Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
3e69eed640ac4af5f6359eea6c782a88_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e69eed640ac4af5f6359eea6c782a88_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e69eed640ac4af5f6359eea6c782a88_JaffaCakes118.html
-
Size
70KB
-
MD5
3e69eed640ac4af5f6359eea6c782a88
-
SHA1
2334f2d5f9fa88d78a0262c1d9e6ee7031c71a4f
-
SHA256
c34e66e66093ed5330b27610fae4f58fe161844668e672ab104284928005cca2
-
SHA512
89fa71802bd43fafa303251a3e15dabf5c3b44a34c071e189428806330a7fffe61a4ff821e1bd8241ecd8352555d538b6afd764adf6b2b99842e60829e2c3857
-
SSDEEP
768:S20hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vo:SAIk/StnwOHHb9ucvE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008ba2ef7b25a3085f6bfdfe96dbd782d67968602092455926f96abb8b36f58bf8000000000e80000000020000200000007efc0e37603642393bb4511813073d4416b3f1572c4746d3c3be63232b922939200000000a4a2edfc33202760a1d3067b4d2f370223672c46530d239dbf73b5641a839c84000000072463f0002c07416a8698ba131e57deb1fad36e6f5462efb3096ac26db5ce3007e98d21416452715110587d4bf4635b7a6b881098757768fb8f9984bb28da10f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426970996" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BAD6791-407D-11EF-8AE7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60708c128ad4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e69eed640ac4af5f6359eea6c782a88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafa7b5fb0081fc4aeba8fce20855779
SHA18bed13cdde3093a1074131fc09070fe893a60e15
SHA25622ec3b885213b8d42184699ad1e2b101f132b58e79797325a230505366448e9f
SHA5121ad037bb9305b12601414f29d69fd3f0ca7d77a83c2d922376d46a7c9774ff6486d6ea8444a03f124620b1383ad875a900975332dc23c35af0915b597db9b2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201e66c1e996da9a54e502c55333b188
SHA123e380e9ca06fd3a5a0d118b9896955692a5dded
SHA2561b914664bdb8d6bdf6ce461e753c7816761baffa7f14cc9ea0cc3c36dcbefae9
SHA512788a14929710e295145ac7d339a7d9cd27d9b9f148dabbf4aca078ab708f3ef9ea65b7a8133878b67e9080603b2f9657b92474375a4f5cd8855edf17c4dfbec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508df5d179aa57d31dec1f844ff2ef470
SHA13e9edb677c89d19f4e59453da0f985db9dedc50f
SHA25635bb59a41b72c988d8d5cfac132fd13413b1b41191481c1f47087f76b25a93e0
SHA512501ecc48f8c1e8d10e4e48d506120e0a97173b13e7cd96d16e0f3ee044a53c11598c07f56a4da73684105f0efca79265c3bd52c5e6a8b68e3fb576100a2fe293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb6503c646cdea1dc24ffead0fe79f7
SHA1098ded4799211bfb6a8ed2409c6a2f9680c904c9
SHA2569e453dba316a5e5b2dbc48043476e9f5b67d30f47a41418d44be4d11ad5cc5df
SHA51234a93356a53871d4c55bac07b60094b0f4e79aeafbf920488a3c8e974c20e31c183c6015e9cf0de6da325160be8fbaefe241d916d83a4ecc27b333baa69b8740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34a6ba7df81af97d98c6f939b67ec91
SHA189414d993bd24620cd73a7a8ebf5796a5c60165e
SHA2561275a5165e93bd61a3f2b51f1043025af5208cb016b90ad59f2c1cffbb210b7c
SHA51216a987d26545194fc22a17ab8749c5b4a36e73c116e19994d9d8ed652deeb5214d1628883234720bc6d580fba1c37a5ae4a6028351a4a62ff92981c986ae6ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8f8a82a0e9af04c17defd41f09e77c
SHA18771b2ab2b12e9a61b60c9b703a070bdb6880a3c
SHA2560f33b5106dbdabcdf4b46db0ca0260c89b20e4f26b2f5bf8d1208f0f64ec944e
SHA512b9081b774cdf4135e3eb7b82080900d162566066cc4e76fb7650c8b68b9a679001a9a50c8fb28066bced45f4c103959a89a436e8612059f118e2822e6e7aea13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8efec344ddf7f23c4cedd43622a5074
SHA182edb46d9cbd4fc65e04b6c220d560e44086c176
SHA256acfd0e2f753c0c60fa6c3340e80f911f979db9e49cea77a6710aa5b5d883f46c
SHA5129618985faa302b32943b106b2b6e8f7a83cb9c8cdb51bb1838ef16fffdee09cc7c5fd9ded40d8837ae08691ff9872a9fd34d4feb0ade7a0224386ab93bb321be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d50e2753e9e113f0f992bacdb1954b0
SHA1149760c4ee424a993a2128bc9d16563e2f581fa2
SHA256af88cd86f56e760782b499df4fb4f738874526fda0cdc02654675c30c5da805e
SHA512b719660ffd4bda425162c695dbde9f514f96d3c4c11a13b15e0d419c98b947d87b18bf1bbf54f0524e06c6595ec028628c9ac3cff9e1c07393bc35392773ed8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02db618e82ae743ddd7ba462206b831
SHA11325c178f591c4f06c2b350fdeeac838caf7ae51
SHA2560fbdf65e8ce16200201380e9f03edd9d23d33f147a2a7918b8787c2b3344d46a
SHA512753309a1e2d3b892294cf0ffcadebd74802791fda5aa3971e0ff1130d1c3bbbbafc9281144b7f7baef0479127bf13e10d8bc8b7238ea574359f0ef1af38dcfd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea02bef01098be8cce722f6d437c682
SHA1e1851ca3ac01653dbe131ee0b3c7ce4ce70ff3f1
SHA256c0005cfa93d765b2ccab925dbc9811a50cdb49f82c591941783dfb48d2611397
SHA512502354a3227089e53402776da8ba61eff1f7af594c5be63f7e80f619b4684b04a23d1f4383c3d7f7a74842c8aed71766fe0737b06dd6a8779bc6ff0c678c1e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578553f431cd61c6653c84f54c7d95dc9
SHA1c123922d9c082fcb49d78e1d68577cb8a81d2b5d
SHA256b04137f2cc0ae6ab29310ab51c5aa8156ffdf59cca1627b8deb3cebcda84814a
SHA512f78d14825d538787ab9e63bb8f124e56383e65d6bf58cf94f5c064e6ed9e48e742eab3c5c8fee07e116e1e121606139d49e5a78c2c005cc9c2857dae64e6613e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f9a18147b25d3b6a955a4b3e3d1650
SHA1d8f924635539265f35ba3571daab463e0e361bf7
SHA256f7d845ed6ff4d93b760761a43cff190a93c10fbec34cf588ead524eb81f9f7bf
SHA512c5f60d17906b0b901948c0bddf4a47e2afc59b59a080cd341252675b004d6a63c01a45fd95e76e81bda236dbf08541daf2a140fdb2eeb968255efcaaedc76381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54796b0b17c26705c6570c3ea21cf182b
SHA1ee14e7a927b02eab4b0bfe4c6cf4a1afa46490c2
SHA256fcc639f7c7a5c2d69f15ab818cd76d1030cab25cbd7c1a5f75321788af08562f
SHA512161071436680a92e2c529ec81d648586cc9bb1e0fdc136e9507f4a1e59c09003a1e0f2911df19098c1a7ef1fd12f0bee316f3c63cd551d5e231e157b190ba8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e7105c744b935e8a9402c6fda5d1f6
SHA17e376be304f834f0e71c0e34a4b6ac0b4d78e1c7
SHA2561318b46f4ffd2170aa62416d9471fb3b32240458efef4281f5677a4d9b1179ab
SHA512afaa18dffce7e617a921c69e49c41b0cbeea2e263b2bb19c155abece91384bc19b527b536646058736061a70269dca20760d916b973ef15e1c3b8607d3106472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be0af50837416f6d6eec5d08bce4e89
SHA1d068826cdeac9ac335ce7963c05e81125cfbfaf0
SHA2568523175456f3a9766deda7de339a33a11544e15f86657df3f7bc0ce64b7889f7
SHA51220fc7a6a52c037ab1dff12bfe7a86f319a1610409f9fe337149485882c426988404c17a2d6d55eb5f7fb9a5e7d8a17735fda22c80d0b93ffa7fcc4755fce74d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58533de62d8390ea82adcc7f36f5b06d8
SHA1388f3b9667d56a7541a8beeaff0d50cfa6c67731
SHA256bb0396b5173f879980a402a1fa0e05aa04d30270dec28240350d55a1fede076d
SHA512db5e34b41e2cf332a15fe317786e456020d641fd30bf3ac781f0f285f7028825bda7173a4835ace0fc715bffe886b449441a25fa8e7ba958a7b50c060ff3feaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec3772c4704bae31e7787d62dbd3b3c
SHA1807f56acfff7980287e54c81b12d6014406fcca0
SHA256db3431a9c07b26d3982bac86bd39ad308dc34f16b20c563a453f4875417a2b98
SHA5124cb6b58f7e5210db49af716ca93f5a752ef11a3d3acf1ff24290f8a32dcee2241a41da186c6590b22bd10e823194faaec10f06fa20196dbdb425607dafff7286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130ae876654ffd27d9787a5f5e00400a
SHA16d63883e7e74ccbc5534df7812b8daa9edae1bec
SHA256be49de6433c119a0ba69cb8d0ab6db6b5ade16a8c00c12275e77675c6fb5ed31
SHA51285854daaf24e3c93dba030ee369b0f8f2afdbf56b8b6231719c15cb9b5d9d746515405af9030ff055a1eb17bd481a80f3bb985b55793384afd0432f914694ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd500c571af5c180e10cbcbdb805ed0
SHA15decb97fc2b58a9731394752300769e80dd539d5
SHA256fc59f01c5d09f0f8a17204ad789ea48f10218a653c8d1515141def88e7cd2917
SHA5126ab0253ada659d9479f534a5deef00797a44bf0bcdcf33bca670e5583aba379c78ce5ed1cc712d3ca2eb76d2eefc328c8c77dcb5896040fdf155aa7c49d2302a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b