Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
3d63cf7d2e15ee0a3c1373761eeb6b85_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d63cf7d2e15ee0a3c1373761eeb6b85_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3d63cf7d2e15ee0a3c1373761eeb6b85_JaffaCakes118.html
-
Size
94KB
-
MD5
3d63cf7d2e15ee0a3c1373761eeb6b85
-
SHA1
8a38b7398c83fd4f9118411d45504769137f0d6e
-
SHA256
378e89cbcb4229f3794c15137405cd6ef03913472a7ac049fe0f57d1f4a83dae
-
SHA512
f722baa3875033ea59c8e025d8eb65b0a7c432a46aa7160a01b92f72816542a3b7816591f0d86bb958e8bc9b4e04cf751a3187f2d43fd8456a27d1ef2ab138ec
-
SSDEEP
1536:WMLiNirt5JAp5SXe431+F7LGFQyFLAf09ZObGyWBdkrY8mgHC+qpEyW:WAihLuBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bd0ed6a8a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421816586" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00888CB1-119C-11EF-91D8-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000023f0d87d97a54f95e7ed94609dac563106cb0c5b630994c4ad2d4b9ec6fa97d1000000000e80000000020000200000008ea3d79f9e372d42bc506581edabbecff38aa66f487ebc786e4d17f952ddf60e20000000b257b9a95448f06b88fd59d2b58e975a0e8f4ef7d07fb7539c8ebbef627f0b8e400000006fa77e98e5829a37740f6e0a303c434e608c8ff87d63d5514e7ef2eccf1fb2df1505f4eff1ec6a180b4a4afa33861894f1363c8acbcf33bfad3bc1c931c37a85 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2828 1792 iexplore.exe 28 PID 1792 wrote to memory of 2828 1792 iexplore.exe 28 PID 1792 wrote to memory of 2828 1792 iexplore.exe 28 PID 1792 wrote to memory of 2828 1792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d63cf7d2e15ee0a3c1373761eeb6b85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5772cdbe2acc97cfee8565ea680c3967c
SHA1e76a2ea8d990b2880efb0551a9b4bca4bc089241
SHA256449f4fc89df70b705e656a5f2c77925c56dc9749334a87974faa55feef615821
SHA512afbcca949bc4bd7cf3f5092c4bfdebeb0f4fb0c8e050ab8f707d5ab21166b1c22d599f2d7cf9ed5465c3e9792a3771de9b65c035dbcb344d7259ac34c1c214c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a2d73376037f9a257e77a25b72d024
SHA1c2d1f7a53051c7a917232aca123e07e880375521
SHA256584205afcbc03d5c34c1937b49af73c1e3acda1bb5e6ea49eac50ad1d9aff8af
SHA5127687f036265d6467b6ae3f915fe21b051c09cb78fb0e6145b7f5b9941bb304501e6d435b378121b644d213a13d71d11af96e15042cdf46d2d05c6f76168ba3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cedbce2aea34df5d0c8c1e713934a5c6
SHA1920699301732839f60eec12ec9c780a7f8b421a9
SHA256fc2c722bce486c300bf9163334f9fab898d84c49795844080cd22cf9209f3d29
SHA512675501e0d6fea14ac04b10b62322a96b008b2c526d617ab17fba4860c9b8dc6800a013a13bd0fa92f50eea55a00beca00a9fba62da01a0437de265522be6ca8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c701ce4b489ed1dae73f452e9b4152f1
SHA181a20d22f90696305c7552fff3d2a5fb922f90f2
SHA256642c661548ccd192eb716abadef1765bfb1c95e57284e8a7eb49c4183888a5d0
SHA512c03111c843ad8e16b36ff9e8f03bea22910559453b801ad5d85044f80dcdf3a8aec80190af4871c572821daff5a7f941a3ebe154942d03ac2e508edb362cbce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a120cbf247d6c0cd5343e672da2da0
SHA1d562877eea7e4e66c443e40cad6355e06fdabe4c
SHA2566eea97f93f775b2c4a5e40a0ded55df3f203ce0efdf198130500a76ad6facf42
SHA512277145406e9f3841a9c5e2374c139ec1f1c6187f870360a715768520382986ffeecfac3a2c6174c1b4dc2d00071d100a25371b2b3c9c59bb12b38aa0c5cab632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5440d882fc6093d53aacf6ad9d6c26d56
SHA1b543391310b3bf0ebb10e76ddb9b1e7d6f3ed04c
SHA256dd884bb8f86f0ba4ab4c3ddfbde74a834e907a615398c8cefbb933029c81c0d7
SHA512c097fe24a6f8836209749fcb042f02c79a2fdbbd056cfd2e11d0500be14e171e00172a0fc4e964ede89d0f4d86144a4e62f537b6dc05277e8c0db34ff90dfa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b86162c3517aef34527647cc0cb48e
SHA15d7b674ffc67178807720605b1ec4d0c97a2240d
SHA25645e3ab6595d98e31972d7d635e518a4caaedcfbfbceab6c42f8ee9cb074e03f1
SHA512bd138dd08cf0f3ff0d1073c175a3b007c65ce2182dd34fd2323160a0b2e4ec27dfb2261c5469139f8f36f5620797d9d55205f31c700b2707d6f67c5eb2461595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58602df6349c1ab6f68cdea0a9111225a
SHA1792f8368288689853a3b636aa07a6d7d6cbaa8bf
SHA25649738bb260c238711ab88029d94e93397d70f2ccb802744e670dcf476723f87d
SHA5124a4c1109c5193fe3d767aa9791b534cc0bba43f27f01993db6c93399228258ba1b73391b7745b3a578f4dadaf030b9c7178a64c973f2d6ec042779f7486855b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d5ff90b90ad52cce04fe0ef2adbcf27
SHA1a117ab91287083fdfe1971b7bd9cdb8b22f9a56a
SHA256f07ab8b1d19dca0885e240a064a17f2efb08246456477647a99d11fad3127461
SHA512935b5f5f1fb18ade93f8bc979b7c13c126ae5f87b1abe07fcd961882dab568b32ca80f3309ada08a8b31517b17e155bf53cb956752bb2d0ee292f1ee81eebd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9dd57e61d372c579f06f82329e6f14
SHA1316b7fc78d5facc5534ee128a803a0f3410b1970
SHA2562e96238611a27ccf07585795cd7837d74d2b6806f8cd0c0234633002bac12331
SHA512b8fdfc85118cc6240724185ce89706605f554ba6fc8ac8e6f12f7f5020c02fda8ade62642926d22adf693f9ee477b11878f744c6a12af6129e15055b2ef58883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5692e717aa42dfd7e3c688bbcf78d6e
SHA138f17161b6a0b3f5dbc865f38ff5dc43dc8228c8
SHA2566b93da3b6a016be39c25e5b0660b4023e875045033c82424b1cd5c7c83d89474
SHA512bd89c611572546e0b21b98008733636948c128479a2d2a1385f819a3fd38f14b87301ce3cee0308acf28308c520c785c9b9a24795e9769580db965de2d7e73ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5384c0ce545db91861ebae0f658cafae8
SHA16c42e81fb293c2e87ca56f7a13adc6ba172c8b72
SHA25611af8d8f8e35216d5844932b3a40e316a8a60e5b0d0feef98b18fe22721a1708
SHA512fbba3101953b6319a093887f62d638cbf6c82ef24da0d6fb566bf1faf13a1e8eae155a51263182675e5e993779508e6a65e3adef811855ee9274ffc39728650b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ddeea8eb8210c2dc7894b21cf147bb2
SHA1ee7a15cba5e8ccf9e2de380ea66d4f78cd55b495
SHA256fe29b0fe8c623bebc43a09fa3abfa1da4f392ccc7c2d91dc6d0069a29fd386e0
SHA5122f58e498745d41b59c1189a66be29ea388094795efd7b086fc76ee1d512aef1e4323c5df0eba1671c8288502631d389088e100362f85e9cb6f36ccc117bfcb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad361e0967fbbaf848b27278383d8157
SHA142d4fb6168967989aceb9502171d5e6b60bfbeb1
SHA25691391064fdcc447eaf3d621e83a826e4d3576db1445788749b855e721fdcc27d
SHA512a38adbb6cd8776490e5696799b1488762a53a31073bb2c4adf3245112408960ebd1613c5cf9ecc64145620e7b91bd65a21f6a941af5a17cab3caf8d7d2391b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bbe31047e41c4c98bc30e63d7dc9cb5
SHA1a2a5ad22bf6e27c1221435d26f6d321387f4bf74
SHA256ba25541d54bc1121a623477995fdfb46a5acae78d4ad01cdaa903acb7b1efd5f
SHA512dc4795c89b51487f4dd4ca5d80189a9dde0aa3792a1a243e1f05b22ed0dbd536e52aa78cdc15782d1d939f2a92bca38b62bae1c1cb0fb2881c60e456f8570c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f83e27a6ac98219d0c14bf576add62b
SHA18729371135df9cf041005eed16ea3473c7a52b81
SHA2562454b1a5d70b4d653902cbaa45edf7e46fd3b07bf473b330b7b954f43248d93a
SHA512bd7650465d48a67ad81decb40ebf5c181eadb2b9f0bcfd0bbdc74914a382db3c6e58a2a05e85026d740aac1ba672c238556b7ed9a38f044d13ffcaf18f853b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6955f633bd751c7e5fe8af8fa0a2650
SHA1f1581f108aa6910112ec83d5fe223256cc6ca04d
SHA25675dc2209ffb3cab11b66c6ec39880b6096a518acd6a9c6ebda138a515e25a9f4
SHA512381d9681d76a9614786bc70d497dd8e4ed58fcc9b466ce0fe2628d294c14b5730c1719ad3d62d22e2c6a2c8bc39bb2763de5bbc0692736d7259e44ed8aba7399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad6e1259650bfd2a9e2b1cc0a263e2a
SHA1e48b4201aad2da2800e563d67522d4444db16e8d
SHA2568dad333ef1844f793ece6fb9d85fc0390f3dd601caec4fbf4d5da4c33190db55
SHA512f49fa4eef321fc266a43c23b0385b929ac8ca7a2ebcb945570a90125622113b777566f3b51c23d6f4647c691b39cbaf1baba26fb6ce61c44a0bbfcfcaf36bb82
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a