Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
46a66a871193c4034590b8b87a6402b3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46a66a871193c4034590b8b87a6402b3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46a66a871193c4034590b8b87a6402b3_JaffaCakes118.html
-
Size
6KB
-
MD5
46a66a871193c4034590b8b87a6402b3
-
SHA1
8f041ff6c7150c071de1f7b3fdc6a51dad741d13
-
SHA256
2a768bfadff3f936cebc50fc5c0aa11e84c957793f213dd0c44a3bb2c7ae7e49
-
SHA512
773ceac24bd7582ce1c90d04388f4bbc84840f95cbf0f6b010802a1a1f8bb4371ab0da3f4fa8680c28efafe70145f44a95a3cd2a2e6f82eb76798a9192c4265c
-
SSDEEP
96:6yDgCxfy/qU6Y4tJ/r9DX9coP7cmGYShlSOcKxIyC9ZMBrXejHWgR/+wrmomL2qc:6yDguySYi9Dr79E/SOKyC9zjHWNw6Sx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC70C071-41FF-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000db83258faaa0dfef969c8b67ee59182b34b2824bfed0db4142d7d3d697d44109000000000e80000000020000200000005af031fc6eea1208b0e8e140616470d7ed6d3c0ded6cc0307b11abb4aadbba72200000001d3c284424278af1acdf7228a00d702561efe4851385af47f9cef09c2bcb1b50400000007c28ee700b28d36623ae23dc02f407ebc7ad531d933322c7f7fe06a4030732364ed5bed7bb2a0f8a4c2a2dbb774ee777aa9f692e90e602fad939607494411ef4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308d709a0cd6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427137105" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46a66a871193c4034590b8b87a6402b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0080be89c96ec84fa8614caba559ad
SHA169d91f4d47bc8a95c42841093e2c4ce27e81f454
SHA25680569faf6d571a700a450bbe0bdcb16e35ad58c8dd3a6c10fbe3a3cae0a28c0c
SHA5126e09998169bd8ce3b5ab5fb2ed33cdc430f86a776c928fbd68eb2b8b19418526137a53d8f6541988a97f47eb50dc387b8c6a17ada9098c4f9926f1cce7553c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f3a53d1d03472637d492afc1e73919
SHA1e25c966444f11f8083c60f9f2b39f910c4be620f
SHA256d73beadfda68c7a24fbf519f52f92cc1d841e5834368c9bdc73ecbc4c1789142
SHA5128cd4e4e6d22dc0170991d106f16d9bbe0a2b26e6866b378664b4c66d281dfb82df9cba70a3ca650686493a8bc981953592ae2d96fb1c9c74392575d80ddfaf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85fc730d5e6058d444ff2ffcd7f3eb2
SHA1ead20d43d27a176dfe712e70caa984e8ef1ee6b8
SHA256f335b379036e061ee5c1a241041e530fc279f8f1d6342a94bedf170ad349cf62
SHA51253bbee292d02a2c5288f151d57d05af19f287e7b95e0168f4d7418cf9bfc04e2c192e98e920376cc3374ff389ca7cc5e05909552b492a27db743a8e319977c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575fa363dff20fbdc27721fad643c4537
SHA14d68bae2448a204dfa256cae0990793541f7463c
SHA25623ce3fa5b383770ea51a0487456dc499e384205d9a75e020a6ced02b50cb46d2
SHA512edbabaf49394d38b5df6e6ba7bdc33c377012ae23332188ba6efb50063de2f2373e477c3863826f2ab6d7866293d4bb70559e9fa35d1812fbbd54e8f180bf401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59771c89d2abd09f728a2800b31f3c9e4
SHA12a6edbec6eaaa7c9acccf13de079d1424ef5b8ab
SHA256eb18c83da2ed3ef84a4925c7192f5af1db333cdd83fb0f0954c8929ec7716ac5
SHA5122ef477bbdf33165b16d1fee0d7771b4adcd54537693fc9892f04186168c58f15d3864de5883dbcab29c9d65d9848239cc32858d8700f278b795772f307b094c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4b8f4aa9b5618065e4767c4306855d
SHA1fbba67677860c48af4e7a87579d558b4643360f6
SHA2566aca5bb2a07c6223557db584cf74361e373a54ade8448e071c53fb5e13018d46
SHA5125fbae2c73965238afbf0be276d2354c349fe38bf592c18d72c48472a3b8bf431b1eaa320c461576d56c96e5f71964bb63ca99b45ad236ced3fcbfa6cd9367fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cfd8e97054e51eb1eeebc843a455fc
SHA1643a415a8c3804f6ba355fbe8dc2efeccdfcb614
SHA2566cb91a6a9e1dc44501a6adeac8872f7d36c3a52b7df87e20d7e1961766b75d6e
SHA51291954c56369d58211b56e96c9f55f3535e29e545edafa36b8cf6e89ec932cffc6097df2027258e796ba9e83ec24f81e52e26535d52f9f45234611cf243746052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3c4305f774fe2d9dbcf1de422b3a91
SHA15a62ffe2805efcb3fc858a03c27a8fe06a545dee
SHA2562389b1e5efe51234d80321376c56c8d014c3eb710debd20015f8b159b87591b8
SHA512cb0298a283dfd6a8171c15b6cd303c3acc849093021e5d5d3f7ae5685b39b258fac695af2a1c7091fc7d23b74a1495846e0e757d6ad9094e568ee2acf41a6a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb01e841fba7a86299c943ff93f63be8
SHA13d398f379a319e0615f09697751cb5cf63956475
SHA256bab0ce7cf1aafc8132ef3fb6aa2ea2360dcaaa4ca5ccae1d708385dbd051f841
SHA5125110a20a530ac8bf49a4be7207f7d4ed5088b7ea7419ee7a5182ae4c293308510a402fdfa5eec292a9a38605fa8188b70c0b857c4db1a006668f249c9576387d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019311f8ce53e9cf800c784fd8d38aca
SHA175aeb18769c168f5bfbe4c31d3418eb8cec654d5
SHA25656ba84c25e7036e9cc68ac341dd602a534ec73988d68cc6c195211b6decdcf79
SHA512f41d0cfc92fd92b1ab64c60e29cde6eae2cb86c006907ecb9cd906795224a84db994a5dc618e2c2019712b9f0a42018ec45ab02742c78ef110d0f485ea98d7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ac89747c4931fd1c818f3edaa0d27b
SHA1d502bbfc5d409e7a1a5f831fad4192e03b69adcc
SHA256b92d8eb8f872c14c7da0b1728834998677f3999458f3fd0b6015d45edc61666b
SHA51202783f232f219f59ab278989b3d8397767c4281a867c21356809bd4625c764faa2e4ec59a1454d46741c6ad6df35e3b9a8f54455e68ce8bb013cafce93dd77e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622cad12c9d3ffa507f6f66edba26d34
SHA1ae864e2e1c8a66cc153b0087ffbdb8bce1923145
SHA2566a2a524b24a05bcd979c1602421fd8b64aa9b0ea74f311f1699bb116857f8eb0
SHA5122e3ca663cbde72e778e90f01a502631e36a6f284d3734fc1adf39530bb5d39cae05160cd2da996a9a8744dd696b41bdb670b9907a7e0179c66fdc5f66375209e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd46fbefb342db44315fa61e65d82725
SHA18c0dbe8fae9515fea254ba316345c6a702cd2d06
SHA256780db51b3e243d46ff8ea855e04df26e31fbffcb03e6771b2417a56d1ec72c8a
SHA512382b60fc0d228f0913e7ee4203053b1b0f68b4bc10e52546cee2ea9fcf506e2856744b80744f60b182877fc726618d9d1fd36f71b1214ff9447bdd252707d8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfad2ac995b90ab4e9fb1494adf5661
SHA176d6a166e468835a254a837947dc51a5399a05f7
SHA256477dbac970c76f7f0d0199478ac43a7feea26d532d42b0bf6c6bbd8f4cce4498
SHA51278612839b3c8ea62ac880382a39ac241a2829b1c62ffb9611679de7a3529d33bf095786d0916385e84a271da8da4bc40780eeb2982b3d662190d365cedbace7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b77d41e2f76a6468545ad8e3b18842
SHA170e70e07c90f5f809dc60aa44d94c7abdf97fc64
SHA25665f17a8d3b3ab7fb0d2a2df6cacd66bed32eb5a1148c644d99101130faac05ef
SHA51224ec68c795bb4666f5121be474073995863b4b0d4568277eb3382f2f911a1d3a0f93fa1756158655b23fe3895d7e83a8e7fcda6d293b279f63bbd7f60c0789bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b429fb06ac27b21dec163fe347a4471
SHA1c4c6884cc90f631c9bf42e59d842f9408f84e212
SHA256c0da77f276466450b558295a76630cbdd12b495897a566a609383efe00189977
SHA5127ca47d783164f46640de55790f405da9b02de5806e710c1baf90078809b5ce14cb26408dc77a15fad81ec87865de47a4031e55defa0260ae94b5af721cc25d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b69473c300c864868d9acb6ec3a2603
SHA1b40bb3e0e8b8ed6135a655aecfd4b7575007e0e4
SHA25612a33efb221d2d76523b39ea5e10840d00f1ccd58996d5eb671ffd9d30b28738
SHA512c1650d67081635aac8ee0c233e7d6ff9973d5402717ff1bb19a2728a31af9bef3922c154ef890eb04f4718fc3a076b96aa2a2a58b9ab5c346c8f4f44a15e7374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799f0f97c7c82187e2d1be0e3a3759c4
SHA1a919e161145606939ff2066b246b9ffef66e9bff
SHA256ced68150bc09ec2b5246f55dc2806906460de4b6ea10faf505ef48e6047e4671
SHA5121f7b7ab320e4fce33f6493b5055a3f73bd714bdd7a53f0e2375b3f2545c4a85de58c7fe32df18a07e1b2df6c1e7b74f0b7ed0ab4623f255ab4cd2eb407e6d055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b3d5fba0774a0eb9f7d5294804d524
SHA1001a6bcf81916de154ddd5620b2d05fed10cf43b
SHA2560d3172394c2630ab2e0cf77b589a8185e52fbcdbcd6b171f80c610e0c9d5d8c5
SHA512ed08246a5d18e24b60a388d3957d05c5a2205b10be32c63c6fe7f4dfc4325407877d78f5c01079bc8a720a92593635463a90c175aea1585944e9dc0b9b6501bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b