Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
463a4ee8242db8f4eaf73124814790a6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
463a4ee8242db8f4eaf73124814790a6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
463a4ee8242db8f4eaf73124814790a6_JaffaCakes118.html
-
Size
1KB
-
MD5
463a4ee8242db8f4eaf73124814790a6
-
SHA1
46c247652f572e1da59ce11b26ce449daf7e6620
-
SHA256
d6b5db8daec46bb18a9c27ab17a225ef83c425cdfae41ce77351788fd537e8e9
-
SHA512
1d74d801e57ab140774599d5aed1233245de2f6fae6f68aa675bae27e7950a8a3ff9b2ad919a92416754e4430920a97f0f4112f1d6db49dbc5388a6a79ae2b63
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF08FB41-41ED-11EF-B161-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427129459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000e7ab99cdcba51c1dc70e368a6162bfec2f786b4aa448922521cdc4750b745d1e000000000e8000000002000020000000bc6502a6644aefad574ca751abb83295350139659b471c1cb758c599219563f220000000928c4492e82c2f03c310fc3dd833adf842f8f4208b44131a0d5018f1caabec86400000009914748d774004d22d4ecf290ed568739f20bf70ae5822e70ef699f74b7b84a67cd5e8c3e9c28b5b767a5dfe0d56a2528168db88a874ad58c2f72ce3abcc7450 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0003ead3fad5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2828 3056 iexplore.exe 30 PID 3056 wrote to memory of 2828 3056 iexplore.exe 30 PID 3056 wrote to memory of 2828 3056 iexplore.exe 30 PID 3056 wrote to memory of 2828 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\463a4ee8242db8f4eaf73124814790a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535a23b3593760bb9b41a0405685e6838
SHA1c6576872b7c7f566b59f45f6546be1d4b7d70f18
SHA256c2d9d4b68b88feab54f7c91e7478b2c68f25f726e3909e58e271d7d84216a0c6
SHA512b72bb4408104c9563c26499797fa7d63fff5c2dbbf5de47bf70adab971d60f539e045973630e6a99e986343fca95274af9ec806d02a21b8414165e7ac7b08d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a90681720db2e00a38dd59639ffee59
SHA174beea4320a55b56cf52b49f40d4b353ad234cf4
SHA25680098951d80c2d6daf90bcfcfd60c2d6efad99adb867cdef5798bf046f03f6bf
SHA5121789f36aeef604aba9d0ce7d5518114e9b8d8d13c6055479502ebc8c83b6df9793f0d000d7bf49056a0a9684c154d3a4b430be87eccc6020d16d7972c1d49429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50df809f72be52a448cf5fe38a6e743e3
SHA1dd432cf6f8d6b3c69c1905203c5b027f431d4abc
SHA256340adab8c1391fd6128c63349af1d621ccc967b6958217b6c1dee213d102c30e
SHA512d3db45da8c2f9213107744fd4d78c7066e6a3b44200bec2f0a50f2cdbff56eacb9a809331adfcc7980c69c36b6eebb3f1e22e66360fc147713c9353180f7df91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc46f2c9bcef7904d37f7695017e441f
SHA1b89da3621b3d5c1ccd479b7076c886c0b24cd780
SHA256bb9f36a8754dc5f684b0ccd7fa727faac550198ade8229a6f1de75298f584cb2
SHA512d26fa5849e4ab0d784333ab0df8ab421df703a347491b8d55206e304097a4ee6639a4c862f67563368af635202dbf6106966b01f40ec6d4b2870bd254d57798e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eaf5ef2149713f646cc3a442ffd496f6
SHA1739a96065ca7101cbbca37999d36e8e8d56470aa
SHA2568a63a17b38a42cae3e3bb09c791b1e0984b5b531cb95aaffe8efb42dfe11f964
SHA5128c3abba7771ad6a4cb8bac01fd2cc6f2f68690fe36f0730429d34a97aaee95c01b3f7104cfed67e6954ae83d3f545dd8211668767bd3473ad70bc584e3e5acd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5695435b8ee85f214b47e10eb49f22f34
SHA15ba64a18974e28c3ee54972b1776812a8dd93078
SHA256fbbb6bd18c29d9b99e375e85fa8dfd671dcc91a3f5f47328e3262a0e6803a8b6
SHA51204bc1218547bb133c4032d28cf0a4b92df6014948181765985d56ad031b1c26610f186dd49c1cf75e05e062228222467e490a27adf8bdd0451af3298c975e0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e311f3ea018001a8cb15beb66ba625e
SHA1534f4e3a7247d835d2233fb6a9db13827d5cf48b
SHA2562ad7450a986237a1a016b68e9f07b74995cc3498aa729670b0e963be760c3bf6
SHA51240ba950f8d00f947ec692d2eee2794a3c100f055d8ae4c2bf16fdae708cfd5dcb9773a3a97607c8b4334702852bf88ea96475e619f8acbeb2be2c09ddd90aa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fcab792c63d9c14765e934c37fde502
SHA1bd580ba864ce6e5601d28d7dd532b14f042b4350
SHA256b09e55ade6cf0c7e7a89fadd0a2b331f7f20e977ea6708206c29f3d6ce233212
SHA512dfa7de968c3f65d6b1357558b577b3ee60d690a2a6572eb83b00eca27a3c268e875298e118e3cb3e7c887b3a4200c41520d267c174fbc19210cd10f1d4ba6211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f0c17feda5453caf3f8efa3b930ee0c
SHA1bb44d78897c7653bf65895e3c48867d9cd799250
SHA256a26f9e9750ada55b70c2207a56ec422722d5a12dde896b56a0de02e0d5289e6e
SHA512a3c693d9863da6de00b7519d96ffe7edc60fcbae29099fc93acbf61419bf90de72ae86cdfe266a2d4949b1dbc8da46d5b98f474cdde9e663d5d02ff2ebdd270b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591d3bd65fbc6c5768142f09b1511d53a
SHA125e3a2be4c5c20e916b1e761e45b47b3bc81a59e
SHA2565b9350a33b2e71e1747c0fee226a00732be228e3b7760bf8478b4eaeffcbf558
SHA51294b329574d1613e177ecaf9043231b9f92e3b2e6a4e9c2a3e063c11416034fdf6b571ca75214e3fdd7e57dd15d72ce4f6d24f82fdda408d5849e97ffc92a13fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a33846e12d0558bff5da858a5c15f2b0
SHA1495d71e07fd6701473bb932f811ea1d2d659903e
SHA2567858818e30157afae7e93d40efda558b0e8767cb63007a6361a4f7aacfdd822e
SHA512b56f7006ed34ff9e8907981a18dc9a942d339777ed0af3334381f8a72769c3d86db18fcfdd4e85430d5c37f779595412d098b82ecc711da940246039211b34e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543142c680addc13c8d0dcecbf7c295ae
SHA171f228b1d7e5077e483537c0f83d29d6e9e866e0
SHA25607eff1cc24749d571e2944e7465975df560ab0c51f4386da3406fc981c7315ca
SHA512b5ed89e0a35a768087d310cbb504755921250a6c8828822c1a8a6a52ae7aa6870be46dd2d00fae3890eb46aaa167888009bc42ef6ffdc5407d0f921532eb9801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bd31989f7567545b3c7f38302733783
SHA1006676ab5f7ef3787c016b6d09b34eb06107be82
SHA2560da2ee29bfc7ad10bac31345209f892bcc367976a662eba2190de1218d892372
SHA5124f4a67c5932a149aa2807591a4d3d2d525fdc7c2803e55a66c9e09b5a9e326a419b6bdcb2060fd731cd95eb4057099ccb03b711d095e11afff205bcb7b8237b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54346c8d3a918b85ffd0ae040ba98c44c
SHA1905455d9292c870e80626e6106a8e1d37d516f18
SHA256c7ba9809315d3098e798017deddcf52df711d81193e9d802932e32d5fb6e3843
SHA512abdc7e459929ba84dd8e193fa437711dcf0e7e221054765bdfb3208a27603df7bf2d3159f3c2d9997d14abe140cd4ade24ea5a38ec79f100624676e0dadc21e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582732cfcfbcee0aa1459101b0d58fc57
SHA1a6fc2214841a02477fb24e22c760840fe1965ce0
SHA2569255699fdfbf824ed84a04553d7c9aea46190a77eda74fc8e3a113d36dd0a883
SHA512612c0ff99b6d927761c9bddeb5927bb4a81580eaf45f90cdee89806297a0ecfb1da93a9ae502af96f77ac720e6a3e38eda949480083bd86ec7c31accdda89a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5903c62ea589d70b6a54612f483f8a572
SHA17376475061255e193eb490513693f002beb45e0c
SHA2560676780e5c8aacab6fcb5330dbd240c29997a082f12d0ed0de33fe07f7cbd123
SHA5126743df6da57044383520396ccb0f3de105c67d8648a4f30285b37ccd77401684979f6d2891bce435083e775c277c82364a23a4cd2d60b2a3e2327390f6a5c71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505d963258b13c11041ceb4d325778070
SHA17924fdb5ff11514b7227c6e925e7cb31f1d0be53
SHA256bff06ee46c19d0732d4f49a7a75928ca239f4e6e6ee84f8a4433f27b9e4695a2
SHA512b69d99390a2386b32ca94b55b2c2738efd6ffaadf2181b736a43262bdd6a49e4c4a8c56d6a282d4af97b0bdb4966d59580a28c25cf695101f7c57115fa09b614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d12d07a67de76ee971168f3709e7d62
SHA1a010c1370285d9f0fec08805f1345c57a2313739
SHA2561dfa795c4ea7fa428cfb42717f39bdbf1f5e2bf2fce2169e427f5c934b66767c
SHA512323d825a1cc8d910e7953d50f048c4d509ff3c6f28155c5582cbfa6001db49378c0610cd50cf25cf00798a4ec40af33632967987ef63e58e003a7a53c357e93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e37bb2445de9091dd0196d96e3a09c8c
SHA191372931c479ce7e8c4a90b8582c33aac6dc171a
SHA25690f87b58fbc79b9b600358cdef446a64c57db521800627c59dd95d04855b08c2
SHA51253434a2782e7b1354663bf7caedf91d43e80ec0ccb61ad5d14ebd93e4c0c04df99dbe65d94e394f041b52b19bc46665e1542850ddd80738f65682394f0674418
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b