Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
46fed3420b6a8e4d0a29aa6544e58ed9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46fed3420b6a8e4d0a29aa6544e58ed9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46fed3420b6a8e4d0a29aa6544e58ed9_JaffaCakes118.html
-
Size
20KB
-
MD5
46fed3420b6a8e4d0a29aa6544e58ed9
-
SHA1
fc723aa1db9017e610371da47a29bb882b843c7e
-
SHA256
2f0f29f05c8273855aa46f194e8ee803040aa5cbe3edcb20bd1971451ad91a44
-
SHA512
3a3dab65225b79a9606fa67bf132d59d8b562f5913f3c84666fd7695db6571df4d4eb7eadc8a99aec7f47f030b6695b7da13defee76c637173d83e26786fc0a2
-
SSDEEP
384:rdlrI/xtNFCy7VSM3uDDTeMn/fMWc9GmW7Q91TAyIqp0cYAeGj8:5lQxtHtxGDDTTnMWc9rW7Q91TAyIqOcW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504c75931bd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B748F551-420E-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000bc08c7ce72564f4d12357fbe9f2225a442a01938f191a7c1cc87c9de11d2a5e0000000000e80000000020000200000002bad8d6955b471cfcbdeee189a660c11e62e107e58cb4508a46e0daa346b1f7320000000402997937076eaf76508e490c092108c123af4270817a77350b0e91b80332171400000000486177771d3993ef8538ae58f01e6bb43bf19c9b7efcb0f2f3248a2d687d96e13d944c97f5bd22beb35b08990831fba83df52c3b30666b5f80f95c95e4f4ca7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427143513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2308 2328 iexplore.exe 31 PID 2328 wrote to memory of 2308 2328 iexplore.exe 31 PID 2328 wrote to memory of 2308 2328 iexplore.exe 31 PID 2328 wrote to memory of 2308 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46fed3420b6a8e4d0a29aa6544e58ed9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e445531bba31bfed7a4bc375480985
SHA1b4980f5094246515b369cc5260f9e38cd4a7f174
SHA25688605a0220e56e77ed92657e58cc800248ffe371a48545d5efbd84a9cf0bce7f
SHA512006e38298c157b7fae5c5001afe63e7fe260ee0040f7f66238b9f20a9d8277b96a3dbc0fee5711700fba6836fa96ad9c6eef06b2bb06e52d70fbbc7676f31799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56145ebbb0710fdb1521bf294d092820c
SHA1563fca64ec0030e688b710cdf186e4c887cc69d5
SHA2567dd7a56a76c538803d11680b38439c984d98a567449535318336edb52b169b82
SHA5128e78c3f65969f9cb48309d59e4b71963a5b9555418f06f96c74446cba6a8037a6b5b9b5640977177b97bac6c0bdb9fcbf0f5ec31557eddd25b7aee622b5dda9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d17bfe4c3c5ab0ee565b8c69b5ee8a9
SHA105f1d3718043f15022d419035a9cbe051508e4a3
SHA2569ba49088338ae57702545ce48ff5e48c38caae509509f77c84d6ba6084719de6
SHA512093d5d7d2b8e698be90edd16879ee7b8c69eee512aa0bf3b534a41e33bbc67a619426532792286c85c93a548acbd1e488e75e6403972a6ee029ad9a442a0f58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4db21079ae1a2cdfbc227c30dca95ad
SHA15298f55996d64232285292cdcd53a8fd4a2d84e2
SHA256dba240139332d58e7f48925504a9437a291b63bc0410cf3c1477161a2c4a5d9d
SHA51255ce32fef5b82c35527879a559aaa81f98acdfbd1a82b69aba54b03b3e990f03ceda9c90f952f23ccf98d53a9d97ddc7fecee402c70f6c94cf74af31a8d4a9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d0d4967ea3e6324cb7d511451092d9
SHA1296b1db748e3d8f240ae4ac5fe4fc723e2d9300f
SHA25656cce3a350ce7571f46bbdb65c4b01c52956027575c8217bbb3a4ad6295c8ce8
SHA512db90c9e6bd461d8973bc7d5063a9782a51ff681bcc78ca34d57679298ef8bf1d346069dafa82c1cb95a4233d3d9d9797fb7d2aea452f86bdc9d9238ead787a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404e7eea54db36128dba1c702ab0680c
SHA12636ba9c3d6c723e8f2e3eed8ad8d1169fda9c81
SHA256ad3d5a9e91ff9a54f4f9e8d2f3fcf3b50db23296270b118480fc9d84aebb995c
SHA51206acfbc6380ed9bdc446b935903d241e438274bcee800f56e694e7f556fd39be488c240c1c7646cdbc8c1aed44eab8eb4bae477d7fbb72d3239ba104dbb76c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57031528bb4e7fbc579cf353fd3205c
SHA10d03ba960dd4a380f4d00efe1cf620a90e64cdea
SHA25631ed265b655b2f1d1cd6d7aa3d0fa5fd28fa5e63d842636a6ce854b3319a2c09
SHA5128dbce8ee7165aa01834adcd070aabff28c370707cf1b6978f548a1bdfdeed4519d7587cc510bf32b8a4116ee8d7057931bf72652aee26567b1ba96b8d4ee6179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab48ac7307fb3d2a34b5a1c07a2e05be
SHA1e96715616300c314c4db6ff1406390a64977fc11
SHA25630fd1f2c9aa2eef78116c84a64439ef4be6f15d12268a571ea5b82a05dc6d1c4
SHA51232ab243438046d27a7a12033f41b081c2033ae6ed110e9de56e76c0249b6fd3d85b82ab3002a09debc8063ce63ce8ac89de4b0ffd6ffd25ff23aa288bfeb3e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c56b71428f8d709f99a2ccbae41dd5e
SHA185c96ee924ab2a05167c02055c244b319c854401
SHA256a79903df4fb68d427c150c9b7a1a58d5e1d7bf4a1f62499d50d6e2a9c2c1a9fa
SHA512b13c4dcd2812b93ed1d4f4c447f572b789207f1c2975c81764a55da5a56fb5d4eaa21f2172a0506da58ea3ae87b6304d3204f2848fcc3a99aab76df6bf78c0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59baa7b193c058e4c87b8730bd2fd973d
SHA15a9af7ab352737d84ffb6d0854d2f777c24caabf
SHA2565d234b95f0eb668c08fb84472854829f788d5a212dfa647dc88388993581ef62
SHA51222d6ad55134414238bda2d71ec0f5e7ce24243c90e9f431a8dc265b2099293b4f7c1b5fb7b68ee2932ba7ae754bebde2bff76419d7a13f7d3dc73d8175a14527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ae8cb1201236a71b2112c83b8cc2dd
SHA1a28fb0a4aa01b82123c141557b3d58a882d8387d
SHA256c9f4343f0e9991ea2534ccb6ab2ddaf971f6021008f876d875e7558d914a88e0
SHA512bd11545c9f123d600e2f966a1e249ce1b82343bbfd48d91ab4c2e273957362e19995fa69897bed71501ceea84d2f91636335b0ec1bffafa82fea75d19ae8e429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a8bb8f215825dd43c529385fdd7261d
SHA19cfc4f62458112fecfd08916cc9935584d65971e
SHA25688e41f1622e5977f8c567f809aad26ed85186cae3e48692a2d1881819db8fd9d
SHA512d937092e0bf6b80c3a00096e29ea57efc0a7dce912c9874e14d8c860fb533321068130f7f5db6e138e600683c55a2aa3dfb73ecbb45de1c3b4d20489f6d4c1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7e2c505f2854c556db3d0e1e462928
SHA1369307342e36b62abf82606e567ce974d8e48a7d
SHA256b6e10b8509c0e3c2b89c106e733463945ad3905052f22a7adb3ac9280e2d50a2
SHA512e363db5f9b0194819cabd9a1d57904dc5bf944041c5722ef38fd3a9403fe4cdb5455f0151a1f15c9c745f8e85730ad16fd9805defcd8cfa113242a0825cdcf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d1ea508d3ccd0f931bbd84c9601747
SHA1a1144f461289f8e31ad53192df3df396f97beab3
SHA2569baeb9249e4a82835f50fe224d8e6e79316d9b90fd50a554b84b26d4b89cd1a8
SHA512e7cbf1eb1191748b50d92aacfa13559dc9c04d6d474ce55f0b5e2953b9f0941382c7c1d9c96707f2fec842fc786fcd5e089ea5a24c156f5050d33f5bd1931d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c4509342a925ff87a742c33ae8bc7b
SHA1f0706f27cf3ae4745b19551995996a3cccd61fe6
SHA256b7a1e3ead589db8ac99ecbea63497321fab075cca6b8ed71d6f96ae8fc7ffe86
SHA51213f388df41c2f58c01bc4543a0a542ae55b4b83a9cc49c87ccd9fc04e0cacca39beb58d76cb2af0bed7912945d3933c708193435b2fc1a63c21e62e282817905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333731b69b0f71b666d71c53bd5cc836
SHA192022f4f4ee7177a2bce01e9b3cb96188868860f
SHA25644c5052c548cab47dcfc142b9d7bde160442e3027f0d29f5c93de89dd7f1e98d
SHA512dd4eb45cb9bdeed8db0fc2de610ff9812b56ab07c3870e85b6e773363fb81b970652cf9ec3907e4841c6f72b30242face73d9e243305264bd4e30d30e4680d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51397dc234919fcc08334ac96a076be
SHA178d7d610786f0475ab6f1cdab549d734eb6b22be
SHA25602de207e2c862bec60473b31d9c43f1d61db9baba4a1d8375fa5c8092896c3c1
SHA51264cef8fd6d7031348ef2ef0567cbf7cf7f4cb15cb45d1a3d2fac0c607d42178bcb641f9c23a9abc3ec154802c7c0abc62625cc3a5fd7def236bc5596f1f8c729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e168d3c78d7bf3577481713abce88b
SHA1f8389c012369f053941de20df62a482d6d2546e1
SHA256122aac3d1112bee40b1229ace3f47dda4c75313ad41d4fe331730400e633582a
SHA51229a06f8bfc23efd4dbbb92f4560d17cd379a6fe60d6e64a47eb5fa672d6669bc39fc17d1dea324658d4657ce32225047577d1faea8c310cb1306c1492caf9ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb380a7bc4dbe05d95cd57a2434e87e
SHA176535bdbb77c9579b8a893349f319ac8e08c0fe6
SHA2560793d2ad78289e1593ae8457b756fe22519fe74e772a51fe31fac8ce9f1dabbc
SHA5128db66a970127ad5b9b690480c249f93c8699dea289cf1ec81cd8672a3169028f2c552a6d550689a23a01329473955c2be731407fe5e0aefc55b2936fe10247ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b