Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
3ddb8d8f51a4c492899361d45f63ad62_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3ddb8d8f51a4c492899361d45f63ad62_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ddb8d8f51a4c492899361d45f63ad62_JaffaCakes118.html
-
Size
69KB
-
MD5
3ddb8d8f51a4c492899361d45f63ad62
-
SHA1
fbc24d5539503cfcae408a50ba49978154d71f09
-
SHA256
5fdc0fbac4e858a448205af2de7f51b72a7b4c8b9fe6caa5abaa878ee3ac5c70
-
SHA512
e8cd7fd57d1fbe374e09228574ea692b57dcb2b5f83cb9beeb527c2657045b0b0f0ec8c2b322e3a5f65db637c3440c828033dbd84f50c27d4e0e007406355695
-
SSDEEP
768:JiPgcMWR3sI2PDDnd0g6sdSdLyj7oTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JV3gTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421822203" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504095e8b5a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000024f29cef8d83c7c817906bdb1c3023edb713361fe59ae7bb38ac304d1d8e1a11000000000e80000000020000200000003da0e002c8587d80ad12cb5477d97b68e6adf71c190a77695cda6746a33453f020000000a2ee1b90c832a0b87f3d6387270cc6522027735f4bdd37092bb32ca089369a9740000000cda5ca0a3f814ba5541a6e8b59005a8993d899a9ac0eaa5c9f3d711530e9ab217d8b6eb5ca28422a387961fee2fd2be34b11ca356de483d620625f7dd9e38bcc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13F4EB11-11A9-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ddb8d8f51a4c492899361d45f63ad62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d20964abbb7fe26ec7b86d00e9329c
SHA18b4ba7ea01dbd616aa298f204c3e8a780a6b40bb
SHA256934a5cf43a007aad304f7a09e2b422a58457c932c16967fa629925bf7ab4f576
SHA5121710efe2edd9e3a884d15b7865dec984f38492a3288257e9139da25b8a0078000b876f170cd79ec8263d9f1b2e02b981e9cb13a6daab185317e224151cbffab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e96399c798144aabc03a8dacce0bcdb0
SHA1db27cbfa5f0d40091a5718b52f7cd8a12604ba3d
SHA256de6b167aa79684af0df499d2637b069ad3c0f2a9b38d6a4846ef5b261ed19aec
SHA512ba45e0d856c763dcfd0ba6d4c0e6532d266bf691d79983d98fe75de04c1618e6e16dbaa96d06250dd9a223601cb82f190d03e36369f351dd37e1ad88116cd20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b2a49d9aa70a882256fd31f3671c5cb
SHA16ec0a1aceabe49f4a080735ab4460791df3177e2
SHA256538a4ef07f17d2519f7df9c9bcd5ca95ba3649f38d9feba9819db707826ce573
SHA512721607f987689b07d9255e09a204ba5bb331759a09b33cc27e2a2d2f304255b75203f04574dfd5f0b8c02bbfa9ea6af3992657050c53da69ae7f5df5baab8efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d2203bb4dd59d3236c497f6f73e508
SHA1ec4f4bd3fbe28c656988b4668aaee8b54dd7aa0d
SHA2568061e4d942c97435e952e4a580f97d448dfdb25f9d126fba0bd000cdb207a1d2
SHA512d6350933457392c02e458a3bff446f6eacbfc63d67a2932af36482c22c708e188a243672cb937c6d1f65762f7ff53400771b9999bcdcab4a7b05ab658f6f8beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534046efaf60d3951bf42095795bb8004
SHA14a333b226fd4313b3a5f76c77f6da78602d7dbb2
SHA2565608f70a32f07379659ea7c55f95da59a7cbf213eb2a13b419088fe6d6f45da3
SHA5129c5b38e37aebbcf980833307a20b8da656c21e75f17a5586e2b5501c4c01cb38565167e966c9bf062c6fa7ccacd5f05d5ab062126413b83b7782701d405c9a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731745828d35d7173215e8ee00a04b06
SHA1d68ef7f1f356027df63bf160c11cc8ba16d75141
SHA256039efab25b25cb310da0bf3341d8fb69dcccb6a5c7b2e440a9c72e96554836eb
SHA5129dc931143744e22ec214e53a7107107127853c8d616af4750362639d9c933b18f7e7aa80197ae03999e1efa0d6b3335a6a2beb591cd3048beef61acc6a22f1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d2dce8cc7e6e9f0c50e55142cca863
SHA182c10d59e0a3dc8f3b521f2f8011a3271fcbd39d
SHA256028d74d609090f34f913bec81e509cfadb867dcbf18002698760e1dd87c2b815
SHA512c8df280d2692957aed39184829b385a3fbb977e72aea13e254b49837165eccdc28b9f72954ce5022ee32c49f6b24a8909413373a67dbb7d1eb4f0c72db0a0f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859b27c65bb01f647bd632b6dfbda4db
SHA170973a696bce54ba475bf2fac65caceb0ba691a2
SHA256e66cada7ab7d2ffa79e5398eafb80e182006544b895d42f268b6bc9f37d449ad
SHA512ac8dfc25f547ea1d202913e51f64b6dc6258821cb9f8d5fa53ead2d0931b09ae57c240fef729ff549e90b25134b512ab68e394e9969f1f9bbc8773ba5257ab92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea94d78935878be9d24928d13c83b58
SHA116a28e179c9f31ba2a7535648f3d20e405993b51
SHA2568a84f9b7e1c0f195a362bd0f42d85f9ba4db87c8b0a2baa0f31c505c5e5c7a3f
SHA512fa665f800bad447e6f72d4bfa60f95ded4049b84795403dace957162f9b2f58b3efdff40b3fd2e6ec54a258a8966d655e4ccffec466be17fc32708980bfc2ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10c58edd25e4ea6245031c989a5edca
SHA1ffd16d7346fc0a245dfe9bdc464f0f978f7f6951
SHA256abd609f4e6e10ee6688cb830aaa56a9a64757134abec923bc73c414a9863ec90
SHA512ed4669a86ec8994ce898b995286226ffe0c60e32482f5fc8c272883a33bedc4c1e2b74162a8d48f5508c70f34ef636d08c0d668ed8224fb29e46dcd0c8bc3b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959af4225cb14455e8ec174d18a78808
SHA14ec9527580da873292b2b0112f6d9f853c1bda70
SHA256a74490263606eca0b541fd9663534e3b516b7d85ecde86442ff3cd62a1fc363b
SHA5120e5329566fbc31a23dd905e08ab24c3ad80f452ac04659d27b580f0a55631fd48131389b74b3ebba5a42a454cf6e99ea6e14c2d8ff449157855d5ade9551be00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e75bd8386bc02798cdcf23a772f0d5
SHA18e06f4598608cc1f1ce39f092f3c353dc1c80739
SHA256ab439f86722935d896ac9186d74a0fdfb9db8698e85de0b2f15eb2baec2956a7
SHA512cf8b11a6f44ac95a75b73a20f6166869dd0517aef3a363a414c95315a44845558813ab1dd7e799d65728cb020b90c5a39d4954dee20f76749c181c1983c7d447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad54613fc88e13d87795d93590d8c2e
SHA14134a9f4de2e643cd5ab2506a3e77432f3151528
SHA256444a09ecc9394942321365c63408f4b640df837526fc683f81b62b0bcbacf1ce
SHA512dc2d3dede0d8b0d330c93f36f10d425794682778c62698009437a8ab94ee95fd210a6fa1d8b15a7f505b69cc955f671eaf83529b2373a05df78f3031a423b761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b32a3c2d576179fcdccd1ff9026b75
SHA140de4a1fb1b63f06b8c2812dbbf6deacbf2fe1a7
SHA256f08e5b64ccf608eeb7dd3f2e9bcbed768bed673843cfed3d666107b4a0a0dd00
SHA512a89f4c28211c7e69537d963fc524ffd39c92eeb22b13626b88b9c82ccad6319aecf450d492b05c79c73980e84eba2c4addafcce5bf16017c91540b83410722f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518952bad596eab68054dbeb5b70f0184
SHA16466960302d7c73aa94af63d311abfbb6d624fcc
SHA2569136e00960e80cf0f7445cd72215c76f16ec8b6157d6df9d3bb4a09947c59b09
SHA51276f0898114d38624fca1ab7fa4d4ff0df2fcdda70df70e04f9df56b745ff19775423e12b7fde0e6c744e412d47bbd998939a4454ffbe9e4a80c17c7c0fc9bbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621b4a4db7e1693d0efb9a033dfc5bbe
SHA11a2c176d6f0e56b90d0afd6b7d84c0977f41f8b5
SHA256a86b6a1862a7581c66e6f845ed83bcb89c363c7a418fb838adb84335540da10c
SHA5123b2ffafb9d13dc1feb246c7474d8ad5aa850b5dc3ae473462f2b9411cec52c7ed93646d3a3e34bb01a3b8d167bd4c8890371b8fbb78190eb353f8f95b0258d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf20782c60045789b903bbcc70422944
SHA1d467dde939c8d739fe901adcd17ed5974366a612
SHA25643e5038a03bc9c89013965f6d30ec05d767986127f744f66eade05ec13e7d2a3
SHA512c41bc856e4d4fe87f34adebe5c66f06c6a257612bed548504459acbc81c007ab9b3af584c1f211d871a2333837d60d4863a945f1c493656b12dd95b45d1dfafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be5453a0368e54b5c5a3d6b1dbdecfc
SHA1be0d803bb578b481cf82974fa7e54e0c490d92a6
SHA256090eb9895b095f04bf86e22669625cbd59b373c5aa4b4b6089aad131972f5ee8
SHA5128cf4d07f1ea92e8655ca5a08517adbb10e31d9bc7591ade2bb88dfc631d0217b4eeabb641a23677909521ef217dd2b42b14ad305ae9f3b89906c41bbbcde1c83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a