Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
3011b05133516e6175b20f70e8e9d8a8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3011b05133516e6175b20f70e8e9d8a8_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
3011b05133516e6175b20f70e8e9d8a8_JaffaCakes118.html
-
Size
1KB
-
MD5
3011b05133516e6175b20f70e8e9d8a8
-
SHA1
9e87ba1c5bab30c52197e3d1540fb49e17d42ffd
-
SHA256
be98dd53d1290346a122f05b6ba68c17712a46a63051f8f1ea3d9cfd4d4d95f7
-
SHA512
d9d170d528176330e0eeb9b052ded15b7f25f9aa0bb7130ba445353a42e08211d360b8597f0e46af5f9f82742526c01cc72b8db068e94f9aea2d3ac644fe3e13
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B8CA8C1-3DF4-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c3d4f495a7c09f7e13683df1e52b861502a7895a3fdcac8e4fbd25131bf98d26000000000e8000000002000020000000b357d5602454ef6dad1ea66aeda72666eca0a6a7caf83c2530d2b2e3b7d32a4b20000000fa4e5590aeee058426afca632e49e51248e998dd43b90159811ddba7500d106440000000c93cc473ddbf1d816ec0edd659fa9ed801fc07988aa81aebc89bcc12f864d90af2b39a8748de2f7898664ac6fe0025922b781fd3010b2b75e54f739ccc06ce05 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300cb87401d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426692494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3011b05133516e6175b20f70e8e9d8a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6810f30ef1d5353a8acd8eb79d5593
SHA16851515b7430937b1dd7344325f9cba1b7040b42
SHA25635810e92e64d812a773412fc1e4780a76530f2986f8aae21d5280be3a4319e03
SHA512666e86c5e7ad1b6e7bf683a6ba636ec191d1960f1da9ddbf3ca2cf99c55c251401eda2d720fcfd4eec645f13ac7dfd5427954e7933fbd04180f7a0259e004444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20d3a6f32bac45c26e452d0ed881c79
SHA13c156cb0418703a6be412f6cd14d6540af15c8de
SHA2567fcce44e16039c4d09406c79e94d9fcb6c67d092fe7340f6f00b6ad23c41996b
SHA5122831a595e93891e44da52277b0d4b847885541132694dd2e3fc371fb4b5e73d148cd83b6a826086e8e50586c2975030f2a5aa415908c604a406ee63221287e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0230cea7f2e74d1dec1574f815c0c16
SHA17eca43aaaccb05a34fe5079047f43cf02d05ff25
SHA2566f194f6923e71847a70fcc2ab53babbf1087c4355d83a55e5f2c524e09403b1b
SHA512d7b12831b7439401b2cae28ebc645a5d26f4744ffdea91b4bf64cd9eda3ee9bb380664507767d51ecd098ad1457d85e4e55c462c9062d1c441fbb535603128fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75dd600f17f55ef4b6214146eaa2b05
SHA17c2759d53d5bdb567589dd1250f59f1e43ea982e
SHA2567145a04d70dd6f839d3b6c5665f2a47f8d7d34a91a838b2188adeb8b0507e417
SHA51212abf7b89bbcb8ebbff90ee5298b6933b605e23f35c3e3a1b5678fc86e464e01bb6b24574714f4bd53c95db6ce83800d30ed23e0dfa24847fb34bdc783e30175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2775bb796e3ad0bc8df65afb37149f0
SHA19739c62f8460e80816251cc1b7bedf945dfbd765
SHA25656489cd6706cfa7a02f1f65a8b447ddd2fe41ea42385623136a5f415cad64096
SHA5122daf733c997e539e84012998cece5352c10963078597498d7136d779dcb9ac453eaa5fe9632ba4436c278fb87946e216656fcb2d9eb39ce0930453ec66f799b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6da165e907c2bccd8db957a0a5bf0e
SHA1388c97316be7b0a00f0f374a1fe2879eaf2d164b
SHA256263a41d527cc8eb4012edd09ba32a332d9f87880f0731eb42237d17fd15d3a62
SHA51250baaf72c9a17b79a914fefdc7daeaa53988e69074458dfb6bcb4de31d104f94b060a2773663ab353d8927a14025d44c26f877d8fbfab799a5314f3ba9d8d2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7cd75ddfaaf9335c93a4020702a3df3
SHA17a8620084327815617d5b3ac63d2418564d40daf
SHA256dbd79590bd942070ffca215feca890f67148854578c8aa81dda4a9903b24cee0
SHA51229a73f6b8224915d9dbae58f142d720337152d1fc069c642ec0a9590b847197a6ab585a5f7a8a7fe99453728ada336d5d548bd8e241b56af69b87cc9c6876d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c167fed517c2bd72aac8d1800d23eae3
SHA1b772db4c92fc13d7c1ed2c4f7e88c71b8ea52eac
SHA25628bb5f8b89e41a0ab54119cbeb5a77371231178a7f8a15cd4fcbc6a0b4f0878c
SHA5129e6c4be4e78e8fd33fca348a4039b57d676baa4bd79d942d4101249bd31b54900645f08e0496098d7d95a0afcb4b4df78f467505b61dd08ccaeb74a5dccb6537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d1fedf33640c838881153f64af21b9
SHA10928b9357a0270bf222f42cd6eb9173eeb5cc169
SHA2567939948bc7a642996723e551c4d2251b07de2f32febc7da93b6169452e8056ee
SHA512a277c2a7b484a526e4e6a77b0476d375f662e0938d6a1eecd50e975b30486f35ecd17904a1570ae40568603d0754b08acebfe46a2917f2d5906c159cf9c63256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc31230b64e4b5cd81e21054b11b8f1
SHA18f0eaea0c18b85db450b42165f4b8927c7922d99
SHA256729bbee2018f11c6158055d2bf107e5207335523972d4273745a3b692f6cd16b
SHA512a17225654710bcecaac9cc88717dba287bf3a4dd441ee81b0b3b60b4f4e916ddd9a21531dddf0aa2e73156a2b57586d15ad768b7a97bc071cf9835e7eb6f0e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509365e5dd79b1e6c8f5839f1b5ec1f86
SHA12429c8c6abb7de134d96d27f93164810ec66b715
SHA256eacbcffca234defaa620d9969debea88813c2a82b012760f2a0a37ad4d909e49
SHA512e197c9d4a79a93402bfa88b74940dd508bd3b65dff37c44cbffd6ad71be82462d92b40462ff202da27cbb15ba18b9adb348494cf3f02459a928585bb477f3861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b086845b14da10dd6c734cc24da41d30
SHA1e3b11347b59d5faf8358688df06b5f0166e65e99
SHA2567cc836831a21b33d19de23647d4b01e85faa4ed54f8582d8e0b4fa712887f2ee
SHA512fb55eb74f35c3db4253a9769646240a6cad558b729567a0826ca96fb9319d961649916964eb648bbdc76ef08d1e21c4eee81cea4ea9e9fa298f1977c32cdd2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b91140edd997c61afa613f9527e59ca
SHA19dd02d417560ce384bf2e9625b164e32b17ae64a
SHA25646902b9957a447f2686a88aca2ffebfef009be06044579008056a7e1c0997111
SHA512a8290bccdc8d88e32da41940c03dd0fd19cdcf18526cbe21a849c90f619954a5368512535667505ece8e638eda82b4c899929e636fdf1402c3df175451ab5c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380630f3f77a88fdf298253b16330fc2
SHA1b131a9aea94392eb2809be347de1180df88d7ecf
SHA256ee9bd46f2b5cafe05ab7561d6a55ac58194c35cca978312bea731463b0d9e8a2
SHA512b6ed407e0296f575798c7927505b560058bce7a4d7b0c6a1851bcc92ef85ab49fa66e933b03cb43855b975e02a63eec9e6e4bbc674d2c25029736100109bb1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb7350c46ad59fd82aea9b6618a7bc6
SHA101231751059aff0d9ce5bd673cbcb604e3e46412
SHA2560fc05faedf5b913c8e2224d59ecae29fe629db1e1f11ec2dbf8b1b20f3e5c437
SHA5127f03a7914c387b7b6aa749105c7d02eccae70fe51c41a3cc84c1727d5110fe5cb6cff09c3c81c413ac5c6393921c96cc29f8f71af31be2f1b90c678a846386fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523838d7fad673a9a0cb4e054ee888540
SHA1a9e306dcc07d4490ecc7c61455bb826b531128a0
SHA2568226c369982f5a2e091d415e3d0741a608a039ad084f93021a5a7e7d79a33db8
SHA5123c522e359b6ea039cdc85d57c87936f820c5e5e8f6fb2a158fb36fe54d7df4ac82908dc0c3a0239b93a00a58b140730c73b4b6226a2b161a8f84e92a10c30c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f271fb6c55803908088451cea005eca
SHA1af83867c9c3c240a1b75122d438ef6a366517672
SHA25684854027e54c48249fdf99671f961fc37ab7b49225c79056c360fa879702be3b
SHA512ad0742f54680cd8c4e7024ebe9acbee9f6814c9cbdbfdaa7ba2fd01df36e3cfad00c5c8fd9e3b3ca4af35486d6b1aabcc36d99879993426cafc82d99a6acf26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d14f16302be238fe24c755515ac90f
SHA175bcdd73bf80aed7fa2efefb618790fa0cc4123b
SHA256c8b4356b8380ee302dd3d1e25220bc26371da9940383b9ad0912b4e8a5aaa7fe
SHA512de96378d89f39215c20c170797fc71cce701273ff7cd377687f989609f243413dc208f46533d77411461031161a8de5bca7889b2cd46ea4a92f21512f2baddf6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b