Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
3c79c83a6691fcfd179846e246c6603c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c79c83a6691fcfd179846e246c6603c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3c79c83a6691fcfd179846e246c6603c_JaffaCakes118.html
-
Size
21KB
-
MD5
3c79c83a6691fcfd179846e246c6603c
-
SHA1
f08f502bc4e06cb4f55950d1243661b518c31121
-
SHA256
6bd11c5fd684b03812e155a91d83a7ecb8e5475a264eacd59994006e2a663aac
-
SHA512
51407c7a4f02b7c1c340e1c11b4271e3937586cf162db7f31472a563bb50c82cebee35a5f8efdaf6655331add33f793bdf227c9f7c98330a8830d0f3ae9dd9d9
-
SSDEEP
384:zi+K9XLVBD8cUQ3Rktc62QmTD4QAmccfIk9xheizVc9tv:ziTgcH3ebmTOOIk9eEqtv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000002f5296b042078f25303936eee227610c0a052dea9eeab32be1f0796b4740f08d000000000e80000000020000200000001e441e96fe18054c96ee9202a474410b5cc4f0b26a711ac5b6cc13cdc1eff14f20000000dde349115cb7a1d63b5523c7c072934a996ba586cc94b5154ae5b9531fad207140000000d54300683decc7092b1556cdc9db96746bb6ca5d3a8137cc6f4b5938ec2e885a5e0ab2d270844c9d70be94867cf3be2d9d99f4cac23d9c5b0b9efc66b70014f2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3041865c75a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421794480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87BA1161-1168-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2748 2904 iexplore.exe 28 PID 2904 wrote to memory of 2748 2904 iexplore.exe 28 PID 2904 wrote to memory of 2748 2904 iexplore.exe 28 PID 2904 wrote to memory of 2748 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c79c83a6691fcfd179846e246c6603c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df4f9cd84bc7d32c615b19fa3c637ed4
SHA1dad5e6edd517ab9109e0f49966afccab37b31bc2
SHA256864dba84e81fd02c5869bfc78ec6a0155b6100fb14a8325788b566cc21208b0a
SHA5123562a5eef0ac3ae6ade36fc9e842a788228bcc646a0fc9484ba6a6a709e433f2f169c30f3bf30c7777226120b669fcc2c160fe6fd180ea9e2c0c9d814bf7b157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b06d1330106132d591cc89d6e1fab24
SHA15c1ba63e65e1b0059937722252a7d65cbe4313b7
SHA256f623a1f41c25c42ea28c73c6b798240b6ab5da711b63d32e4e8a167e6bc09d0d
SHA512d953cf21cf30b104eb7afdc1f5753417ee17b074ebf1c43a40fc9e3dd6d8d18f0b4657deb2ad414b1bd4d1774678fe6eb5577ff6061fd6c671aa30076bc60f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed46d9cc7155918386f5b7919085f5e3
SHA1cbd59a27ce43fbfeae6d03e843308f3f15001936
SHA256da0eb9c7584a89aaf0fa17d2406ed0ddb67e62cff2837d3a542d7e01c2f2dda9
SHA51272e550317d2815db9f3f98ba3086bc99b4d4fa489edbc8df4f48243a1c660b58d44006b743e064af949698dff3db832d2839c32c78e7863d9b0f7ed5fab3da7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880dcf2502dc5c362e4a334d35c6833e
SHA19a480154ebe81e40c06ec9876afc23efc91bbb10
SHA2560ad7880d86c5e6ed6f23a04bb5c6a9c92f213db36da87f7f790d130d7017a342
SHA512ef93193d0a9d27546117b5a5a717cde0ff76713a3c33683879d96217528b96e2af3dd789fba2b092ca01b3e0ca82408b2b0747ac62b09709b6246d231f7ad109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7e480f61e5d273e79a5da5a5031337
SHA15f4e45f4b33d319ad6afd137539d2caec40bd8b0
SHA25624f4fdb7a9937f9d878411cadb94b887ec6eef6dd8321fa32c512538603da062
SHA5126750a7f2485295b27d77f4a4a6434e212b266de28b4a2005c7aecb83e371ae5a11aa79bd74a7a6767baa4cf6b785d50be5ed2a8b8b43b19dbbf531b45d648e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5401d418b1d99f022b34fd598bc773
SHA1ddc43e7d812d424fc7ef308f5966174c05d0d461
SHA2563cb26dcc0e7aa1675f8a93fd26e38f513711272a937bd20ae1619ef4cc479d18
SHA51223b2435bf303cb30176e06909e970cf8998f87d397ae89e84c9da6fd7f83ae799eeedbbd6fd3eef8907d8c0f8ff775fe3be03ee8eca42c651857f0be9c85b36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4dcf682a617e78b0171bbecef6e3cd1
SHA1f57bc2f134e2b133a4dd384cacf703a8d52fb3a4
SHA256a6103d7671ac541c55b025e4af361a0e83197e2551b60c611a78dad7c745bcf1
SHA5126405f3d98116495d836ec24b42eaa1994b7168b86a8fb9d00f14be43f04784e7c3a2134c902714aed5df02a215bf877db1e75672d719cff473bf0e2374dacc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522f329b7160a9fb5365827d5d10f60b9
SHA1ef77b3b9aa30032cf6ddf855279c3c52ab05833e
SHA25682d82b899162a89f52c59197f483d2abb556b2e5fc41a469e8a86530cff1d2a1
SHA51259888e0fb927f5c82709c85f16b75880eed5eec2f711c06f97a27d664b98d0cbf3328d6fd58e2f440b0b43d9d06f5b6266eb698ee3e8cb35be43281b40655f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc1f93b97525c912e16b198d5f3f26f
SHA17555b0860be2f0cef203273cfc775842b468ba75
SHA25664681ee89d1483c5df059b0f4d30cbb0fec0fb013a1fd4771110174034a1ec14
SHA512f5eb39938b6d4603d4a486b6893eb9cd22b5e21260a4962f2194f7920180834ddcef97599573ffd97692ccc5c2059d9c1e2b6c4ef7d573c21af89f0023d60c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58980b924a092985da74f9cd13a9d65ff
SHA10e18314a9d10469d794953942bcd8e30ba37b3a6
SHA256c116e9edca58ac8b62263d1a27e6982fab2a6211765e9c403be5ec486b7f2fc7
SHA512b333cb59f08df74887b9a9da0eb7a87e9bed5fa9a127f43f51d124b50586e752e3245959ef768f57daf2e74e7118588b7442ae4675332bd48269aaa2191e1b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8a10555774ee61a9c37d760aa59f4a1
SHA1de841ded40af55d60a16756ca6849d43cd2c96ed
SHA2567af016e98e5cff805de3aa84fea9d2422c9e7c6676c6fa85af0ec12e44641c43
SHA5120fd76e7b7a0c41ffe42f42d144b2d7edac9e36e1bdd031ffecf55dde0061a98c705c2e77a67d830e01b682dd4b129cfd6368dcc341c453da4aef260731b993af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef9ad34f2ff688920341c24c6ab2d5c8
SHA1d2fa41a85d2740dccac33c67f990ec4d6a09e5c6
SHA2568539ca5e98edbd460d2f635770f5dd55a2a60d1d7270fc58ea67785aeac8ff2e
SHA5125e239a912af579c61e172bfd86afc8b8d69c5a7e0363ddd2fcb89462b8a465e447c356bdb297105ffaf7d6ec2c1487db00586f3dee69a588d9bb41993972c253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539f2eb09995ad54cd4ace6d3c28947f5
SHA15c7b68a8a90ab60a034ccc02c5e52daaf1f516db
SHA2567c28d814e25bb7912d1e9be30097adb0bffec03cf18f018a3f189e05b63cb1cd
SHA51273071db1e0ed67976912956be7c63228d56f501407aaa151911ed21b14895a8b3941cd60631b435dfeaef1af4276e65ca5b1d673a40fe418dbd5de28da9ad457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c475c1ae198e3d364e5ffca99fa7ced6
SHA1b975ea3a4f95e527bdd6ee357143c7a78e50c507
SHA25632a0486cfbfd615d555d75e662dea374ca3828af3f5c523cae2b5704f0feb5fd
SHA51285d5facc03e953eb7053bcb0627eb7d99988989860887dd473e4ef080431dede56772a0687b63ee3225426bd691940d3a2705a75ee96aaaeef5b691d2b6ef11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547752eb56fc7952a3291e4b961c69857
SHA16536ce946938a592965325b731fe2b278458f263
SHA256f5abe616d52426d55aa42b18fe27a2ca6c10818818a1a0b880f8f8dbe8fe1c3d
SHA5124c3c7f402fe1e6edc34f4272d23434cdc0e20289b57654c09fe64b7549581016cffca811f9c7c0f15eb758b8e8eb18620da22f07250999904382f27a0241e906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7761e5afec5cec50ce03c09ec7c50fb
SHA1963419d3897ac8666ff2148763524d86fe0ce11d
SHA2569f8f5d602ebd892fa0fd7377e6fef10b13fe7a1214c664d3dbb9a721cbdce7dd
SHA5123a5c3f5b75d3af9128d0a12a35a202967da84960b67779df8987c41535d91a7a84159c074e58ae523c03207f3a052ab683938bb1303b6dc64627d7d81744ef6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d339152214c8abf16355ae86da7a3e
SHA11eec7bce110bdda6f5a99a29f50c98e02fd789e8
SHA2567d199ee477bd1dcc88cef222859080074cae48bd258966320c466e7ba0a18674
SHA512e3fc6ed905ba4e3bcb75a1ad0ad6f1f2f288634cfc519c12198439f0ea2e04ce533064a76b77d880fbf1d07c5bb4d142ac39a9f57f3d8042c73bd3c88c4bbc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac3901df685f68b5ab00d1c8c66671ce
SHA143c07519af5b70414898320dd00a6073846e0149
SHA25617e2d39a23a05fab111b2cfd43e37c48997059c90af30cf17ccb8fcc6c697451
SHA512fb28938c453739172b1321180fe9ec551957c8e6aa76a6ca9c70ab7aa0ae66c1bef7ef891e54e017687c30234ab5d122c4335466681ebcc70e9ed0e2552363fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc435a808962e21e232721260d26c4ad
SHA1c564473b79907e9e4d0037096f1a98318ba1aa06
SHA25619f7729876880286f0b19d8b7b8552a6d9afec7b3be5d2f39276f9220f839876
SHA512fda1f2e79729f273d69aa083743223a40f0df3ab98f70f9b7b3259ebc11b59d7b75da6e775549d9e6aedfddaa6eee1e7667af4c109619feaff07988e68101049
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a