Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
3f099446d00e6bac4217e2f92e49a7ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f099446d00e6bac4217e2f92e49a7ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f099446d00e6bac4217e2f92e49a7ac_JaffaCakes118.html
-
Size
10KB
-
MD5
3f099446d00e6bac4217e2f92e49a7ac
-
SHA1
b818099471620e0550e3a9fb7ef6df8b9bb93bf9
-
SHA256
68fd52b105e146abda26fc2a627310112f831cff8e9489245562b288c16dd2ad
-
SHA512
978f28492f6a140dfb9c93d6274bf58ca35a043ae6d01af51ca9cd7dc62907d1bb297cb238e0c7c4a897a7ff5fe7f413e25e0e5ab759b690e5990b6e1aa0f001
-
SSDEEP
192:cjgi48Optr3DVk10pLVXyvEikXKAhViGCV2gFr0wY2/rz9gyZ:hvr3Dc0pLJ5ViGCV2IrrFgs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000049b43f95bfec808607fb7030e2a8dbe743f0c39b4754fd718300319c191aca3c000000000e8000000002000020000000fd8a4c4322e181fa06df5418ba21369900379ea239b81238cdb187d6a37f1c72200000002ab26436e46d8cd4a6c656585ad68db049ffeea700f9f61d3a3485a5e3feb2d040000000d956afdcb418ea75d4d11a5fa2790fa551f268f6eaf3c6693d8a6effb1400a5609983b17d7e5a1ff3dad3087c44337b7b2c8e7315836b199892f97f15070521b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421757995" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c8156a20a5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{959B1C21-1113-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f099446d00e6bac4217e2f92e49a7ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebc025fc96764725a3800e88e6cc6381
SHA1b1f2bfb1a19cc7d998e683b79a613cf534cf8321
SHA2560d74a8d474d5f424a7174957b5c7162a7859c7d3110591a9e3e4bef05834bbba
SHA512355a6cf91610e9f37193dbf72f01a4976cb6df0fee7a75c8ea68e369da88f2b60c6879884093f7fda4351736f7d033a7d3bb53f540735902fefc3d787e94dba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d507afac0058c4ce7ead5d1ea285872a
SHA132d00fd6d4c896a0395444940500b42cb06ced15
SHA256ef6d3430a50646e38bd7de6efd81686eb88900294e31c2aa5fc7379d494aa746
SHA51234f320ee162b66cfc677bbc6238ff23aef5782c634d0fe1babf983d3e7a6d8fbf50fc0ee436b5b714bfa17af1cb73b28bbbd799967dd6a81e18c08715fa688ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52430043c46aa76240686cc42f6b26683
SHA1ea8adc549912219b7e29da7d8748de6b8a3960e3
SHA2565b20e5483cd5f70a128e00e230638d467c13ea33aebc8145f6cc8bf5e2c54d5f
SHA51218d82d9594e9c657c410d2be4d6ffc1b36d06af1a36985ef31e6e0d068daec686efb20073ff82088ac687dc082a6db1a85c32c9539a6a32e712ffed9a96cc780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3163355779057f347001a4a7ba2140a
SHA111bc6dc150ff9e2ef1353910259cadd1042dafe4
SHA25631583b4cea2b0a0c52426ec51e315b9487c90d90159c4b25d29890ca2cb5cb5a
SHA512ca79f92337cbabe2d4f047daf743947ee24581feb9581d87079a0235513732fc17594aae17187ce4a1c0dc7755b245d6305b6f7b03401f00c97f9a48f4433de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745fcd527d134747345889520ed37c30
SHA1bc9808f3a33f6e6b81af26524bbe5e428b8d7bef
SHA2567f5e27ac95e68972ad93e42a2cd043c417fe7434065976a1d0cc20597afcb184
SHA512f6311816c5b3782112b3208900e544dcf8ed8f5ed8f43ccb62a98045ab0f53b71b3ac62a12662d0eebb60eaf8baffb1a707be28469526edc5ba665baffa71526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454d1dc79de98e7db4409d6f67cbb712
SHA192b06a535dbb7b1d0cb2a77c27e4fad269c1256c
SHA2562443d0959e02da1380341c6480e856f3fa7d6164b9c439df0f21939978c61a18
SHA5126a5998b76f8ab7abd83adb487213685eaad645d9fd902dc13f9577a98462c4313943dfd3dfa4811c8dfc9f1e7a4a0edd315299c55c312fa46897fcda6d76e8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba5eaebd6eb49e41afa8b37806cee57
SHA1bf796720558914d0c758a57a70baa6d633ec4271
SHA256e606caa35ef62c9a269d8d8b0b6450a0e2ceb6b256f0c855e36fa3e55eeee0de
SHA5128ff9b71a87288e4dc95b62a260f199653e55f81dd323b9933816fd01cac8cef66d84683a0723bb4702c092490bf761227d6e37e0b2cccdfea8edea8b1a5f9fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff2a824094318e5d2e5ff44e35773d51
SHA11733608af9a31b8854db0e15c57223dc466bf913
SHA2560c3d9a356eb34fd5a490b241b0336850072080cfc87b626456e1337ad6620596
SHA512ae4c03917fc58e4f401c93b1869000758a5191199915588e73164213a5a54e6869a2767ac87665759e1f1144e4c6926f24e7443f12a4e9d4bb30b2b07d592879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a164b9e8c86dbb2d7de47d6d19904b3b
SHA1b5d9556925afeba720e99dede6cbdb80f0ec8478
SHA2566f06a4c58d14ee5a3c2f1f9fe224da5b05b71ac3a17e3e54fc234d2a2023f747
SHA512672c33d3f910a6215c89bbd55abed43d8f95628fd1777283dc6b1f6469e2d8211c3703639c38895af399ccb5cc89a49dc735ae6e56523b91c58f8c5756b94f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228b8c528fba6416039c832dbf175bb6
SHA1da5c899e387eb2ad58e21903c3cd18f72c07c3e7
SHA256f08232f02a92df3fd3402f09b1541cebc8417725ac29badb5843ff1bd7fa880a
SHA512e394f2166bec748af2083f54693fe9b85ec9db66ef61c27428edaf02b926fc5e4f16c6f72c5f90a37dfcd998a12e80be6687551ee903de2f1fd4b1de3e6d5a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1044598f459fbf2af1748e802184674
SHA1d61fa4525ebb2bb6003df0326ff86ffcd515aa9a
SHA2566b87577278a6cb6bf526ac06ab70f80b883b9c4f39469c41d6f5d686a55bb46c
SHA512deab407c0d3b3a09dff96e9f025426cd9d1a46437513b9819971f809de9852eee5d4bbe7e1d8ed0935d46fddb2793fa54fafdcecb6e678686a3cdbe5d59283d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519dcd26ef3f9e71186261aec9bee3161
SHA124aefab67f0da9155947ac29e89714d5cadccba6
SHA256dbc2a3a6d9ffd3c6d5bde950773d35ad03cc2c0d60b8fb3d4599eeae73423485
SHA5120f2c5f84b6130045a18a3a54cc2c665f8a3d2adf722fc4dc50b1e3eceebe3369f89121e2383f87c0657ff7ddece2a9b9d32a67a8a52821d1bfa1352149b8cf0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3335856c94d995cdca896401389fcd
SHA1337c7b5f126a240d8569a1e927a8741e6452d761
SHA2567c42c7e4e87fe25c48e20a5d6f8a6b25220a200f7732e74a134919cd9abffd58
SHA512ba3d917205035661d9b18c1b8b9b1e3b41002e6469df6a0cda5fb06f99602a1c361548eb3512d1fe6eb28b2636f75198557381a6c0b11f2af5e2a61251d87b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cce9b4f381eee7500646d77b252cd5a0
SHA19770149ddf578ad4a449bc464e834c73d819b6f4
SHA2560058f09aa667c3d8b065428bdb70d7b0202c31fefbf36e9a5a5985b30a3c4c31
SHA512d0990d73a6296542a3abcc771c46368160e5f29276f7fb89d0a0642ca52dcf0dc2069abe4567e5005ceafec73da19eaa316c7fa6b3ba3171ca243dcfdb73a2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf364e8550de90fd5bd947fad75ce5e
SHA1ecd3a065c16c0ee81599842340c90cb304e6651e
SHA25616081678f60a661128e3360c6b482a73e7f1c370e15dab42920d96d24173853e
SHA51226b6ccfeb6c1e18e1a032b22fc34f147a98153f06ef9a066b1122e5cdb4e17ea7361836b71f7e175f1470c8c1b295786a8eb92a2daa60635ade8c8246b0a6648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d8ad4bea8baaa349fe030fd9bd30df
SHA14d0f3c7696cc55a9be71c3d6cb8b7a0a8b24e7e8
SHA2562abe286abc828d7d1b0df4f82422bc0d0286094649422c10703d74969134da43
SHA512300efb55e55c22ef90ef2bba84cf12f197af9e0d0c9faea063f01e2214d10423fc01720fd524fcc7aa261e33ed7765abbe6d117ab031e2cd8848629163f86431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56926dda3268357a4b82e4efca75e8576
SHA16c76a66604a594df789fdb8d477a5d378c54769d
SHA256e3ca6fdb3af0bed3b2618dce0db2610d7c7bea4d045912b778faa0a19a05fb4b
SHA512e87c11d457327efcb7820bb56934e8f2b392f366d3cfe89fd825ab659815bd09fbe340d34058c6c034e22b18dd85963aa9e0837ed18dc246e70c0df90e6370df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4b59f5fda1bbc865c2baa626b4f529
SHA13c0404d8b5b6bcc4deec2e2d739a6ba13187b738
SHA256aae44f0db09cd2f9cdbadcdbb30743e7765552df4e4c15c1609cf09e1022c843
SHA512dbfc4e636e4b3fd1d0e65867cc173345a6e2156cf88b3d18db40cbf29af871a84f370528a71b7757fa028039add0f85c8b6dd08186defb264c2f56b5bf0a6332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8ee28ef8d0e1ebf07db7fbe2c75de45
SHA167cc373191b0522536a1e629d9576987114d8ea1
SHA2560ea6b078157c710a26a07262dbfb3cd500686140517b598dd6317ab16c55d016
SHA5128be23c8a308271710772614b07d0abb3d69df5ac90987301bf4187f16627a04877ef8caa1be23d7391b956d885aee721e1af1f8dac4accf20299bf2904312d10
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a