Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
3f78ea80c7693343011c6544d9c23180_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f78ea80c7693343011c6544d9c23180_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f78ea80c7693343011c6544d9c23180_JaffaCakes118.html
-
Size
8KB
-
MD5
3f78ea80c7693343011c6544d9c23180
-
SHA1
edc3be09dd198a962bf5e7373032118e03e44d72
-
SHA256
0d25f404ce01906be04022120f3a610ccd7c38dfced9f43ce7225b0f8387d05d
-
SHA512
9fa06f850ed58a473506cbd57973db1769686acb6e47ff09cce2a9d3996ae78efc28e06bbfc5f189f8111484486b9062e0cf7609d9bd5b53f46d9fb7dddb2135
-
SSDEEP
192:FfPDZYDoLaBSepoyTSLORBZI/DhMyS/04ai49x+Si49x+KlOtutYm:FjemH4yh5jxHxVkuOm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426991942" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000147b8d2946d8af9f8253bb99052821d9932073c7f541f0cf0b0e7de8006b6cb3000000000e80000000020000200000002c6f41b9fdc66cbc696caaff11a00f0c35ae69376797709e589c296e275a621920000000dd1be76882df9fc749bf985ef205cd0b5e14e7716edfb8933fa5f96da78d07ef40000000c7db8005bb8386cf4b04a0f0477c17c8265ca3b5b9be008644018a37842a52d87c2ade4c7aeae947dacf2fc952dfc8a14034ddf025e1fdfa75d326de002d379e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D081F381-40AD-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09aa9bfbad4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30 PID 2496 wrote to memory of 3032 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f78ea80c7693343011c6544d9c23180_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214a28487d7a6a1a0bcf49ffba73feb2
SHA1ca94ddf038e411e21b27884d0bfc314c2e37a618
SHA2567c16523038d928594f2b590857ebe398f22bddc23b6f49f2be2420d9aabb12c3
SHA5125cda5aa8369f095825a5a5a6f49c899a539d99d0cfd18e4a0ee1d3808fae58d6378d3e3ab89140ff675742dd23ab552095d1416408926ccd8c6c8cf36745797c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545111d4cf43af07e78d41741e95d44f7
SHA19c80f78a264f43c0bebc6fef3251bfda63fd6711
SHA256a3389a051ebf58ddfff34504108f2a71b5d12e102fce508b647b1a56e2cc9986
SHA512c78fd19863eff2cdb617486c9f682466f7725025c00f2d6f437ed93d0635998fbf39ab4893c9cf9d6c1e27b37ffdeee1a7856d28332bca269e6c02bf3fd6e07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a3e4a8cc4791daff7252d50b6e0151
SHA105e0770fb7d14e5171876a21207b739b6db6b03c
SHA256fc1ac9692eefb462613ba03a7ccc90f60094586e81f94b1ff4df9edb3559c79e
SHA512158aac0da78650aa164fb7889e05ff1424e7d45941d66a81adcfc2b8503b77f3ac920ae536f763e85a82868ff15884816c6d6a2c7f343992f0097c417ddf51a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bdfbda5705fba4c3a1e5fd4d9a3bf9
SHA1d21e951dfd5bf1a1f48df71442b79477ef37833a
SHA256800cc09f3dee0b4bb02aa3d9d9ccba8ddc8e5d02880a8275273d54681ba91718
SHA512dccbe24d8847add1e441a009699223260010cb87224f1915c3d74861c0c5ba61cd5e62e41d20337c99a6632008be6a2c93063a424dc2335b1c3f3bc243a8cdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a157bc984de89ce1aeb3266369aa376
SHA1eafe1a5fcdc51b6bd5566ab0f480805b3b5977db
SHA256d93e1bdae6d6a4e0e70762cf94208f9ce89f379be4fc38aca99002de83d60bff
SHA512929f480a32751164224100a14b70dbbab38417e01f05fbb27c631b8069c648b8b7de3336095726503c29dddb8ecfa917ccb699cf138262a6e3cd07dcd18507b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8a0ea1fb65c6650055e212358d1f43
SHA1a0b75a1dc97f8562519b3fcb3338b553a938a999
SHA25644cb9727a3b588b3ffa4aa0371332cbdc041c473446005266c3d4cea583a6a96
SHA512e05dac39cacb06d49d4ea38dd8956aacc99eee660af684cadada105131a0011ad1642a024558e92f76be1adef470e3e2c72b9b2fea4c5ea35e57d49f1d241cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc229bd8145986d9aa134c111ce9fb2
SHA15bdf3980a61d875fd6cddba562d1f59fc36eb55b
SHA256f341154e8962446e69af6cdd846c5aafc6d52af9caa834ef632f382c71755ab3
SHA5123ed374b284054882b3538dcb29406f60c5024b101a1eb4561422d7db982b232afaa29c5d0ae1d13425a64ddaae0774256d0a996b0c9ab28d88d14a83ca0f48bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bf7fea2a6988b20f7dfe319abf581c
SHA1daf9278204501ac21f4fc1f1a28a362bf9a83de6
SHA2564bb31bf75260c5ef3f82054adcd05f723c7f3fe102d230e0a758a301a0a0009f
SHA5124281d07844807d38915e29b569ef560876796f9941b08ee7604eadd8645729ee0a2853fd28446c9892d501cad21998d501401f25c892ff89add79a50b2e4198e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5cab40f8223218fe2f215814a129ed4
SHA14b7746f5f7d0766dcfa923177c23389baf883522
SHA256a7b2eff4569825f4a357272bf074b09e28cbaf65472ea6109377f7fc94e18fa4
SHA512bff3a30364b35ca4833ef8fc1363079eab5932484462a457431e6c97bdf34092e4fe1fc54498257fe33a8c9acf2d242406bd79648c891d29b57b68140b1881b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d68a3712cc6a3ff63d51ff4b13d5bba
SHA145b31176eb8c28874dc6aaf5373722a25a67af45
SHA25698e1310f8516146d2e2a5a3e329fb344bcd4b3b6a1f2007a54a80d8c83fec9af
SHA5120a10867ae982b8cb7717c1a48f00af118e65ca0e8dd0d5379e1920c5e7934b3a7354db41369e687da225eb83beb4dda17aa4ed313e6576f9ccffaad329d05407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fd14e535ef2c753b5523c2198e53c1
SHA1029f38f938cd8a9a8bb8598a476a5d8c526d7b2a
SHA2560b189fc17e42c4f63ebbdde957172b3a0d15b1d74504f2e7ea2bf1a4ba9ac4f9
SHA5121d01f0337bf4ec45d55f691e170ad67c1b28e7e907398fca1828844a8aa315b674a09b7054c793e249a04d6984242be2d2023555865c857a873f561b639173c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f01abb2211344590cf92ab1a527a41
SHA1a1db62015c9cca304de883a293451108a6cd4193
SHA256a21122bf0a840b067c2bd7d8ae1a61825b233f8aa41881db5197508f06da95f8
SHA5129a54bba57c66846062c832357d6a42d3f8a565bacac40c6ea8e18a28d6c37915447c8adda5f43ac29de87fc1c803c7d64037758c459dfa8ced3abe5cf01bd037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56749b1de09eac73d144b91d0fb413254
SHA1cf858e872844a028db2b56a7b030916653abed1c
SHA2568d0877352a08e62a242cf7a9cfd4cb7bce712a8ba7df5c91cbe786d869c0f10b
SHA51277d783be397c143ac93fb4d509c31a47a2327058c158310f1db7df972917e66733debb4bfa0f757b57d5989d7f81a62ff2f9b1e4e7764eccb0f1f22dae020cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b24e6f325933098487ed18976766c4
SHA15495efc5cf5408a41823410c00050b9586b5cb59
SHA256790d3a09182e27f26013bb60e831ca1be183d9242bc7de6252fe93fde760eab4
SHA51274de806024205e3229e37621d0b9a8d60686cfbaf4ac6214831b604b39ce2c675cea041cf9c40cb8513eb5206c318938dc5332f73972996d7935c0a8dcf6d4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d2df61b18c51b44cf9ca951e53776a
SHA12301c5c9091fd53bf7bf1379a8066a0b8b841c55
SHA2560cafde081a921fd728cb1b7bf977fc0695911ada68be46d344d0afb0fb4218d0
SHA512c965959ccc5a1807e9252139883108954e018bce0fc827fb3818c8635807fb9834a5957f5ec3788e5ef33846365a1f8748d4ad2c9f89179f4af238edcbd265b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6e3d383598964b376ed65f5edc6484
SHA134057f8d25a5caf539841415becab1ebe5f8f0d2
SHA256947b8736cf32a415c3e289ee9d98a2f743cddc16d6c28132917d7fe7414107c7
SHA512e2e038897abd12e62b570ef36adc6cc484934c944a9d7b0ce02b65dcb7d7161bee6a25bd1297723e9c737011336a89edf26c8ba5e9de51c9953c448bcbde16eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5a582f41a835d1cbe3af65285fc487
SHA1dc39def46f77fcc847c9243e77d6a07b97a1cc2d
SHA256977f2e9a1ecd82379ea644f6f7cebc1805c05adb9d5a5abf627a52e82bf00de8
SHA512608da1532bcf946ed8d9e4fd343b6dce3eb06eb40ec8c7af0a61c3f5bb459a3d6a3531674dd19cb153afbd690ded99d4ed963728d3ea6db775af63dac166a02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50915a9f739ab029b16ae05f5ded62af0
SHA1b6469567f1cc2a8dbde7480a5e72abf5e1a09b62
SHA2567a8d116d135f687bcbf41314e145092788bd278904be01e6d07b0240b7695034
SHA512eb314fde3572694372e40d543ec1cee21278c9e76ff09938f135538ce18c4cef6456bf801a3fe456a00586381bb73cc54a393453dd26d599dcac3b903764cc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fd8096d94e0039556c7bc7bcbdc139
SHA15877c82b795eb5111f8172f5fbd6555efa5598c5
SHA2562ea8eb942c861acb25bc2561bc31b895f63f01dfa0259582b2d52ac915d45dbf
SHA512f598f0de792140d6a24eab30a9570de7e330571fef1baec4da4503b2d46ca2c69a0fd0947c3dd30e3e47c13d95836589fb1bb0cad6c4af9ac7a166eceac497c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\f[1].txt
Filesize40KB
MD515862f8a01faadd216ca966911e5754d
SHA1aa280e3492ae1da4502a1b8113d11ffc0e84243b
SHA2566e712b517b9813dbcd6e62ddc5daf9304ff53c83af4e7bc60d5f56e238bc7fd2
SHA51267b0e4637148c72185b37123fe99360bbd8a11c5c6be61f68e416a82315a69b04c44ad88a90b6fce77e6f7a1d311b11a4d405d98ebac9e596ccf01c025b06a14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b