Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
45aa596d172752a4a7eaa550f1a507bf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45aa596d172752a4a7eaa550f1a507bf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45aa596d172752a4a7eaa550f1a507bf_JaffaCakes118.html
-
Size
86KB
-
MD5
45aa596d172752a4a7eaa550f1a507bf
-
SHA1
616c457f8eb7b482f063e099ad374566598c12f1
-
SHA256
45a6fa0a47981bd238c37d9557fc1d7eb699fdf163371e9fab2589a0f3952b73
-
SHA512
7d5831aa42c2e67b8aebd8e05cf9125892198868a396c1e31c713746d54a67ed0df7fc48511f04f50d9f4db517ebef82f615b4c88578e8297c466e0852748213
-
SSDEEP
1536:X9OUo8vFRUvaoXcRGYFqEwLBuOdO1KSDXLnFn0MVxF65HHhgP9sGRR8LifpdYt7G:XoUoUUWqJoLt5xmc6E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427119238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000032337162d2c76247fe1bb05a66460bb9b1aa9435fda39d9c80c7b17509d28a24000000000e8000000002000020000000ac03239b95f342415cecb8f92a3a1b419d38b4ffe1d19d50215723c50fbce33020000000c6b8d3cc7e862ea5dcf91d0e3987c625a1f0173440647146fd79f3f56cbb34d740000000eb5f006f65886b36ad630c25f8b0817b5a0ff10ce087337fccbf31ba9ee9783f57b16c1b064381ec9f2ee0f10dbc7734d6ca8bf8985f4ac5e72ac1308909ceab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8058a609e3d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3364B721-41D6-11EF-BF59-526249468C57} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2672 1740 iexplore.exe 30 PID 1740 wrote to memory of 2672 1740 iexplore.exe 30 PID 1740 wrote to memory of 2672 1740 iexplore.exe 30 PID 1740 wrote to memory of 2672 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45aa596d172752a4a7eaa550f1a507bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ad18cd9c117793c0bb29e05ed3d22d
SHA10309b88bbd134185bc1cd38c5dfe4a232e4d0063
SHA256cb9e1c7b8baa0364cbd11b948eba552597e3854d99e48aaa0e235051f4a786f8
SHA512171279b241fc0935cb4e483ba3eef4c3c92d8aac54f57d6ca9b9d9c76ae4c5ddc88c6e591e9fc8fac60bc85433c891080da3c291717b520f69e4531b2382f580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555384a5f0f6e6ac5a78988df92c28896
SHA146e762639665b17b102fc30522a0b718817cbd11
SHA256e6aaddca08e36fa90ae53e177aa0515b0cb7921cc6a1676052d39d24ea1059ff
SHA512a9cbbc37c1306723e17c821f1a93b2fdeb65a9497fefac62346afdb340732ee3f071819782d58bb801264e6697e52d73c8674b2c2799e498fb70a3908fbc54fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230d16db5f71de2d9b1f0eeafd22bef2
SHA13fa9e6353670cde4785b36e45c0dcc913efbb74e
SHA256ea50c3f9779fd2382ec4f1907788fdffc26fdf59cabbd315a2f7cf25cf9d3ca3
SHA512c81db2663034b9eb9be9bf117dba0792a9b8a171fa3d2d03043a99faf1dc6a109e97f977a10c8bdeb2916a25662e2da1a053bedb99d3eacc937d094887b6424a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51101e73c6424c13c52238b1a0a20e489
SHA114636a95d123de032538825480024c2225bdc9a4
SHA25656c7601531880fc55c4a462ac418a1db60aee5ef3a3d7b7eae03a73e68aba84a
SHA512adcaf335bf67f51dd1bcc5f8cccf976825f988bcd053f0b207840e43e72fa9c6a9e765224fd9da399fcd60ea7a7ef3df07f247eae6c2c948c2a300c4bf9563d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498c9ada0107e0334af8f831f6085456
SHA16f93b1e725e823ffd82a9590f52b81cddfe32018
SHA2562a3e72b6dd86d562d85252d3d43c4b217f751acfd532850848366ab1b1a4b16b
SHA512d8ead745492dab6c425fda35737318263ea8bbfd32e6ac37d22f8175ed98a0564d4c41bbe7b1b8ad30e866860606287744a124a9f823238c79320c2fcd376b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec65fb3c4dacb2665a60a5f523d6c88
SHA1fb9e2ac74aa2a9a7f37dd879e7b06f8378a73c09
SHA256f7bc008d3e8a331ea30de18a1981841f92bbb22402f6bdb47a703d5b809b7e74
SHA5128eb4f67af12c21084dca46f48439c33ac084c4333df71c7187b60d65d3c91535f09f73a81e858eeeda8b87e79d6f1d35c3390c369f51b3fb858b28aa8f9cf93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c026b947e488f173a673ac48f034321
SHA12b8f5f790b9570b0cf129423ab026db03058686c
SHA256459016c9add348cfe6d747e84b5a3ee0b8fb2d4242e8f05c97b9c811d576d405
SHA512ec3f90af248f83a8999ea178b631f500bc4ef47da73958198164af3709b78370b5c508df5374c830781c4eab1dace119ca0ec642b0f1f8dbcf9070c453e6fe99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574afa6af015527b82ec6efd176f53439
SHA1499c52a60672ff984bdb550be716bda1f85544cd
SHA2568b41a287bd4b9a7e8dfad5eb9ee26c12aac96c4bd8c09edf8c638b4f6334ba26
SHA51200655d64fa65966590f8b11b0c8f72a84725ed98b178a21690597fc0ca4f0b77b52e783f8483065b4b39c2dc89cc3c1f386720dc8f46c5ecad53dc0dc3138fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b935f13dd1626fe6472be3179459d0a3
SHA12f5dec52cb4649924ba8d58316e7ca1fb36724f0
SHA256703ce1e74a20a0b57c50dbce011d17acc7184314d435245e9ea5b55c10587f6b
SHA512238eef9f70c41a9f4b8d144149e065ba56c58d8e7ce360a12a93088a4e8f48bd25ffaffff7b6e38e149be8624cb8edc91156ea9ef16577f423ea54a470cbc451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62371a19c50bf4d116f6440507fee9c
SHA169e1879f4bbf4c9c3daf0c0a1ce77017f4792def
SHA256def4c1f47fc04ca01bf92166d879336909e491b209e699733ac94c7f47085997
SHA5129a7b8985e40d50b9031baf2b6eeca0054f3b2aa033ccc2bb2da95e683854e32a860acb08c9718f81c9bbcbe5260fbfd356455c9bfb571d75812e38b2008c93ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57301eedb0224377bb47e785724298406
SHA1cd4a6f0b9cc1a21d75d9d24b28e6a1826716ee1a
SHA256e5c7bdd6af406bb889a0f6cd535ef0751fb15b4d9960abe374bc65fb4fd7af1b
SHA51298a069eca095becd99fce9c672c06b0d53d163568bdc55afc618e743f4e37636026f4f25f8e002f994993d536434a1a7af8f6bcc64c2d03cad468a01452997eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b917e2c64448b15f26519f1584dec121
SHA1b8e42f7956b61edd25cd32f99ff32a6deaca3826
SHA256c4c2c4740d23b83bba96c521a3b1cda062393eae0265a93b293f6db3bdbd8302
SHA512dbc665d5d596ccac2a6c1f9be8b3433f319c182731125f1957e5cf4896e651435c5d6c2f66691928083a78d5121adcdf4b114db1473a678881b0fc3244d5157f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b577dbbf672dde369d007dd5f7e78a
SHA1392e2606af6f9b854a807edc245e61e89d810638
SHA256dbb55b648a41094e481581ac56868f6957e3356183ef635e06963a1d8eb4b120
SHA5120f5a83c20cb1f88d7effbd3cb98dc280a7937cf79ab63a9e7b56d3ba9ecaccae0ae1d1eaa025543b7ba38e0396e01c5cab618ecb03216de3162643948f213a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569411e6ccb383e22d24a6af916503a1d
SHA189b58dd112cdb8b26e1e20d3b9ee31d340d6b6e0
SHA2565cb66f7744edcb7a2c81df5ab41a84105e46165a30c68de3b1ff9b69403786f9
SHA512d53fb1ca519834681631e26c7112f012181f6b67ce2bb5b17a80b3be44aa47b77f341727da88c88ab886617bb52c6423b6a940686e42abe23a1272337cc23eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6af18ea43748b2305b42f3b727dc66
SHA12116f9c74b991d7e4e485032ad41a94095ff8415
SHA256a650829fe8089e11f457721b81bde18927251e14f8363a939d800dedac3686c6
SHA512c876a8691e3e811795a43d29410a8f7127f1c8931ef509b28a664377ee195c1ea3de662ba8d5ef5f4e6cc4db11ea14ccb0cd4979a2d012db8ba4df3fb6586b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ff2e8ba400985d1b870d0e0091a034
SHA187d439564d52ce7c93e2d0ace492101ffb0d792c
SHA256de5e68c64a3246a8bf2a6ed1726bf077f90207324129c570c61bec4764fe953f
SHA512147178d6861ff4a00a39e70307d1e929e1d43951bb25e2f6344f6ca9e239fc51b49272d1ccda82e4630b8fc93908dfdf2f4ca8f9280953701755ee91f4a80b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e680f9bd79d25e9cb08462bf781e7ef
SHA1a5bff41b331fee826f61baecaefd03c3a9e84cee
SHA2569133cbfb88e71937f39c4104b62380f72023c48833b3e2a9532f7ffbb28a8597
SHA512d76a6f5388d7d2591dc15dda9dff33471ffcd09eefc6bce1e5bdf3a49f1c124f5fead64c74c86585c8b5580bb2372c64c08ba70b5ae0b47a41a215bf2b8c40e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580deda0bba84067ae259dee9f1bdc329
SHA17f7ee358250a69484545ff7d477761d7dedfe379
SHA256699cb8c8edde773a0d2627e0cb83acf05cf1ee37b6e7c61dbac128d0c99129d4
SHA512af6354e2782f3c23ba193a49e3add0ca9b4ea5373ee46b1a4f956aa6e3e3983a9743ee7dd76865a7f387a098868e6b4957924bfcd8ba022cba59a56c34d9ed91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7d017fa46ebe07611e44f15c72b776
SHA1c25963c9a0a3a50df763efeb464daed4db7a01d0
SHA256306326fce62b6a15e11316c5b1ab951cca3f0695a529eb157ae8071686938b41
SHA5122a9e9789a5bbc5dc1fd680936f9f9e7c27549ef6900084a3919fcf84eb05cec740f1b1ece6181fe6f2053479219e781528d3a81d61487ca12ea488647d5dc749
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b