Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
3f1f1df7bc34311a9f0a1ca1ecd62f42_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f1f1df7bc34311a9f0a1ca1ecd62f42_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f1f1df7bc34311a9f0a1ca1ecd62f42_JaffaCakes118.html
-
Size
19KB
-
MD5
3f1f1df7bc34311a9f0a1ca1ecd62f42
-
SHA1
a6b42a0fda79f718256ddc6320ef1f06560ed313
-
SHA256
faf8abc57f190493b7496bf62e59b482ecab4a76382a6d34c3e99fbafa43ee1c
-
SHA512
6392ccd236e9c25a93c8d6a973122b82ad09a22a61c595b64c2c0dd85b0956f6278abc6a356bbe38adb2f73f9aa558c3614e87431be773bb826ec159266d8577
-
SSDEEP
384:zi0qK8vLWmbVBD8caQ3R4EB/6iWcmWsXucfIk99heH9zVc9B0Df:zirLWigct3u5OmAOIk9SH1qB0Df
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB7F1011-1116-11EF-9DC0-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103d5f9023a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421759348" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009d70c6409d1de532b22cbb442fea272ab8d4c7b4008aa1672e795dbd3fcabf15000000000e80000000020000200000006875b63e6676f2f9ddc255946f7cda85acbc10d5471137b49940e64de9c603af20000000da6ae13feb3e0bba814b375ce360bb4dbebcb916014dfae363adea9aec6b707e4000000065112ee6632902f1b62cadd9cb2a52fa8168e946ac7f1b7c79e5e28febb46f4e5c84a546075c84d7b1d6a6dbd2ec4b6bb0072436abe053985373824894268e0d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2972 2684 iexplore.exe 28 PID 2684 wrote to memory of 2972 2684 iexplore.exe 28 PID 2684 wrote to memory of 2972 2684 iexplore.exe 28 PID 2684 wrote to memory of 2972 2684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f1f1df7bc34311a9f0a1ca1ecd62f42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559509f484f94b4fb2b55525ccf2d544c
SHA159e6b8d8422e497800b62a3a6b699e8fc40b3f07
SHA256da91cc2124bc5942dcf0078ae2b019e428366c3aad2331e7184c8870241212fb
SHA512f25606e51cdfeee53a70382a73ae90898d98bbf22ffbcbb97c9115005b6e8897c7ea1cd12462fc7c97dab0e55646af2b910dfc7cc8b54a4ba20cf81ef8ee83fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7c43a40444ee8f2421f3dd82afb465
SHA15607aa5d98dceb33e0dd7ae227c51ef1f0e48fc1
SHA256fa616e056f0f1bbe7e9a09e8ec87259e0aa6f5109a8ae49e2d64b255aa787c9e
SHA51278b104136f0c9193c42e8a793d48cab02565ec78457503b9510094712d305c1f6d870bdb1909e7fe5fbaf650b15db47c2342e0cfe3107e096407356ab65a96da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dafea82a088f2d924f4538009bad0d2a
SHA1cf33f3c4457cda76c1d816af08935370c8b191cb
SHA256b1df8dd8a879694b0fb59b2debef4c694cc4f53c10c5bd36eb4efd097ac269c7
SHA512f4c38aa52af6c70d2044d6b625ae1741819b879eb2af5e9f0b3250be125cd00a4df24b9b81d26e4888945275aae9ebcf56a5a754eaa0fd129f9cac628c91bb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d561a59636e1024da73b490e2a4a1f
SHA1f25daba9603c75f6e055c2cdb4246ec3ab0f8390
SHA256c6d3b6f54da289c8e5e80e5c3b2642895a048ed8a5d8738d4551c97ee30a89a8
SHA51200530c6b50585e3488d17abdc0d0c7e9a21dbd9db82867d2f4bde6920d1a93dac4336070808de99ffd025013ed3e77f26c314534d7404560f55ae40a4a65e7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c192e7db3fb8593419dc7def619ebb2a
SHA166daf676a6d0e6447b06d14ca3b48763864fb72e
SHA25680262ee41b0d1f7c8f3bb45c5fb557ca0536540f2c67072e0ddff0e2d2da7999
SHA512024c6d6d7d34af09a0ae831ae45528e59634cece4039ebe47d45fb4d8f83316fc4df19bdc8ee80bd2c89f40ac463a65a5a2384e42684a0f4e0afbf860a5c29bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539befc25025a0d5a8b5766d03d12c700
SHA1b8284c80dd5e7808cc5fa67d1a4fb3e17561ab27
SHA25663312fb289cf4eace5e42742aa7502e9c1ccf471779321ff35ace584b5a53b45
SHA512f9392b24970a3be45af6239db28ed540b2057ac5ca348da9dd2eabd900216aa0e2d21af2615f7d3aa7aed95804c5f627d1998085204d49f924486450d58626ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492dc44eacca8b43f90569e98315eb8e
SHA19ed92360a2978e52f945378938c5d4632019d308
SHA256432facb39f520950620e51a0b0d09ed0196ef3c23cc36112b5716b7c2d06ba13
SHA5124570731f3fc86197ea05d159867d3c87c89e5af2ac86905c20d8ef145825cfefb88f2038b52fa132874327025cd1faa7204d38f92578f15d8e4721dfdfe4c861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec8880b10565545b5edf03cf17d1e25
SHA157457bf9babf8943b199373a7707b65a9dd549b4
SHA256c96074a91c9dc8027fe3997ed3c5cfba91d670196b98e087727ac7b993bddc3c
SHA512ae2d9c2e50b4351688c7583ffe587921e7344c119c2fd898c30f3b9b1e3c2185a92116be2807a4b20d31f18229fcb62c053f46318b3c744e5e3d8e0f9aaf5234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d5e6def471dd409e65c18c451368de
SHA11d53f50a53af25cfbc8fec6d32ad185b350c29ed
SHA256ad25598c993ee7dffe281fb29b190db7dcd94949250e910f641b9bbaef367eca
SHA5129103b5156da317929cb5a78b293fac6153ddbe9a280eec33e02ce7d2d197eb0b29e8f7b09332e94d5b9fa670afb7b04b624dcb9cb4470272b26ab009b8df46fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0833489f4d3dbe074d5f8e02a71e99e
SHA19653ae4a221b3922b1035ca566a55670950bd434
SHA2563d17e40d70aafcffa0c34572aef5618a3f975b693f413ac2dae4b8e517773125
SHA512a00fa092f598b33d9f2887ec79757cabb43915682561fa57691d00a6fe2069b8c375af61108732a4992ee6554be594ae24cf98e1309a58582daf7b3222386af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc45d6a4cd7889a9f5fc5b3121b0f57
SHA1d8aee3344b6d69fa5322ba35a65c31b167961c87
SHA2563aeab1c227910c4a0ee3266f63f5c6104f0416bca26eaaa84fe202324b371926
SHA512c78a15392822a086cfe8b8ecf4d06064dee660d482d829841f6538250703d6b57797c954a653b8290f8bdcc15882944cbf6c1be33d321cd7e7bdd088b8108230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557637c8a7b24d99e2a6fb48c12779c3e
SHA188f0cec59a4caf51115b442d9608a8c152789df9
SHA25688c8c6891cce085dbc17e91fb25460e0516b14fedcfa84ab152a82977dd05235
SHA512047a1c8a83a8967002567c4f1d14b6cd94646587c60f2c7671596c97c3634630c135cd297871d6b356f06f4989e34eb1a97f4d4787705b57bb9c61dfd567910f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520c4117ddf6992447c8133d25f040fef
SHA157affecdae30e2165b375360c9b390dadf49ed91
SHA256582dac361c2c51599689a1e57d1d505f2445cb43761e39e9e60fa821ca3069a5
SHA512e045c911fa46cd3b20b58aaeb5820cfc05c875c0d3232b97cd226597f91553f07636dc86f9aa76a9ebf572e4246a4c986535a81db3cbed09ed3730d170905a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e62d1b4227707b9a48bd5d69e4ccde
SHA160829c8c9896c0272d4d3aaaf51a85a726f90fdf
SHA2568e21cee7c24bc7d5f2cc72d5ae71d798a7c2375588de65ab417ad8b097473a24
SHA512a9077778127921fb08ebb931b49fc38ff18fb2945ef545f9edf21bebd1a8292fdc25e96dd78bc5e0a21149bdd32b282ae8c0dc109a125e64dee8b1be059dd244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58899dcf4bbdf1b8bd2603335b0a8ff0a
SHA1d7e64599ed256fcbe6ee8eaa2df78d9da85289cf
SHA2564200795f00f140056d598661b3348920ab9aaf68b919c2e6f58cf47312fb0dec
SHA51265e96effd9606d19b310b227ef77055b0948de97c41f85a04a9fdf57144770f211290f03e7e8f0e888b8570929eb756b751d74faa37895c43391266774831895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d6806c16d7d733a1929a99da6098dc
SHA178a4a37b0b446a40ee2061307b55bbbf4dbc8229
SHA25613b80f8effb9156d67502b59d9349b42f45ed0eccbf64891bc42b4ec2e6b102f
SHA512360307e045cd3b16d5bcd3ca691f21bec8337230738b1575ceeab8ba72103d94ac1489824440de2f9742318aa936bd1c41db7860a9c36d0ce1e61ccef69508de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca3e3b10166d36879f5f15101b5baea8
SHA13520cd3d2d0850d250cf0398232598cd1330823d
SHA256850b8813692e86aa0f9b7065a422579f2b6fa5351bf134651a066062b5f1edee
SHA5128ab32454ab3891abf4f02e7cd681dd5bde7b4a51a296c4982764d8a3bb9ac264adbd7f62112672b950e1559101e55ce2fb2d4f419cf842c6337fba6cced9457d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57040811546a214c0781eefa5a3dc94d1
SHA19e7fae4d0176e9f39e9df68231bdd11fd8211236
SHA256652c989a0c542a23a1c0fcef49b146e2f48bd6f3810d9d660cdd46d299e0b4d9
SHA512e2c7b636f58b0453c6ac010393b269410121044037293388e314973c4426593f6bccfbabe2926d8e837f3ddafce0394cf782adbea4dc1b0045156680c823e732
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a