Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
3882bbc0909b64be21bbf67a2d341b38_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3882bbc0909b64be21bbf67a2d341b38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3882bbc0909b64be21bbf67a2d341b38_JaffaCakes118.html
-
Size
4KB
-
MD5
3882bbc0909b64be21bbf67a2d341b38
-
SHA1
c98ac86a59e74aa1c1b0915e07c63700f7b37537
-
SHA256
01bf8aee654d91d90a80af75c9fb2a515972e918f4370f8af6c48c42c6e89e5e
-
SHA512
c995d67abae9f5b5d8b4f5475d61ae526232b35a457f48035120ca7676c0865788b0434980767ab2c498294df8ee04d4d27e59e01ddc8b593ffc111b98399833
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oVoLqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDY
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e4d5803b2ba181c34bbe78c780c4133e51c78573a137538ff5f836d482a49d8a000000000e8000000002000020000000bb90cf26be8b9647227a39d72e58e633babc9012d9e982feab10964aae2c604b2000000009183fdf142e89f8a1a2b135f7bcbcf8044cde06bd4a72846b0c02fc117360e9400000000cb1fb5c6d8c5f593172266d702c321e3c96e453bc3719601e09b640dc4a58d668f665edcf262c1dc529380c4f897cff916710c6f241fdfb3de00e37624f493b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{542AA9B1-1021-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9021b3282ea4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421653948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2932 2984 iexplore.exe 28 PID 2984 wrote to memory of 2932 2984 iexplore.exe 28 PID 2984 wrote to memory of 2932 2984 iexplore.exe 28 PID 2984 wrote to memory of 2932 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3882bbc0909b64be21bbf67a2d341b38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8f4e4ae3aa5277afea06a900f9e9cd
SHA1344364b57bf8c871c1c6b567519b074e586ee0d0
SHA2561da2e457602f147376d7051beb26f6a0eef125b6172084d610601cb13a4907f7
SHA51217d01513d3797ffa0d10817d4b373c1cc360f9361f3a5184edccdac6f320b539287da0ececa1118685607c0567a70dbbc9013b1b36c3d05560d4083239e62402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e09488e6e299160178f17e52c0a070
SHA115b84e8e35ab495a206caa11b336b6ca2c1dbe25
SHA2563de77ae26b6bb587e50a2870fea22434f1d14da5752a98882af3d9dd1f3cad25
SHA5126b86e4a72da474e830aa73ec7613374c34c159a283088dce6c8eb5351a9e76a6a5525813611283029f9a338acafd3dd126ceb8b8f625be2a3c8f02492f99cee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec26fbb3960a314666351dfe8b9168fc
SHA1ae0af0b1935b80c76da08a8633fc1a3ca787f19e
SHA256bab1927cf489d8217c063384987451f433fd5932f59c06583a659b48e507ceb1
SHA512b7458b4409893e08262bce6dad6b07c59a5eb01ba12928444036d6e2959aeabccc05c283ec2052119f4eea9b464fc26aca0a1f3bb313b6518b4845b2be28b2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c54ab58601db54815792f7bde77664
SHA103eb201ae7eaf8dd940ba60ac0e7abff02c90fcb
SHA256a14de0248af9b35c16afb6cf3eddacf226ca676eeacfb6f9af6f011f69342363
SHA512daf77ccd9024fc90c3bec08420e8c46ca45e3cd0ec1f141e35a3d09c34d8bca1ab9c50c15098d8652bd9e0511924df09263274af53a732d7d80e1ff738f7a889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5332b9e73e98d482075c3bcab6bee7508
SHA1241041b00cbafb090cb30e166dd77c58073d5e4c
SHA256d6e7c96c94ffcf484375e5b8d4cd0fda2f7d446edda908f781225815f36c3adc
SHA512b5fd0ee9bda180ad423677c2080f8fe6cd063343da1b2d48d8c9241ea4d9f8401748ffc8cc9bc3c4727c93481dd30b5549adf340747d0fac74d790ce28760cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532bb662f76a5244f974eb5ea31746c83
SHA19d453e72395c8b8f5bf8b020eba55f0489d4aed0
SHA2568a1e09a2d21df76d37926006e9615f333fe9487c239f12c826f11ade1540d1dd
SHA5128637c30c05f141657632d1550a87196d0ec5d48f9209f36625d45f0e8845793c9ec9453d008cea59d52d46c5b89af35bd0a34bba30c258e40c10d27663a5f295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360c9be5c1b678cff8fe5e1f14e9ccbe
SHA10a0dab3c580890b3725e3689509ba59c3b66893c
SHA25689efe3019b17c5ef63f3c1d452a343ec2a4fa89a332e59d4e779ef1c0088ff27
SHA512247e78767a8cc0a2830ff7f08fba5e5c3fea213d539e559a144512f195d705ce4f3e23bf6c77cf1eec7f2f34f315b4aad95641c7c180db66b8b39113d5fdd4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50774526decd74c4d32fc0c640f26cccb
SHA17aa53c0b13b8027fdcd3f390d37ed6fc97b8431b
SHA256404ba89540b43ad9ea56f55ded8474675b396ea6d4f6fd3250b3ce9068c8eca0
SHA51278c0598bc66150e3643daa72dc9a2a50a122f3b9a1697c49cda52b8693aa34bbd8cdaef117e6b4f73d92a2af71c6a6cada3449231345d6a242b9ddcd4aad8508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c5e0ac3939d10e021a1b7d4b3c4965
SHA1927336f9d4148d317d598e8bb122ca9f77fc3d31
SHA2565b05cb577dfaacd2759735bbde1a954df14d4dec295aa03d5d60cc02b5e7a292
SHA5120d0ee34be1e52e8bd524fec2ebabe820916e487b1e1f6fac70a9d5d45486e8667066bb0f8ead66164e4c99b5244686c5f18f2fe4776fa48fdefaeec0eaa9ea60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53509bd9425eeb6ddaf2c8641a1a74b10
SHA19be972db11a0ef359b16055442b561ec0108c251
SHA2569c4f3330f04ab08e420bf25fa4c8fdb6c88aeca98f485dc63f77df6ef532247a
SHA512ae0ca412f6946f33a26c551430eb13a3dccc665bffdaf280ee0ffb776ca3dbeec76968f659f213f643fd874954cdfeb3506f57729f055956973aee0c93e07635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd73c05461a4a424eabff085da86c0ff
SHA1fb1b16536fd16a25c36bdc5ac9b2c170fa5c18c6
SHA25607a42d035808999079790554368919b90ce9c42752baf6a6704b0c63d6568879
SHA512fd8fdd0c992a4b0620cc1d69755e27087664e327c273d87d0b706420adfe489e7c102c29ce11c783fac701bf2370f83985a83f6fc904e77d44656b9496c32d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950aaee0ad2ad746c7470a619d2c56d2
SHA1546750bc3dae55f53abddd5bf2d5938761a46978
SHA25668d308aa68b1268527af8b5506e5630c5e847fdfe5024dc2ad373780b0f07f9d
SHA512675d9358d61ec6766384578df95cfcfab544410a6baa989e8c401d3de26c4144c6028263d2ab68d15c63d66e0a52cb6ae4fd616871f81d35fe5c0a2a63446d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb25cfffc51fe80d2cd4ae98a1398e69
SHA16d0bf0bc9b1cc80e7825aa6d215076b60ee99aa0
SHA25677ecdf82a13bb5f79737bf6f99b7e8b5dfb25b5e378efda2847c66592b2d2239
SHA512373c48bf5738045f0f2c2150c974266e62ee3a393980b138bcf1f45c0deaed50c882702c7fd8b36156f04c37f628ed6bd22b82da6df2392e12efa24b17124512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571890d4c87ab1c8a789a66010b34a680
SHA1987769f6c5c0abdefc07b1e05b942d3af964afe7
SHA256c2b0ed16cfc1ebaa55abcbcdf66e852c31655c26b12598d092da11b349381f8f
SHA51225c7a4851c82f66459d4ceac74a902c3f194b0ed442ce805a417c462804bfa3e8ba8ea45ed372288476124d832bcf52fcdb728778e474a75a33996e4450bb34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf4568f94621e93912e3e86eb10f75dd
SHA1308f3aab46bb2ac83ce0ead623b1288e149131b2
SHA2563a9c4bfdd35225abefaddfe016ea7cf9edffa548a3bbbe7705b82865606d2ac4
SHA51245c04f02275ec48f3fc68d3de0e4a1d210d7f6a0cef34acefb43614b577730d5f8e4c6e98aa73469a1681c31ba1c59829daf6f2f6c57afa344e5292de5bcbb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b5eda1f5f49029c40c3d73130f1c7d
SHA14935033688dd701630c9496fc504785628d5e86c
SHA256b9e75186ccf8b251927fe477e26b8698f3a0a166ec9452b115e6f8049e4fe7b3
SHA5120456a4b77b667a17f80d0f4b704ac829720b6720fa8f8b7d44d298b721278c183855060fb5215814af164c0e236f0e5f05976e548f4e59fc934fc39a4dfaef56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1f35c0aa724f3f62857bc69bba92e8
SHA19771638bdaa5949aa40e0a1141194df72aa71c10
SHA256d9952a14887d9c0ff3039e579d3e0a856d9f861dad7983d6c4f47f4ad96af1ed
SHA5129784ce1de9bc9fd5ed041ac71deae57a4e6b64ff8bbea4124f5e3ee22311d2df04a47d985a3a7863c3f48e012af3c9303a32f7f3b801ddfb86507db2f1f46abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598051a2200696833bd33f5dbd7e87abb
SHA12b2014a75ed9fb21a61d5ff6147cda21e857cd48
SHA256a712b97cb8bd5e316c783de3b635c1746074d3ccad4b4213bbdff1103dcda61f
SHA51264c01ebb38af99d53c20d353a83bcd41d5df3386171f2d13ec9245d3bbac1f67b1bf1f6a4afaa8eecc3cbac0af1913b2afb12a0a532fdf9b892b4037fba050f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584578086ae9c8471a17e58bdfa2fd0ed
SHA1d4ad4889e0b434a2838bd440f3d04d6ba8b09582
SHA25659a161fdeea7212e276cf93c8ad7e852edb7f2e07bc58b84290ce7d657991cda
SHA512dc8a234de746e56ec690c205b91706c5feca8ce61b8290cfb110aab54d5cdfcf449b63300c38116deb489158fbea765fb0378078eef98c6a8b50474971cad70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a815bc6e2401d97034355799940104
SHA19b480128cbe81edd61f5a65fe874c672d1390304
SHA2563fb84a5f3ffcdd842fab267c2e29dd59c786374c26decd1a0a51e2e87e53b764
SHA51230b9846ce7aea3c4f8aa04feb9f5faf24764e0c62a7d829fa88c1dd1282af832f6abfbab491776deec46e8e85059244487ca014a37a3d682f2bc0b8377c313af
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a