Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
-
Size
53KB
-
MD5
3cc42a4ccb95484423bdc2e8bb831e03
-
SHA1
8c30e443515430acefd05421325ac51acff0480d
-
SHA256
2dc4a64cc7b79ed9578c925bae6f61b63d2c4e233c114775939c32a587d53ebe
-
SHA512
d43ff032f9522a8886beb3a151ea0f56173b0fd036d6c35819e9bede85376ea8803bfb199ef4dee65acd359f53bae5cb8712e5ab328c465b2f75ebd56fb999b5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlY963Nj+q5VyvR0w2AzTICbbAoy/t9M/dNwIUEDmDP:CkgUiIakTqGivi+PyUTrunlY963Nj+qz
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103b41463bd4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426937236" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000097df0e9b5301b97cabedceb1afdd54208b0cd249fa73225d01c32c644a7ad071000000000e80000000020000200000003d288edd37633bf03cc3f83c298e9308cf5baeafa4dee8954605962d3c607f6e20000000a2c12b795512409971754ab442598fee0e4d0da9578d3e902fa9375366356a6740000000f53f89069c71a19b421c20d5258d69809fa010ffc4bd6fb71218eeb70b84c7e0d2a88ffc93c8abd7063782c9e6c38dd93a43ae1b889f31543b4c49713826f5e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EC07A61-402E-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31 PID 2956 wrote to memory of 2492 2956 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59762c6290fb07fc3691dd6f94b0c38af
SHA12068041eb03a10b603fa1ce3555a13de9e01057c
SHA256d64f6dfe8ebda4fed2e6b420b648f38eae9caf43b59b1ce917a4013d0e7d5e24
SHA5120ef04b6eeb1daf84a5dd1e0ce291d4e44c54fbc33776b8580621fdcfdf9bd9215629105cc7b1dd629cc7559bf9a1aa234abf5c83785960cc1b206f0202678b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028a8431fb8a3bb390993d4f1d50d570
SHA1ef889165f1ee1a66065a3b31c632199e460cc7ab
SHA256759a56617782741b81082501b89563d640b6ce75052b272e608a4ca056848a89
SHA51244e189542d90c52199651d9cab820e04e9e3956b49b1a740757815d81868c54cda1de505af21a8545a909d6e7e735870e4ad616087408091dfb9cb5f1b600f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00bd56711f34b37595363b3463be3ff
SHA15dd21f4c364d686a6921652b5c6712fafd0207de
SHA25666975bc1b234edb2db3b95a42f136d1909dab52b518da1effa91b0437a368136
SHA512f17f152faf7b22aebfff1e95913b998d74a2adadf02ac73f2ca1495586e26b053f45ce562717a380175ebe0bf4ec05db036332cf36a8d98ad489559100fe3fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab9fce0e8de97108e6405ffc5d5e3b2
SHA1ba6e983e2769dd60e3d2c9ec4027aac9c35fbb93
SHA25663147531d28069e61b3304c36f2203b1ab71c3df79871f3497fcbde15b91fda3
SHA5124ecec17b51a98761bb03798c2302016300cdaeae4d40509b90e2409c10b8eba403c54d8b559ecb5d52cded359b114cac105dc2654a2a0509504156706432efdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68a0b30ce33d23b1e90cd9f37fc7533
SHA12b061f44a7e674e0f83fdcf555a9cc0b3168adbb
SHA2566187cda820dd81f643b5ad00cab87bd2b3afbf2d90588066d65b0044e157c02a
SHA5124f18733bdca7f4b968b186fd6022b8c36d5df9feabd6e46eae318c73ee3fe53e7d0fbff9b1eed6b6f8fb4584e9d6f7ddc29c5d90e51b73ab12e5b4936bf74d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36dcc70dc909c179fbb7c3f33ca343c
SHA152cf2f3c9b6e4846002f941b5a1c088f4ab5a44a
SHA2564815110951741f1f80f70fe6541c7134de647b5260b0d7df29e4396e3eab2c4d
SHA512d8213773aa81b83d48153546fbc912682aa36367e685a44883c6a5c38055f1590c2e68a9f7a6111fa6ef3b750d6c1784c91573996f7892cf37918873a6772574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50774a03234ddca1fe969166ea03a86a1
SHA1a4c26ffff0cb7dd415b89150b22501bbf9a86d1b
SHA25658656b52adbe3cc81116bfd03ba295e74b0a60ad7dc3f3d1ac29885d0d7d7a3b
SHA512fb7f48ea3eaa583d9469fd803fa5eebe157eadaef448096c544e6556b22abda774803364c8351395069a8f23c2fe82583398a39bb40c62c5386b517589cc73ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea6659cb8e77b88f05450d426ef0cc6
SHA1fcb0e6d204b095069a1985dfdd02185a1da1a3a2
SHA256a04a68523d44000537d0d52482d8e9347b32173b13016d3826387b4c1a0c99db
SHA5127511a024de8adf4dbba094817656434e023618f86d5fcca13d1ec9d9711f2fa3db2b3f1d3ffb955152d354da90a49bb114a6dbe9c28b3fc4ce136c2757763a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebce91d57231aa2465bc83a8354c2d18
SHA18b439c3b62e3665312b490b8a80f2220b4f357c2
SHA256c5295603488c775660c48939ca24983109f7364272809246e068646591225ff7
SHA512d3b95780a82437780fea21ed630501d00eb46c4efe66590add36580b62066e897c02fc6709136c2ee2473da6c7ec1a9c5e1a815f142472f8f031dc9cc7ebc748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8736305da6d1e473938bbd756459529
SHA1ad093a825a5ae9c5e1e1d9ebaabcaf30949a8e7b
SHA256ba1dad53575c4ce19a7d39ef08078c927f6203623a7aa6622ffd32fefd009755
SHA512d3be2c14c41ba5a4a0e46cd157a2d5079c86b7e3c47295a214f59dd80d77f51cf91cfb8b47d0741068b88dbc67c5a5bffd1c64632c37242605558998781d12bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dea3fe295ffcc1b3c1c650fada92db3
SHA176d4a9095d90f643a02fbe8a7140f538e046ffc2
SHA256b374b62428f94f801e7497dd6e87fc26969672a351f4f0afe148aecae192eb69
SHA512ef06522a27c2d31e4dfb9554b39e49391f8445b6e00170c69f7db8ecc5d153c105beee52c2a2a6ab1db7fd93efa83091ba1baf5154cc602b976cca959860441c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f19dfbdcb5da8bd06068ca1e6846224
SHA115c0e0d56317edadb50ea02937a9c6fbf133f007
SHA2562f5e98a185806e17b01f6a119b7b134c7a1502b4ee9924134d510478cfdb031c
SHA512551818d1e40bafde6c98e308778d312f449d459afe49e36d366ec54ba780681d9eba4798640250495b4d1fabb49ab8b7bee5a626d618995bddc5028a599b73fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eebd001e5b98dd1f0d8405a828d7f8aa
SHA10eafa1235512679ccc1e427c72ff33d0d0a8fea0
SHA256bfe641f48f5081188cc436d8af972ad8bf92b4d07459b2d18380295a4b73cce6
SHA5126ccf3d52d6afb7456e9d8d3b9676f4ab1b4a328cc8d629d73a672cbd0d53af1f8896fd0778fadaa343bc481cba88a646575aa8e7806fe1787347984c5756531e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706d4ca88db6c69642cecebb1f200b2c
SHA1b7986b81b5d92ce8ce3c0227f1c7f42504dac7df
SHA2561e2093d37daee3f82533c45836b694bdaebdc176d3d0c2e6040365c5f641ab19
SHA5121d53693b46796d96190eab530433744faaf41275fe1da23111cb54fdb6f803e952d1912d1277e6250bb74745a169058d4200952476e8b503ba2f54c3423d7c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df38fb3a39e47314b25565316aab5a7c
SHA193c5cae1bf8993ad7d41b0c143b57301ca19fc8d
SHA25637a000ab22f9361f20026af0a8ad9332e8174a3832fd7d2e967f44d2a6b1c3f3
SHA51261d0dfe2f50bd2b0372f18d9424edb24dc0b05e984be5e2e5267510defb007dd992674e32e5d94d0b4854bac45a42ae8f03a6ca2a4fdf3eebbd4d770e25e9c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b3fd5b0532fdd2e9d9dafb6133a743
SHA1a1f0727e4b63d23849127a7c982a913423628af4
SHA256f521140920ad341bdeca5e4fa9335b7edb54210c0929df4ecccc29910182af33
SHA512947020e0f94836315345a898660f3b7e8dca82f260085a2564594f7e177ac26e3fb41e5b514b0456782b520d4fa1f21fa7928cc5419c4f3a72ceff777cbd260f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59625a98c38e63f95a39bd584bf8d1a1d
SHA15c7a38d55c5c2754c655f4654d95153a19acf5fb
SHA25681d4853d8bbb1a7cb8b6ae98d782b461513ccb0a7df3a54cad45305d6598525f
SHA51269daf28036baad97f2f5f7c79e3d7596010fe045a4e12e2d7314eecc8cb88442a53ccdc1b6922e074a7e56c19ed20a015263aad2d054060efd129221b4af2b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809c1bfaba71d3b7bcb5edaeb22e3874
SHA193df11a9ea0da126db9f20f0c8ae2f4c6dd57bdb
SHA2566b8294e3e1291b033b8df730fea3b58a7884e51202ffe8740439260ab8701560
SHA5126c99c1b44c50b64c7bc3282ae3ebdca7ef0e3177905e2afdbe2b4b2ab3701f89553dddc3d2f0ea8e45b3b91f3e67c4b20425d17caf2edb009992ded30b19757f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a714c8ecc87b1f2a65dbe52298d65f0
SHA133ae4da29bdc462042f256641e528239a1b346e7
SHA256cb85a6be2db0a17b6bb448785570dcfc029af2beff0e547b348c303133eb56dc
SHA5120ae960b26628f4a74eef0fd8b4b6c018f15d46bc105072bd55527f1c88d59fff97ea254c04eb46d53116c266e6b6e56359b8a2a226f30b42c9ff953556797a88
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b