Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
3cb3b3897755548d265cbf0050148b63_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3cb3b3897755548d265cbf0050148b63_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3cb3b3897755548d265cbf0050148b63_JaffaCakes118.html
-
Size
24KB
-
MD5
3cb3b3897755548d265cbf0050148b63
-
SHA1
7bde101049fa08ceabf68bbde7ce07cb218f4b51
-
SHA256
b384d368d51f5438bd9a2e870087ffff89eb6e57a1103b8f7d717b6ae43dde20
-
SHA512
ccd9ecb2812ba4cbcfa27214ab4acf38b82f5330477ef1619f04e8dc7f6ab9c06f5cd6e2bef4fd676776cfe2818350999b07b810ef597dbd16cbe7718b136734
-
SSDEEP
768:0ALpQoT13CjoWdmkTE/Jydx/Y9KihwVtGb4LAB:JlfT13dWE9kTY99IAB
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC146381-1172-11EF-BE4D-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ebe278ba5b5cea590ac8eb2131454de1c89a8507e6400624fa52d2051a7ca48e000000000e8000000002000020000000cf44d65598f65522ba405d01ae66d21d69ccf173aa821d97143f3123a6d5771120000000e6afc49345c719aaf7805b5033ede4c0c89eba016d5fbecb9860fff26daff52c4000000028ee51d46954f888a26c0f665c871789747d455a4eea403d17f81c2ee6ade7b3ffce0fc548f7e078b0fa26cc5e6b676b4d5aa8aa5afb7ce234af4f0955915dfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c583807fa5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421798835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1764 2108 iexplore.exe 28 PID 2108 wrote to memory of 1764 2108 iexplore.exe 28 PID 2108 wrote to memory of 1764 2108 iexplore.exe 28 PID 2108 wrote to memory of 1764 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cb3b3897755548d265cbf0050148b63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d55ac3e8c1405a6a8343a2d9bf61e4
SHA1bb7e15fc520ba56ae4f85827b40fd097a108265f
SHA256118c2eb38e749a5fee2f0f9b94379895afe0e6cd2a012a664ed479cc76104c5d
SHA512c7705c04a90c1e226798bd4e5fb1de3871a366404af721cebbe131d22c364c02df2d5d980b18132f70ea637b14590488c986e3131b39c6197327e44fa9425d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5873d5c44ba059cd78d6c562a1e3350d1
SHA1703ce227211516bef92c1e080301fe44cf80867c
SHA256b239346cbc7716a7ebca4a33e57b258293aefeecc3ad62350469b85e817bdad1
SHA5128e3f6cdb945b7cc0721c3516b8efbfb7bbbbc3e21b9bbe48136b26c6eb93deecc3ab8e593d893d6f38a13a82f3c7e3faeedd6ec0677ca75f0a92186b79bd3720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5770639584edd516f22f857d5f924fe07
SHA1274201216aa8e2039d7b9253f1ace39c46c121f6
SHA2566a05482e0db76abef81ba1f91aa6967c98d5d6cdf95c98b80e702b0c9495225d
SHA512a4a8de6b1b96cc119757836fc95316f034719fd46fc323ddb7fc41b413a8a14061ce7b7f75469169692c83bf71b190d2d2403f3be14b9825aaf9e0514eb55f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee0fe2fac439f85324b175c6fb073e0
SHA1be65e00c9748f9d083acecc4e2fe63913025cb34
SHA25642d3e727fd061c8411f3f1211e28b806fecfaddd4c4bf7c129de44a50d5a1893
SHA512cd933bb746befe90d3aba2a5c2d59f4f8090d931dff894562cefae1850f216b93de38da5a23bb69dabab73be0206c95ea7cba856864110b90184e903c1053a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593fd671f75f2b71e560fa4b8c98778d6
SHA1c1f738fbbad0c0a062ed3fa45681e9cc808ea57b
SHA25671bb1fe6cc9ff899f1fc366f82a964781664feb18b8ec4657c7e259586ac8e5f
SHA512c31af122be3eb025bf73922f92d70f315e5ac1fb5423e1a3189ebc89178b424451947dcee2d0d4799aa782288fdfd2d2a511c404cd464cd09d26dbe08d2c8beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2278f835004a72feb62e7eec25380fe
SHA159f5d80f78e18d619cc20ff22a7a909061f17108
SHA2563e90245cf0d684423558d66af40bb7bca89ba45ff588d77ddbd57093207a180a
SHA5129ba02014191336a115f005452a5ed8be3b8f2f090594c14a2e908f588036e0ce84034b6916f5c6c7ccc5c6e7860d0c26a6846193feed949bf53d4afc1eda4116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a9193157d5716355d814fffc70f2839
SHA16f37c967de6b641f6f6506d9e2731a141f74b5fe
SHA256a772a303951647d65efc9f861ad9cce09d64793bc8ad6818572393c647113b52
SHA5128d9ccf9d9ff9dba4ebd5aafeed08c6a82e641fa20c6627155b0d565171520deea1ce4be2b37a0d2ecd3d0d434f6531de8bc5b60b176fbf18f1976150f1a1e4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b32d408e03f48df084a007526bf15a9
SHA1be26165cf5bfa25c53212b09d73be1c7631950d4
SHA2564e912020626231097e1179a2582245fd1540765bcf0d93f21dc2a18e5a1bfc1b
SHA512d49cfdd50849d89188cb1e4af86d4507247ed6cc1685080744ac618675055de584c9d415853e0da132ac4594aa9014d8b98714e172203b568ed9d29f67858b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f092664e9258edf4d27109f1c55276
SHA17eaa4839407744ddc9896e4033ef315a7e99d799
SHA256ac270a9a93144f659c18ed7f3f85d0d668367dc674e58e97756d9e2808af2a05
SHA512017a61e5f2f77011dcc3064f3bd61256ac1b25457ff75abdfc5cbe621302420cc8864c467ba2c5982d6cc4daa0621077ba6af468dc15fb435888a23568fcdb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57afe46631c34695ab121ab7994301249
SHA11770cd1578ca3ab259acb6bd1dfd19fc90e40bee
SHA256719ca3e76eca84e153a16834a2e5067f8a22a1b3acda92446bf948f0b3ef9e3c
SHA5129f178074f5ee8de265dd819068956d0d0a9f00c62136745e86b46ad347cd5876c559189630c7fb108e405c83ede1bb81cc8de00c3a8e3c2033de3e0eb3d15274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520745bc23cc8926b1cd2fc454b8bd0d1
SHA12b0ab9285cd1e969618c145345f4efb8cf81bdc3
SHA256f3fdebf7ac56d40cd2a7a5780e7a9725ae0af96b6db308d80ea3147820d06d56
SHA512760ce6c78f8708379a00866afb8a9fde0f87a81f00f5a3ac8c013262268b4caa15358bc5fd193704bf96475d8569dacc3894d309d652d40388c758c360fd5756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594103ead113024c763e5e4c7e6728680
SHA10345e4e7fafa0b7b1c894083e69ddfb35a44dec6
SHA256f18bee83e8cf11410d92b44d8a327b4cdef17d1b643bdcc1138f746610f6c488
SHA5126538a12decea066e3641847e977d620deda565593bc170f10d252cf36bc761b4773da31256192774dbac30718a71eea7cc892e307cb08b82aaa2accc5b99a35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51abf39600f352d947374e3333d7ba7f0
SHA1ad061f92711135526c81668d4a43d339eb90b831
SHA25661761b88e95ad7a3434ef4f4bdd553e1d896de46c034adc8a15919ee00a10763
SHA512ab881478fc6d45e1ead07e593b2750a44f7179446965b963bdea8a151bbeeccce4a61cfc9701fc7d19c9815577b51cdbd06c5a451ba7cb303000c3e702ff48d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4fd89ba06a039602ec2e54a2cffb1a
SHA1bd787aa3d7cc9a2f63f823ea0e9a119dec628f0f
SHA256b84d0002a60edebf7da4c6e51311e042f5c4e9abaaf4f28729439e1a4ad10ef8
SHA5126f25046c6e436362c4fd93bdf07e1d1c2146c73718bea0490e46c5dddd72914d9dfec554e15cfe8d8c0f3ab78fe1abb169883793b04b3446ff1edb32ce3d21db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1e738d170d6ff05227df081346b505
SHA1e7cbf4ee196f9f7c0e6054ad67ceb534b76777a3
SHA256f440ce9aec269854c9de0ebee5702d561b2eaa7333506a2d1bcd3d8f774aba40
SHA512b47710ad179b55ec3c3e8fcca3419ab4f8f1f9e6484949e6c515a3f9119d07e4344f064e59370114733a2662c6621745f1b8f39603833407019df49fe9d9919e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7feadf87428c52f7b151d99745a3b5
SHA191d84b86cf6a411fe36ab4f946d4c878e800051a
SHA2567ffd5e41d8c8c6974e8d54e9b0ac76a5599e86f3aa82d513aeb47dae8d83f294
SHA5121d37baa2cf85e43c64d3cb72135fcee8c41af467eb348f1e9bf3beabb169f54f8ec09d0b1d854ad80f961338aa40e29b48a80adffa0f884c069ef7c7bac971a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb6c50e0f687310fd9ce231ee1d461a
SHA1b5a01c38d895b23848df148c5801d5e11725cb9c
SHA25638217cf644e359e906ef9931fc6c3dab74ea29577d93c92c5485e9273c3dde7d
SHA512adaab8c76e8e8bdf6b65d4d194232da344ec4a5b29e44f55570decd26643d4071566ca4ff54917243da8f0465cecd5f7908f483b014e5d392526c2d24156717f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6c7ce75a9bf72fdf28baabc036fb14
SHA17628a2e431dca861d5eb0a403253342f04b2960a
SHA2567a2b37b1ac447211e7e625d66bea97de3fcf7c9e545b15aaba4d8f0196c60011
SHA5129f74a3fcbcffbf601733e3bcad8ee9c95734bfd1e29c550238b2d24a6d16c8e44adeb1d0feec482c7fdb85c7c519d587525e075dd2e8b6fcf262841127ed3abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f196adadce92109d46ddea6908282b02
SHA184b920b42ecc0e14856ad9b5144216f1183d2973
SHA2564554f813f02dc3819978946c5f255f08c7dee545aae68d76df62cc2900e4fbba
SHA512d6874c3209c74cf307c1925e980cf0e5f19b95624a7066b432372eac4028f6c9b406bab6fd1e180d2bbaa415dcf266557db6acaabd31f89231064cf03fbb16e1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a