Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
3507b447446c14a1cf028d9f2047d5dc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3507b447446c14a1cf028d9f2047d5dc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3507b447446c14a1cf028d9f2047d5dc_JaffaCakes118.html
-
Size
68KB
-
MD5
3507b447446c14a1cf028d9f2047d5dc
-
SHA1
04382089175a257ae1ec656f3d37505da6636683
-
SHA256
6dedda8cba44a54dd13731e81cc1b0e93b64002555abef6bc6cd88f2a25f4bc1
-
SHA512
2dcfe3447f3a63fc94d06cb02634e91372bbc5f45b98de0d73146d322897483bc080af169a9d8e5c9e64a50425ba7d8640394b5f277816ac4a9f7cac78b1a573
-
SSDEEP
768:JipgcMiR3sI2PDDnX0g68DrnjXPkXMwroTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:JBXzjsPkTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000da61707f1ba629426535855c78abe628694d394fe612f6521fec0471c3f97509000000000e80000000020000200000005881c6dcd03af7870ca1e0c79fb55d34c0329c71564eda93a7902f47de4ff3502000000045a8704359b36fc61c9490a89eebdfa5d40b43ec5def4c3e183b62b4f33e4ba540000000987c09a7836c67c859cc64cb306078d7fb7ffd0bf9ad756b38c5e5a6fd597099c698f9300c295b77db514fb6ee0375408bd5c4207070c0ed5bbc40fea724192f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{437A7481-0FA2-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f50718afa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421599373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2924 1244 iexplore.exe 28 PID 1244 wrote to memory of 2924 1244 iexplore.exe 28 PID 1244 wrote to memory of 2924 1244 iexplore.exe 28 PID 1244 wrote to memory of 2924 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3507b447446c14a1cf028d9f2047d5dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80a80047ab7cbe01f9c9ee35efb8903
SHA18c4377092fc0a18120dc7245401a0597d414ef67
SHA25680f6e6f36d81cdc6ef1e2166a0a1787e088ac6ba326e8b3f9122fca73fdd792b
SHA512bfe6b5adf13ac3042308e722672d206ff33733d167c87cf57fb3dd9c283f33ea09733e416eb29ed79df3f7875185858ab0e5bc985b8ac3c361c861bd86d0ba7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed09e963cea8e8a6d62663b103ab356
SHA1ec02e2b12577ffa6ab6da6555607aa7757e7d7d8
SHA256f7e97362d9c417dbd4df7cf624e0bbf7530755e5d884ed1efd97d7c8fc781b3c
SHA51265efcab9999c2ff4d46b447d86ef7892f786d540844f270dec737aa0954019689f2d0fa495fd3d211f1d7a96b36f63166e492425af76ee5f4c6e58b3b61dc925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0d3c13d8944ea167dc23a7c007b75e
SHA12f4d1fd778b4fb6233d019832b8f792d4e9d8be6
SHA256cfb185dd31967fbdde367fc98ac6ba8ebbbff4d82462614c1ae052af6eacd23f
SHA512406dbc15ba81cc634035176827a50c2a7eb8350093cae6c9669eb1269b8112768423442f9eb0a318e8ff1072c0abcc609980354c8f44fe717fea47f5237cf2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180f84a533697bf9b5207a3e6522a7ba
SHA153b31797a6213ab3984f04180c076f0297e4149d
SHA256294bea65dcd01286b8773db0f1ab5fb63b98ade9b30f993cabe023b9063f62d0
SHA5127dbcf6e550d52b1e9594052ce66ce843dc829caf3b272eaac09a5fea0b641f9b157e0f51976ccf6c5d2905c9059937a3bcdfaa27a25b2d0e1e6705c90585eb2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2f005d0f614f749e2f243c1d8b19c3
SHA1ac5fe002f2b7a9f8d92677e07eedad72eb6d2d7e
SHA25669559637bf1f50d336fd53aaaf0cccb881219fa6831fa349f54af1ad68c11793
SHA512fa1e96cf08986e85c46444e64f10bb79ac963f5af705964275588681a78eb9a41648a51c576413d8da8ba6823a37f3fad4e838cb9a079abbe2b0a6a59b0eb967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58469a07f5fde76326e9ed4c9ff445473
SHA12edb5151d601ef8767d1c4c8f47384412d6bb3b6
SHA256e04599c38a9e66691df2ec071fad586b10877c62d20352550061f7fb4af026c0
SHA512834bca3de89c44cab4184a352d81c2180d64b854f2b49694dc4018e1280f0360d32e3274261b6095ca4956d32362498965821c1f5a4d73e48ed5857dfc91dc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5735696506152d6e4f1d5dbfbf08f1e69
SHA1200989779c04122ff3fb85c8aeb2d7128e60c846
SHA25642783583d67e9b2fa6b6dc0c4b0c1270a95896b7509cf921ccb1df5002e135be
SHA5129d809bfb2a462b998c972f5324aa0dfcd35c48a5bcb69dff52a8b4b95d6d2320c7bb5039f33c27d3c101ecac055fdfa1be1fd298d006af4523ec4189cb5af1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5952934fb900b9ffa932c2dd45456a
SHA10ae6cffb61818995321a2b346eae5df8d52a6a05
SHA2560d18fdbc9873dc05e750c2fd0f781c4008474cb8517a3420b3c91dee23c2e80b
SHA5126544c90d5d7fee883ba8270ab21031ee7a87ef60bc5a7606fc653769d3674a224fb82b086215e603e263070c0ec40e8e0b729357a126845e622c3bb77ab94873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aca04854c8e5269f7c2d6b339d7af2c0
SHA1673ff597acc398ed8640bc72d447852b9c2df845
SHA2560e545324a8890b6f322a79e248a80850c94e20f59c16884ed7049a4c1477a415
SHA51228944059cb7007d468035e21266a189ac8f4d08e6093ab72b1aec880996d33a012e2e2aa9d4b997d668c4c6fc4193879d24cb44cf0f89888ef7bf7b508948d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03fc800ba3efb7bc4d005d38738a533
SHA1dcdf91a1ce676082a8a395670791809208dac5a5
SHA2561183c584f842ffddd6384ce1859fe385f349ef8f91fb4b836a8e54e41e6908cd
SHA5128a2b0930170d13992c1861a728e18a861424e9e164c11ca43e435aa9dc75edde6ae41123297aaba7fa79a35588c4f6e32204a9a56c1bbd26658aabb62dfe5bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158c6b3757a769f955e27fe44ad63cba
SHA1d71c8b079b58194d9523951db738811599a51a0f
SHA256d47923953aa5703c96a6a69747223a7cf8d94ce44b8e1f4c103eee53251f62c0
SHA512f388bceafaa755f389ec9a1edd7c374a0195a05c7f17dc6ec469bc70daa728d0498596340ed7c0f2d842cf280c3b9ed8035c36e7a8c1600a65a17ca5311d8690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5601461a05b463449d2215783296ad
SHA1eee43e5c3b57600ccdc62cd96d0719b0589453a9
SHA256079888f67ca8eec41f59674dcc81ba17c2a59b9d181d4c997cb14a8e20ae86ab
SHA5120c26e545fefd5811a43d4fbbf8701ee9506138b6eb0dde48dabddd2b570586520f12afa62945c6ee69882552522cf3a1e34a2e22b32037150cd4d5da4a34c34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500107d52da7a4ec7a7f3cd38a2319319
SHA1f5af493ff14aae2b92ce2a345cd86b908bd546f4
SHA256d956c0aba1f56471c6c4fd78a422838bab325bfa9b20939a2caa8086bd4d9b74
SHA512993856e748d864edd463aba39083368940564e796a5bddbada48b833f0287dbdbd5e840a0929776c21627284336292607ab26ce8bcf25eaea817723ddd9eb783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fefe040ea702a533ba77fcecec6a8f2
SHA113749ebdc920ec3b14998d2e91996e4f090e9840
SHA256cfbc4b7b5ac40ed6429b7331db565d81d39459f609a082f2deae4cb119df9842
SHA512e8e87c78abead309f7e5752c65679e1d927bc67d05df6929dc6b54f8deebb134e23bf05c490439101e6569965339100400425f7e999cf82bd2db2197c3a1c1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5417489038387f89637bbc2f75ca4369a
SHA131c9d779ca928f0fdda6019301ec0362fe85fed1
SHA2565415b06a0bcc2b83222b4203bfbc40eadfb6493d0e64a6acec97ca42083d927f
SHA5121967c972ddeee28c92d7333a771f5948078c96b3db45a23fd4e176439f0c8ce274c8071619cefe40a6f94902301dfd8b7b350316afb71e7d9116d682bc1f41ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb13cfdf65b53821b56ebbb40e3af2b
SHA128d707a32923df5a5d1220dabf9a2c7b502f1531
SHA25617f740b383164d6517a7083416d8ace1952e2467b440a82c1cb9a1d28964d2f2
SHA5128c703da0bc3d7a560ee4a4dd105f5370c3ddc25d729904cdc866791c6b2e6438ce9e9b8cafa4e2faef1bb2827ee6c9be00c613a1a8656b10dda0cbaf2286d68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b9c3bcda5d73001810338fc6812473
SHA177b61952e411807b5d94fb54512c897699f0a62c
SHA2567283da71f10b7dcfba83a3eff19fb0dbe973e8650d5390715675ed7d61a594cd
SHA512a060367ae97009d0d71c7f7d48433d98e097e1ad43e31d401730f7f322aa38ea93190a48a841a86b4225c42b07183b4b82a8a4cda3d23c528ae520d02ddf015b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a9922a4efba7b819cea6949c6a5b33b
SHA1faf95ab67d22d832564e98f5fcaf02ad1bf16e27
SHA25678314aa23e52d77f4d250ab8911cb1a68e239466c77e777cabd108e2f6e91f4c
SHA51258e35c3603370d0452d7b0a9913622edf5a262a7036bf22b78fafb9d519ccfb6347647fd620c723c6fce2e9ca9f5f3f17a1c59461ed93394467f1611b6c992f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5005b9c092d605b67f17d94f3165bcdab
SHA130e94bd1bd921cebff015115d47af872ed354d8f
SHA256a4e904e2fa480edd3ab4ec184e1ca272b196b80c7ea776ea86186be1393edc00
SHA51272f0a48f591af93eacad554a84dcd46a1595db5c4f835e1e41e150e7d8102d5a584eaf0f7936335c194c9f5f1a0ef18a419527902fa75c8ffde517ca36a913fd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a