Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
3ca2a2574b14c441555349669835b4cb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ca2a2574b14c441555349669835b4cb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ca2a2574b14c441555349669835b4cb_JaffaCakes118.html
-
Size
53KB
-
MD5
3ca2a2574b14c441555349669835b4cb
-
SHA1
e011e8332318b505af2a019e896ee863429f9b15
-
SHA256
9596f816334b399a4f2f4b5a688ac6a345b2e43a8ba004a8d36af72d967ded46
-
SHA512
63fcfafc9fc41ccab88d0877f83bb2ef58184a95321112bc25a31b3dd1194baa8621e4835581f7151654d369251facd42cd95588b8b26a39b1ae6b36e656e486
-
SSDEEP
1536:CkgUiIakTqGivi+PyUlrunlYf63Nj+q5VyvR0w2AzTICbbFoA/t9M/dNwIUTDmDI:CkgUiIakTqGivi+PyUlrunlYf63Nj+qk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BB03591-4027-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a6e74f33822fbb6f237055a8ec21ea71c8402f83a8df857b4862221eab65e867000000000e8000000002000020000000a84fd681a66a801d5528076ec7b7d985d9051cac00a7c8314c3e4792fd72f0c12000000033eae032be7fd3a860df8bef6ecd6beb6d8e0b70f6b63a78eb5c87a78b4910514000000052730ddffc52d9e736538cac25790921d8df3fdee3fd3795e2f66136471db662262948e3dab62fbd09e8eb083c70cbd3c461b514f2440ce8a8031d11717294cf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6046076334d4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426934274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30 PID 1676 wrote to memory of 2360 1676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ca2a2574b14c441555349669835b4cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c8a65c6a9b491629a973abc5c0ae01
SHA181d0d41fc15c881a02c7d61722baae8025217f2d
SHA256e9fb57e6733c426f7e6c4c8060e5f534c09e245b71d6f0821f62f5177905e5ee
SHA512c88418e2dacc9a2599189d68363efce7caed062202e87396835512f9ec017869541d6fb03e3643b405ff42947de4991cd0a261315f49cbb4b265a55966e67860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19cd4921f4582d9de7dbaebcb1e5526
SHA14560c09f18c82a544b7234b8fc941f4e500ea026
SHA256c3c4a2e6066241777e86f57aaec85a2b15d183192bcf7fde61de8f64740ab9b5
SHA512328e7aaa15cd3ff0565f7b518fe2a6db6312bd1ed55b5ebf41f967854f10e2639dd3fc9a18d068ab409263f06e8e56b0f8dc516be52a273bb6bbdb4ed1d3075d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ba27b8e359560f11fe259549b0a767
SHA16fc8c3ddeb13fe7a92d68fa562792f5d30a69658
SHA256641d85b9f3092231f9e31a02fa849fbd101d4855949c617cc809b9b3683a7cc4
SHA5121a0072d10af566c94cd2a284c019710f554feabd5c6d3fbb86512e90921b3f13d22d7e7717ba9c7ab19adb615ce8a2baf685873b24425eb2de6eeea07d9d012f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c40bc302d0e0aa5b4957edf29514f0b
SHA1331813c760219d33a9de9ba985818fecd6484e27
SHA25646b3473f92458bf11349cd67a959245c261ec25186b8b222f8b22f906e09fbf2
SHA512edcc7e1efca17c55817f72454be43388da05e3b9baff51ccdf113f25c14fc81f9a1d3d65814d91a00906c303737020c87085633118a16bcc1355eb55f8dbe6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1288549220aba07564c4934000294f1
SHA1130bf710a4dfbc09535770f03d2ce017cf9bc27c
SHA2562972aecfee669f0443ecf740260eb81da8296e156d83046d223d3badd99b2dab
SHA5123edf4d75673d3ff4e1b60914f1f7901f5f1a05bed786bd004a904b69c9fa0847e552c66d5564ea7fa65396d12836ce50aa4330e8183907537c68a89abe366616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42c0264295d8d7e155c7724dbe36d6c
SHA152dda7816d2d9d8875545f5d70aac1a6cd4410ed
SHA256a04291f03528eb18f7c00b2d2898b8293264d48114f8b3cea379c6839f692890
SHA51243fb152bcff8bba72a72defee9a7ed1d0786ca67aa19e331a45211abdb09d5f517847a8d62b5d386e569e280d263596a275fc2551d57eb777d3ae25a5885395d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c9f79586853baf5fb2703eaecc7487
SHA13650701cbae3ce6a8a29d076746e8c0f7ab73890
SHA256bd440b215b2058125d0ec4b34a4721e5edac6ae7e80995603c06f7079b5f929f
SHA5120437d3fab2953994d3a7d48eb909aca80575ec0ba3c610bf363dffa3c6b2035aedd852ce4a3e2186b06ec16dc8ad7e69f5262f2ddc1db7ddacacc602562d3f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2557db8528732b128b0ff7d7315185
SHA10740f09b9d7fbd58ec1d9d6a4eb1d2ea19725632
SHA256f80300bb5c3d2d0f4470243f35493f7943966f1df8aa26c25e403a0ecfbfaf09
SHA512939963f098b4655cb34d780cc377058e5a79a1da16557062dbec95139883f52f1f966de6becb634878cf0af916f7c9e489fe5d944568b61422a8e35ee0389451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558133ca13ae722b495e36de8c75bf2af
SHA1812577ca5b9607e7a3633828bc64bddfc3fa033c
SHA256b864f4a940a70f5d23ce86705548396649414171a47ce3154195f5a28f7a799f
SHA5122a1f1cf448d1574227cbcee449e9307775f9c04660837b7963dd7135b45802b45db3068d7e50fd9ea66f27207b64f9e32f2e3e0a6aae23a515c9d5d34d9d4099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6972c3a1133a8c6ed2f82e94c80d16b
SHA129f9d70718bd0cf7178715ef3c3a12b5acd0ba26
SHA2562805c58e6bacbd03c09c5e10491797477ac3b8f304683d4fd8e4f046626e09bd
SHA5129b84ea64b6e972feaab3229fc416ec097440e99fd529b7156cd8118d261dac28f405295269ff3876fb3d30f6244bde6702ae504f59f9e5b030ab9f849924ceee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bbddf72282aae3d9c818c5385c6779
SHA105e2d34fd3b1c3e5cb2789a745c73826c23d73f8
SHA25649a244a1d7e9ad504804009882afdc20cb47763a6f0994d0497ea433770f9d16
SHA512fa5cc3634d78694617a0ec0f4500ee1e5875b0956667aa7f2c2a9dcfd29ddc1754497c3fb819824e5ae7c74e07be255b1c0f783be75fb5e6bd5d28911960c87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fdb8c58d79fd66a29a02101cc58b5f
SHA15e113d9bdaa99c4ef23950b7d0c33d7bffdc0b03
SHA256f0bf7b799a7e539482f4fe6a218d82ccd29b57329242e428cb7e6f5438003181
SHA5123cfee5a852b21c6093b357e9b883c754b16917f44dc31033d2eb1837232dade61931099d44a6af2eb36eb1fbf8295ae1ef453bbc353ac2edef5d087e2a486ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97f611041741fcf316272919c38a21a
SHA1b44ad1f5dc6b02b97fbb22ad0850d366bc2ef05c
SHA256debf0717e803ec1dbf73dc30318ac13039bb35b9ad69086dd7e1ff00f7c42a9d
SHA512c0b06ff3b1bf6dd443fe856d9d49cf8c9ce7087dea3911d8d40e759b724920ee36ead97ddb589d9d8fb091dd114dbe820896ed668cdd66864ca430cef10d4e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b869383f9ad2e9649bfcd87fd2b8aa0
SHA130fd97dea740294535f942100b5332b1e280e314
SHA256601fdf046de6fa7a64dec09c7d1b47694e2b2acbc57d568d0d8dbe240f7242ac
SHA512a24a62b3c3b771be20f9cb7543cdea769246caea8d0c40a08446e8ada9dc8c757f36ea02aeedce2fa0636956261b0299c40bc6d4406bf9730da2b8c5e478ca8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e9ffbbb6065c04c52f97b579fa6143
SHA17619318142743e940725c9267d31096e26de57bd
SHA256daa451b0bbf98c8a11e1931fae95f2b669b6608baa99ab08e9d2f64d526e3ff0
SHA512102ed82f9f8781cc757ebaf10dbdf285d40ee951b50ed06f7331488bf0c0a0fca59fef3b41f45a4e08c2ff1147d37e79759dab1517f6926b65d3f3742513df85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57459be49889d04e0bd572fa7cbe198cf
SHA13515748337451b1cbe3c760249a4e533e922ed1e
SHA2569a7c450e57c9022a12bab3d2c21844eb3a13e82f81e69b168e5549c015edef31
SHA51236db0313671bc5fa502051b518a7be3f77f04e9c453d0476f97f0fa75782fa1435c2f746cf2efac09dee7ad72bade63db7babf4d0649ec46391360c296e8b259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea205e661987dd05dd6971ff8d4c6846
SHA1da12495f0b32feb26b71eb5831a7ee46634f644d
SHA2563cab5e2fcef8a0c16df57fe2da1211674a4ae06fc7faf2da87f969f5a059f6f3
SHA5120af7077ac7915d2c4a1fcde3131041ac1d66ec5eb8c0a5c981d3a08376704d2a83ac6c2de1a0cdb54af155045379a4acf64bb6e9501f02d0509a63ba81f67a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c099d184bfd62e1afe4a3b8f61fa3d48
SHA1cb7fa0b7631af1efb8f2d0abd6d62e57fec99ce2
SHA25683ed4267e79d93b626a022dd0f7940cb83e4ee3e2c61c6d28f751f0761ff8ddc
SHA512942d2798766932a0d1c2b58eebdaba27044a9b5447fcd8d97381d1f3a90eb47bde8d6e407e963142a58bc530334698fdd19232c3198de5e1728d4c7a40311028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272e7953ca6183d8d23d1dcd5f82c6c6
SHA137621ec78450b4518f89545778a0bf0f501c1506
SHA256a3e90886ae7c1bbd988128d11224e10f6b2408ae540f79343d23eeb1d669540c
SHA5120f7b5aa56cfcfcdcacafc5c6b94bab1c9e4243fe73f3fa54148138b60112fa7c59744b68f21cd4efd4de7cccf79943adb5537c7fb32a79f6e9a56c78ed0ca6b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b