Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
3bd2535ca39b24cdadc7c75e28bef8eb_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3bd2535ca39b24cdadc7c75e28bef8eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3bd2535ca39b24cdadc7c75e28bef8eb_JaffaCakes118.html
-
Size
28KB
-
MD5
3bd2535ca39b24cdadc7c75e28bef8eb
-
SHA1
6053796a7a66a15a87c26a211a0b747888048c0f
-
SHA256
1f68ca23c9b2af6e9ea2f66cc97a3429f563ecfedebd9b07575c7eb2fc909028
-
SHA512
29af29e8056d07a6a3c0e6e7f970329150c77b46b21e80b7f82d26fce6b4f5ead46e525c3e1ea6cafe0c3f8c63c927e8f33c46ead75e819ecbc72e13f72e823c
-
SSDEEP
192:uwXIb5naVkanQjxn5Q/0nQievNnPwInQOkEntUqnQTbnhnQ9eDPm6//Hegkw5Ql0:yQ/FX6xXHegk9Sd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000042b6e18bf280d9f20b295dd5547f1b2ade215c1419c339ef6447feecba533b000000000e80000000020000200000007bfcdacb6e23681615cf72620d87d67382e602e61779dd495ff6178fd15c85b290000000cf8fe45361bc3f06021bbef995c1c208e25427fe93d8ada1241d3fd93d3106b63dc90b2c2282995f814846d970866429b564fdafafef49d5943d8ff456977f7213e9f4498fa61833b103c6bf71b616596021b7cfbc996ec81a6877bca3be4f13e07b74cd1c8919631e4605e5e907371e07343c595a97886757abacd1119e7a7e04352e3e00f890541d9cda13ec93186040000000c16d3c534d67fd1e36e3aa39d98b601a73b6777fee487a997bc9a6a7ca4332484669474341d6457f130f7d57b30a5b4ef4095e2c582238f303cc63a712969ec2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421705662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f9401256b1f0072a9331ecc398829ae975cb13496a0c91ed3657a7bb14132de5000000000e80000000020000200000008d10dea8bf4aafba577d773ede40edb83f7b5955edb4c44e0b445f77e26ef19620000000281a6f0279e1a1565461491a1e6fb34f367c70a5ef7236a5a560edc268b256544000000034abc783cd2eff11b13099bab2b3cd700be43ca6e929eebb55d5ad4c86b3bf0338184b3e5ee2ce271ed2ca5c4d4853c046c66cdc45d52b7e7e6059d89078ae9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70549d8fa6a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAE8D321-1099-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2836 1740 iexplore.exe 28 PID 1740 wrote to memory of 2836 1740 iexplore.exe 28 PID 1740 wrote to memory of 2836 1740 iexplore.exe 28 PID 1740 wrote to memory of 2836 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bd2535ca39b24cdadc7c75e28bef8eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced23ce52809181c410b7839a89b4f7b
SHA1e06c61b895e6ceb6552ad2434fe2c4ca9abc6de7
SHA2565f708a29470bba172989a76a70283b8772efb34a86b0a274b64cb3dc806a9ffa
SHA5125c7dea6bf2b62bf524e76133b64922e1722e483009018f94dcf4a01299a6ccc1e912a9735059f002dba958aec5658a38a5817d572c2b2f115ac8272aa1b7b72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53451b9f12fae810c096d42a7a1056ab3
SHA1412e06f93da94a8fc714592f24103f38dc588fce
SHA2564c9d825941c51cb08a95a60e1f978a67d7945b71bb509ba13a8a0141ba29e793
SHA512275e3f294b129f77f3f0d0cef2acd8b4e00f02f17911cefc6d48a82bfdce24702b3f217c3f98b75f73d5e29926d7db5137c4d09189ff2ef80c5d850fd75f9260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b828421e592f3d5f97765cbcdc224a6
SHA1a8a95c85d54944cc3977d119cf7dd680fcdfc767
SHA256e9b244e84bb0651f13a9f0dc373b8597621a89f839c4d6d37a7834cef6d92024
SHA5121a3e246f51d9ac3f7c4ae7a6b2e5b3dadb4354987a24230d63ee07aeba361d06491e2f80a63569c6a1c9fe61b3b6e3c699888f4d15edf1ed080ce6b1aed9d123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568eb0d81303da838b76ed7061537c4c6
SHA18c8046e0b9b87d7322646faec733c4b777a1b739
SHA256ee2537bbd5a0d16b9df46bbbaffa977d96890cd8e07e02c50d3013487978379b
SHA512f92951199e4a6aaa41c6ba232194aaaa798b3c0312f76cc36b5e65f3b5708374f0981329e430c097d393a703d85ae2cb570ec649d8c5fd9758483a45a2c46a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c564589d9b23350eeeb87b80dd8d076f
SHA1d9273a7e371fc76b372f3bd5eefcf79c83c55729
SHA25659909e12d594407e2b54015783d306ad2f0c139a4b29a08217875061a1093afd
SHA512ab54ee8d02ef5df8263754d695dd71edd9345be4c03b4c04a0ae7fafa5681cf5f28178868bf796bad30926d179859f661a8284b58c606c9650413a64daca747a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57511d0052e9b8e19f164f818c3851ed7
SHA1d6a3987a54e3c6f1b8819822980f2306e31af7d4
SHA256523663a099d01472ebc4a2dad5b853647caea4a4b2c7f878e54127ed48b9029b
SHA5125fc1864c80b8fad718fe606a07a02bd1a5d5d686ef50579511ed13a20ece5d5258d61177a892ad8abe2a15a997e6a566cd9d30714e3c91684b5edf9b0cc7292a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a120c6972c887b16e535d553648063a
SHA11a5aee2f1887b5aae0e1dfef191ba051755cb4e4
SHA25629567e4cfc5987f6c96f497b0e95e3d122b5393e8511cb77fc6059473493df16
SHA5123efc5c90a0755e81cf2cd468a5a8a17705bde01c41375d491eb8361e48ddcee07058052940008510c3069ff9629dad10c9b3465c5520ef782eb5fd60b250468f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a