Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 08:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3e9e881ba58367ba0f94ed55e627f68d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e9e881ba58367ba0f94ed55e627f68d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e9e881ba58367ba0f94ed55e627f68d_JaffaCakes118.html
-
Size
648B
-
MD5
3e9e881ba58367ba0f94ed55e627f68d
-
SHA1
8e64e8ac0ad606e4819f2c2162ff8866d86cd174
-
SHA256
3abe5329eb247907645f3852cba4ab0ac338031280c106c1843243acc7ee7ddb
-
SHA512
38121ed8b8781036a8f1e41448da7eb67a330126aaa566634f5c98c622a9af22e435c27934f2d7433664a174de9379ac209542733aa3b6ac380d00eac26f6470
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3009c79411a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C024B821-1104-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000ee65ad8ab18e7558f8b2f972121067ee9684f9557a3bec9bd339e38cf6daa3c000000000e800000000200002000000071351404c4488e96c43b530fa29045190afe5af63bbb780064153ad2a8872a0c200000000cdf37b37a5c919b383c40126849115bb0788ccbd0e1bcdf40c36889b907ca774000000069194a13a546068758e59daf767546b507417b3784742aca77732b78ae072e822ed972ef0d229d81b8baa951e37b6b27e9f93e4dfec23c58390f943c6476f2fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421751624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2552 2972 iexplore.exe 28 PID 2972 wrote to memory of 2552 2972 iexplore.exe 28 PID 2972 wrote to memory of 2552 2972 iexplore.exe 28 PID 2972 wrote to memory of 2552 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e9e881ba58367ba0f94ed55e627f68d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
-
Remote address:8.8.8.8:53Requestefreeporntube.comIN AResponse
-
747 B 7.6kB 9 12
-
747 B 7.6kB 9 12
-
779 B 7.6kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546df96c4d5eb72d4e72b8702c6047a51
SHA1221147742057a81fe1e7c028a8cd47c2805bc4b2
SHA2564836966804a637e5c44569be943f8f7c0d7b4abe5ae4eb978dec169ff5ad132a
SHA5127e90737256c07ba96ad0a8976ad4b40a6b2196cc7d1c7e5ea68c5fb1d6fdc8e932fadf782ef6b89e680539fa258873fb36af0c1ebde0c925cfcb9d519f8869cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56203ce76e535e79944c149e4f78ee47c
SHA12b93cc36ad5b699893c6f971fa26dcc8d09fa129
SHA256496c9c458c74ebd6dfc71bfeff112b5de9d74eb7449f20665a7cd71814916cc7
SHA512eb488ac022e978ee7dae31913467c40d562ea06b11a313a4e3fe4bac548e44eb1af233647dfc08570c78a8ec0204672b694e86c8995534ac3ccbb872d8bd5cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110259754f6ff53d7436cb33913fa56f
SHA1a7cb78b33c3a4e5f1f04bd38bc7c598bbedb45fa
SHA25672308c7d893f6abf513c577c18dc0396fb2e18d45cdee090519a87244023fd2f
SHA512bb1eec3282eb032790840859f649b195e4756abc35419cdc683545b71dcc36b604e6088e1286554c61860bd1c554db34f32ed77a39652d88a990756f501a5ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945e5779a9c822e6158494f14e9d7050
SHA1be81b2cb7bf4ff3d6de6fcf96e9e694581a8b952
SHA256e01aef5ca1fe43dfd092431be887f486faeec1ca41d50c9af08e67404605d474
SHA512b79a7b4e59c1a2f679fd82bbc45825d4fda547fb8d8dba804919209cebfbb98ea5e9d6819605c471e83f9e51edbaf82649fac7faa8b3a40ffe004f48e6c8082d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79e00ca12ce1605ce70ca705882d477
SHA12d8fa05af53bb605b103f31cb03018a81ea8739b
SHA25634f9753dec4945aea27fbe628712cc5422938a72d8497ee1b22fbd380831c91d
SHA51210d55ee1c24a0e6009d738afa2880b8e99be51c54ffcb3d5dbecc58f3fca80a5636b9b4996d073a049cbf72e048a029c5f77189afdd47f3247fa6423bcc12dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df18224e8602539897a3cfec0e0fad9
SHA17c68d52a797f0b25dad464f6765b3686e9e7d075
SHA25675f8909bcfae72c5312dd881eed45ddb5930ba554b55eac6872209954c728fbd
SHA512135708276f96296cf5a05d4dcd9d7825e6ee7395d94eb786f70a7e7cd2c289f089699b7de62a6f37b545e1f36f3c11b432f21ba0d86ce520c8deecb96e500531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45c6a45444cad6f77a31c30653ce913
SHA13dbf41be094d7e7940f9e98822387b1ddb8d8b4c
SHA256f552eae15c7a335ac8f697fa9cc5038b79aca73bda43f327e35c7301fd17e162
SHA51229fdca843e77ad3d44c5a80aca9be22b4d0030915ad1df857631127e86f45fb36631dd4db9974069cd66d5f107b122cbdd0bea1e82527454e6b2708f7c1915fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51203dd41123a6d59a06a247b3e3ce894
SHA14031218b1d4977074f107518c92a7aaefd7061ed
SHA2561803c12d88b242f9896773cf17cee90acd1f646fd03a57f8e0dd902ba605b809
SHA51297b953ab93bd55d8fb4db2bcfff5369c84a0178d5d5e78c2fdfce66946af9948d8b3896f9c5cdcc33e175b78eb37137b6ae4a45a9405ae09a7c2ef7bbebedb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516641d872d1e386ca2e7b5741b96ac50
SHA1f5817cb2ca7216f53da5ad51fc002bf76d8da874
SHA256db9a189b8eb6a94855e7f3b5d8d3db35b8f135d0787f5b5ff9043aed24f78536
SHA51269ee30e1c53a160f3cddf0f81be3df272e74aaa157beacf35f64fd362d01e16d22e30426e53e4ca3b088edf4ae2fdbadfedb40dddea8012f6a1a062a67ccdf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d06075bfc8a465c37a317caf6ff7033
SHA1fb31fb0088f9ebe7da0e1c7bc5ef3fd286f711c7
SHA25610cba0dff3dad3c041720fb82bc2d826ef01026e0b4428450fb823854deaa4db
SHA512e90573f5500575200971fb818640cd909a069ff623d1e28deaa59b47ea740875d9c8ce2851853f24c4962d81add7154c83403abd7c11cd9648ecd0ddb06c2b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb92f2244436fa9c2350cded7caeef01
SHA117e43ed9f6717624749def2d5de1aa716c3fca85
SHA2560c0b04e4502ef1496269dfd08f606976f4e78c0aca43e9f07a765a7db69645c8
SHA5120cd7b82a7a7fd9f7cb52310f17eb2dca4561b86fecd770e031b7c927693e61ebde4db0236d9cd5c59dc7fd1d9d41d8f06e7f4aecc778deae3b67400a804fe6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c881e67e3c28a406733e556cdbf3b93a
SHA1ccfa9b7ab513e481eee077e7c3fa86de38cdee88
SHA256ee0bf05446088c22c7da4818b794e358a7d173f5696b43b9e46429ae9041a54a
SHA512bce3159cf6618f6e119fbed8d6106d08f1caa7bdfb54a3d85fc45ff6a6092a798c609f80e4c8d0fa447951af8bce5d5320a9c5cea6983bad9ad628383d139dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580fab2e9dfb5c47e3221d490a904e847
SHA109035c8cc6c37d7cc2e8d6c35bab4be7699166f9
SHA2566c4771ca97dcd22ddbd285619d8e8ece2aba22962fc68b01a8376ad9b3264ea7
SHA5123e247c4c2c3b527a473bce8afe40d0a130ddebad1ec344499c91f938501555b5e0bc68117278287b6096aa5d0af743eec15ef2c26adf77fc1c972bf3f0149639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f0ff8036c6d0077b86020437f67f58
SHA1cb65743948f6e0b004b5636b0082b3cf77b9b4e3
SHA25687d7f50542683a140fc1cfeb0d6c0f012f810b6f81f7b974c4defcfde81c6081
SHA512e6fa78d282e786820ed3b6637f3d439a4b7fa30ddeee2395879448ba7fcc046651a0d01e85f2f9211eb6d3a6c91a8ccb5e475809aaa3577de8b95cacc54e9618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ac3bd87ded709821588294d02b4160
SHA1af273d963818d20cf6ea7dcf0b375028c7cf2b9a
SHA256d5476182a023de234026f6867b9c57c1fa82c130af11368403c4d97ca6c4946b
SHA51271e9dccd30b77a1a77943aa6782fa33eb394e484cd16300e48a7bdb976d5923afc682e5ed2f7774f03f24ebc1e49f95f0399edf93a5109c118b504a7d380d416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a1d5bb61a5d7a44e0d0c94be6d08883
SHA141ead60f8a13ead1266057660e49151fd6261ece
SHA25671cf91fb4f906969951481bb4f6ac22e2e6e618607f1177e09cf416737a1a774
SHA512775de9a9dcc91d931efdaa1ba15a25705e5191bde7af5da0e023d844c4164d655185378a6a1c17dfd7a90fb1a1483dd1a461fcd40b988243e09bdfad9b6832e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b6d1cea7f386d32a80cc554a39ed8e
SHA18ca1313442b4f234be700361f108413928cc3726
SHA256cbf82d69427b04efe3fa5a9b7f4f57b39847c76081b40aa7c5e8de5052bb8151
SHA5120fbcb5867b7ce7212534f65b87471b053f04b290dfc10ed8d678dc01ff72c6933dc40d64dd07b302a4fb67cd55f8fd14686a9022eadf5438655a361c0e9070e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb80324eb144b404dbe81699934c805d
SHA18ab604289e4661655858bddde8a41e2a78617b9d
SHA2566146092dbcfc490a46820cb61ad08ef70aefa7543a0157ff360657d912be9b32
SHA512e0d86b5d86f7fc912cd9b7281f5a61af2e0084d0afc530de2cc29715524d937c84d8c737bdbb5df789030740aa519d96f6addd10fa0f05a6052c66191a10fc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156a7d86cb92bee3b17144144791ff05
SHA12ab5eecf11c7a0596948e08f995ce9146a49baf3
SHA256b84c7729ca94926b897c86e388456d06881744fe2fe67d1081a6a58d4109d50f
SHA512785ee4812338796a43a32325cc2ade322d059d271a604a7d140c86215efe425c0d4f9597a9c939a6ca19872411e2b9a9273e08d1ff88b40d38948f298a9ca856
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a