Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
3afbadf6285c4db939ae5779272c378c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3afbadf6285c4db939ae5779272c378c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3afbadf6285c4db939ae5779272c378c_JaffaCakes118.html
-
Size
3KB
-
MD5
3afbadf6285c4db939ae5779272c378c
-
SHA1
b0523d4a08556ff222807c1c0ff4c48758d704ee
-
SHA256
54d12228c8ffeb11c7ecf9963b3553cd43fd3aa2cf0c6befbc1de75e96e8aff7
-
SHA512
49a72271552714e0d5c0c22c78ba8b6b7a9bca3fc0b0cf3e644c912c4c35b7646da61d1dbfc7c3569fe57da16a35de6231fd514e69877b1ec2bd7ad820049dab
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004a61a633aca31d74109eb95896771d94c5c4b202c8bb9eac7fc951a0c88ecd01000000000e8000000002000020000000916eb0d39bd96323392ec4323552718c9aac20ccdf823845a76c539a37b3b0a920000000a6e8469d3b14b5ee62a8ba741fc12fda85b87dd6ca9ddd8b44f2a0b544f72e5140000000b8415a73786973be4f61e02cf7bdb5a7fc5eb16055e5042286521c3b53a48dfc8205f49dc2266ef1b6d15058d6618a98025d1ce0ecee534548c08c8e275c1fe7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6553251-107A-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809a158b87a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421692338" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3afbadf6285c4db939ae5779272c378c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ce003a644beea463427b2d4c694d8c
SHA175b16d4bea1a62e2050e2dd36a1a5db9a950c69d
SHA2564a2bd9e7d63ce4dbb46fabb0c85e2c4ffde63f288458af1abdcc73aabccff761
SHA512753c685a68bdd300119da9ac1c372053abece4882d4f79fd1f0aac1d6f1795e5ff87bc7ae5a2ac37fee409cca3281c85374f60c364b7ec83a3c8cdd0a1fc22f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23ed6fb38240e97288e559ee50541b8
SHA1a10944a7034965f2335f6f9f9e4a72d897d60e52
SHA2560f4617577db3b5a339bb5229324e3444941b2f37971bbdbb1221dfef2a9c35b5
SHA512d51306597d0c5747d788e9ab932b9f6ad5c82c3521ef1dc4d59ee43d499f36e43afae428951062b8d925b019b28e8cd7fe39eedff0d19e85e3f5ec88a592dd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d836ad26dfcdf35727a30102854ab33a
SHA116b02cc7a5d6f4df535bfb661126691759de126f
SHA256eeb741fadb239557d050dad329f2d82408c7ebded23a46109964f04cd8bee6fe
SHA5128969c1dbeb939a969ce94b0d01756c197ca85cd5d1747cf0d0a232c227df0d177c392917b8c41c303620e7141c42b819a427d594a944395d15923b88a244c916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596979208aefb0e1dc925cf12dd41935d
SHA1f70ef58f7e5b318dafa9e6861658e1d872459f0f
SHA256dfa276480e3056ba53258790af6809c9c3dd5881a653e4c5f16ea69d4aa40171
SHA512591dcbb8def3ad76893c5ece8c16535f1b8b03f481352a5825e10d36df6470f552c2e520390dde7a6c86d87c86ece1c74891cf8927bc07b72f7918fe47e9ede0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54482269b8fd71f1750a2053db9e152a6
SHA17b3923349153ac1029c029f86ac9cad0f4cbc062
SHA256bfcd91329bd8ae5bff09562ac8f9568c6d36e65f3525eb3fdf27d39f514470cb
SHA5123e9ad5dec87c2c400f7f70635a20acd937903ff0057f4f782c1c365a8364904acbaaac694d792fac783b1cb65a61c88ecbc6168243920f75dcb10cfa9b3fa53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eae673c66b0a1881edae8debe26650d
SHA1354424e58c6610cfaed4fe9893bea77ce141eedd
SHA25604507f948df5a2a297ae25c92626a52885334f48938892bb6ea8bceb2c66f320
SHA512427674d6090a62524e1112c02303d63cae2bdd5c5c0341f3637a596d65003f9930e6056c0e1c774eaaf76c77e56c0328cd9296b34b00db29b8dc4becd626d591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a29fd14b5af28500906a9e7746e319
SHA18747f94619bbc7e2e1d18f5b894fd798c7ac96f4
SHA2560104d4832d15cc5ce1ce1258277a04bfecf23b2f17d2c72aabcd710f36401a43
SHA5126ac1d4742a3804eceefd2ed1d2495e4c1b8fc2e314666a99a2241df15cc5e7d8521ded292891bb8c06b3832d9126c127b052ccc454fda47d95deea4c7146c115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9331e2f5331594aa2156f2f6005609e
SHA1382d5fe3221ccb35ad540658c86fff78668193fb
SHA256391b5af7c234fcd7c5c5c0ebc1777aca6b086f1d40399111c2a33df6b2d123c8
SHA5122774bf0a111ae15150d1e0e617e10ca07843989f085ea505f540e29a1648e0bf1399f01e5a0c0dc0547408428defd68219fcdecff06e4895494d5a7b278e9eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf66f74431cc9d65357c8b507438b2d8
SHA1525931e2bec6e242a0f9f71700c714ffb0f49331
SHA256d3ccaaf755c9032220ea8322c78ce9e387ba1fb78178b7ea2e8b8aeaa85a24eb
SHA512b2b60b7e7fd236437fd5a4ea8d3a6dc01c998e3fcc4453ba518c568288209546b469026f50dfa6e768f1f27ba97e03443de0e7876376974e34d9ad80bb4e83fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7bf243ea395cf479892a29307ff3f3
SHA148804da87bd57c6459327de4acf4397e54acb8ac
SHA2568225b7687e470cc8d62729ecf2f88875dd75d741445d3e4b673fb287c516f4d4
SHA51202e56bffbcf1126f2586b49e9bb68c05584d0682b567c0e060e1fbc0f40233cb6523f19b1a2a237ebcca77dfd1f760923e7f73341565beb06afae2d2b9a53c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581d008618b71027f09e1f8aa7d002cc1
SHA1e2dce0df02806a22c23662ace920708867e774d9
SHA25603a0276def22f6a4949e97c0438a0bce8768fab4d3b89ccd915f9dc938cf2d44
SHA5127b95ff33b519f1272ff0229e8cdc49bba431cdcdfc9f45fd11043b45b298627bed03fbb7b2d8a99c71aa4d61a521d570259927a48559e3dc7c8e4d0ccbc2f27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c183dd191e3dd39de664f7ea273d90
SHA187494df216b7df961b63156795bd18ec7ba20edb
SHA256947e5d13362a1dd8c8144a518b1e9f0d08e83262c103995e3c2d90d87a6874de
SHA512155cb0725dcc798612f13fbcafafe9c413b88af8a14cca75153e52e5a1e990329085877b2ebdf37d5f2b993fd41cc66e2245ecba8cef2ea4ea1e73218982334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529578a994038f495e6cf6904d9dd66aa
SHA148bcf302f56140b4ab47748c4e54e597baeca49b
SHA2567464d26bf2189b1926fb014bfa08cf50e72cf25f34c29eb702d5fcdeaebf903b
SHA512914168d5c06b195b6aba5dfef849d978da9473da12a2c1c3330e5eff42b05f61a71a75e76af0959abfb88d260be340317eb8ee776cc41377d7c48e1ce7e9aee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52016c1de778a885da3e3ce50487b6b32
SHA1dfb43e458c6d6acac0d4905f2f7ce35f490bd74d
SHA256770af8f96cb0bb1f0d7492ba99f9502f15dd922258306ccce2fafc47d288fbeb
SHA512b6952f923001bd6f586836bc994db7d75405e45918e645c404dd6cdbb1c2c7de9736b735a0192a98c7c0a31937e25ff42a58a0eb9725ffa654258d79b446d302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b492197c5b8e280968e22ac60a320c7e
SHA1c3df10cf5197ada16c7c744ed42df38388f1c23d
SHA25602e1f47abb5fe4f6c48e531bb553439bf5e2c1d54d6b3f0dda9c4618804e8e77
SHA5122addd1ce7ab80de2468684f38e4324481e364564636e4f46c351ea7c10e3ee9bc53d2c514b480a36465a32f86cfcc81f3bd4155e52f2a6f73349a6ab178000a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5384cf0d8e7c5e057d6df2a0ea1141
SHA1e8963efaade1d5029ef47b3b81b45136f1718f60
SHA25688d3c1bfdf918d2f726a3bd7e314ebadc8b251ad0e474db265cffa3406afa0b6
SHA5121885c7f29030fd61c557f75ecc5b93528d1ee85357807353a139f1b81b288ad4746684e97db53877bb6545cecad4888664125bf04fb4e04e659971252d31da29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbb34ab823421a4881997e0fb84b6211
SHA17f4f036d593d305d612556c7592cf905cf559901
SHA25698ba220577cdcb0fc72ae2206cede9512eaacf7c14958c31d16a60126ea05012
SHA5122671e784a0f0c8f0684a476716e6f220aa0486fb5229df73600112e4206d0c0dbbba66a519930684491495dd5148bcef0a17b827bf952e2f75d39cc929fc0426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e38077d11a789d3d34f2e7b2b3beb6
SHA14473cdff7fe7adef63f67bb03a434252865d975f
SHA2560ad416f05906bf715ca34de10fd3d9099bc46b459430c5a4603398366df11449
SHA51286a8116df01f1eade92e0554a1fbee0ab03625fefd43a2715f16fecb8afe0bcd1efd891e9e522227e2b7dc56817450eba482ba1d8038e9a7ae35975284142076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82f1039d5a977962902cef87c729488
SHA158d7007e4815df75b29a4c0da38c0d927d0d541c
SHA2564d53cc7f7faa5902818c0e3ebc1151d2859091eadbbc44a1ea058fb121b36fb7
SHA51296eb864ef31771a6dd88b0f177166b0f2e33631b8a11c19d5c970ec8081518cce3e2cc04b371c702e9c442bc241afa2a24410b512e3622ab2220b7b668787858
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a