Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
3b270b8ec670e3fbe2d4067a3a0bd065_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3b270b8ec670e3fbe2d4067a3a0bd065_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3b270b8ec670e3fbe2d4067a3a0bd065_JaffaCakes118.html
-
Size
10KB
-
MD5
3b270b8ec670e3fbe2d4067a3a0bd065
-
SHA1
43279280c0257e0d01f351a2cd5a6253b58bf2ea
-
SHA256
4683848f0708d321282049ba4f0059ec8e39cb08b86319493b89c9bb61112a5e
-
SHA512
91de15e7a7c9bffe4b92c536d9554a6d58e019bd2d750ab78ba01ac158f6ffcec33da7ac7b303f7a28adbb4fd3c8a9ba2b09bd0a836ba4814b17b7196f70e03c
-
SSDEEP
96:SIhIaSUcSxxaHGUBsEzIfiXNL7S78pli3ULIS7m8uDikhoULrS76HxPD2ULJS7pS:SI+BUc0uLbosNM8pDhAjk07ypdXhO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421694963" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001647516a04dad484a435d8a8966e3fc7f000540ba5fc1a0e86370f5f05041662000000000e8000000002000020000000e63f4f054deba521c1156d762c1bcfb3a1a05aac4be2b62aabb7cc5afb36157c20000000c29688320de8467964f726083ab4e583abdc4f46673167e062af3b426db3010140000000134b16904be062e046e045f0e8f01a0f3c29783776a92e7c95b12cffb8e4fc7b40de93fef6cc4d52bc2b5225997e1627a5ffbc413069aec175f2ff91547e4594 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3958301-1080-11EF-9486-4AD8236FB259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609c33c18da4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2012 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2012 2208 iexplore.exe 28 PID 2208 wrote to memory of 2012 2208 iexplore.exe 28 PID 2208 wrote to memory of 2012 2208 iexplore.exe 28 PID 2208 wrote to memory of 2012 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b270b8ec670e3fbe2d4067a3a0bd065_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c2a7024f9971d0860cc82f244c0b1ab
SHA1a847c9a4e2a027dbd2cbbdd0979be1d5fceaf820
SHA25625a8581ca2a39347f71f25a39379c60d84b8ac7b498adf18600fb838235e946f
SHA512fc8319a9cc2337977f242c860c2728d2ef4d84c72db60cb3cb1f63e20772ecec1ef4b46891924f04c72dcda20514ae217c125c5595a397e5d4a05e0b5861d615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579eb354959a0b46d6f11ed69d9621a2a
SHA1b4898cd2b6eef4f7b5975744c44a29993a1c7681
SHA25692b3add76b139b8fd7fd6d6d9c399925eab58aec703d383c3ea840b320f4ab09
SHA512bd0afe3851265c5c7be588ad9f0dd3d2a7c2479a7a805fb2f987da366e371c52c52c58cc12957e87ae1f62e395c16dc2d702014e48b6f213ee7e474bf71f94c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542496a0d3e27dce67812db2b33f722d0
SHA14e3c110c830da6ae176b672705cbded76b4d6bf9
SHA256a2cdf44bc50bace8249560591be719002bb775e5f3f2eba1682eb9391514961e
SHA51292cf49312c160c0b48fddefa8a8246d3d362131a9b54b544f4ef5b84a9d82ff840cb04e10d4586d0323215eaece8e41b23a64d9e042fb85faf89bb984e877328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885bee8627b3c8aacdab163cc5ab47a7
SHA1e2bb6777b3edabd03657421228b193b8b592472b
SHA25651e9305decdea28601b7c57d9baea35813225adda5fc9fd1f7e2011d73b57d0c
SHA512efbbea1c9c30d8b94a1500cd301d569b0f8872eb6b3f8570bbc1f467195588d8d7f7f3cde8f10bb9323aea22bf1de991f15e762f9da963cd9a2aedc96a810970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f925ac808771d978dc7da334845530c
SHA1b29e10c3c782fa6fc6f3321625956dd042d5bf4d
SHA2567722ed51b3b0482aee7c2762b45f35f8cb6d4f4803d6c6b36bbcc9c82cac602a
SHA512d6b2309861588af11d8fc927dee033c4df9843e1b04247720ca6a97e303d9760cb3779e48092bc613b06b0302c1c18017ecd692eebd0c620a9e026d696ecdb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b240843d469e5b4828f37456bacbd8
SHA18c9e1d967a7779334255464a261beeaa88f5d5f0
SHA25661aafcae6a2cd9eebd5ef108055a58802bc1680a3ed8f367cbe195803c723b93
SHA5129ad7e563a66f733912c94bced05ef50c451238670f9e0ebd95660d14447510405ac77e4a60c91d2854f1d1e8e7dea34f77440157c30a7a6a025e908d38fb28e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4fa3fd6c2bc3ebce6b796bc1dedd28
SHA1e53893973f9470a16ae533d36d4aff2410bb738a
SHA2569d89cfafddc9a5cc52b7b4a895302c738fc60b00f4316e960771803a7891cc61
SHA5123af8b9311a68f40152934a1f94e6de105b61cd444233655db9b41ad1751580afd207ce29cceb5134dff1fb8ce82489f06e578b272b95e63f03bb7f70b4333911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b24733979cdde71a209c4e2bf073020
SHA16557f476520f61531422a0aceb4d3c0534eae23f
SHA25617b9b2c49abe5c95a1b3554b05e0c62b874946873dc8f5b9f5bc3d3bb058e7b0
SHA512ef83705f0d367ee1d669a976d3af0eb670578c1a825c00995dea3601b2e3a36982f06334245244f77185a8b264e096dcb0892d20af69ba124ba4801adaa643b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70d847287a1bf60499e8f29523bdd52
SHA10c4138d2ccbfb1131efd570c2913e728b1dd526b
SHA256cc92d95704abf0c34b904c4e56b0d0a1fb1f41861d18791c0d81675136cd4800
SHA512c256a9749300424a310c2d0f2f674d8c5501e89d3d93df0c18f797413a40668469afd87c31a6e11e18deeb719c9495a420a4d1d64c419f008bdb43e325242c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510126c34691e847644476581cea21180
SHA1616b42c6e89e50c40a21983a225d3d2126cddb9a
SHA25687619881710fba328245a18bba2c01acc5069a3c3ace66c7c6706c952fdd1e38
SHA5122457d6f71dfc38a98e22a779cb13dae1b4a75548105160f00389b3364f6db85fc64ed54c5cacf0dc227dd0164058271ceba29c45c4f60cf229420745440d1881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd6f4a81128b8aa3971a701e65b29a7
SHA11e2d2257fe7e03fad15cae355e793471627a4fca
SHA256e1f15e813bb0365f570de6f872101f0b36efb811da76848a76d954d60290f27f
SHA512843658c5c0efc98c50e2916585289b9bc8ab204bc41d2d96785658fc7b79909f3bbc2435fdcf6b5327c04646edee3e7d4d2e236e80c4a79508ba6c5f7ec3cb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537a39caf42c07ac3ca5f28594426c0b9
SHA134e8aef591d53ba58681949c9d46e4644ef60f67
SHA2560322ebd13965e8717c274a42b19505a05594e3f30e792c170a7bf06261cd8b4f
SHA512899ff877208980dafbf0836093e33148e0903f2ea6859544dd7a93bc1b16c2486befe0c3462e906ad29d4f32b45353b561feec3e26cfcc6b0471b6bc06b3bf95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58783e519db2fc997b697c16d2ea39f2b
SHA1c551b5ae111f7115a992f07a24112885970b4d1c
SHA2564a895e80b9bdec2dc19eafb654f86f4e7d2de7904dfc3370903d4a3617188caf
SHA512832f75d8b9c20c19c79b92213ae20908e19bbe691e92cfb7a73df4d6491c6e43384eeb837255728fa0a6aa3343a46c066d10f1c908fcda760f188d2694d8b135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78ff670e59cf29fafdd880f015aaaae
SHA12d7489c80a370883fb3cd70021549574a568c22f
SHA256958a003e2892431c833d90e44de50bc7b8383c2e65568ee720ccbaf182b8aa9d
SHA512890f5a52fd58b8db835f9bb75e0e4383b57f7e665c0ffc70d6790385e0899cdbe58e41816d60fd3ea61251c07642a15fcc6c7ac66cc9f730de96384040288a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56557290694cf4a361d4076f7540014e5
SHA18a570ec9fb1799003a11a1a9d00cd51ca7188404
SHA2565aa4ed374debaa61f17a9866c54929b0ff99d45290fb2dc2c2281f8e3ce30b5a
SHA512e489774b9018e0b07608dc3ec8483d0845b4b8445d2cda0893fe111679e70f4fc10dec4597fc7699d093464ce4b8e4b8a98a645b5e9b1c2222245c30868b216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da11f3f65969e6b4bde2ca278dd2a71a
SHA13090645211d0d90b24ad6cb555395aa57a44eb71
SHA2566d9b3946b59237eaeda6e5b4550646afaaa0a83da571c84886322c67a535eeab
SHA5125c4277ac49f4f2e27fdeb433280a71915b658281c7a623549999ef60fbf036a31a6d7e384841801e6e9418b4d0acbc16d8775a267f44ec4b563a6bd87855c14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7723839eec2610b41f34798ab69ddb4
SHA1ed29cdd8ab67a144454fb6f512a80bfad47cd48b
SHA256656c37cbcaabd1232a113def85db92bf4d79414c490058327741fe12a79ca336
SHA51257c86b552412c0d8c03b3bf44d1c94f8db656cde096dcc627429e0be7429b28762ef491e7a89ac37fd2ea49868d44520c18bbba6cac4fd55c5c2e7991e0d46a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553d4e10625c59d1f3b5ef852f7110b6c
SHA186682dd3289b180d98771ecbdb0a2f61bade1a2b
SHA2567894b485341d55f46c2c4bf609836ed0e6bbda4569eab1f3dc2b1a54a8cbeea0
SHA512ff76246d44e9bc5aa742ddae287b898a237dbb2a7d37242503f88fb17455822288c72c117a4aaa82bf2b7b65c271636cb6408d68e65b0b4ac9ec7cdafdc3de50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5651b93979c617e2fa3757c1939401bce
SHA1764f1380d329674ef62b3a646077881bb0255ab2
SHA25638b6b8d49ca961dc503555180114cdffb4b151e086e5f4c9bb7113d08a6b3ded
SHA51221311bfd27fc23993a49b10c80f474c9fad77c19d1ff4f0eaee3a517146f3eb778a273056e19aca7fce805f3a173e39904a666544a695e5a3d451583e18c151d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a