Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
3099df3936912c50f291b6ba73aaf6b6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3099df3936912c50f291b6ba73aaf6b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3099df3936912c50f291b6ba73aaf6b6_JaffaCakes118.html
-
Size
34KB
-
MD5
3099df3936912c50f291b6ba73aaf6b6
-
SHA1
7525480bc991992e650252cabe12b919842ae5ad
-
SHA256
0865d8c8a61a3c8c261969f95a0f344ca4687d1e33b3320bbfedc6c85c9dd6b5
-
SHA512
d106ce46319b7cc29255a30423be7e04adc7696ccc14a3fe4957550228d23896769922cfeae92989424271ebd12cab589ec5ef3c6552155ab4f3d4dec1e8dca6
-
SSDEEP
768:Nd+J/Eo8zcAOW3lcoJSgHCt3ppyzFa6Zag4Ri:Nd+J/Eo8zpT0gHCt3ppyzFa8ag4Ri
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09AC3781-0F01-11EF-9387-E25BC60B6402} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0eb84fd0da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421530127" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000ffda0af9d2e79d68f84a0ce929aad4896d4f32043fa1c26c20f62d76fd3ece31000000000e80000000020000200000008fa4a559aecd68a30286feb2658b48881fb5180db5317686d6b669e766dcbd5a20000000ba5e47ee0f52705ca6d05c97b032863921532ddcd37e66a13cc8e84aade45c1e40000000cfd8457ed3d6640a96d166daced808baca70aae4879a91026bd32609a21ae304f59cdb649cc400aa7ff889c4b5e269eeb18969dec13ee9acfe156fb92d5aeddc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3099df3936912c50f291b6ba73aaf6b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acf682b3a4ee2f671d0a9d11e37c318e
SHA15cd704e0f1be799fc6c2c558ed2d82f3eab1c4ae
SHA2566656b4f04da7c3362c7978b93f8e27e3fbd4b20a6cb347557b5a8d392b4be81f
SHA512000dbec935fdcffe2f47269ff6c2951526d8814b31aed421c2059d806591a79a8fbd04d426e008f87e9bfb7d8507b3509a6abcf9328ee9cb5c741e2f0657077d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebfe97575d25219d1a660d991198b3c
SHA1006771d477abe794574ea106e0faaa663e63c4d5
SHA2567dadb0294dc05e0fce064dee1fce60f284f21fed9c894528669bd76f33fc6cc5
SHA512a949ef4b18048aa6e5454d1e93ae0231a015b553615bdf864d16afcfa35d3389574936614323f5a810e8af7e1d9c561cfdcaa513dafb27bcc2b63e40decc5425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51710dc8c0b474eb376ff255542e5568c
SHA1da50532f3cc8cefb25aea6a4587a28a0f6d0787d
SHA256d4fc768e178e3c8d47bd7c1b10dadaccbb127091e25cdff8a46a17741a7eb03a
SHA51288a06ec2a75906e6c2aa305427de7df5a5fb498c7fd5bde596daeb79e7a9b1852a383cb7a4c5687fd91b1fc99d121ea5bf1f081b4fdb0bf2ccc14eee6b7a538a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13086353d819ecda0e67613d5f3ed1e
SHA13f83989065521a417d848b71965273a7af6e1d87
SHA256172e4a019a49409632775bbe578d0495aadd590a9809c6096531523b1e0b52c6
SHA512c35f1e31f56aa1abca8cc8f83deb9d5e038dc7df432d8b51e3fe0477089e08c3a5aa18bda01f77e0790c7380bd07fe802b484f9533ddc4815d765803e79fbbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f9d5764238975d511dabece1b1a70b
SHA1be21416094cf968c6125d90ce2eb4472353943f6
SHA256ff5ecfe44a7c79c98f219f9c80b5845b49fc15c23147e4dd49691d80c331a6c9
SHA51238f1ec7aa066d90c0cb80ceec99ef913ffd92df5940e8a7594226f8c2b4c3ab71e03a81e25e2ee37b1ef093c5eafc77a8e5465bd75c2b713134bf49af298b984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9d8bf8e165ff12c6ac01dee9046b2a
SHA1010b0e0a937287c67fed6b2cdcab49dcd2ea51b7
SHA256b25b8c05df24939c205a6f7ed43135c2c2e6abf471dae31f4078cf6cb84416c2
SHA512dc1290e08a7293f965df37ca770403447d4ecdeb3e934215df381adcec2aff0f94e3ec059e530ba1a7195b197a4af92db80c2691f4bcf5250a437e6a5e47b91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2cb81df627c000708bd141bc1c3ea5
SHA168ea4114a3a18e6b3b4788b31a122f6b99901f78
SHA2560dbdfcab8998949af58486a956f590597485713b7ad50657969dfd1bfcbca34c
SHA512c740464e28430d01d7736d799de282ba48bcfc6bc088e9894491813dfad2b1871f04925f4eef08bdff5328241106d2e30de8d99d105b8e258775a40f7ed6e856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f040bd7c84ccb7f41156838a45afdc20
SHA188b4470355f523dd8f5c65ce1c37a3956ecd8c63
SHA256897bb2f9b5be921fb3ddef91af7a86043566f4282c51ec10fbd2169ff3f5f396
SHA512395ab220d1040c5c1991040ee037f9ff167e84a821754c339dfb4aaa285944a842e4fab8555adc2d25a5c85c133055e812477ea2ac9b935487f5f61a7ac920ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51555c70ff495294ffd9882cf9bad3e0b
SHA19dc6cbfe5515aa43ac9b9e87cfd1529909518a3d
SHA256f6abbfe6878a354dd2dfcb78f3f039ad41bc2b103a9326781874010fd7d28ac2
SHA5128a4617cf23f7c20f8057b29d8582572eee3aae2b67ea5f95c978cc1e2d3a8503e21bab24721fa2c3b61548c66ff45cc6ad990a68f1cc20536793f83cf6fa9114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb4f38d37cd68c368928f4ab05b96961
SHA148932eb6214c8ffce3ba7c33d96fbdb836c53b85
SHA2566f9ab49fca9c65f9d42c02b7341f27ab01d91dfa01a1539e58d83cbe1811ec74
SHA512bef1687721e3548ac9f1fbc4c81182fe6654079c37aaf8a00b886fd4196ad2ccaa2ee2ed1d93c7a4203ad67bae0da8fb2d228e064e90c53396c2a7377a8a4e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d8390278743143690ed95a4bcdaaf7
SHA104befd6caf65c32fac9605ac7ef83ca232aab6e1
SHA2561fb7344b5cc691715928527db9a877416d9e447d51ce5b06e5e528953c0611b6
SHA51235a31a6d2c9834440170e43eb4ee8bdd9439c87959b7f63c00bf71a988227a7c2bfb989823c0d51d3b3ea038077aa9b91e66c24ce7893134f4d08008f18c8d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5844dd06be96091a325127f21a88eaf7a
SHA1e4d44ffca81160dd93a23a46b612fd61f2817314
SHA2560c43a2584eaa6d835343e9955f87c791ba355cb5ce2c91d08eb76bc4c5465e03
SHA512458188dd306eb2cf983f3ec3b609c57a5fdb622c14d6d6281f1426abc0173e29c39a16512492dd3c0841b48c419975e517cc12b1aeaf0e23c4b78221214ce1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d4d30e5581b795ef105a3a55e29da19
SHA1f314de03b49f5e0baf006cd6edee4a6ad5cfa470
SHA256a6d3d62c0d3848ec32567f468c8fdc626d99eec08d66f4b5eb1a27aa936ab75f
SHA5122b30113460e9c203fa7d6e91e0dbfe9c76a6dbe3dd39dfe933fdfa10c17d1be455698c3846cafea767f3c322dd4810c1587b103bf0d75c17f89777c03808e0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5073ec9c7bbaf67261986099504602c31
SHA1b040a79748ad4eba2af47d8a96aa8058cc37b267
SHA256e45d77a6c2325c7b86369e33b15db1a60010e801cd23379bce73f4f9e3a640c3
SHA512789fd6a4f28395ecfc6e6dfafaffc2923d19f4c0c47ef2afbf27c184f5cc559fa535dd33c79dd6ff76a5c3f47b24325e6bf445cd52e8028639df90e8aa566de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a515c53705b1e0c542afd10b66c70e
SHA1edad2714f3ee1e8679f0c6deb60b7f81ce63b8f5
SHA256cda36c4af013326cb37d9beff103884f454928c0dc71e757ee0e4b5215154859
SHA5123c692dd0e938123a5240a498500e11b05e018eb599cce66bdbc96c1740cc5e4d821ef3fb8bc6f298a1b8f902f18e8d4137f496b3a967b2fb8c82c68eb2a335d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f22cb274616476292bfca5e5908155
SHA19fe736e36b0701658ce4b68da977891aa431c97a
SHA256a4d894b9a8cf7c88f4a4d5ff3fde48243277177f9d90faceb2549493bb6bc43d
SHA5129df9635f89c07fa189fda94de59b12a1eb38ea58f68ec9c4f398a4454cd4df5541c190c8b9e96a40174b8bf3e327b0a59bba20f193f40f82983668f46998fa1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520840fc22809fcbf0784cb2adddcab73
SHA1ce859b457906b57b78a334c5290e447210e3c6ce
SHA2564a55d4b349eabfbabd91b5d25c910cf13fa79514af1c183d5bbc6b56f538665d
SHA512a8bfde6d95370ad5be4ae4bd52d34fa5fb999373ea8dea0c0a76824f121c640a429534a114d422a6694a516794c658c5ab6ec29053d911af8a2a32bd0bf64f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5004ba6efc80110a7c3282590e45f95e0
SHA11ae43164d9a92a64671da3184c71390237c03313
SHA2561746f18b1e3523c40fdfc59a2b1835161adfe222e7e39d7b5c9e3ff57df64971
SHA51265b93796ae4ec880110d13bc682019f5a11a23dddfdbcbe5b1d4a45c4fa6fafda59ab30226c06b8f1d0d7ad65929f1f1f17d1f13ca09c72999d2682b9e776670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e00c6fcaa64ff2b8fd3eb5cb5972abf
SHA19b905bc9f6fbc8c9b9660043c18736e0fff74564
SHA2565ac64117ee2c9bf50831f3d401c3d546907639cea2656476a7fa2c830c4b58f9
SHA5126e2b1633741e7e9fc685c6d4ee8d3727c13463cf2010b640cb7dccfb30be96a96a87977afb955fd74c0bfb8e8345a4b33a64eb97c3ba263d67afe83c5264eb1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a