Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
3dfae3c5bd7789e49917ca7294e8e4d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3dfae3c5bd7789e49917ca7294e8e4d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3dfae3c5bd7789e49917ca7294e8e4d8_JaffaCakes118.html
-
Size
29KB
-
MD5
3dfae3c5bd7789e49917ca7294e8e4d8
-
SHA1
78b160737c8316788392aeafdd8966512322f9fe
-
SHA256
0e02c71e324ea82976b2af8756848bcadbc36d6a69b6aef0c7e0f63e35282809
-
SHA512
18adf396282dfd9c83dafa225dfca625382cd9e7073665f1118f50252497293b72f0af7c0964980f998da9cb80947e114970814f154ff0c3d68dd678138c68ae
-
SSDEEP
768:ZWGSClClClClClCiCNC2CDC/tKZdOBKuiyAN8NEkscFY:0GScccccLQr6SYdOBPXEkscFY
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0E04391-11AF-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421825097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d030a3f47daa204fa1b3249c2a299447dee30aaf9e44f90ac95f7fa303f28d56000000000e8000000002000020000000f11fddf284e494ca093b83b8fd1fd62cbaebcf6281e0853b4cddeab1c49b887a200000006f94ab7126d021303203e0c68b50c7d389c14cfab8ba16b461ff8cf0b1f3225b40000000b26c00880f113f4cae77bf74dc2654f771cdcc1a45d0233b6c8b4a446231272928027a974f88f905e5cf467359cda784283a24234d903538a1cf288f2d555b13 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c249b7bca5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dfae3c5bd7789e49917ca7294e8e4d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573005d89fed9dc40212afe81b8ff88d8
SHA1d4897c5a72412d55d3ab5c9e3fff49825799170e
SHA2565d4663e221c208ceb47c741715fcb026a14ff73d7e7ab7725b5421eb60e81216
SHA512dbff699c1df9fbe5e0f3435d37b07de2a817b9df1b9dc14bb12ecec030a2986672d354bf5b77123504c9a02ab0b0f914419d8c786e244f1aebdcf0829d7e4278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e953fa89dc4960a1cf368b586a834b1
SHA1db9f0358b22e4549db2513f7bb74f4083fce63e0
SHA2561c45623c9e88b95329b76348ded0a412737192f54d170817b1e58a992067748f
SHA512b3c4b37ed3f161ad6f926e396ad1c75d85fecd377cfce91146f7e7ba37e8b2967801ed3a157a8f713bdf746c12a068f63849dd298ba021d4e5eb91e94444b044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57087eba900d88bd00843a9a67bc778a0
SHA188a0a90f6548fe9014926f324ddfe9acff64977d
SHA2566f355bbf0072d2422b9403bc448a4b5fd275ea559953d36da1a31ffbcb934335
SHA5122eebbcf9bcec0c75a55da58d77219d049d25fed76fb0ec40c4956e97a639ba3b2ec2f2150c76783ec0102b4197345ebb9bdd25f8df3defa573a0dd0573735462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f5e526e8b7e4514894131760fbb867
SHA1c6013b852a4e1b17b23f6ff8655521cfaf8a3b11
SHA256c155339c475cd495c94a2738bcb55ebacf87c9c7c5abab2ccf5fdefa12ff9418
SHA51234513768934d164daa0a0baf288acfddc2df27cb1d2165dbbe3b87f91d7af7749f752cd4059aaf11fc1a8df59892bab4ba2195ceb7212087e9018c5217f57d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5c4d93298efc09bbb1bc3181b1a42c
SHA19c6c17df43b83fd47c756cdd76350185c2a23f25
SHA256118d0c1b7316bb9aabeae31cfd70e22ab60628fa4ed411de9b01cb9983a08d7a
SHA512f8e5509ef1602c56e3d4d0c8e466dfcbd780227162da32ac327c738ccebccbc8c33e10021e23f955f818007be6062f1de5f4ccb818ebe601c855f451e0998d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53642561b28b3664766647cf143dc5816
SHA191408a8907d40fbad642f83fedfd48f5638d83f0
SHA25614cf527455d81326b70a9af4e8e62fc6b0b019aa5cc74cefab56bb6eece3924a
SHA512f7b39d651f456f8fb4280ea3eb63d362b6ae33226a969f5e9dbefbbc3bc416e4c9ce884f2bce760efe712f6ec0601a330683600f5924b47b403ee71256edfe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17ce57d2ddff5a99a620a942d718229
SHA1cc7b76a95be1ee8fa569a9c78e7d19a92492186a
SHA256737e85be99ca9fba425fe386d35cdfd43e7db2aafb565e56e69d626770d89b41
SHA512de3c33a4e4102a9f3c660967757f80c63ad7d5c552e4cd27803a6ecb6f70d0fc77a2f446bbcf9a2c9faa9121bad054010f2613e03107173cbb21c1a6eb1f4023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54f5d950207c509a311173a33a6f11d
SHA1076364c8af0e2461df7c25c27697a7110072a2f4
SHA256b05d5972d8100515e75b5f6e7ca8d445c07d83c78dc8ccec3523ed4e812cf102
SHA51233fb9dfba3bde1aa9e0db563826b9d03a08a053cf0776945f8aef8beb14ad1b7ecf5363080a0ce56440a784e7640fdd284418de03f7d7a61fd6fb03e26835a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a31d55094ab6bf8ba6577e8ceab52062
SHA168cd2bec886433f0bb5e9cbd3d3eb9dc9d50f0f6
SHA2562a141083ee8deb6e8b16b7aa93deb0cae04a013a8ecbfb01acc56d885c943bce
SHA51206aeca2103bfe2695049663869662631c127a017da3db4466d066fda8a62a66833a85fd595210dfbcb817a833e4325fd2f6a7744057be232ea17d58d718b03c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1525053df119ea982f79e3dbaf44aec
SHA1d900b693fecbed292b02ad1eff3901d2a593ea2b
SHA256465a1d981c293d6bea151eb37b6e22a7dd75f88c714e58467762eb4bef532166
SHA51251c021c3299c70b640aeaa84b5e7c9d4ab1ff944c65996279f2bc93a837c8ccbdae30a5f6b8e1802adf42e9167f53e7fd246c60d2e2d73bb9c129cde805ecc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349224939c44fd4bd5115f9edf6db43a
SHA17c0a19aaad3b38512d14ad40dc9b93e4c483f5d2
SHA2565f162e7d2b28dc7525436ca2a5f1db8f43c28eceda1f590a89f0d10c9206c3d6
SHA512d1ed189417729e7cf92a2230bdf017521bdb361d5ad2d68a8669e84b419fb007b50f1753586da9937447662a1fe4790276f5cbbae9e90b1271c3ef8b8819f150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5752a52311079c63174b59e017ccd6665
SHA14fed19de73115350407f8b442fbbf3ad4048cd06
SHA25689464e7977497ceb23f4a81aabced0568e8b52c8bcd0fef50805988d8db23ec7
SHA512622b2d61c6a9e4aed61d5e933b388c11cd46822ea4e2ac783948a459dd1aa23fc4f66dc3571abf1b68bf6ab8b8e7707ac09a13b7e9f41953bb75ca6df071a0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56085dd91d7eab41135d26ca78224bb52
SHA1ce97fbe5a52e9b9ba2fd7048b79069a17837b895
SHA2564e64f3db3ca2c769d17d6d679bc6efce98988c8b56123cec219d2ca9605e9f98
SHA5120179b7fb124115d6813a517bfad9c26837186730b0a64c37fa51e9c0e1f259fa841eebb8c6d84a47456240d5f292994ccf55136fd2e675cbf7bb0dcbd96e6fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c2e6fb2addb32fc8dd45e38da81d84
SHA134c3e973931ab6ab62453ee3f3c22ffe5e57808a
SHA256d7edae3d50aacecaf4f8320b71248c1718f6c9f60a4a4cf8a913a9040e87f0c5
SHA5129875502c5fa82f262c91cb324fdf841b526104d838490f2bf265411d35f08fa178cbd3935bd6972afce8f79a008da611f3449e15175d6731576b564c4611b0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82c466bbea4cd8ee63392074b353adb
SHA1dc364d845282e1772e4fc2d60f2e41ea13d8ff93
SHA256ebd15243db57cf7e5d5d530433f986fc5c0862e9335ed65965e9375a6ce96983
SHA512b12915839fa3f803d65f147388f3a23bb505b43bd0be12f1ed19c4b67c37c5001cddefc15e92c5343c2eec92ac0f31e8a9cc37595478cf58fba96b205ba1ca09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e497100a56d595a7e634a4b1850e8e1
SHA16ac15a01cd6c6853fa3f63c886b434e8c1b0edec
SHA25697c4a0cbebc195a6d6a493162161ef36cc7a9cca4d47247274a4fed582fcdaee
SHA51241915109ef21e38643d3c59811a11362ddafc6601ec01440be847932c87990ee6e423cc7f85348f1fc9790dee9a60992264660edb043e31ab337989ed0cedbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546fddf846099718f14b0acb5213ec452
SHA197b7591c5306addd0448a7132976bd5d708fd536
SHA256d2033c568cca58dbf48eb9532a81f5a30688400a11007dfa59e9ec30f010bd38
SHA5128ab608f53367a5a630e7ae77149863ef6e8b4e3febb1769b6bfc3b1ea6ab2cf2c971b2b1ae0cb9500c1ecaecef8f7964926a886f5b2e9a40f54240783664c7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f843ee9fdf199181fd1e4e588f4f17
SHA18d2feab25af20ddaefa2884cf2064085128b577e
SHA2563d2fb407538b56d10b386fa794395ce0c2a72d14bf4c27ef2c5db8610deecfcb
SHA5120309db43029847a4b456bf6f29198d9178b00924da5389a8596c7ab2b439c79735327e876c236c2a9e5bd063bea955c52b141c6853b50cd188c8f946967dfda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e531dafc70683ae25100b162e05dab7d
SHA1bf6e6e6e0cac6ee6fee271d6ac8465c5dcfaf96f
SHA256e7cee2dc12d8cb56f6a322d0c018ba34575d36861c624ba198ede00d97eb3a13
SHA51245fc85b1734100f0a19fdf4a0d325f8a7f5fb414172abf5ccb63c786640eb3d6178e0217538685853b117ad93cbe732c5135bb23c503caec6634e53005377c58
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a