Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
3e8ca9c9eb707d383a1cf827f6ba44a4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e8ca9c9eb707d383a1cf827f6ba44a4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e8ca9c9eb707d383a1cf827f6ba44a4_JaffaCakes118.html
-
Size
5KB
-
MD5
3e8ca9c9eb707d383a1cf827f6ba44a4
-
SHA1
ea5348e000b4a98f6eb3b6cf00307624b089d66b
-
SHA256
59748bbc047e37402ae855747902ef2823a296f60c36d5e231db2305030aeb8d
-
SHA512
1a3d13ae187b1970613c1b2df96053bb302c48e8619afde3ccdaf18a793cee72180c3139d734176a919871d67f89436c952643baf83a186e82f0fb923d61ef35
-
SSDEEP
96:2iJYjaQtiEtmAR3CQue1wg95X+g7GvfT3TV68BGVsuYQ2se+vqNCTI:2OYjaQ0EAAVz/5XP7GT3h6dPYxTgqNCM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0afe9a20ea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007ffbacae5dd6d81f1e967c0b64ee1ca648da55178c91f2097e5ea8c386782b08000000000e80000000020000200000005d402adec58916e7ed3971013a70a15e493914c2965bdf62b6ba21d156174a052000000095d149024c47cec31841abf7f9599d90e0e2490d84e1d0706f6233378edada9640000000584a1088e9af2c48bcb71d15d07ca541d6d2adb4056bb3c5d48e09e0611e3406e5dec39df73fbf4029e61396bcfc9cce270a5d16cc86c3b3d070edafae13937b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421750355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB3534E1-1101-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e8ca9c9eb707d383a1cf827f6ba44a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeba2cf8ed593096304a4bc290999d5a
SHA1b07e1560e3a573ad6f6b4a0369a53a44876487e1
SHA25675f6d7fbaac7ce991c0425efd0c957cb57f03a1b61ce7e7cc2310e5700fd0845
SHA51239dd23fe3f81826b8bb2c8ab03248ec70fc2ecd988c341e1d89d660988362d4cd3a9b772c9fdd04ff6213ddf19ee6c6f7f749dfa274277ea867625846450bce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2ca1cf346d8371260c8322e8bf1703
SHA1c169d5f57fd06dcdce13af33318390be5d1d31ab
SHA256008e912fed0bdd04d0b05df63837b181dbdbefcd6b43283cf198dca90c832dd5
SHA5120012ee61f666673cc5e8a048d97f92037f2b6181d15d592ef3d658ee14312d190100e975e208e5f53c3180150e079fe1f3f5d3b26bd4dc8233fd902339d56dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c20bccb563c0175df83a14c08ab4e2
SHA1552829d4edb16f24887df400b6bfdd91ed322c07
SHA2569f65002992fa801e6b7d38ad04da0fbe6d25adc2567e46e53edf1958ff3dd9a5
SHA5127996b702d6573d84fe3c27052f351b4b77f386ee2e1f50626f8c330bde15e777aef83567c802bdb66e7419c86fe8515218f2311e143ecaa8f25a10de7553e658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fd6762496c3b6516b07816ff68c129
SHA14c0c187ab0ca7cf6a7334944dc9359dfb568f05e
SHA256ec3d895f4c7c98162a8a6c56fe92aeb7777e17f1093e15cf4fd65640f8acd874
SHA5120b77a585458008d278095a5746c68f03c19e32bea8899b901820be8df6ad14a576a1f74a28672adf28114de791b7e5a67258f01178c484b6ab8f2eea441fd39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015722d6a96a845936c759bfa3188abf
SHA151b2b27d100eff0aacca0900770abe8cdc8151c2
SHA256f153e33e58e16587f6cfd92aac632c8ab6251397becd3f608e585f42a65d93ec
SHA51282b2bd988cb5b5e57a1354df912f269a6df07a0d6da2abdbba99e2c22a644c45db46167a2d83abff357f350f87616d783eb768cc858f8616e4af9e2647527945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c6535bff30754935b341db87ffc34c4
SHA1952a36346eaedb437ebce0a4a31455616b34329c
SHA256a5c8ae7a865cbd1d6471192607ae5c76916baa288f54499b2365057bafed2c36
SHA51224472349db810aace423e2a11436e535e06ed014f48607e0945c86d434847e44b3585e78afa3bbf9dd96fa3edbeb80406f06ce2034e8b786973f8b7ac431d957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3da8b8bc5f4c89ad1b3807f27a5f6bf
SHA1abc4e8023a28deff8dd24da60c8907d1b1891b38
SHA256e599465a4f60832b0922c251f1b0bef2bb3ad992890b87603c4e057a488eebcd
SHA51270c8335f2a01478107af71d1f6b29471f6d45ae1cab459dd1d529314be751ccb72da9ab7eead7fc74cb5883e47986d8040511b08eed7ae8c65cb9890314b368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56366eca838d746c194a551d258c83853
SHA1c672d69c9821f5d5b33d786061cf376e23956fe3
SHA2562a20cc40dd3ce754bc62e5d1af378c95b5816f9e9b31c21998e146d2a94815bf
SHA512ded6629868b4ee815bcdf441e070e16ba4e4ea938698191f729adf44e2641a8077500ed9ced48c102eb0c773ae13e8af9dbf1180172dea4883d881e7f0e48b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc43eb681c203ff422d3de145a0eebf6
SHA1d8c6cd2831e68e8e1e0b9fb5cee2b56194eb0a3a
SHA256b625b7652c3291ad59a56aec927f62cbc671d1cf7953c0541f60c8335ae0b658
SHA5126dcad99ef454dea99707d3d2412756954dd2472cf6d07b4ddbe82d7ddcaa905c9c6040e05e73322f7f66e9a253472eab930bd0f236c34b7cb4b110f517621fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54197e3363b4e47beb188a53557e68faf
SHA1b46f65f49e686f57e0995924ce47ac6cbb59071b
SHA25672382db3e4c29c83c94c789b51a881b1a034f7288cc059cd84e20a7d459199ae
SHA5127e894e27ac0eed4de09b15801d143fbfa6f40bc6c028eaf0bf9ebb922959ee1f082c04c903b29e616aa888622b1c0352980ce650cab2ccd3e5120cd7d7e590a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674dec3013902fe42920c5edb0a45ac9
SHA13039d794d1b7677430e02ef9bfc1b557538a6772
SHA256c1cec3a307ec9da380f1764dfd09481adf63ac1bc6c9eb9caa1f5c922922693f
SHA512267d5be96bb56461d3b006313d5ad66d179aca9450dd4a2f136cd981b875b465bca428f31991b25b2250f136fb48bb1128dd5679c4c64b3de089f6d08190d739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa81d6bb5c0e86e5f58277a24acf216
SHA18cbb74e0fa117aa9e8874d79f9a8b846ac2e80aa
SHA25655816799932104489edb8ba5375787916a27f069be1f384533b253cf66abe427
SHA512c01b8ef059518fd7401cec7bfa3f71234c1e2c45ada934d830e58419f5e298aaadefb00c113c35726fdb89d8b9ef52e0aee6d68db6fe9641713a1bda1171dcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506293d06bcb76efcd4b681d3bf57a5ac
SHA15a83318e36417bfd9b0aec7850c8519f4826fa82
SHA25656b9b3eb495e977d20ec4aea4f992af382cded663fee4bc55679fafe9594f036
SHA51201311ef09ab12adc127158dd6d2bf69db6a03585f98c22d4446081cdd54f80c044fdb7c4bfc363edaaaaf7b4d7df618656aad1e955f8042d8763ae265a6cde5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2991ca65715c2b2806735f5fe7acdae
SHA14381e33bd2b7b5aa300c843446427707eac06d11
SHA2569d7e012b5f7f84cd43d30fbd6a614a6906f356a2be050ccec981642843f02a02
SHA512987c607d5dd8359415cf676cc5171dc0f7ac4e27851569ee01f8aad382880223e79f750af36214f7bb6c1c6ad3101fcd283b75e67897b570a32949c9e1724b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c19dfbf73873509277981cc92b67cdd4
SHA17b28def0c9ff6c70c36eeb5b88128a7f2c44fe5c
SHA256fe1593addaee3ecaf646d080de9cf3aea9e8821dcb93a2b20b79f6447b3269ee
SHA512e37283d3ea6b41a387bbd67cb147bf74f129da5bfc984be1bedaa5b01e764486a4b5a50413c59c48ada44098df3b63e9989f414089404241b41f34061c10ff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541b1db019361c2b18b3d8031b3612144
SHA1653510e0c16cdf9591d4acdd510852b7048f1bfc
SHA25601440f5aed82a5066405db8460c9dcac3e02e1ba44882c58e5c9ac7618088e8a
SHA5124481f20f9efeda6df3c135081b67cf6e2056c51265ebeb6d27e7adc211deb9fb4b66ad1e6c3e95e2b29fe1eaf3d7318e521fd15a09822a692459f64b59f9efe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52884b9c669d180c1e0739615d6a3d665
SHA1e62b3475a1a89b02a6c80799cd33c44b5fe3da12
SHA256d05b0eca1f74b2e2747ff619515498fe97af496bbcb63d2fca0597e711e44ce6
SHA51273f278e986dfdafaf8cae0f7d94a395dbca2664adebd0285597f6a50a83003ed6a9df9796feee221d9d109bd3f437ba8f71ef33838b7d0c292c4158120a6137a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e2c8d2771720e054ea65ab65722f854
SHA182883159eb4277862fb2732f1300d966ed0330fb
SHA256c48c8b3ae2d39f42fcfc017938c623d394b7a57c2bd39c82b73c19aa952528b8
SHA512ef48c9c4a075a29a07bed96329fdd4d4ce5495a0e181baa0c436a9a0fb253e1b0c9da92178b2dbdc2d3f995808f8db37694b7ae6c6810cfc5effd5d3f380ce62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5585b488e0c5fe48dc4fb5f9aa62158a6
SHA119b5c34268c16ca5e4fe5153ef92bef309d3c458
SHA256272e8426082d221ec03f321362b9bdedacc4dac16660a32cc4b06126039a5262
SHA512f536691c9853df61c2fcaf20e9be97125c3110cb0ddf9be86934731a47c3e65869c5929cec7185b8de29374a3a057e0603fd6ab326e14a645337c14f40a8c6d1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a