Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
3dfc59d9ae50d1b23a355673931006fb_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3dfc59d9ae50d1b23a355673931006fb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3dfc59d9ae50d1b23a355673931006fb_JaffaCakes118.html
-
Size
47KB
-
MD5
3dfc59d9ae50d1b23a355673931006fb
-
SHA1
d1a4d54a635f46e64b9647bae3b2b4281837ae76
-
SHA256
937ac93aa20d2037a4a6b78d3c38cdb17c0169c33628624de96cd98d88b8e46f
-
SHA512
42d05f768571b6b5b15668d7a0db3b7f7d6ca066e623f1570b672b67d7875f96ab2b1f2da19d0f3298454e6c1a120707cca78c0a8017f6138197f3a4718ebf87
-
SSDEEP
768:0pEQ1s4Psqh4DlqAYywdmJ4F7K3zeTrQaLLJzNMqZgSmXqDGz7dFMfZJkAELMQN+:0qunUNY1ma7KFcEb6emiD5tA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000000e3144199f9d0aeef13cedf0ceb71402b75bab1957c51c28103e6226f193fe0c000000000e8000000002000020000000f1927d4589e57e0efa70b1c01e726da3c0f73d6ef610b37d4c86d19626adf077200000000569aa81b976b9f579e8d34e124bddc71b49a4fff756327855c6c794e370c313400000007eb9ab41ddeb10275918a9e2458d135cfe52ab037e880741ad371cfea69795ea21400a046068da9ada80331a435087cf03fa780770f02f145ab0b3390d3bfdad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06049461-4066-11EF-8C3D-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426961108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301e010f73d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1276 iexplore.exe 1276 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2772 1276 iexplore.exe 30 PID 1276 wrote to memory of 2772 1276 iexplore.exe 30 PID 1276 wrote to memory of 2772 1276 iexplore.exe 30 PID 1276 wrote to memory of 2772 1276 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dfc59d9ae50d1b23a355673931006fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20bf083a6d8e32dc3fa38be051c563b
SHA14868eacf0ba4a645e2b226d72fa87ab4872d4b89
SHA256f6cee578b4b363aaa24cafeee85a346d4521442d905ca6064fecf7d8f2499deb
SHA5124aab79692203048b3eb8ae184085fe562c020c9da68f76f93a264cc457cdc0ccf817ae8110013e189974b2792c1bdd825b86a7b0dfa3d8a57a57c15d3c1df0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ce9e616b8e4580c3f39432de77eb19
SHA171479cbdb14aaa43961e72cb7df64ff85f91b841
SHA256b26eecfca52ceac0cc4bb2837f1bb95d99e3872287f1ebfc1115903509bdb8e4
SHA512cbd7bc0f0dd130778935e5d36e5836e0fd5aff2c874f67b9776b7f3bb1c4a2ed73a19bd387da700a7cf957d2bde7797bb3bc51d859a7d6b307be26e81e0c3a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70977862b36db47b43ce2faab5627fd
SHA10d2b1267029bf04550adc76c63adfe6884076d02
SHA25611c8fafdb59d3ac52ba6e499c0f425984570c1058e77b7088949197bc094c15f
SHA5124e031964688185f5f0391a520b2bc5c398048d3a9712bc564ae74db4058ccd81293391ef50fae9faa2e1b3ac8a006048552da3a350a8c305c2791865fc385a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59774ed2ae743cfd38c0c6f4ca1c0ff06
SHA11a6a8b1927eef7633bc46f315aff9ae433db452f
SHA25685ab4560247a4c71df0f1d2b42d7ca1859d4a269cdeda3f8477ab43e40edb0a5
SHA51210550d861867a5af1be8a50a31ec9a859946ca1857032c2e40037fb383176bd7a54421605d7e6aee41cb79e349ad5d97d0eaf0f7102075d7bd496468fde857db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57553ef5c596a70b7b50b89a033dfd78b
SHA1b76bef4e30d372b4f860808ef2ac765817df81cf
SHA2561c4c8a6040e4f00bea864c6371161a91428ff6150f9b3842ba872ea1dcc86830
SHA51208994c55daa7a50c9aef8a902610d8115d247ddadfac1ef3118c7560321450af7a4fceabef775de7738c8f05df3e7321bc6d2cc0642287a766feda56e1cda7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d11fa6bbd0fc4110874017562c203a
SHA175f458fc4f412801542fa54afdaa60b4796d3169
SHA2566e651371a0e941ee0d8a4f5ffc52a9dbea584eee8e8f148b5eff5f4e3a8b6bf5
SHA512d92690ea5b304fada77042328b1b0a1d2fbf18063a193c07cb8bbf948b46e6d4a155ecd92d69b2525cb1fa74f6a27ff9a048a9c9db294deeaa6c442afd6408a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa38d51ab2af2d1a8ed2018cc1e4e4f
SHA187338d5dc8c9f8cda89298f1859e5e1eb2af8297
SHA256e0292faa375c168b996fdecf6d1816a241a35b099eda05539db83030345e0dc7
SHA512dae715b9303f03e4daaab45cc38bb95240ae752ed9895c82f4a557f3fb34990135febf723d1de9bde62180b3f4b3d10c6e2de676f624a14c5fa06f5c0b1a42d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f63309023e57d68099b864206e4da4
SHA1679338ca343c8ac941d828dc3155964122f96e11
SHA25623770bcc4c24e28d56e7b06b646fa20ac9ecf9584a76639223f5b1e825e6f358
SHA512498cb62209fd2deeb4264508941e28e800a56fef98932021401d3c8d043d5ad294c7a1504fdce5e48193ab357b228b74cd32391efcddaa54539c693911541a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d085be494ebbdf10c7d1b595832bb145
SHA1ad532dc8d8f3d1e9f80e7ffd927a0c86472205f8
SHA256fa03b566333d5d1e8cd5f37fa42401c7c6fc86227dddacebd3aba47b635d5b58
SHA512dbb367f42f44a80b108c292d2b817b880fe1ae8e2b7ecfd7f149dd3c2aa880ecab2b001b840ac3aa8edfb785ac8dd571707ec338db8fc970471a0f4e658f9a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f2a2a18572f049eca8afb7c93e75af
SHA1a6c981183d35f47f17a4cecb8c09913b65d538c6
SHA256a47dc88ce2328fb48873245e925f0933de993eb44e78bc8a9e61c3392cdbb7c9
SHA5125e37c8dbfd1ddc57a303f56a2fc898342c672d7e809efe10bb9c9c34df3d254d8fc50f6ec09bb42463704e21a6d0d6dbb08bf731114f6cb21298d0fcc871ee35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c21855d37270dd7b41979b4475f1ad
SHA16aa64e14fea9f900eb9669a465ac03d72f425358
SHA256738561eaa4499d1ee30bb428b406c6726dc2c66bd89dbea0a0bf8565cbb6d856
SHA512b5284126b44e2bb31b7a2b57322f25d41d1c6c9c7fa02f2acd70a4d5d1f8a5683c0f9fe792f0cf8bba5ceac32b8c4d500ccb1c769435a12ace6a1fbbf45d07cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db339fc8f75ea5ee0dbca77de95a27d4
SHA1939d9e3439212979284d245b505c940b6e4e1079
SHA2564f2fa3500e21d37000be11b740c96ad7bac43b9acee3e6b8fe7241bb07b63c6d
SHA51233283726be41feb9d5dd39c1fb7034331c0df5016769c6cf7caaf32f3c65448b70b95561760d5e4caba3505020b9586050496a3f4aa21a0d6c8274d2ca4596f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fafa866e46871207c066a47879cd02
SHA1d8f1ed4a427ee1e601fafeea9e8f487de905ab4a
SHA2567dfcaa73198ed9dfc8533833bfb2c5f77188d30e0a68945b22f108c20908289d
SHA512934f839dc4bca4a83a496bff0eb051599ecc54ee9f0f3ac93b84b5f4ce6a7e99f73dacc20c519a8d06087a6f4ee00b00ce8de70f0cbeed6df9ab7fafbd4e8051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f97b922e02b937fd2d73a4b94dc7643
SHA103989afb2018db5d304f423f8a70e726b24ef845
SHA256cf092ef54d4c93de030a6af69aa9af03efe49e3ec8830744aeb21026b0935be5
SHA51204777dc2a0defca5b02e9c0de96bcbece68b31eb6fa2ef6d6b4fbc7ac523fc3ce3d6d7a7186faf22446ba7d9bcc78ce50d5f0b7e2d5903cc0ca99c686fa325a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7f99531ca7ef55520604d1c06238b1
SHA13161892ca7d3d6c74f449778ff27e06a29c24c4d
SHA256e60e41e89ed8ba5a7b57ff7b91d6cd4861ea3c48c92c05da094bbf77949d2067
SHA51266b7706b70eb12671ff9873ed15598494223b910ad1918b193cea9a7f8a481e708672846a5816531d720d9e03eaace775c105ec560c444a1afae6120da0db302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3bf5e28f162261ef1e556dbd081c97
SHA1f16874887d24a9510bc6f8b1a1f9a7748c5b51f8
SHA2569a0b90da70131653be3a943645098e9d5be79ea3de661b25b39923235d8ba136
SHA51271018f55e6c877509186b10ae24197ee9e14a281c20782bb674147c13a9a3f2a025ab554db0106ce3ea48ebd643bf0fa732e3a143776da52037fa3e7525e48e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570808c7090edced330b3646aa8d34b84
SHA1c5848ba7363916aaea73446fbf5acc6a339a8c3e
SHA2560f524c3618a94abeda0c347c98e8149f529f4da0821301e7d25efce866fe26d4
SHA51225e2763f085572ae424fa956849c5874aa2356de1b085d7e8e7849e38eb9654fce28ce28cac200bf3403520ac1cb1acd6f64580849a42305d51acefa6a790fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee88c1d9f312f276794af26f0b01409
SHA148729a857adad9b9adb94565ca78272c19f4e153
SHA25668ed586465c71d8fb1ed7cfced3a8d00d4fb7940bdb853b6c62e970eaf3f92a8
SHA512c152503b833150a782ed59ca065fe2a19fe5e5d986eab323276cce64a39da12874c54c596deb46545e5ba34d573b7c39ad624e9553de0bb1dbc3b92e6b70d03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca1ff4d19a6e9de903fc2ecec8b3a47
SHA180d15b5132a95b9b89f4f909d882a25c03ca4073
SHA2562c9f4364ac3da177f12361cec111872403376dbd2f51e177e5eda97e803c16bb
SHA512071e03f64e238a47c9878c61672c1e7a0744fca8f1766a8c91f613a88de98d387bd6d0a28580bebb4fbcdc9de182f973aec4a0eb172e0686d1e79aaaa7f84b4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I31L8UE7\hudong[1].htm
Filesize735B
MD58ed4ecbe04a6bc1cd2742ded37636d71
SHA10f52afe93c7580d82132b0cf9154b1461d059391
SHA25685cc4fb35d8b051adee4bcce211b0cfc8abddf11f9913123fc2c98c9272a112d
SHA512d96bfe0390a4b40d1d5eb5c34ca5e82730571152b8d2ccbd1ab5283fb45b3f3d3c211079048ba520b76d7ce2cba66b680743766a895eb1745a46e415e62b4921
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b