Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
c3ec2b612b252b295064b9db2b2867e6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ec2b612b252b295064b9db2b2867e6_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
c3ec2b612b252b295064b9db2b2867e6_JaffaCakes118.html
-
Size
81KB
-
MD5
c3ec2b612b252b295064b9db2b2867e6
-
SHA1
d3fc2e575f7f92684f1a68f8afe3c2c1c9fcc609
-
SHA256
fac1a0bca0a969abbfba8c647e854d4d11b5fbe89bcbbbc80f460cdf1050c6fc
-
SHA512
d858c05f0f0e309cac8fb32ff459bc4c97f3c263f10cad232ef355a37d4918faae8239997f219bd1ff1e6813859549dfcc6bbab2a9979cc2873bb6be0c833952
-
SSDEEP
768:PEnHvvCIhhogG7LFU/7Ylf3wL5PKQqC90C7JTrFUljz1ln2ovp:PGHvFhqZLFxdCuC7JXilv1l/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418433114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A0CE9C1-F2D6-11EE-8BF6-6E6327E9C5D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000c6bae459b5f82f9884b95617dcdb7df846202da3e5e0d0235ccde78db606a2f8000000000e8000000002000020000000a21e14f9b334602917456983fe1891b5a33dfb0c268936c8c3bee6e5ac2c6e7a20000000bafdf3cbf337904eef8591e6c10fd21f1ce26e88c6c5b6b798cb5bb82483084740000000e43c9647748b0fecadd7316a265b4f94846d7c5449583baf9f62467e296f533c0d52a169b4a1c469a681ecfc134dc10177fa2aba8c4db9570e693ae723c79558 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e35912e386da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3028 2304 iexplore.exe 28 PID 2304 wrote to memory of 3028 2304 iexplore.exe 28 PID 2304 wrote to memory of 3028 2304 iexplore.exe 28 PID 2304 wrote to memory of 3028 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3ec2b612b252b295064b9db2b2867e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ac9c21238cdc2eee8a2797feccd34cbc
SHA100ad795bb7169cfc08e1a17e78748eee1df613ed
SHA25694142256069cfdfce3fefca57efc8610d9bf13877fb3cb53ddcd62d024621218
SHA512eda8c0122d8b6a87d7c8084b25daa5d76a6d83339d3d27d7a14cc1851d2ddce390cad9e98a0fde88cb6ed2b1cb7f3caca0e2c91402db010beba554e1778c7b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59baf7298bd00ec5a5ad610f4ab931f2a
SHA1191666144f9dfbb328cc0fb52a44b2e3218c50ca
SHA256dc4a8b63c71fe8c3836b90f98e8fd12d57db28a506ec7bbc8b46ec9ddf239bcc
SHA5128c54f55ff23380b42daa3c8ed9dded3f7ca6676b85f5d3f0262f1de2103dc06247d5b9a02b7a58dfd72561365f5db503fbc398317671af1259d3bceae6c0e432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5628715359136f0ebe889e0a92b42b153
SHA194ccc019339ef5c404639cb24c9cdf91a36905b8
SHA256a9a9aeb67f109d6cd829470d8a66a27d7b906fef8f5c5641743a6c3d30f67c25
SHA5123e59c8931a0fcee6eff825b3cee884d786ed2b031ec077e7b3108e694c73d63056d7e83528aec29d8ffb4645caa002afbd62036fe738b2da4b512a78c22a40e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572c31a7f9d11606bc8f2039e84253ade
SHA1bc4e05d9f57b1d5cffd8817d7d9e3a7fbbfce922
SHA2565c1ce2a464fd82122ccb5e551d87875178e93f6e83722357e84ab4e9fecd6f9d
SHA512e6d43688c7cab5ecff5724ca3d48a5e57628b3e11c274ddb8a8ba03b94cc364f061f6a2a03ffef3a5ba4b19b3d88bc6f6377d74a99f002c047ce8f63d37238e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d39e71ebd928a4c6b74435e312a725c
SHA1176db19ea7edfe6f3934efbe60d83da08b90e35e
SHA256ccbe3378f84316a8ede9d292f71e51676670b9c9b2a610269e6195e4a279abb7
SHA512c56bff4c66b12a07c6dcdfd2d0fb169c745566a6bcaffa1c41717a3df8e770372442429214c06078618a4e967bd64e3d529c9455d9bd42dd1f1711a095603f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c06a3f2e4aca998d7bcfd5cf86034a6
SHA1ce617e4f78010bf352d38efb2ad7b08473faffa6
SHA256a87b7d7029f5759a9e5d19e6b57e0dc8254f2d645ca876c5a7441848043c23cb
SHA5126e0b1f9ef754a3b5e77ba483b3835a0a605db29c3b7e8553f974968268bf1ac3ed4f7e6a96ad2d46f028ff41925baee464c0d572239f7de415191817c84d863d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567344cbabf9253354f4310400cceb7dc
SHA1be2c58a334de3c9b6b3b5818b6b019fbb0e5acc5
SHA256279c6da3b1345984a10b95fd6802462d2be78438d68109d824fa16db90eb5235
SHA512a211f6b3e280422e86c28b526859c2c10b02c725a453aae3bcbba5a927caacabb01a641df91e52fcfaea83784f9a2337e276225b246120fbf275d55916521f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b418c561e263f67c1353cf68c3c7b721
SHA16a8856e0181f06b29f00a447b72e55095d418287
SHA2561fd88679bb1c31bfe2d36f13e3928798650a06ce15b01c27a76360d7bd933676
SHA5126235af262344eb02dafa3f71f9c4c8cdb58022655f0699fc36db35570057e5c199991ceab511cea5733922c4f66ea8a5b7e9bf73dd3d192ced2fa4a0fa3d52b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6bab47ce9a93456cc68cf75ef8b75a
SHA1606f8b9f7c0127d078d7fda2eccafb7cefab04bb
SHA2562534260aca566d3a951b6a743cc6f7c961eddd7557b0c9c0a7029f7ec4714ab0
SHA512decfffbd457c368c6dccf17f17f6005198a6edd3d46d1d482fa3d59a2926ec2d133d2033adff06fee3a68aff1fa7ea86796a9e3e670113ba69afebca3f1a72e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a0039cd9bbff0f613e39725f8bd06fd
SHA1587bf140ceb578f01ce3955245207ae4cfaa6932
SHA25664c56002f22ea2adbc2ec4cc1b4bcb058a4f4afd402ddadf54f7c9541bf330f5
SHA512a868a03f1cd50105148401ab16486f32b0bd9c91203a6cf9c8ae5e129fe025a3ed102c560827524d4a2266748552f737c2c2e5ab4ee815f14542737a43ed4fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7177a979dc1b7ff731b2dc3a51e7ac5
SHA1e8162ca68eeaf86084897e336539b57ee7325e8c
SHA256e16789dcb7f9c34691e0fdc0580a137a55792e3bacc9b4b3095be0a04e934a01
SHA51292fbd3e4452bf25b9be59da35c7e814fcfd141fcac4d7c27fdaca585b097dcfb5b69bb11e5b26def4af6f1c22c25414929836c6c4833fcd81b81758282083471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9851e0e7aeb6539d12447f982e92f13
SHA1adf6592ee1c819e0882c41c08ab4caff893fe78c
SHA256a2c75a8067da0d13e344b57c7819f130f6d2c143e78766c1c05b6b464e3f7f0d
SHA51290c3e4920ed553457833ff7e4832f8a17db622794567ec4a2b4b662284c11cb787fc20f1f77705a46c593d41ad7909d751d45de5b2628cabff4779ce8acf171f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58529edc047fbbb6ce6f6a021d808e760
SHA1a5cb797d1844a67098dfb50f3ea620b8b3c7ad07
SHA256a009f0e9e33a819dd0a2f841ab82b693f655491accaffd2a59f90ae8e806a052
SHA5121782ccb214d126dcc53ea33d78b57fd0fc97568c796cb04ddadfb8d7471baac71b8ea0b29adcf36d95a3c92e47e6459f317a073a7efb552a7dde04a81c0354c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ae8c537058259c53d0ac6edc31804e31
SHA1dac5d99b8dbb3f4676ab9ef3cfce695cdbc384ac
SHA25633dbe683e0acf5a2627a0abe3ba56af432c64abfbb740dfc8e576da63f5a5c95
SHA512cef3eb07ee93691c9313daf1535dab6a3f61b3ab30526665cae970bad4b86cf4c72333a1c19a6e3c06ec7f446373eb17db7be7db74de6bd4ec8d18c26c92ee7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a