Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
3baed9ddacfbca245f7a9987a7af26e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3baed9ddacfbca245f7a9987a7af26e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3baed9ddacfbca245f7a9987a7af26e1_JaffaCakes118.html
-
Size
23KB
-
MD5
3baed9ddacfbca245f7a9987a7af26e1
-
SHA1
d04f2281192d9ef5ce68ff2f37ab02df5b8a4a0b
-
SHA256
e393e5817191337165ff1939b1e66c3aadac8adc9a9849b634764b545ddba275
-
SHA512
2ce8fb185153441741e55442606fa60dd1a32ba4d88e807da52096cce99ee40b74d11ede01afc92cf5b0e42c4a257d36fb1d08db4a10d842ca47f1bf32fb5044
-
SSDEEP
384:1C2bG9GKG1GzGyqGFGNWNK4clCPhAiS9toP:1C2bG9GKG1GzGLGFGN2K4yGP
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000004780d4790720ba5fed52ff1a6749ebd243e038afb1ffb98d08784954c144f6ee000000000e8000000002000020000000f118ff71647d7de49780d081c020c6381d8d55d951c989084a6f4d68f1fc7e1a20000000e8e09bbf3a63ee5b54529800501c7cb99ee804104229cb85afd1107da25ea8f540000000895c3d40034377edd45d5670b9ac73b5b000fba0e4b74989a2e7308ab13d28096cc53038bf859dfd5aa8b0551d2af2ede895dad820ababa415980fc745e74737 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421703545" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE452181-1094-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03819a3a1a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3baed9ddacfbca245f7a9987a7af26e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656fce0c1d1eba95acd4899c5d8d4d8f
SHA13abaf561502d2611bbd91ed562332b26484694a2
SHA256595f11bf02fa5df83413d7923aea76e0e3e96d392af80912546573d76b0ca547
SHA512e6fb5f45d910eb4f664c05e78cc89e2dd533931640c37e65437877e84727b39c196bf3324e2f0fa5e3bb710e78efe688a8b7ea3e041250c02bde34f0e8558fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575f5d3f2be94cbffca12f0e0d8fb9b3
SHA1f83d77915acebc615cf4f7ad851a320fdf1040b2
SHA256f9f35e600c088e8f66932aee82e9410c26cd2c0d996dbed33f2dfefab4a5acce
SHA5125c0741ad3576b8f003824cc84f5e3ee5c46905210eee26c0dea7c45ce7d4087a7289b1dcad23201db1007178f32bd80f05656a19a626c582fa45ea9112e401be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e570b34dc92bfe27cb52d133d266068
SHA125ca48d10b5440d421dac5137ee7e0bf7489d82a
SHA25655dba2d541411a272822bc09560533c001c30f2e11571c4fb30fb14be6b35d5c
SHA512f9b0487c4860a9c83b7774b554a250aa68b8095d34c07596c554a40e6ba2484d64180f5635b48bed926c1c1562d2e869f3f7b17b99f332fa8103553e3e76b248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56118d42b27d8bc1fc477f200f4e668a6
SHA122b34da0da7a01928bc4ffeb923da2258072b89f
SHA25624f906dee0a89ed7731d24337af5031f73ee482b4b5cc38d02fcaa57bf6e1497
SHA5120ec6938ee83c1bb88d3f2dfaf9e429945a6e93080ca315fa89604af1af87d2bba45da5cf2d019ba526a116dda11e05fcf06990a1c569fccd3ce7939eb4456dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501339d85159c7add70a38322befbc6c7
SHA1f44efa23396c7d8bbba0bf4b5ab8aa2e3356ecc4
SHA2569b50aaebbe60b2b056b65d4a40f010fbe5425e00c39598522a9a083bf0d4227d
SHA5123c9fb17bbeb46101d5ac767dcd052376f1a8f6d1d5fd91e69c7891539660ef330e4b102d4e74308b35f9ade9a0281335cfb934698ff283a66ca45a393f279068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e40156465b262dcf16002d99ca897ebd
SHA1102c8fef11fb8403b05914d6849a4659e5d8484c
SHA25671f7dfad66a73a519218f9f7b568fa53a11f4b5acccf93b377070109952decf2
SHA5120c8dcde91ce32f3a0d7e01d4f029cd4b8aaeec053136def1d807789741c082fba824ffd9535a66b16a24320e8e6ad58c30c6c098cb9c79d04745b347422c9491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eddeabbf0e60a740fd3579b21ea789c
SHA13f401955c6f540aa3b43377a6b1ee3c4189ee9a2
SHA256674a4ae16d379c44f3749268dddea1b841b80dc47e59d07aad6502f95e8821ad
SHA512a97141aa51b4163eb8ae1ee3eb020b63b3d73e2e2d016365b75a83e2d323a37a0e754a783a97fee63f8de4deba73a7f5cda13bc0f727574218227f51ae8b04e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5126935d18ff5ee67846cf4713a438f3b
SHA193584ac69ff91d312366555b94e82b3d9c634e60
SHA25608dd740b20ee73aef9a419a9a180a1d8f65e903fb0b61f93d3abc43cdcd87cf1
SHA51286730f27dd4225e3316e1b44dab27310608945d92ffac621947eedba453ffb43ad90ec1744b01aaf3a84448fdc6e5d0854cc5e9728807ab933b9f819149621b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572540524fe85bf8d2451061d5771b737
SHA1918835d360c73eacc1820fc4253eaa841c2f2003
SHA2561c81b17829dd2a75c4cde1fb3166d60709135061aa3ebf6cac7d8f5f90978734
SHA512b8c5bb0c661c048dd9a895925ac45b381f0f22f4a8f67bb060975eb20bcf07ddbf5309db50c0137fd60f562934425c51f1dba8c71f1cdf549f897accd46c93d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b46d2154e15afeb12480f975e59e4d83
SHA181519c5c1aee4d14f58e98cd2949df8e912769a8
SHA256d239891eb8d7c3bef5d3f21adca16418c8151550f98e664d972c7734c96388ed
SHA5125d99344bdd29bcc23a38a942ae078fa968208c515eba78ed34f12d14e47c2d39ef405eedafc865ed48d774b285c37068bab38f553695b85498a6467f28d884ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5cbbe9af46a3c2e9053aa675d5275e
SHA19a9bda2686f2357b4b5e0c035f40bb0947c477b5
SHA256708d98b43bfb52190d97caae9568018215ab349c1d6fe14fcc130a02bbe623a2
SHA5129f43b01a25370ce29e69b82df92c4e8945aeee4edc7622da65cede70dca134b9096d0e3bd9011aa3561b26e4a057e0b6d7d9e6ba4ff53216f6044d2faab7e840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae57e5ebd3c61f45a15dd57f56623948
SHA1bcbbe7e7032d7c84bae2b674a07fc8ebe2545943
SHA2564e9131264a1267f8aed1574860b063afb3d2055404487971d4546a9aae674ada
SHA512693b3ea441d0d2ce0932082a05f447d4ada3dc3ec6147392d62e7012257f387739f416d6ea577c8da125322fc9bc4f6d2fe2ad77b8b86a6061bef212b3dc91e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5901c92b9e53318209cdf5533e4514d00
SHA1d0d762b266ff4f389d4353182dc68fe2c59ab6ec
SHA2560f645521ecb78227cf371a8feb8a04a729829dfce6ee9d917466d0ca8a833e49
SHA512bdb56748533a3fcc40f589999d89b0d93ea1d66cb8e223d13a406497821007faa815fc74422821f278469440a6e85461ee0d35ca7ab373b55e832745a7c64a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5030c908214090c68e91b0cc0ce06a50b
SHA1f6d37be2ffa8451d29f1c431586ada9b0775c9ae
SHA25634e37b5a50c6a360ad35f7584aa501029abe7e98426066e57c87ab4d7b3f26ff
SHA5129b9121561b9555a4f29ae2e4a6b22d650b6a900ae8e49aa78e91460780ae131df0819212ae51de383244482181df2a44a76cc0e2424b1050c2345d884315087e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f036ca93c8ba7b4871a18d4f50cd8295
SHA1162f593fe35ba8cc878fc1e07087dc2ad5bd1773
SHA256a7a13b8435d1c9ef67a9999f3a4df4e842c0e11633e0b7bd5335f389318e0232
SHA5120a1d484780dc99e1cd75fb9b0e2df3aa6f1dbf1686694d64c21e618c301b212369b4738f33e0deab038675f4145ac9612584db6a5c9324f2f0417899d8b097a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58272ae691d02880585de1a87a62423cd
SHA14a6033a45a7de1963f8a467e181d6455987381fe
SHA25661a898f257c08b3a089e52a11c9460d1d77aacd7f697b60d5fa9f7e72b0b75f6
SHA5129e2b1693e27eb8fd101cd998a4fd347d050910928ea1aea427199dcef7f5cd6237f9ea01820d620f72b37d987a2fea93352ccd134052bff9f21935c5ebae812f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba286e0f8c50ce032eb31adc9d10cab
SHA147f0ba286d7c42d61de3ecdc5dabb764e8603f23
SHA256440e2d1ddc64d72a717132834e3284e9f0c4a893f7dbeb6ecf091c3e881291e5
SHA51237162e06efc32d2e4bf953d24c8b62974b1d5dee774474b0d42aa440c5d775ab8d993f6da241b915768abd83c6d74544681bc49ce0b4856557fa522a40839b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d22e32f63dd53a4429ea810b5daeac6d
SHA190c69216ab6947fc2387e39fb8027f7e811b5a6c
SHA2566ca93463eb9e7a72a596111acf18a7337af75c1988bc9126cd28aab3568da4f9
SHA512994958caf2fedf50b751838f9981b6d9830d0f167a7b76f8cdededa925693445e61fa8a742237ad3c221f6b2cee007d1372969e9ec3c9b476907f414e2249b73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a