Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
3db7e2a6aa8757b75e7cbf076698ef75_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3db7e2a6aa8757b75e7cbf076698ef75_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3db7e2a6aa8757b75e7cbf076698ef75_JaffaCakes118.html
-
Size
42KB
-
MD5
3db7e2a6aa8757b75e7cbf076698ef75
-
SHA1
592daba01d924dcd8d7239da140dc283b88e85f8
-
SHA256
bf875d8dd9ac3320e3ef8dee76503855c9e9fcb14c7e8a73443b55cd09573273
-
SHA512
3c061b3c2cb3b4f0d8b3106cde26c4724b529ec648e8037074610ddccfab6fbc3c30bf08f9aed9a192197222f5b89ddc527c7964aff0f50b003117d0d9774624
-
SSDEEP
192:4wCFCihnaju0gpCQhqMoSwYcpQnVirgYTxLSXmxaf:3CFrhrJhnoSUpQnVqgYTxLODf
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f720b5aea5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0652AA1-11A1-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000060284bd40dde30391367b5d656e6b7ee4a69102b3273eac9b232470ca4bf9195000000000e800000000200002000000088425cc430ec04f6a329d5d98d5e08a42ff9a428cb7b56252b563ce9b0909a4920000000e41265604c4b2a2409f387977ecdbb7210f1dc8d0a1f4d3ed016aaa9a03c9a9740000000fe589cdd85c15dec3b543dd058e4b277d2198ac5d72f0ea134dea8f1c32d997aa2301708facf4a5d376015bdbb68fb568f8ac8e0efc41f3f447bbaf6b4dbee3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421819110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2528 2188 iexplore.exe 28 PID 2188 wrote to memory of 2528 2188 iexplore.exe 28 PID 2188 wrote to memory of 2528 2188 iexplore.exe 28 PID 2188 wrote to memory of 2528 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3db7e2a6aa8757b75e7cbf076698ef75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593be2ac7a41a755972ad7c2d49ab27d0
SHA16622b0f8eeeb09b5bd2e0835ee5c126e7dde7976
SHA2561d1856926163263792b4b4652edb50b99c253965c4af2ff28d079e586df14f2d
SHA512bd77143e689958e6aaff22c7ad86487c2a7b35f4fc0d51e1add7bc9aa92541034b91a82e0ae6524f9235e82cbb6698213d70a367e5118bb2d0a17fea5f61ef4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33bf6ae1bfd38a1a8f4320c8b57da87
SHA1ce6922f07c3bf7c5b723de0e846029434cc7db2f
SHA2568af56d551ddae82b8b5425f3d4f6545d9e833d13e14d6ef335bb4aa5cfecc657
SHA512a0ab8fab95b724274a21518d6579006a230bd5a1db09a6c6e30ef7d5261367a33c7563f56fcd0cc14ac298728b58b9a7ddabea6aaf79fc0e072471d97d58afe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592e995e38e3624da88500a31f80c8a05
SHA19b42660fe2826978dabaf802c30ad5619f6c7dd8
SHA2566b3dd6124a78ec14d929bde7896a072d9531f5b42f7695549136bd52b77b6a8f
SHA512fc823e2f6eec2fb91f2cfe05c724f89b11c4dfbb0d021a272fb3609e01536de1bd137e532528bc51b7cb185d41239459df30c0f8d90f837d50b383e45b6c2afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6b6a21e6e4cf0a03586ceffb4c18bc
SHA1da2e1a5dfaad527db1d6fac527da939a6bbd33c4
SHA256d735d9f8085941bb8562dba71f7df027d934e250de8b39ed3be0a95ebdd3af22
SHA512fb57e3116e561061d7d5f080aef3a5ff95149e05bcfbd7effe50ea9fce7c356c4d17ca2761ca464e1ce1585c1967f308d8876470b7e4f4a87e5d7ea07b751c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469388d021a1b9ff3ae2424538d27406
SHA14a604c5a64c8753cbfd4c76f13da6b546f940362
SHA2562bed96293307107f660cb9799a64a260dd39d5c025d499991ca86a3d96b78b6e
SHA512e18af9a7f4b0fd5bfd5dc576e693590108302892062667bbe2b0907b6fbd8c7409ff5848a2101fb5f8e3521f19f35253df05ed0c30b3bacc5545e4b34de1a1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6d974c4470b44e073b82f3ce173dc0
SHA153915b363500bdc8d65a0ef62cc57478c26cfea5
SHA256cd6c7dd0443551d880005bcc867676474d2a672bcc9ef15d6e9bfe4876d7f3f1
SHA512350ff0182dabb9722b4a2890a24d74d77efe9c16dbc08afdb13b87fbcac2746a1936842bc0e64c67a1f899eab70a8e05f1c088fa415faf60a73858585368a0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59388b79c9262bebdd6650449b4d8637d
SHA189824322999bfbd4de879dee8fa5fa2e592a0853
SHA2569b1ad031b5a1e9eaa6836ffe2ebe4d9af5bab45828f1190db598a30ebe33125d
SHA512d43f0837d2249eef9f526a742bb15b0d8a614c0506cc685439829487c5b1d41475e291bc7a5ad13ec5bbae8172639402176f3e08170fb024748fe7001d7000e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87ce64cdc6f5c741aaedda67fd11b6a
SHA168a64895faf491d50c3450586bc32f227431e2a2
SHA25670aa9760376677da3a040a6cea33b44860611861b54e02f3199b6f17545ae806
SHA512925bddc7fd5718f1761331bf51975abfc7835c470e3f5b1930ac50776db435211b68678859713aa6d89b45ce1037717f96822f3434fa80dc8b549c927c592a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b719dd37c2449c73503df3832609124
SHA1a49efc04b42a04409ff9de5563c8580e12f18b64
SHA2565680278af827c380f4a9bc6256e18deba60cef5797c6d7cfbb90d8d29c8b20bd
SHA5121c8684688a3c1ca05346d669d0454e5ce3fb1b538ebadeebdbd9e82875dfc529e00b7b153bb06d3247f6b91603fcf4c26bce1d18c8e2a1e5456b58be35daeb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c59ab2ac8ed98619aa460c4f6b6e2ae
SHA11f63e671b6a96fbf6d91b5b6b26e67ab080dcf81
SHA256ba5ad0208f6b727cc4ace8eb776fd555ff19841cd0e51a9aa8bafa51b65fd7f0
SHA51205c1cdd9a2346fae408877041e333e76000dad8f32da5aeb47372fd5e41ea478f6a2c182aa7a0ed67fcc3648093e83309e51685a29a56636b0e2903585cb4b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d18b24de6f07b60162149754327e07
SHA113ff8c3b6d654a9d4653ac86e0954de1d777103c
SHA2569dfe858eaf7d57e07836ef8992d73f9c3749084208ee3b3f5dde6b513e1e9ab1
SHA512c5532e4f98f97800dd9082b5c390c46462f99fb4b37af57942a27c6966588e3afa84f881a4803e19eeaf5a0095387e4a0f2b61fa73a114f348da519b835d2c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54850c08ff2d7394a685712559420f805
SHA17ac71974eeeeb1b291b0ddcaf0a780f8445ae1c1
SHA2563a64ed1e0834a948c9ef42507072e26f8a4f945e99eaf6dcaa44d3132bc6714a
SHA512bd73911431c2054c043fe890cd7b53296d95d68cdd2c5b6c65490ee9a23afc691ac50bf2e94bb7023f3a628b9fd0cf6927a3b8b6fc207194662e7ec9c40a688f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571178146dda6a84d2a7b4401e0481621
SHA1c3352088bc9d6825081af9bf256548495f1b71a6
SHA2563b63098359061ac8cb7fe4385d62da31197c68401b0ba3eddb042f5bc05f8886
SHA512ced8a961eb02d106abdfa1f99ad391ba83d8f7fe43db8e124e8e9223b3bbffa02ec4d59ad678bb0aa93bd76b41dddd781b56f7b68b894d9f7b44980e7852ee57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea73117fea4d14b625a64f56f1b1576e
SHA15bffeb7e871c64865ce5353e283b4fc1fa05ffa0
SHA2565edc1f2fcca16007c828afa48e433ec31ac7ff59886cebf2f332d00e3062f480
SHA512b97bbb704344a1c8851f812c2d91e1a44c7397fdaecb9a373f75cc9657b1282fc8592a5244370d6d70b2b80d89e59f21afecc4b68094fe240e7f9d8654997ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571dc4945d8e12c24bdbf95348c2c669d
SHA18085b1ae5c4d72e37ae14f30582d9f65f5795187
SHA256e387fee5fbc37741e116602b3e2cfe3fd8785f74dac1c0015649df99583b39cf
SHA5128a6c74a0a817f9f152d5eca64963fdce3001a052449bd7760bed6981e2fbe001e02e4656a16a8a97c64249b7b2b862c2c2cff1e0283b8ea04ce9fac0493d8bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697b481261200c936d80d27f813de641
SHA14bf19543903420d1bea3305d8fa3ffc421e9513a
SHA2567e34a480ee068ddf787c13e476a2eb878fe7d02591a37e4c5b76b3aa0cd21b95
SHA512323bb5271bae30eee8bae3cd5f550514e298334273ec32c7afceeb5ac8e107be53494818111520cef80ecb84b571d3c9025b206dff7b2deed04edcfc76d25162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512aaaae78618d53b7a284d141e080c88
SHA1cf2b468096c47b8878533c2f543309286064dc96
SHA2568f44830aceb5ec574be3db0ce4180dbdf2453bc61b142cccd449051c01d92e08
SHA512134d73111af078b9e5171e07da9ee78f2864965b1e2a4f1e11fc8e1938d694c30750ab09b2aff1d86b0c1a437551c9c359122ae54aa02bdc2ddd87f2d95ea5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594dace487da3bb5cb8f1d011fde89dcf
SHA1a661f1d7390c909df7c322ef020fcfed79986883
SHA256569da96825bf22b74d003a86550ea863c3d945ff122975c951ddbfab62c32398
SHA512c238ff9c074ceca56bb0b74154937d0a89ba976a0166c48bba2b75c170e5b07038c957fe34bde5b6688dc223e6fedebf8bbd842837ab1072aac5ba7e47a7cfff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a