Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
3b43d7783891862420021d2cfdd678cb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3b43d7783891862420021d2cfdd678cb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3b43d7783891862420021d2cfdd678cb_JaffaCakes118.html
-
Size
3KB
-
MD5
3b43d7783891862420021d2cfdd678cb
-
SHA1
329482f55a34cc4c64e104a3e5cf0a4da89c9c39
-
SHA256
dfe63adce7276e2d362b8a03b67d2985b1694968c23592fbfc092278424013ef
-
SHA512
8b4fd66fe9e7241181f60919863775130374d19df941321ed60a0521d0b55d3f9ed8238886c8a5307c9af2e47c4a7dc3a194a0080040d9062c8b988b4f638bbd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30040e0092a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000421ae02adf89a40bfc3ac53d3d0fe02d59506d34aed4ddca2ad9dcf00403f9c2000000000e80000000020000200000009a2e04d11ddab1ccd1cb99d4ebae41b33dfdd8e2eb5e2ac768620eccc1fedc6d200000003291cf1f05c6683201f8d3a2ee960427aa2be509236de7d4ab73a1c9c97fd13640000000642177910b3b66083fea37e0dd296889ee3d022be4f51e51030f2aeca1898b5de7b03a26acf24ae412ed7dd18d8d5301b009bd1dafd2d9c6183c6fa9f0f1d46b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B3C8501-1085-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421696829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2112 1736 iexplore.exe 28 PID 1736 wrote to memory of 2112 1736 iexplore.exe 28 PID 1736 wrote to memory of 2112 1736 iexplore.exe 28 PID 1736 wrote to memory of 2112 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b43d7783891862420021d2cfdd678cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e96bafc07ea653dbeeb7195a46ac9290
SHA1f77018194b9621c2af3aaebead000cb94b92bb51
SHA25684e7692c24eb46000330572213dd3b2345811cf0fa1363896a4b1f44c702ee2d
SHA5128f66dd452a017b1ac75867db3a3f8b3867ce0b9b037c0ccb9a5a0914188d0f72611eb2a74d4e2780098ea5a2625fd10ea1f28cc9d9330c12f2289e5ad3c566b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c196ef31320bd16c894f1b9439ccbf9
SHA14a7108d8f1cd32927318663c484135b88081d9cf
SHA2565c53cb2797c8351614e1057926585c708916cab848501050eefb1e27483e4231
SHA512dab390ccbdb4979742311d93afe47a9d283197dc1c5fa3779058074c5b89b0392eb8fcaa6c341b2bb71c771eb03954bba8ddaa6ce6e3576b5e3635bc05caddc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7ea55db3210ff01b46685c773a6201
SHA16cf98254a0e0d0386d7dd3754b1a756bfd5e7ff4
SHA2568a66bd9171b9b8cc8000956a22c463ba83856a5db744dedb668d1523eedeb36f
SHA51274121ad2d3e5d234be42ca2b075f8832e04ba60d410e6e02c0d1c8bed4f21798fa5793cf940773fe54d9c1e9b6244a6f1fcafcc586ce4d04631ba78199e3e4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b9e50c91c6535631e04455a8b40a5a
SHA12cefcd9fb72633d55f3538409d8ac8f59cf85231
SHA256a921915548e0e1801d8eb3ee12475a29449d018ea56b5b98a9b2bb61c5574cbf
SHA512f1c3f8e624034862402368108762c682a4143be03707a8646c657f902dbe021acb40d7654e5217f369bdd8d027f0c03107a7b5854ebc4bd74836f6e0ab85e049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f52b9f939c81128689cc875eca906f9
SHA11327e83199a97461969cad997113c1d189cf91b4
SHA25669fc8ce284755eb80e9ff1b386a5de96831ca29ce2dc4fcf5522496d0733c2c4
SHA512ccba9c4919d699eb87cecad150841679f2661f0cd1e5731f21a709ffbbd2f878f5632af000ea256b78c5192373279c1fd22c00f1cce4c9283d1dc07e2cac1ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a2d243bb3faff57f971b638ede4c0e
SHA144830ee93b500ae2f0b86d5b974c889b19ac68aa
SHA256b88feca88ad44d6d54bb903a5d5414c6313aaa99a6d3492bf3ad16cb2ae46553
SHA51212505f2ec2b5b08619aaa83dd61edc8e7540f3001df037c52ee600e5e2e972de4d15f9e8e611d21980da38850679b4c3fdf568ad26231b21590742f448b2de81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3082308ba6d6fafc8d0cd631d523c2
SHA1bd975009649ab2dd2a1d1f8a7be48f4367ab6024
SHA256d6b7d717bb429625653fabd49ff09f0a720abb24318fdf16f1080376f0816411
SHA51262edcca2496a5f45bf2659138fa1cf0cb19d457e6f7c99002d78a1c8344261ddebe192515e4b4a1374dd6f0d91c60d0c3a6443ab302b4b6f8835759f1b07d1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f432e95b0297a037be8c8f137754fa50
SHA1fdca8530206ddfaf3479ce5a7c038a07bcc7e706
SHA2562c537d72a4a217c4ddfec6f6ad103f400383a082af95c5397b105ef7180d1a76
SHA51254f7bbc5e5dfc4713386fed55d1fc5c104425fb20a07bfa5ca58931de700a98b8ae14fcef8589eb63df7d3f000e7f530dce2e658d57ba755ac83e640d5308553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05b2f6f2bec4251a141119c4d7f6a77
SHA1d1718f68586e21288dbed87d3d45859299781b2d
SHA256eceb124061d6c6965cbe4e95dec7ba82d5cf9c10f9d13c036d2063ee603c7619
SHA51213ee1b6824162e3be3bf36f3cfc3b3303d44ee8131f07efbd1da710e3a9ba7a3b490733cc215b8d4f68220e075284d6c31d1e162c3a3d71c7b1e0bdba22bf087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf04b69b4e08b4affd3d46863f19e82
SHA1926b057df2e6408d4a62d1cc54209fb44af4622f
SHA256c983241c38173fa1bd78efcd32adb7ed087b12ef3a8691c9bd911fe8c2472500
SHA5123d8fb8f7df2794f09a008c9893b7a4e60123dbfa63605f70b1265d0d787dbae7eff27f080783f04b34fcf48b665a214aff6b0194aae04930287e17c7c362cac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08dd5ab9925e4471a25f66d8467b6f2
SHA1d94dd356b1f8f418fe16b994307d905959c3d9d7
SHA2562de518314e6e38cfba488a17ba23aeffe8cfd3e5dd971cff6627a6ce24d42daf
SHA5122c0c331ad989c1171013b8bf319877c2360781ee1883532e988f29c6552a42b367da48b68c1641856a4f27a9c26824448c06af7ccaace734d2fd6a859b5e6739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522db037e7ec73d4faa32a10f4065b37a
SHA13199254799deb68e7c64940e4513f96d85322d56
SHA256cad298e63a570bf13e5f2dc0118d2c5851d8a48d4e06d69c5f177129c447f944
SHA512d6ebffb48111bb029d7ba4c763ef924f3007f81042549e857b3768080bd33cc9a21dbb94e72f89b3050cb4173e157455e17cbaf79ab41c738f2e5e177c52fd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f2cd5d55f8f566026ce5333925808d
SHA1c6bd44fe1cc3d0978d86ebc76304991d6566826f
SHA256bfce61e32c20507f03267fc456b15f06ee9b54d5a571309ce7c8582af22fb27e
SHA512a134c82f350240f584d73b9902b12be6f1185d8d3e3b1327d270c2843c5dba8cf59fbd62bca04224b7d5dca852b79f12104f295a02aa2cfec015ca1ae7a8703a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d24937fec1fd94d1532771ff0e9f28
SHA13bc6c1e3489883870df25e1ba7c1c7b726052500
SHA2561b64434243c4a0f8eb40bed1431e1de41917de771d7b3ee9dade632ad85730c3
SHA51285fbefabc18308b480bdb1a6ce759df430bbaf4845656028ee726553cc04a85a42d894ee80fdeb0b0b2b127906a903ce8e44c32c953b876a569fe23433b5653b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596ab6760d66290a0e15d26a5575060d1
SHA198a64f719829074e757ee98b0392d45eb8017e7f
SHA2567ddd11a6bdc2bbde4f95f4faaa3daa923f184d1c7270da3b6be52495f1a64db2
SHA512ee61cab9f7eaef528e61b8112d37a2d2f5c70f90af5c0cf36f0046989f337c527f4e583f3c52c48dd7317c031bc45b36862ba23e5d586004a28f73010e1b15ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa390f52926b91ef5aba7df6188885b
SHA168fa48162a79ef0a681821aa01305f86b787af72
SHA25612c40bebf7380d1342c270253aeddafe7600ebec998eca5fe23526e31bfbd863
SHA5126c9c2eb483a97da63fed1af62339c981490aaa36aee626db499df09df17117e70cf4c27ccdac5869bccadbc6c3937bfa83fd44d86b0b5496326aa32c2017bf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b41c7f1d3c9c0b5733b9115b94115ec
SHA1f0580c094ade26a451ce942999689f483925f4d7
SHA256db759c385ccb8e2af66e4cae8fb5c2cedb0bc84e8be20b0308ba5d61ad559fe6
SHA512dda4568fcf165e507670b11c9cb30c38d610cf42be441541393e45c239ae0ddbe85778b9dfaa65616cc9255f4229836bf858fcd00677ee9cb8605168a4fa7d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5eeb201e1a9f3ef0103901f72bac9e
SHA10743d354982d2dd08c665d8826af42d3eba44301
SHA2568fd8c1797e8100cfda83081db214ff49363a313485b782cf997ac61a0b54cec8
SHA5128dac792e2311c467600381f9f0fb3cb4110a9d681c97fe397b25c0695926be72c5be060923294a30ad10f6369b1db84445d7ec31be16388006e2aa9fc0de4237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584e282883a9211b78c3b80a4b81531d
SHA176f452d437f64969db245fa13a0e69ea1a4864af
SHA2560e53316c5501fd414c34761c8eb300017a145634f80d116ed47634cf21fcc04d
SHA5122c2be2daf9647715a3c08810cab9054e4d9fce150eafeb7acf0f30ec3e6eb0c9a695bfef4c0e58ab8b79f300890ed1c4e99906865b85f25b246426a1f880b616
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a