Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
46a021d107749845de209fb6f6f20595_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46a021d107749845de209fb6f6f20595_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46a021d107749845de209fb6f6f20595_JaffaCakes118.html
-
Size
53KB
-
MD5
46a021d107749845de209fb6f6f20595
-
SHA1
4a1045f20c050f6628f0b5dd67787c8faabb86da
-
SHA256
2e85aefd191128d448fe40c4750f989abac3f7938deeb0fdb219bd55e4e69c0f
-
SHA512
d34309d67ef1204195efdc2cf647e1705934aa11a204c946c667cfcbe6145facc18a2c2b7e12c8ded6bdb16ebdfffd536803a9e9485de169e3c77f8702e566d2
-
SSDEEP
1536:CkgUiIakTqGivi+PyUIrunlY563Nj+q5VyvR0w2AzTICbbXoi/t9M/dNwIUEDmD2:CkgUiIakTqGivi+PyUIrunlY563Nj+qT
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000077a7add650b3c96e1023444c34ef18cbffe6a34ae3f3be3e38ddd3bcba635aeb000000000e8000000002000020000000ef28c1e784db5079345fe2cf7f9122c6034dc9d611372e2c06907aff79812ed720000000bfd9fca72ac160274caf7d467e409874b8b8e9aa230de21e3201dbced4bf0fca40000000d10db4a8ee4a3adf0eb1cb0d85baff9bc07c622f1cd774ff57dff1fbdaa593ae067e9ed0bdff9308ae3809064d52639b96adb1312b7e5a2a6e1cd0c0d33a1509 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09da47f0bd6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427136615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A85D4C41-41FE-11EF-80BD-DAEE53C76889} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2176 3028 iexplore.exe 30 PID 3028 wrote to memory of 2176 3028 iexplore.exe 30 PID 3028 wrote to memory of 2176 3028 iexplore.exe 30 PID 3028 wrote to memory of 2176 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46a021d107749845de209fb6f6f20595_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88757fd5147308cb48c5e9f40c64cf5
SHA19dd81fc15e25cb721fd13cda324a50a24f037747
SHA256abd4d2760452012dc1e5092f849cce2131ddd394d7fa8a583715f8c7a69b09b4
SHA51258150115d23ec9ea6722fd59d5fe395f22690edc3b54f30d82d4c77e865e3f6d8a0031f902c4042020ac7c34933a7546560690165ebb374b6184a0037f909a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b74ea2de1a0cef29c53c0785c52dcc
SHA1f6b5699c53df66d28f1bcd9f23a504f6d148c79f
SHA256de02daab13e503296384b4e6f92305a13e3e4a25bde52811c19da1bb26be0fbe
SHA512425313d71459394b80e698c228700ee58c6d9611e9c8ca92c26b7b812f680fa782be9ce7dc1defa6c53518f35316a6ef20fa8f03674a79e69b7de0a960117f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cc921d19f519386e6c6c3b8f48b622
SHA18f6625fa0733e70fa65234a1734ea0d0d9813711
SHA2562400f15aac97d6ec1cbfdda5c22f91f31db94c8334fb96dae4eebfe99d7a374f
SHA5128ccc01ac58db4a3bb8c4d564680bbd6096558d650e5c8ca588b9974dc7d676fea7ef0cb5e8d69cc3d8e6f1bf35c01fd50e80d2935326b84b3a96637e6c5d58da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b68920946877049c2ce5e8824c64ca8
SHA1d0f72ba014625a01e1ae7f3dc14aee002742e9ac
SHA256b5a812004ba773056d0a0b672df2d0a52f46de1112b455883a2f56396f2a68f8
SHA512fad9584383abfeb2f45af9efb5a2896902eb3cb016b23d5f2c4f8f0b8e6054cc8bcfedb958b10fdcfdfe7c2f48a5d5e18741077275659a66d47621e704ceb265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52faaeff36ebbb178e9f799179254a2d1
SHA14114f3f903f93442cb3c0406db70e9c35e1e95df
SHA256e1fe424058a113b95a631c18ef06204eead40eb9562776b9c7c3a38183d6b9e0
SHA51207fb956fa3666d98f903f13969f8671c347f10251b67e83f6dce76b6b1bd0930b49c92161a0d742aea7521c66d26b8fbec7d00e021fe8a1c15c841aa5904a88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b683d50ac329a00b561f1a5dd4edbf
SHA1f91ff70b652943a3d941d2a81dbc8c5fb6147be1
SHA2566e65a3e63e03ca1a0255f8d602d5c4be5c609aa0ac5696724f112be290f2dbe2
SHA512405a969e64b64c48ca918bc757deef95344212740d3b77cc0db116995e653330f4d9829f6b83ecaf8d6cbfd8ea6e2e3ccb3f4c58d37c4ab90623fc0d8ba77603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582aacb79f2e4d3d6a883d629424bd881
SHA10317381c0cab931b1dbd55ca655399f28ccdbabd
SHA2568564d3ebc46b82184bcd2b25ed6fb9bfb8c979d4cee094e32cf21280a61ee9e2
SHA512edabf7ad192f9437b8e6e8c0c6dd2ccbbdd0a5389daaee451a01edc185f65a1627331b82d2b6e0dbc23d5fc980af67cb60a7f533db49a49498dc47f3431f71c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbbd6b748398c1a6475fbb94dbf15672
SHA1e2a1d482a216228ae680cd28d8619facb459d6dc
SHA256405e9cca3dc8256cedeefe04689456719aa74e01e4bb70f5ba68fa6ae2d75f97
SHA512e38882e77e3bae671120fc7d8a9eac5742b6231fa6568a25c13dde70d47edc7fb829f8c6d79f6c7a09d63d6129d5a75df67ada56d7b6162fe39dcd1d4e1b3d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3185e7df91b77590cc95c0e81f0134d
SHA1df4d7552faeb3e83a420be45a2b735d838c23ae3
SHA256390300f03015c43a1249e73a99b3939bd56e4ea179c899ef27be24cf1d660b97
SHA512fa2364c01fd7cf50862866afd2083d21fa8e8f2c64e0944523cdd3196c7f5613c6014aaaa3a61e79a538b6d5b69c06d7bf5d94c6386db8aeea96229fc28b5c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfc04598b7f02dc671b2612b2f6b964
SHA19c5558f8635251dabd8dd7539dd8295608b8a218
SHA256596f7da6f08511e8c7535981fd1f32b52a206f12729e47a02a38dbe2842b7fab
SHA5120236d6f4c7268653d3ff7a05a108cb8c95476b11cf9290fd560d3988a7e79a388a07864a39e8b7fcc4d24512170cc2eceeeeecab7206cb1a4ddbc05abf4f9f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403a28efd66c5a65be8dd845b777d861
SHA19a5979cd1b81ede8a5373a0cd8dc896eb02283e2
SHA2561f8e4a826f421a9d36a799c9ae1be2a39aca3a408e74204bf0dc2fdd878def50
SHA512bdad44e9b70cd1dbce5980e1b032e0818a4eb72e19c7bc1e28916f820cf762006a05a1adf0cd55ea3c0b105f4887fd0ae345665d77a09e56c0b64774ab1a7d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cd3e989cbbe710631b32e3e8cedd7a
SHA13e7d1de2a943516fa96e47d63a17f43edfbb380a
SHA2563e9aa6c7bd2f7d87191fb78c67470ddf53569747e161416399242d3efe227fec
SHA51236652363b083e7a98ca5662e3ea176d7294ba6e68350c71ae5bf413981c909bbe52ec5a36d822906ff505e1f5c02c1ad418ef42d1c12412c60adec2bf2644dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9af16d9b4a5c0e140e7c5351da0ef5e
SHA17550bbd2e6e9ba52938c793c7422af244b79d1a8
SHA2563238666f226357db0c79e65059f7b92b4f0f54c84a3ebdd2e31f3951663f28ec
SHA512c2477c7d22436c50fef8418c4f2c89c036367cddf722cd6ff86bbdd2868a7dd57877c8afa4855454718038bc7f37b4f64a74ed63258599bfb264a608fdefc945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d3d8fcbb6337b684106998b56a0ef3
SHA13c21b0793bfee55f013ca0e59d5af73ba00fac3e
SHA256a8b948029251d931b632d1c7db83f1e47faed4d0bb3a0562e51eda266f66420d
SHA5120781ba59cf9ad76e00cbc2f5937cb6d6447e4530e40e9825392c4dcec11eb245d46db1c0b23c44ee7e9994cda84b024a329076c034375f8a85ce4713a6dab0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56814378bb8f7d272e49926790c8134e7
SHA111b010b8ca77a2b8a3041808e87f17a321febfd0
SHA2568a5cac70841c8a88115cf5066a2ae47c976dce22ca5adb6a5462123fb231591b
SHA512fe6cc1211c766291b699d024f18743c45edbc987f299ddeea0f4ab09b70f4a5b67c22152fbd73c30a8bd5438a34d4b9b72a21cc0bcb3140f60524e8bef9daea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b244dd9f714cf4169572ec253789259
SHA1366e9212a18aae3a05e73ba9acd61d301d860dd4
SHA25661aca596e2e01a2057c8f8d77e30816f4d985d858b5975386206be6b2ee014f4
SHA5122c0ea3ffec6ff4d6bfd323a86f3ee71cb51f8f2654e763b9b3200a30ebea6bde97c9c81708380406387385b8c5c29274c9bcd3a6bc8469cca571681c61b7eece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdd557e24cf2bc6b99e751e859e6adb
SHA157d16fa8a45deb66ef4681e0d7799a1a19c3e606
SHA256b3b2925730cae8a32686fde4a991261965b04f5338cefa3b3c8185b049ce44be
SHA512c072c9590cc85cbd13f3ac9732e37c73aedb774e84259997edd817d044ae00fb037ca097232f1be82bec1fd68891a06f54bf4feb6b862e1bf7c9cc0630b2fda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d82d1271de54f77e5a4cac400387f3d
SHA1eafa8b4f9d7125bb65f26ddb0e2cf2ee1b3edeed
SHA256f409f3799a21047ca94632bf17a44853f02dac386d453914aeb15b3fcc9c628e
SHA5129a1da5f8af55640d2fa693c7c21c51854af1cfb9b740234c4c20ad70af4e4019a14c3f0f5086492b2e4d6cd6313c9a034cdeb3e930ff61d08eab3fa2d126a100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d43b4940a4bb7f982657c969c55cbc
SHA1d2846d6301ad80baba535b6dbce5fe709b74d14c
SHA2568f5409101136aab85ad4299a4c436fef232c0453805d1a56866cca23ae1a970b
SHA5127ccf8b4d0f1eacd5dc992b63c22d9196a8fce9626cf96fac993d7603aee10b0b29357f6185fdb4b0733b27f118affb42a9313485689964bb6683f779da2385a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b