Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
3c4ece53e25af7ed168f71aa9b1d638c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c4ece53e25af7ed168f71aa9b1d638c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c4ece53e25af7ed168f71aa9b1d638c_JaffaCakes118.html
-
Size
788B
-
MD5
3c4ece53e25af7ed168f71aa9b1d638c
-
SHA1
56fdc4ed9bcddb6840e6c537a765e18bdf4f9eb9
-
SHA256
f31ae752d4cd3a7280bcb070db5c094b778ef943c6adb25dda9d143098c6fdd6
-
SHA512
9f057299ee19fcb0124085ea7bfe96652468d94a68305b10f567b485fdba9cbd20bef9374ad915fa4929913354ac14a5778b5411491a15baf62dc628c891eeda
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d028e5ccbfa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{095887D1-10B3-11EF-B02E-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000004cb804542693e2b2d0c96e1a72ca8aea45727ab49d848773ef7586e55ada5d15000000000e8000000002000020000000dd52f6c300de5f92f3fcb9dd7923d38974e6a21cb48d30d59c946d434f56697f20000000af3e762f2686370f646bb2bf76fc7c53365a0b332af1bd8a25f985669f791f09400000009c544efd28eff78009725d5f6bafb93c9121b3bafb9410203d137859b5dad22093860542bd82a318202287ae5875eadbab619ffc008c8bbcdd08944e40da6f45 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421716529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c4ece53e25af7ed168f71aa9b1d638c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502fd5fe56a931d4ba9b1913baafdd65a
SHA14008b3696fd1d6f72818001e14e4313b9a398b50
SHA2566356eae8e13a219d6a36e14d1f986c14d80ff65cd8576c498f558bdc1d689dbb
SHA512d9353b5406e33075c060c085fa4d8ecbfb73ff6aed0d3e99729b79f7d936b218fc88f1869668df9b8a6b6354a6481b9771979d4d88c5de50fcabbed4ef4ed5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841649ff5ba26ca8ab236bf57491e2ea
SHA134f34e4665a5789a6a2fa10a281785d30d9aeeeb
SHA256f0f191e52758f7fb3d6af8c54badc839e48e4d2a3ff6e9d0a8dc49f096a8fecc
SHA512afc11f23aaea883b5306d3279c472d1da90098082239d7e5617fe0e529ace54201d039eb539ff2cce50ad8a141dece95b498d05ecec3fa0b75cb72bdc9c4bf1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e139e41bbeee558660e5e7ca1498fc9
SHA173291f08e7a1f172a35c2c78cf80353e9daceb1c
SHA2562a1c6f110e1865a45925d7cae8b6336b7538b1444b22c7100012e0aa737d3fa4
SHA512cf59fbc11ff2cdb90213a57a9aa7b87941579e504ff545fdc4e4abe3ef42312e366efd0f4c66053c5c2e68331d96a5c817cd294bfc7e67e0950b4199e32a85b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b90dacabecc92143471177d5b9470c
SHA197324a7e34391dc7d2a5c1e87f3b43819e03f8b8
SHA25624b4727d9394511d30c99ef005eaa83c46624c27fa8a2f0c26b09555ea78c89a
SHA512dbdb59f6711c3fe71c099eb1c8f27462097d497936c7bacef7baccd2256271c12828ec4972b89ef92dddaebcd27ecc3cfc65bf5ac012f3f454970578b41c4ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c136564df09e2e2c73a3a75c0f4d1057
SHA17c80d93c54805196f4f352797a10164f673cea88
SHA2563bcb228494870a878366c359da43e77082d9b95d201b9ba6be25a9258c737e7d
SHA51243c34876c30f3e5a898451f5570052c0e96be8d35eb1b56a02d72905b61d4ceb032ba2d8c8a4cdb8fa54e641749a1473f66f428734b30093db86ca4d60bfb028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5171c0fbd26ad8d0b4b500aa3b66ad9
SHA1bbcce7a74bc9069c9296bae2a7f8fa48c79f9113
SHA25691476be6ea4679a8e8f273c1698f2c6baea818c4b0e2e3241a10501aa76c4f70
SHA512e390567141000edcb6745b383eb31184d0a415a49c859a93ca11b8520fdf20d52b5b46aa00136904ba89cace24a7e5967d18d04c0ee87f051a8fe7fc30e79076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd162a434ac80cae5f2e40dfe559bd9
SHA12b0e707ceb16d2477d0ba96856ba2e7357f5db81
SHA256fe92d6109082c5a67db9d731de5a610460078cd144666cbd398befec7e9d24be
SHA512342fa583310dc7c331a5bc306a87476a3489706cb41369a57cb4229fb4ca2ad0ddda79d61ac942e3b4132995c8bba20806cb39840a8f866f76bbc898afe45714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584556cbd4d4a86f015dc93c6c2b7a2a5
SHA165b4074241889f54004ff484cc09ef3d9fc6f502
SHA256c993122eb899e65b534263fd626b80327612cdb81d9259b37f70de94ff7bca10
SHA5124d59f7303042694709d1d38f5e744f55edc4380abcd0c6f869d03033d91d95174cebed42bfee059ba50c8f872d1f7bcdf571bba3ce828cfdda9a7b895d68dd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b70e3fd4cb07212af866693de2768b7
SHA114444e554954b126f8828b6511394b533b2b96f2
SHA256c84816219132a6d270e3004b35cbec758339967866d69225a68d5d0cb74581ec
SHA5127ee79d2d508bdba7fa62fdaf6b4e60e7d4a54b2c384f4a36b274d21cc0ad397a8f7795c05483948514bb9a0eede1ed96bf386d15ec96d2f949565df80c2446ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54950c26f53bf10392e99ad71f86ab46e
SHA1daf63239182fb8fa4cc0c798d0b6445a1c7d6c2c
SHA256b84eb94c0877596e15537e3b36814caa9e72755bf8d432fdfbe70069a43db927
SHA51208420e411e0295aae18d275b467abbaa8fb4e63eab9ef17d5ce7f2efd8d88dbd04624955179d1299ba956583d57e8a0966fe176b3b130c017d2db94c24b8b280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6e5327e4d1c5f097ad45a4adb72f30
SHA141bc4b7d647b962a8d38c15bb2d26c411587ae47
SHA2564ded6b105b9e7ff003b76d18c9c8090b78dff8189cfa33fae97f728b2b03ecf0
SHA512d1724ca96e100410161db9c947384092122cd5bb02af68d0654ffc40e71b27b3d2be73a6cf184f623288b237e24a8dddc36ec94cce1da0e2c397fe410f791726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd69fc11ddf4fce1f4417e04fe408838
SHA11f2135011e7c0c38461d3f39fea4935b4c6d2601
SHA25669fe18d30c77491ea9d915b0059f126613530d42296d7cb95660f8959ad00202
SHA512cc102f3e3db3987beab1b87097014492a300452773df55133b5ac0726ba361dc7e95c96dccd2012d869f756dd8f812cae95601472758578281b50e3670c5168b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b54ccffc956fe800cb9e540c69402d
SHA140c4df6259d784235cafcbbd856c9eadfd4c6eb4
SHA256c06de95e78318b02b8c69ffb08410792ec60f877f162a174d60c1a1b85307163
SHA51200df2ee2deb4fa84d1009378f5e9de7c92542633fd93e90ed7716ff6506f7adfdaf2f784d9c192a9c056cd218c95d522a6c2564050978315b43e28ee03ff3d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d849aa9ea7045da623f3f7ba3fef0dfa
SHA1507ea998935ac31497cb6f4edeaf17ab842a7678
SHA25619a1e4990dfc559fb7363438411e8911485826c00489d2bd97d65a2818531119
SHA5123a6ab2ad48ee7e81a7570f40a9f2b983ca9dd3ed810d07ec50efa7fcb62447c8322d8d2ba57b98bb1d0ba88a235cde0f889fc3bf0922704853297e082a9f1442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d81629af13a8d13418d809bc8566f2
SHA16552f770d240ace3dce088b730849d0f59aa5f86
SHA2563567a7101e7a7c785a11c86546bf2ecb434b7a3b58c9e133879d2f7a5d26f00b
SHA5127c156f91a5769936a7675985f029560ae1f64a80227ed949f84761aa41912dadbfdc1cbc1169bceb10e8b62369df0600369ded88b9f2796fa48d5cb2d56faf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43310e0696722288ac626efa64e0b52
SHA1e648de6b5da97fd4bcd5873e8d720a413274d0a3
SHA25602421a6c1dd7b5290874ddfcf4ddc9e1708fdc8ec19fa8f699b77bd431faae4b
SHA512ecc03ec134ffe1840cdbed4a7ace76c220c6a1c3870b3a9eaa843f3cc739824957e76a749a368adb1dee6406400167fa725fbd8f7f00b18aea88e09503bd9539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560cb4eb9f79732e0a4e020c14e114f24
SHA1bc734e33cd26edf07c5156ea8fd3e4b7e3faa630
SHA2562c2d22a5f21503bf578e880845a1a411b716f83e76ac1cbc505f34cc56327fcd
SHA512a9ed03b2f77abaf7a4b9724f9778fbb1f5bf3e1272f461971e3adc598a5aea1ff1e9c06aaebb1eda56bb24f0e0ad47f48320f9ad0143f6a349534febcddc9beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa21bad1fdb8456be48acc9a842d677d
SHA14cbfa79ee3d34010b719eacf817c261b7f61f428
SHA256be09d710f5e5329b5af757b2cc3a06cf2aff247717793b0e7a91ad1632c68ddb
SHA512792c105c766fbf4bf3caa3e44f74937de5d952b667a63e2ce316e46b784f865e50f133aa583d7901c456cf9b07e4a3f40b6e127204b3d918c23c50bb2aa63132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5ffc32e2281fb10112c438e9c16d55
SHA10dd8f2520a25de621c3f87f6386213bcf30fcc55
SHA256584ecc802a516da39d750438952655e94b834509c23e72285cdfa23b558d8deb
SHA512bb0982097e1cda8e76703c31841c9152bb83a9bcb63f874e6ae6ec2d0993319d86638878a4238ccd613c7ce99d53a536148d8b07d9ddde3c83938b065c08090a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a