Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
3a69edba3cfc429b38b506ec3cd51fdf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a69edba3cfc429b38b506ec3cd51fdf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a69edba3cfc429b38b506ec3cd51fdf_JaffaCakes118.html
-
Size
28KB
-
MD5
3a69edba3cfc429b38b506ec3cd51fdf
-
SHA1
8d1aa4b9fdcea09d36ed0d5f5a95ff62f8dc3e6e
-
SHA256
d32157c872e3ff7ffdf867b54c9acc52e3a6c971764fc2c32449f8381458a3d6
-
SHA512
fd02b00f9506ea0062b7e6d2f782fcb6dc2dcd16602db2594bdd1f8a041179260c8ed8c92f92944293adf0866991c73101ead3e8b5f782e16132b2a60ed262a2
-
SSDEEP
768:AYOfzWfhXhXJW8cw3KBYkuLJjXGzC4jqMotkt:AYOfzWfhXPLcUKBhmjX4jqftkt
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E356E9C1-1065-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000ec30c4e9a8487afd608b641fac500dab5208ac4da1119ca42e2ba470e6ccde1000000000e8000000002000020000000e0262f65f8b43d6666dd9a01b77fe8970755d35ad29909e7dcf185bd40f13838200000006265c28c1b5f98fac9bb0c5aa5f9a626927f36f1c5a91cf8124b2cb45f59f2bc40000000026a0cce490fa98190f64c6eeaedb12af1f8618f350b4f3432369772b995d54d6c0bf9ad53ef1325ee45cbf8ba6cf85acf1fda0779c7d97b26c18a57cf68688c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ef47b872a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421683393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1456 iexplore.exe 1456 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1808 1456 iexplore.exe 28 PID 1456 wrote to memory of 1808 1456 iexplore.exe 28 PID 1456 wrote to memory of 1808 1456 iexplore.exe 28 PID 1456 wrote to memory of 1808 1456 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a69edba3cfc429b38b506ec3cd51fdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d626fbc20f476e01acf5ca4cc48061c
SHA13dc2041cb7edcee7608c1c19485e111d5c8030b4
SHA2564750d530a8cf4682075d17b7ff75c05a77a43e6cb86d653fd125f402b7f91c5f
SHA512194e47913d81f2cedb412b8a717b1bf7e27621f253449ceff6ef003f703573776af19c93ea6df953b3c6b372b74986fe235f46ebd756e4ccff2f11455d56cf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59507a760f7ba77a8b47229f6bb38ef30
SHA1a4554e10c781e42ad876d5fd8b7a094422647a5b
SHA256fc2b1cf86183fd149832e3b88bd1613b72d5f5d1027f01ca33851021ebb4de06
SHA51254f74a40ef9f43c75616cb13220af24b1375365d68308d36d27bd36d91ba0cc39083deca8119e0738a10fa436d6c24c13f041c28c7271ef4887bafb81df9b3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577984975aa088d8617c3271eec1f3c9c
SHA1df379760e2d06e141dd5bdf33693b60f2b54cc60
SHA25635a3e568ca81858e0a695a22bb0da77f3da6212426dda0f33ccffbce65dcae17
SHA512fa34a38a9925d4e799ae4d1c48f5d94305b81d5cd98a1b9d78450ebefc3f1a5569d2ad8f89d66fad5e14e13162c313cc1fc909be5e975832cb0721b57213b80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838572cdae03e7043f3da241af713419
SHA180e758e0db509e59098915cd053828bf2c9a9d12
SHA25689ee4c1ea09e6ae33ea4474438fa17a2bdce0abafe42c3de9de0df3c2f2a47a2
SHA5126bc0b0c4ee9dbc92387d062625af9d7d0e2fbb52a155992f7f9effb13dd4cf1208acc6cf77a14492af29e05fe46eaf7b5ee533eed3ee137dd2ccc75df36bd646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf80e40457a3324155f11fd0d6a1af7
SHA1230ebfeb19cbe71129f9d55a7851c1281d0cfba1
SHA256dbf90c127c44cb9844d3e752d2fb1bfd99121b8db84cf025fc77baa9c5890e6b
SHA512632c7d02ef5f7620ea111f266dce84540c8ff6d28693386dae453c9fc31e373cdfe42052a86306cf0c9736713b06a2eedc6cb00c2dc70946e311adb95f4c11e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab24091dfbd6c965a83cb1e6c541064
SHA1ed85939d313daa6d7a9d02777b84f3c7d92054c4
SHA2562bdde0e2b3ba908afdcc05bac35b7493f95feb2e0bead279f7d34a7f3e58ea6d
SHA51252c982398356ffd8312186eebd3bd4efd1870cd20df88f8920fb5a517df02ac2281de4dada05f0edf1703aa1124b6a16eafa351f3fbfeb560e30d998ae240113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ecdf584bc939dfa3a6970de22a2839
SHA19a3c33a0e4853719d30a62fa8856384698a21fa2
SHA25621452b5371ab652ddb8fb6bbd0628514854865fafaac18d246379c6ce29c0f05
SHA512e0a74c0aef496fe29dbfa881fcbb0a4e37b742f88328758474a8635eb73fc2be18fe54a1346e0989bc4ce85429138e93909065b470e7e21639edf4665dafba90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe6c78cea9f664031d4e2570c5fd03a
SHA1ad064bc25948eefb0327dca0d11e489951a1a437
SHA25648f40db2ce65e9ff14fcd02e3c6d79f75d4852c4bf9c2921a5fafdd2bf18abb9
SHA51295a066276c972bc76e3bdc1f449218f445155ba24126b921f5b9a49bef96679bc21b536e76a4a2c52bb045c692fdba88ac978212f45513ea94047baeb0a5c950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f3aebbf50d7bd7cb3596cac24174314
SHA13d2f00e6161fff1cc304cd94df950e8f80defb12
SHA2563e7f893f5fe996ddf2e1e7638e3f68a9340169f5e409fc709b4d3ffdd4700e47
SHA512dea9a01c6a48a7b6c7746c1ad8cc07f89c1d48a00a40a6a692ae2288dd9f5a00b7aa1f8b908c5401e0cbf475f7ff7ad88e1f6f4bee4c62790b77e8d0091e7fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9d3d76c1dccb7ed57626e6ed86c47f
SHA1541448548f0bbde9e2f8764dc7d18373fb8fe242
SHA256593c411abd4885cf27ed461bdfce033c1db4d501eefe4544cba02e70213ae843
SHA5121a16bd8aa1f23eb0de84e87578f81531c990ac78c07976941151165b958c26dbc81f6a894185cb5062a991520e202e1494fef4911fc2ef2b49895706709379bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f647664d8ca95a8b8540e5d6aacc8cbc
SHA11fbb6935f537efa957b838430a257cc9ac69af00
SHA2565bd254a238453c7461763d84392d1c33e5205676b18d9b4cccfe3e9b7bcfe76b
SHA51247a007a9bb7b9fc4910e75041e8a0c099ff03d10ebbd14a0f31c6ade1a0ba748469fb90d52d55d2609857c630549c3c47152c6f232e1379d23d3a4572d8be082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542c993d6faae75d49b1b62894310adb6
SHA129e845f063faec9511661093d427c165043768c9
SHA2568a914338c8dc09638be3e9dd12463a0c6d948e2f06f40796a3e113ae5b5370a2
SHA51202f1a4a1a184d9d4b7af8c8c9831b72560fb031abdcdbb05b8a92ea4b6072458d07f5b48de029ae227321937ec0c02a8161542095694b828e1a10fa17d9c39dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb37583e171301512e6375de868f215c
SHA1b46f220694285a1178fff324723321fabe0ed924
SHA256d927e0f810be2548fca8bfad6da6b7912b5410620f0bb58274ebecf2dd8d4a4c
SHA5129eb13004b337b376b72acb2a9065ea02c2e77789eb491cc7069aa7dd40ca943f0ede470658786451d1b9a0dc4f80532e4fc45e6aa08240c2edf8b77666da9d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d908f6944984baae82b8e9fd5a893bce
SHA12515fd11d9e3565a6739b9d61e04934eac52ebce
SHA256fa226807eb3565c58b45f38f4af18729e2a6901e93157d67d40a364f1dcdc61d
SHA51231ec5aa88d5184fb01fcbc074485b3bf7189dbcecc12c7ed04a8a3d947e1f215327b0a827f6c96d3a89d19d2817252e2cee7f8f3da04f45d985ca8a7d550b7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514304aaae9c06f9f2699cf841a481858
SHA183531ff4918579ada1a8bdd87dca6bf3a715cf9e
SHA2567af319e5bd462306108f654c95fab35b5330dd4a836b4b4679f549d092410361
SHA512ffac2ea2df4523caaddb8685f0242b43ec8eff4caef1b329488c3d8b784c27a13da9f262b412736847093ae212e86308ac3d113b50f0bb9f10dd72520726bede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9229531323a6406b99c4a1a94dd9d6c
SHA17ecf83d4af73ba6f91d6083873437456f4cfefe2
SHA256dba3b1e667a9561b44ac5534cc755b0a1dc3e14c5bc00fc85025f2d4a07c9604
SHA5126baee4e9339243bea249da2d5822983b75d118754b78a0f6d636b51a8e27c9170a2a933f346b2e5041c6f0384f0e7b878dc717b7cc56e9d7556d645317227b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf3b9d0c0023fa725a6c35dddd9d047
SHA10ac15373aeb6491de88e589f5ac420eb31cc471e
SHA256d48b91ef45a262a28d25762f877ce5d20ff557236ba4efe6bf8017a9ecab6560
SHA512c4c4743ab816d4e502676a276e13e9da7dd8d442850fb6f9fc0279d18c3529da5e8e09fe337064381bf927716fc68d65d9c7cdb71d9501cc93f81003134b2ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57059cfbda2228cd5d6c41df3adefd8ae
SHA10a7a804fe97e5984a105a68e08d973d13d5aecc8
SHA256183ad932bdeed8c00b675febe0da2127eda0ef941920856482f73e31f8382249
SHA512110ac4d863f0b1239afe23232935ebccc6a29588368459e464a9f165d00bc0834bb60cdc268bc9d9cbd4aa3835e9aab96639faa838ea554fb567403325ce1e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511954057b29bc56c688635858ecd0cb7
SHA14ab812b3362f8b01bb98203a787a799aa56e838e
SHA25656adcd4db7d00a0d627130d398e9ddf0d81b760c4a29ecc7d5e6689ebfd7f3f5
SHA512081c192cfc6ab8a84fe2401cab636be8e729ed59823b30ce031e59d1ac16a5583d2663a251be67fe49e22f5b019c77dba115f11980dfd21fcc3f7fc3d31d24e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f9d273e9c0cd76c228ad9a807110bb
SHA1d65b29ced0fde453b0c8d50dd9412bcbd7aba640
SHA256420288a80de06e2a8fdb22ea615431f35a4a6ced1f375cef7e526ceebbea0997
SHA5125eb360769fa615eedba1258730e2a4cc51fde85309c2250a4d1d0abbd7acff527bb0bf30abce56feface11f4c2d8d1f2c515e7c87881d519e4d8bd82a8f4542a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a