Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
3acdad5d1ec559af95b11ae56f84da4b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3acdad5d1ec559af95b11ae56f84da4b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3acdad5d1ec559af95b11ae56f84da4b_JaffaCakes118.html
-
Size
30KB
-
MD5
3acdad5d1ec559af95b11ae56f84da4b
-
SHA1
f66d3009c1011af03bff024d78ee5d757ea8e684
-
SHA256
045475e0f1281609d05cf5ef2b32e07d28c86d1248835ccc89d09acaaa9612d5
-
SHA512
e24f00c80da06b5e07a0b809e416df96ebe670abb4d39bd275db7bee9b6b9fdec301c13a9be2e054579188c27e1e517ef7b94f18a8cb4cb6cda3a3647e0eaf86
-
SSDEEP
384:vpUBTkngvpkfpspXbGuCHckj6FdH6C0rjIyLui4IA8vUhHhS9kr:vpUOKWB5ckj6FcCNcfshQ4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a6e6417fb97505b8fe89daabf1455ba3e2f3d1423646b09901e821ec4ac1e237000000000e8000000002000020000000b47f93eeaf82fa020fa51a343b88bae2370278265918c49764d2f881531ae494200000009c9657127865b4de7a20a5211b0db308780db2d1039add777d8f118fe6e7011240000000c4d5d73668a618b73c05b8fa0f35cf7fa592045c5ab62dbd2a42fea3e547339eca39323d20488b9460d258e34a4a91ea94df35fdc5874b2e77fca4a5afc97895 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0997dea80a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421689491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16029731-1074-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3acdad5d1ec559af95b11ae56f84da4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a754583d8dca93b9ce1733cbd66f614
SHA1d01605e80d0e8a88e02dc09cb3565e3116757778
SHA256b4924538aaaf8b51f660f90f178e41fa3ac859f55e00246a8b0c1c4ccb311fd6
SHA5124ccd614e3121317246d0ae7aa459b9a25fafb19327ed4cba8dd42dafbdd529a701429a08a80c72bbf00ee8e97fd13d2f7c2954ddab14b1fbeef5d5ffbfd050c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c423f20ed561e0e9111d5efd309f5e82
SHA129f6aed2c376492cce6e68cac3343bd62e1d6e95
SHA2561399205ab0c17da31b4980296af260b3eb9e95f9742fc0986cd4f00f588729a7
SHA51221e027ab100f1bf82966c49e83fe34d6e370619f05672f677cf073ef1d3e7d31b02d55950376538c6d961caa575689d0c323f842f1d3e2276adf4733a34d13b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc2501f7a9886ac3dad2685008fa390
SHA15bd7dc37dd551f8f1cdadab15529aa1d6f8ba2d7
SHA256bd42e583aceb6ee7b0da9ad7239c4eb0b01cd26dd0968f7bad3c92d61a1e14f2
SHA51200d2f27b714a805b7745beaef97678bae6d3bf504e1568177c78b79da8c80bb5ac87cd567177b508c23944de1f0e14d8dcbb5660f4c039646772f093f00c33d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ffd105df31fb88aae2e92c977a90b6
SHA1ecd6d4d678441ba3b8daba9a4814e892afc88af7
SHA25676afcc9dd06f1893493bf5ff9aff3a1d1a83a8f8d055806790d8960aca53a56a
SHA512592d7ab9b2029e3b0dff611da98e27b11c4c009a019bc7d9d7892440edb66712feb254ee77cfc94711f2b52c9ca68a8c7ba3982df44fb511757aa6410c6d082e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58213b2ff8a4f2d8c1689198ccc0462cf
SHA1bf35dc0f7fb73c960a7a975f3ee0fb12f70971c1
SHA256092c6b20a2e4b0ffe629b58d3300f7ba113cf0d7b3e20683534234e80073af76
SHA512b0f3db9cc655deb04730c0e4cce827efa47749b4dc8fee835dde0d63b9dbcf486ffb57003b6a027980f6b56b59a61f976dfe7f9e8c3a4312cac6224a1a8ea52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cdb31637349b01d056a94a6ac1e542
SHA1a95b5494e2d4a63262e046dae53057649f7cd8c6
SHA256a6474b4cde9bdcdb57a0940401174e267425a35ca3e49f1d438aacf0448b570f
SHA512ac0b492905928cea02e965756612e0b20fb894c3439fe8e59e3c756ef71d563ae38e2a4db110e4d0a3bd07c5497fd18e9ab273e3310eaa3475bffba5fcd7c8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576887c58e70da5bab83a5566ab399aa8
SHA15f04e53b5f56fc0375d73a89d64d0265c7a6e1ab
SHA256fccffa7650e05c093e9ace804c48dfcb71e2c954b0a9c7b94623890c20f5352e
SHA5120fea3c26200f69e1d8c34a78f61ccb42f3b59b9fe408d9bfed49810d3d0f4cec07a94c152d39d24fcb2d94da312bce0dd755f467f097812999f97f97c8e647b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967df3ed0a0dff69d667c78ae3c2d39c
SHA17338dfbf3b7f8071772e5150cee9c45def998cdf
SHA256c254423cb90a8c37a53dca09e7cf908de034c9edaf16bd79000b215f80af767f
SHA512c0fe0acdd3fce0d380e0f6ff7403af8e0bf2d1885f76c7c4d94834cf62d6df02bc47ce18879ab2b9a7e85d97eb5b5daccb1405b06bdc4484ef23f73d5c4a9d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b06fef5aae26b56d63a3c5423dd0da2
SHA14f60f13aa08943e15ac33f9c889ff1c9bec8745c
SHA2560d3d6ecd555ad1e44c3d7895e85b3379bce256e309b1dea92d8a986b1e964ff6
SHA5124ea13db008a8b5faee89490c6c93bdff65704315a68e7e54df8445b3316649223795fef7703bad6ebc396f092461f1bd1244ef4d4bac643bf170e646f2b5ac68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d6338bf4dfd0d295db0ccd3bdff792
SHA15443790ebd314ce17f46f7e2c3f41cc2d7e810e0
SHA256a3749f1a929ee5ebceac3e7adac8b854b5f31a58d32883f26cd5cef9ab9a0c73
SHA512befdee089ec28e13ab15ea4ff7cb97324950ab989adecac02a22f2749776bdefbe22191aaa5835ffd6ada48b74d72e7710bbefe8b9407309b50d09c3b61b8305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c367a83380c2c45b4f034663710897
SHA15566fc35cb8e22ec4a1d505321aed5a9b980c882
SHA256dbac81edd95245e374513ad0de8d0a851a7fc884a8c398272460447884a70f37
SHA512841798f2dfa311c871892dc6246b1ee10b350f3155c88ac58227f56712c59d7768fd8ecf9f8f9dc4382dce99ddb404dfe28f9fdf2d3d7406053df940fec52ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b7ed61a2704f888240a84fb80c5480
SHA1cecde91afb630a9e2303726fe24a80656aaecb70
SHA256ab0c6c355ac5cdbacd7dadfca0161f143601dcb470d126076405dd9d48679855
SHA512b1626cd9818c04f4ba198870ecf1e799e67f7df221e30ade61eaa2362b623b8eb9461975432d4a3162cc90aff03b380b806354563df2066de0d0a10acf43f2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4abfb9f9ee90d831cee73fe2ff3d4e7
SHA1bc43dff20abca0a97c81bb8ddd531cfa37c86608
SHA256862572ec1976d638f89080020b0e82a27c3497a0930d27da6a51e190b18e22da
SHA512664d16e8a9457adeedfa0627a8ed75f2659c7da88aae532be5af6ae21162d9bd959e8a5dccd20bffb616d6ebfcd1d3c67f5016e395a02127806c8b15cfbebcb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522fc5303971b34e84a7dbdeaa2f2afcb
SHA1a577bdbd1599de8a35192e928af57df4e6d732fb
SHA256b2d77de96f9f3c31b0f9c8710417a06c30e0f52db3f491b5de27a7e262118516
SHA5127173e2ba06312ace24e1b38fc7311778c9059c2be1068bf4eedce464b8dfe981484db3156a5f054be8c439bcca9bccda533ed29f1c230e365adb93c40822183c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a344083eab23d01ade88133cc294af6a
SHA17024d42a6c65e595fab6d50954c56852dd3524ba
SHA2561da188a2c3b5e84bbc2e4c989e6ab6912edc50362b07b2bf590d65fbf9f1467f
SHA512026b71cc88c028c3945c6c4aafdeee3ba34609f43053697f3ff1e3f0180d2284232164c5176cb7141da1bde47b3ed3f394c2808e379233ba53412c960a7f9278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198309c975e99776c0c369613100f579
SHA12249a74a46fa1f06bcb5c059635a309c7f0c95da
SHA25646ff50119248245c26c890a8d99e2bb0c8d792252d2f8afca445a249be5b678a
SHA512459d63267aced708b9cbed6c8d733e6a8cce5993f440823a842a45c3a6315fd0da877762f8f39b812b48619b215125dd2bfedf85157a7fb9f00d23e08fac7904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c800728ab323e0112b82b705dc44ee0
SHA199a66aa960ba64535c85128e9e2ead4a1704979c
SHA256bf7b01d5d41887eb52e9c5f109e1fdc2fcbb46c597c775a1aadd38fbaec730ea
SHA5121a224dc56cdae827924e07b5c3d4eb030574f0a8df40a8de33400d0192059d6f5b610de2fc9beb22fb8ab6a487862d1f5d2f46d0422a6eaf903c2f95ac2580e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5239803fd6886ec908d315400b2033
SHA13f40187da29cfd41c40c4e63c0fdc95927c02226
SHA256cdbbfcd0142b04a8716ad4ea3fea8ee6362eabe6be2157b5f9d1e0e4a4ff248b
SHA512e101af8706c279e6f6ba15fbaec8cae8b062af315dc4c5d4a1b7d7162f3c0cf1d55451a45a8cce86bec86e8768e1fa4f99450758987858fd8e6720256433e314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59698bfbe3866a18c3ce039f3a8fe77a6
SHA14cdb106c4b65d979ec70b94bf07782b4a019a434
SHA25666eed9e78ad6e1616d167b7a7dfddc39aa543adc286dd7c0239b987ba7d5faf8
SHA5123dd12d0f46145c5a5a9d3fd62dc5439a587d38fbadbadd10e2013a3ec1737ff46c32a74143f398cc49915026e56401c2d1277470c47bb5687d872df391eb395a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a