Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
b3f6b4288dfdabe1a47107ac44f77c9b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3f6b4288dfdabe1a47107ac44f77c9b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b3f6b4288dfdabe1a47107ac44f77c9b_JaffaCakes118.html
-
Size
460KB
-
MD5
b3f6b4288dfdabe1a47107ac44f77c9b
-
SHA1
f632c0f702484cf2fbe23ce4fdb0cdcc6bb2355a
-
SHA256
d3f2e5155eda465ce1e60436d4d244df23d95139a7e8a3900eff28e1836f825b
-
SHA512
c65b803e33ac226911e1d79f24747301f135bcb540f850f32bc13ed56a9bbdc18b58fc1e31b5a02bba46e946abb9fdc175c1ed76bafe097498d6645f976935d6
-
SSDEEP
6144:SOsMYod+X3oI+YwzQZsMYod+X3oI+YbsMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3qo5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06e20b4f8bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424709615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB947801-2BEB-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e60e0be06559234d9fffd06e6bb7e7c8000000000200000000001066000000010000200000001f07174a916f933eedd08100002a2485513918e622f7c18010e993398b6db820000000000e80000000020000200000007d515b557e16dc39cc5e2af74ea235bf49ad7059f7c8f31341bf3c3e6ee7a5202000000082632f5037cef9a39153d734dbd98646d66a5725cc2a66181acff5f950fb3f8640000000656e2ad7b89d06263da197c8321095394739e78647408d9a23c4f109ef4a3349bad0a157d39d2198d2922cdf1ce95b0844e10e4fa8245283f5b5cfc8cafbd13c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2208 2868 iexplore.exe 28 PID 2868 wrote to memory of 2208 2868 iexplore.exe 28 PID 2868 wrote to memory of 2208 2868 iexplore.exe 28 PID 2868 wrote to memory of 2208 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b3f6b4288dfdabe1a47107ac44f77c9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a018dc3612873807a8701e3c14cdcfbe
SHA13da94207d073c73fc4935eab3b3b1f3a7de7e4bd
SHA256a1238b28bdade5341ef8edd44bf0ea3e12399aec8192e0f4065fb3fd76b5b543
SHA5124aa2d66a5bf0b3d78885ae096e72711bcf940074b128800228e1ac0a23cab8a215a38a21d8fabdcf24db549fbc7af1da8392b7a59be9f77a24defd9df86489dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacdc51e5b18bca6f52117e677bd23bd
SHA1cb233a5b988dfb17e23319676e98e304a41b200b
SHA256b645181512e1e93a9ee024719600e9446a161578eedafc5c47764202157db03e
SHA512c1681e1c439178513c5ce7598fc5672f9edffcea007855bc4626e6d25f97fe63db5a3aad983d5573038b8a1e30fc13807ce99eea975e6aa366e902d05f1394ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5338168025fcdff368006b7cd05bbd
SHA134f8afc31b395ce40572693f24f68c031f4c7faa
SHA256250a20c9f84c5a04d8427558bfde076a584b4b4ac1638354080897228c321e48
SHA512bf70e326f88569944f0090cb5ca8e6e97f968261893a7395124f8c0092c616419c2ee67b01735232d79ad608bb4f0a67aaf1263a7d91ee0c6a37c3d67fbacb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9e720d6db221cc39be859746996518
SHA16efa2e4946bd2679e09da22e4cfcde0b18daf82e
SHA256f7c57beff37d5165d581a240057fabab6b46d4103d9d9cc564dbc1810a8d5cf2
SHA512f9ac5b69300a0a919c16cc3f874f8550c83c6ade50557dd92c2dd5882901f864713738a60bf188524e9a11b3e7ac559ab6930b661a81ff05c90eca29b1f794a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0a5d7d0b42bc841df57164e657b8f7
SHA1e70d9f30b508813e242cd270a6780e0dc27c56f0
SHA2566314d065beae945f2dbac62ecbcaba49fa1c5f3155f875dc4f4309cd41aad34e
SHA512414278b865a3b98f089d98010bc85d4e9027637128bd01dcdca0e3503e4a2cf492ac5ccf0cff5e53e22c00a9fd15a7bec5a28971dfe960a88eb47ded6c9c3cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d89c2fa2c67f08acbf39e3f2844c8de
SHA15aa5164005e7006c843b8682202d75c606e37554
SHA256bad4bc74b85c84a9a009a4b4758b9e64367645446c21ec2fb2ebe0a113457991
SHA512b42edefeb947355870d2db20c95b92f336ed48d50d1af2ee7325ccb82174de6769d852a24d5038a4a5cc853f86110b2d8e75c8372292102595677b0e5c7942c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d93e8ae79c8a1655d2a42b1c440dab7
SHA14866d37e848e58ce48dcb9cb81f6ce5e6d5b181c
SHA2561bbab3399ad9ba612b60b0ff0acff434ce1c057c7784d7d34a4fa1e54c69775a
SHA512d7deeca45724684f771c075ade5213256cb3b20bb9aeca4079948eda89697b82d8b166cbc9f8ccf772fcff175baf476af9c56806c1984cd6b171b1af134667a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc2f043b7cc80f3a9c1fb542bade5dc
SHA1cab28ce2ffe2d145be06249aaeaaed4a3707bb6d
SHA2568ec99106af1c9fcd60767a3de4e191d38d10f9f56f520f794d44e53dae10a2d3
SHA51282c80842a92a4954cb2fb4fdfb939fbac531fd9a70c28f0385e6d2f87716d1697f59e83c1750548dbb2bc0ae184dadcb65b99a3277c47a60cbe567a438d05586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab60042427485265afddd5b70ea9561a
SHA168642e4969f519412c155d1d2e53a54227a8489c
SHA256ca26b3fd5d9ca8c18f9e95193c4bac7db1303fe3c498f20069c333aa88749996
SHA512f229a4103e491e818047b5bb6f6e7cc24fda9d1e3573750a37f54641e6c12d551dd1aa0552d94d8f715b376449f8e34ec2d4b2e10fbd9274ca1494eb9289fc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e80111ccd49733f3f817207afedb2c3
SHA109b1a44206f52c3caf197e05415a7b5659712d03
SHA2566fcc592c4bb848a2b09649c27138c2de698945e523de8950281066ce7ce80a67
SHA5128f325f85203eb10b3300253fa7526e50c9a76c7f2d147d8b6223f316c9e2eee1429db8d7d1d0246c49f5a628ec25019fdf9eec3d82b2e3ee40a61f059f0b4601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0821aa78fbecde934d2a238b1299ea4
SHA1665755f9b397b85220f036c741b332fde4af3a3f
SHA256590edf3480fffc44da59ac515677c1f3f00a3ae6b59a323d24c44ca9902884ef
SHA5124e4e3f9176230d0840c09131f4da91d268a8269acbc6dd45745fe0f5b7ee30327d744fb06af9eae70caadd9a331e6a8dccf650e43d495448008b1c6316d3cd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daecdc7060c71a7026298aa09ab9456
SHA13b44d1965fb15c2539db4d8e7a606da2df2a95b6
SHA256dd224ea07428e7b6bc8803243de445ef0b94572f711b3673bdaa25bff2a10516
SHA5129030055a46a4e238fb7f04fee29a165871da17808a74e052e43056a2bdb8fcf915e7090431acb3a775d6989b3a2a0a4e5b7adb1741f40dc6f7017931bf393d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509753a07ed4b619a912f15e4b7975844
SHA18d82f4e98eae456570c0acd65a9cfa3aee3ae93e
SHA2563fef062965ca3744d4115b86037b6c4e8646eb27210fc25cf619371c769d939f
SHA512f37722c3a9cb5a35e85c878fa2122aca7bcde3ae45ba0a95e4e1c53aef1b9fd67ab99d0db97d4462d59fa2232bdfd566e1066991a302a9b0d8022a13f79291c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2397cd57737c8dd5f6aada2989902cf
SHA145baed58db3a1c27776aba3190fab29a6113bf98
SHA2566a72a4530170386b37a89b629f88a5f0f0e5c8d96630f74402c842ec54ee5365
SHA5126cf40ba852ce8860c50af17313ec891529dc95ff6aadb0d592a4118f38870b87fd8fa5281866ff3d62fc016bc53956af9b431a95c3ff8a8e9c01df7907b9d8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a595cc922bb0d10d0cd404d46fa1b8e1
SHA13081bf8d10aa690be20d57cb8f60c4ca15123233
SHA256f7d4b3f94a60c3a6172f50694d841cf968156f2f065e20d4adf19f60a7357534
SHA5121e43f96307e2d20427a70852c2baf933e6a8f7a6b2613d9e49772dd3ee24011aec269ce45fa7fb9c6c4e7b910ae6ef20d71f42859a2be9fb257116e03457fb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb39df3836bc707e98f00598dff58739
SHA14d28ab36300b352c84955189dcd44e36c99cbc5c
SHA25648dea7a1ab75ad059064351ab69af480bca5461c8cc4c7d78c809aa0ac20a034
SHA5124c374a5923d159f2ac307494456e68017b28f9b22108bd36ce416927a92027ac812ba2fa738a210d5cb20147079e46e5ba7664d10af79772f2ec4d9dd2891777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b844344d3c3736add86f2efa3b49f946
SHA1b2dc23f63bb0d2e4617e397b5ce729d2267ed8cb
SHA2567fbf0f9d90bdddb02824a80a015e0c5cc856476ca247ddbce3d62e4dd21bc8ee
SHA512d10de6d3d216f1428f03666521b8c709c5ace0c5ed95ab7c8f030e1f8f4399a7c386e86e5498c5564de7dc55712ecf85319c27365fe05d24655bcdaa0bd2fe72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588ded944c819e94a3d63e3a4a8ad833
SHA1ce980fb11adcd5ab4306125e4e9a7a4a7f503703
SHA256f466903bf03cd14c15d913cb7264edf08845f5717950b240d65fcf545db94f62
SHA512471ae42eee8a83006b450b9ec0942486635ebc8a8a0f5fef3e960cfd56529e9e58909603b7af5af784f5cc754255a27066add34bfe50e1cbfba6465c52b4c087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901d29d099289893f3ec2ccbb644d09b
SHA1fea865fbc35e2dc0271d1a40f79a4c62d261f99e
SHA256258131bb2109eae2789a98dbc0507368231188b4d0b3781c095e53ff7055296f
SHA5128978eded8e9e37ca843d0b035ff72f16c73c51eec83bbbf4bdb3c556ca75ca79d5ca4e173595f81c884f9905f877d33563bccc60838aa30e4f81a8224e21b7c7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b