Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
3e2b3fc1c69bb798d311423df51d1281_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e2b3fc1c69bb798d311423df51d1281_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3e2b3fc1c69bb798d311423df51d1281_JaffaCakes118.html
-
Size
898B
-
MD5
3e2b3fc1c69bb798d311423df51d1281
-
SHA1
797c590f2ab1f0d37a49dc38c67212a5574e3ce1
-
SHA256
7b06806a8ba6be3a096b463b181b777e48f676e5d36126916ca399dbe2a6fe2b
-
SHA512
f9782859f758c70a6126cee602aa37cf92e5d046181455c908b5907594307b91e88a05e7e55d6565a1f2d67eafd4057608b3ef6920cb3b3eed3739570483d0a0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421743942" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCB49171-10F2-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000009595180ad5bb4690ccf17d40a6a741c9a098ba7b8feb806bb604a5c1f358df4000000000e800000000200002000000032540388a0b503afc0602d34ee60dd860a7ce8f6f593012db07d218cd258933520000000f7ea7fdb99973362a2659d1a2241f03acc785bcecd9885066999937d88281bb340000000c98f68a279ba29b1915baba4dbb276e23eae7c9eb386e95220b20d87390343714bea449f5d5f70a32a386cbeda0285e2285054a472683576031728260b895034 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a847b1ffa4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e2b3fc1c69bb798d311423df51d1281_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a626ebeaa9b6661f63848d27c52886c
SHA18bd96a6f149063a5fcabe40ff12ce5a56f077aba
SHA256ee5443346ce9d471df48245d3a3baed9a0cfe7e99f5ab32eea87a298c9c909a9
SHA512016d4208f958ec39f18266b247c19670b63c69c0be0c3666df6bfd805e2a8eb10d6e8f97245c71d85f335a23c856a37d3998de73fcd6a4b4eaccca6ebc83ca8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136764288b6243c3cf9be2076021fff0
SHA1a102815e0b03ed8bae5ea37de59805a4b9168606
SHA25686b20fefae4fca8c04be16e5ddbe3cbf2b1ccbd8db9bad68d5651f28864e7391
SHA5128b7c416f9d29bbf487ae715a5bd34bba6df3701820692a830c32b1c1d7f76fa868954c0ca486ee984101a39ec5d0beb6b3137ffedff75c1347afc34dd4453f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55decd2714dde46ea5e364a1fa28376b3
SHA12c903ba25a81364e2ce7376f06f2dc8bdd1509bf
SHA25658f7f4dfd29b943045042fc1139b578e634189d9b230164e7d4f13f63ed5f806
SHA51218333fe24917e16dac49c56c8344348233c2a78f3c16f1fa734c4e1ca185b2e86866786c8b20f18d717cfc827d4278887ac17b75d8f5f18198454cf9e5938c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b991bb0c74fc6c2057c74f2cc5ac43b
SHA1c1619d93bd3416f8fd070ff999952392a5b8fca1
SHA2568dc5adbb6ac22eed552c620c30a4bb46db176498a7194bc3ee6f956e6eea627e
SHA512f88edf315c80b9b3b61375e9bc6202e74514b07f65afd303688a84bbc2b6ad0091225bb0751d9f0fe77f3be7bf974ed2461c62731226fc4765d9cd68d2f285c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56462d37a8575486015ee3044b3b5a2ba
SHA1a7d21198828da6e68eb3a1370c2209ced6df8517
SHA2569b22b098e8b03becdef83c2fe195033fec9d84966e51f031a7b43360fff75b8a
SHA51252ffad97e9d27cc87098070f56efe1bd7db8f45da7a5894d687f5414fbea5f141ddb25f8375581ec362f879be38b94536665aec04be8ec7878b88eacf63fbd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606486c99d22c19b3867b5da32317a3b
SHA1b93472d3d3a7ff83220a00459e68fed1ca9d4d0a
SHA256a1e973d80e6151e5934df6f67aa30ea0f0e1f7f3dd2275da99890da7e75fba31
SHA51293aeb873c7c34b2f4c6427bcc40b6668ea0629d6e5a8789a7e6f02b2e80cd03042e6551e5376d80f0cff3b87c606bbcae2382b8dc71b61b46f362d7f8be08f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5998fbd4ab108918fa40323ec3d02986d
SHA1651755a3ff56d8a01803d01c3dd8b96d386722bb
SHA2561012f46e591093ef4cdd1060610519579bd77cc24e273ce92a4141073b1035c6
SHA5120645f5cd9ec9b4e431d29334e7c56f7a76dd12e48f2a3f00afea51dc492b6609e9d4a8e8989e8205a8fee0324d3993a45f7ed539b3a11236f30ebb061bf908fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50a31aaac2cf0c33c6d3a5c710ef190
SHA11ad36da494d20f81885518b47d82f795e6ecf8fb
SHA256346b8c0ab10eb15686fa5b183aa555bc8e9a99ed8fac437017a70fc5ba93d9c4
SHA5129c69d36f68f6aee16862917221ea6fec4e785505b6065e9e8c061f1b945c18f9a905b517dd7fee5739ef479ac94286def9d264a4aa025ef7c43f0fbd013bd520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577ba64c8e98ff123041fd30d705d3df2
SHA1159e09f3f186e5e5166252037ad5f6b58061fa81
SHA2565422eb8c2059bfa166ab92d58918a8cb376809a8598394228d02de73ac67b3bb
SHA512d5306883f16cbea8caab0375e193f24b32ec6cabc82055a2a5518b5d150e2868293f2045e11e1e095ba4e4ed60d34b19ef868f36f0cac7ae529d800f0c2d8afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5177a9084d68a8fec545e96bd0da9a903
SHA164465d63c6a967dd008c6278aabd45a4e13367a9
SHA2569562af4390adcd2757c7bd214f6604d4ff8d13bd956fef8a7b4b12e2952d1cbe
SHA5127b7d18f949e6ee50327053edbe53eb2b1059568dc1fe2d84080f6655e9bc3527dd1940044b14887765d8c60633439a98607aaebe82baa457a51dafaf5c9741ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544313cce9016290dda7999253c789180
SHA1cc873c7724f6fe5c6483b07b6d42804731960708
SHA256e17a72544f6c814e619ae07c8b3cafee04e2d008e2413d407b49057f039af765
SHA51229859e55ba8a14bee08274eec06871b97b3e14840c5e36e261cae417c4f0d14221af5333aa4022a0933ebb9557b391997fec6d93103e8446f2ae42fff0bd04d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f34ce74e79f312f4ca3bd4164c1a9bef
SHA13da636b2eaed92f17ec7ee6489faa27c141856ad
SHA2561de3cd029b5dc5762386a33900124889af37160867032461406a523dcbd5336b
SHA512904c4734e3f2e9f54f995efa2f24cb07e4dfad522e809b056291bf8cdbb1ed7fc33d1d4d41c37cd04aa011e42ff710f7a146062e215d2cd63a7dd03ca0536064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552f3ada04e68d68f5bec087bf8589db
SHA1634efc6966796f8e87eacd1fe9b40ba10d97ebd9
SHA256369bafedb939251318d28079b44495f831d09a05920efb26b5409366209cc945
SHA5121c55e6760a445d5e026a311496664440a5757ec1f0584c406466b6f49148831df2d3adddc1867c33d978ca7a6ea8a7e794fdaa596790a8a949ca378353a52cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4864b111225c9fd4f77e57eef181d6c
SHA18cd6a16dfd6891da1344db0e3fb7cdadc3d0b400
SHA2566c68210e62b1497e2acbe79414f445057675e1c55c78e827cd8a0a481a61ce20
SHA512e1ead810c7c169544d84df5034247aa540aef7fc193e8cae974970cac61f3a5d02ead88c4a821f945238b00e1957ccdb12ab0d096a006cc549540c81ea1e5c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837b88a694b41ba54067afaaacc77db1
SHA1a8c0bd9bc90f18739c2687038d39d19f3b6668a7
SHA256813136dbfad11ac082714e49f677806260af14c9cdfeef6cdbb0a24248ae1882
SHA5124772e5a78a1a4f2a19949a67cf3724064e051352643fdd83da3dbd2658e21283711fdaa5485572f1f99814fbd407d38a067a7ca1555b153bdde21a2e5ee3dee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7b2acb8c9653ef128388a8acb82270
SHA180619095cbc1c859a4bfea4fb75336f1e3111243
SHA25607108046aaaf88ca6b8e07b9fe6a010c839a88fa4a8d8f19f77a45b29daec816
SHA51209daf945a30a6894fa41bf3f6118e9b9d5933c77b293d248f766eda26c5dee788a9d6cdcb27b54de2f4440631db2f874e0d7f44c380a3f28221a3c78b9a5572d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d06a0c996ec7206c20a3b232a0502f51
SHA155ce36788a2bc62cc4606c227f6f153c4fb20c92
SHA256090085a924b346149aeedb016b5d2403edbfec3cf85418f8376877fe080433a6
SHA5123d00c16f3106250393252b6e86b410010b8b5418c3f4a64ea5b3f772846bba626e900b4b8c65868074a0571abe35cbedb38383064004e2d216063d27f04e3cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535224e58336725fbdf4fa8975cfdf1ef
SHA1928498aafbc61e2b2edab83788a646f64239cf7b
SHA25653b4f5af562dcf58c05208be0b4fa980f3e304a57359c2940e830c6b9b564fb5
SHA512c8243d2c13c124b58c02e968db6c518580c95fb3ee0234e119332c075c559fa8a249551bfa91514a305e8988d8e604e8b2346e628151cc26e61c4539cfe76fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5509605e761fd94cd36405093b929db2b
SHA15febb3afa546b7a41404f4c18a2eefeebb3cbf31
SHA25601e60ac61c1c934e054e872405ca4a0c8ce685de78893123929a8b7fbb8c094d
SHA512c3a43ec16e465166ea734a8b6b8f528332d3f76826e2d79c129e738d357695ea92a6210dc003273e098a1ec3b3d4d20ce15af3f1a3d542792ca35b1c29616c1a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a