483229d59071243224d145040d061bb470d0e6e1fc124835837000000000e80000000020000200000003fcbdd7adc2a3c2a216aecd6a0c23486daae30e1d9a2411af1b421cf05e57163200000009f0848d3901fef487d709886206f1be1529a7f343358889f619ab6123f32792d40000000b42d71bb19319645efde58f1d1bd1058cd8df71c522864feb45c9be5606169b6d1b4845551de3f453c7bc77c2a617f08dac193ab45700e5d1112e5dc9dc3172d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426928852" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBE66131-401A-11EF-9A38-5E92D6109A20} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f953c127d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1736 3044 iexplore.exe 29 PID 3044 wrote to memory of 1736 3044 iexplore.exe 29 PID 3044 wrote to memory of 1736 3044 iexplore.exe 29 PID 3044 wrote to memory of 1736 3044 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a6ce6dc33562d746da0d1dfea840ce
SHA1523ede5d58740830a4a1a816ed34185f829a3145
SHA256465365356d0e34effdc5abc207752474e9e7adef8375633a2e9f770ff1145ba9
SHA5126943dcf3a8da73275997344ebb685e4fd3521975e262be3477771bcae1a6035e746667ee3ff3332248a9772194eb612cd619c5a5ddc3c2a93d57e3fa603271a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a0c85f2fe829aad928cf4b91074abf
SHA14502f84940cd1089c0c9798c25d1d12d3c909407
SHA256fb352f4de285acdec4ddbf15491ce9cbc4de7aa5551cbc15fed4c52348a6cbfb
SHA5122ee579f4af49a12264df85c156a6045dcc60e2f04c77ef8df7cce4da428afdece7521808d8a5b24b40ca5546a68a1c01aa023f409b2684478dc11111c948fbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a185aac730a9f69e3bbdb0939ca4dbbd
SHA1a29b78eab0b4fa0fce514c61f36804bb5581cb74
SHA256e567893969e5d37a1219f83520137a0e76e9034816949c6c7ebafe19d0302482
SHA512c72f8dd537c08a5f2b3890994e2d8e2a5307df7bf907a6535195ff6890b75ad28c62516a553f8ed1073a43daee1de8ab2af4b10d8cc8497e30833b93655de852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538afa6d55a9bcbef4e9051dfdc2764f0
SHA12b6a22bd94d1ed7b0575781782c61ddd1a5e8240
SHA256d24622a59bc87da9ead2dfb688e195996b94bfb8f83b1853cc8b692677159c03
SHA512a884ada7fd71298803ead946b1c28e80c1d0d08f7e3a43cd258ce8bd936910e390a19ca3d8e6aa7e78dd04b4bc9cdee2b89f3790555d3b6924329679f4c5a81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ddeb88b7610533f13e1e36241490914
SHA1d99cd0672bf8a4da92903e160eb3598b74a20ea9
SHA256688562174ea5022db5fb3e63ca260fe5dc43d89db086708ad2dafc39793fae1e
SHA512d259a9e2666db1d13f1fbb7b20391a76db34ef026cf7b6f9197ef76b7a03ca2bb567d0e79105823fe15c2782b1cc09c73316e76faece3662ae25c8ee336600f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595cd57389babeaf59225ff03f934815e
SHA1ae9c4489bd02722aee2ef6dcabdf5b9f5c3ad2db
SHA256d62ef5c96c0b56aa69fbc43dcbbfa438ae02283f7ca74b0e828ecc284be37418
SHA5122fd8e56405d0402b2f1ea7310e337f868e8d8ec7ff704f59cf8e27d4b2601d716b225bb0cdf9311e51323b786b94aa294b29612398ca0cf24b1fec30c94f0ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33c2a3101b0ea0694792f2eaf8eae58
SHA1326a9e5f844937761798776974d1035a0c48acb0
SHA2562067d5622162386709600aed11390b9c8737e5416c63e921475c7e08f2a7e3d3
SHA5126bc1304cc21788fe137a5c04c19c31da593bad1dd1e7b76792d344c23eddf081574a2b8b48a091189338648b3c0573300c541f4c719a7aeda7325e3f04cf9244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fac6a823e86d30baebe0ee856145152
SHA1b59a81f821dc629f9557f9309b7c30f5b4e93ad2
SHA256bad8d9b2ad067b3759993c79620e6f541f6ec81d8ec619a73ddc3cf4bbc2c46b
SHA512c23f706a76bcae60a3cd1a8b98a67fb540db7ec9efabcdfccfda1404dc486a6ed048778d167f8749fec786419d1d0f322b746195ac54e476520c6e8ba6b71bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4e3eead38d43b3356d8becbd6d04e9
SHA19a5355b35238636d04ea663ac670ca9efaf7fffd
SHA256a579a35431072b50b3e5918294dfe4e5f64eaebdffab1c944e1dd4af251a2c40
SHA5124a1f2109985456689acbf1870e274cf2c2f3a400fd27955f8ec8039f6e7750778aabf42be5d6f28ba990fa36b0acb5cdd5f6c98a7b97416db7afb260ba5673c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04f91c268256387a4a8891bae110111
SHA1541a885c9a3a4afd8564b8ff576ae228a9dc86ba
SHA25656f67045f1db83beac89199b392228b1bb894d4bc39aaf3a451308780ae76ac9
SHA512d8151bceb307f664dd8ed1998d22af2e61fea5d801e51ca03e5f5296d4e183f40d58aa4e94c5ed97b8542427dd85dd3f5d399db71d3915352001a60a53f8fd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8cd996194375bee81985f72335cd82
SHA1f8a59ae0499c0ae37489f43be224bc6adf5550b4
SHA256f83be04dfc08cfde293be151f82e9e7b5683f734c997ea81ff8ba206e9a08dca
SHA512f00552714a8e0ea86230e45dbfc6b58ed365f18f3616a75cee6a60454c68d7956ed8c83efb4c00c9d0927480e20571a51b04ae1ae2c19219bc9485e70be66f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55861b639c41e2e2b77c87908a4c3743e
SHA13e1b21ac128984d36b41d93c99b0e6e58bb5986f
SHA256e0626b3504883971b1e6b756f44155da71fac2e3fb5b4f0641e0400279d3955f
SHA512162df56f9d12627f06d4bc555fb68bba87c2aea0f7b09c67aed8490238cb5836cd522f39134cf13911fb3f211b7a7b4ebd247ad7730aee22f385b750fe40eec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f2aab8c50ea10334fc991b6eac5677
SHA1e38c08a50f8f6a9e5e92e5d8871d0714bcd47cda
SHA256b334146caa556ce6092f061b1b862d38e125d61e7cd019e215e146b6b572d918
SHA5127f64eb4a29d0adb5711a497fd9efcd90dd5b535d92eb43db996a38d95ef8832dfd5dde88f342b9d8efe5df4fad790f5cb7f99fbfa67775dffefe8c0cc38ad75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c0467146d9055d6be40eba3e956f4d
SHA103a5236fc44a07be890168bd6be0d68d95cc2e40
SHA2569605f5b8b6067a1ff28699d8352fb166060851fa8798d38ffc108f04614e8251
SHA512adf080efd9e1d21f7d7425c609a5282046539f4c6fa45af6af87ea4ad984ec0dca7a42ad24814b0c49ad78739a85091ba32fd543f0d5ff4d4336bf8c4a16305a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c563b732a4b42d7eea38c4b78ac5e1
SHA19ecba17be27cf7ea843b00304995bd3f5df21e86
SHA25614f524860310596ef74ae77885ad827d9328f4a9893ac9ff55188478a4e4a94b
SHA5126731ab6278a8af497f73559be4778f1351a52b7d342e585c4e502ae9379866c79fe1d9f7deb032ca833c6697262f8d36baa6dc5d733510be6c9e8b9be3d1e0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2e98208e21aa2a8c31ae37acf957b5
SHA1d41da99961af4f3fb6f8f76240a94eb3516a6e1e
SHA2566043284a493cfad08a1b360e5ac49117a3fa71577aea9fd1527665e2f2b36ccf
SHA512d278b02174cd0ced253bcc9ea503159bc5ba768404566034cb54e816742f7d2a0f13ba2a999a3c34d7d1332d095010406a197ca25ac98a94bee4307d4cccc909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae528cec3aadcf369cd1e9a3bda0c57
SHA14959488299c46d455dde2192a9e0ce734870c840
SHA2568d7739149b28d4e422f404734430f84e8e9e209285e5739b999669a1da7e14bc
SHA51233fd3a165ac8ef2523590e4677d220f132f6236e183ff79c47422618c48170854d3a0689066b0f58e6105aa197b1058107c7503649aa11bfbed2087a835d4f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed10b4094eaffc3b775a53d1371d94e
SHA1e112c83232531f46cb0bc0f1fc6e9057fd3760b3
SHA256a63ec8df127cc7eb708913dcecfbac69c89870571b810b79725716494736c9af
SHA512dbc0eb11cde55de5334fb3363a65629f56701d69f133b0011cf44edc6f89f68b055bb2c7eea792929bebaec4cdee71672150b7d653f43c8b4160f339653f57b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ec34872d63bc6e30452c1190f2c5a4
SHA1a2edae874e5d08904087b959c65abccaccf902b7
SHA256f573850e9399ffbf3f13841ada276100e7d35613c37ddb579e2d459b8d99be49
SHA51297784433c3b9e7046e5a1c963e395a081d90ad9d9649455fd8e2e20467c162d68dda8c47c9288b6d6448737045166e6015f69cdaabf8228028e9434a9b17b49d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b