Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
3b1f69bbfc344bea22f60ab4e4d3a5f7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b1f69bbfc344bea22f60ab4e4d3a5f7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b1f69bbfc344bea22f60ab4e4d3a5f7_JaffaCakes118.html
-
Size
13KB
-
MD5
3b1f69bbfc344bea22f60ab4e4d3a5f7
-
SHA1
6d0a1f15a4fefe770443538a636e875996c44e04
-
SHA256
62942a4b168bcd3d68b118e8504c264c4661f1e493b2b66803248641f2ffe02e
-
SHA512
19417a264890fae2848a63513c99b8deb9a8d413cf6bd051b8e18f392f7b53069769c582ee9b0f223f1b728d939cc8ba043ebe773629f92b4c8c0a758edfd20b
-
SSDEEP
192:40bXJw55PCJXUhgv5BKL2I3Hqonvvhw4x23+8JFqMCp:Hsykhgv5BKL3PnvvNx2uOW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9084d13ee9d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6949BD51-3FDC-11EF-83E1-66D8C57E4E43} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000006718db1ff67c09fef39b114583fd322fddbae0a613a32e5fd8ba6405c6f73bec000000000e8000000002000020000000a24d354e0ce294969e0b59c80009f320abaa994a2ab847d32a587e3b25ac53b920000000d59dbbe03e7f9cc28285831e47a65a6285aef51892313278b281e2890fac33094000000052005c09fce7163f9fb9408808628b55cf1c06aa20925ebe56e5eefd184a36ee352f75b0c7f1f73d2efc0d4b7ea607501e9fa60364171d30014a7fec9990f1f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426902003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2740 1812 iexplore.exe 30 PID 1812 wrote to memory of 2740 1812 iexplore.exe 30 PID 1812 wrote to memory of 2740 1812 iexplore.exe 30 PID 1812 wrote to memory of 2740 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b1f69bbfc344bea22f60ab4e4d3a5f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9a4a0aa99aafe1919204d52a802c51
SHA185b6785bff71ea29ef860ed5672fe233b05487fc
SHA25696e200d66e3f72475b40c161c6d41e42c86069e9b837eeecfb3fc9da61cd3ead
SHA5128c2e88c684958082b903f8230a912ba2c9722d2a0de9706470fef5d9162ca2ad582e599347e8e08bc1bcdbc582f2b951fde144fb091e3ed3f4f69978cda3deda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c0dc147a31bf265b11a69dd08a8866
SHA1c1640cb06a7ccecf45648ca64c209533cdd9570e
SHA25602e5c5d133a206bdd16aa5ba4076f428f75db78548e9e1e60ce691f664d1ff07
SHA51246c83d0f6b33dd59d0de3a2ab0ee7cb7807e360397117e6646cb52962d1380b5eeb74c3a1bd874f67b933935f9f453b696dc2404fa789a35d5e1d15440ca0a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b198103ef413e3009f7e3162cef5ed
SHA14bcc9641e0df2b5f2c6920fe180914da1faf2072
SHA256af6f4a3ca7f134fc2bc7bb116281c8b6071d51c6c36ad3f43e301e5ed711c3c5
SHA5127a825ae6bc2a852a1c91f6c38a2d97c5069484cea4877fa75e33c343532184ae901b9c0634620372472b509cc397b1bf75d1e7fa4b011be189b35179d0921c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8729ea410a40256e15d6105f558585
SHA182e48647fe823e0c630807836e392b71e6bbbe34
SHA2565cb4c4574a3dc16897c87a2c0975372679140fe89e9cca9e5e8812869e8d18e6
SHA51232d63480ffd58e5f3ba36178d134949e371cdeeea61581768b7a6ac51dd72dca252a287cd3a8368d92dae12569fd4c6daa0b33fb889e36d6ff9e202ab1c0a12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47ddfb22a879dd234acd8cb37a3b01b
SHA1f9bd28ce5e95c0a68c1f77185419687f1fd10206
SHA2567db37a88a1ba64fab8e578a596007c60c9843dab32bd7ecfa183c5d18aea3d0d
SHA512d1b101aa6c671b884b48e633f6db712b840b1cb913de7136e0bc112958b2075811b302a21ea62d426b4471edfdd9bd6bcdc4ef770d6ce9fab13bdb6f66284f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52102ac58100b29fb4fe19df0996b15b7
SHA1c9a7c19e0eca16f7bbf41d1b2c8a5c14ff2571f0
SHA2560248181b63483193b73125050a664b843eab5c2d76d4fd37f41d1a9e98f3af62
SHA512c458085cb07f021f812ec6a1e7534459c1803193fd7241d56c10a3da1981f7a360411a9fbb5960abfc36e5cb2aef547c56ab36c16e9be664550318b5236a7788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023a840694f1edbbb80ae03e0c683346
SHA1383596a300bbf1990c73dc93ed8ba2c9373cdda9
SHA256362eec046d430f732dbf576997e26c7c035581b4220ed5a6ff66fd7096c564b6
SHA512aa2723b3dcea65dc6961eb74e83e23ae5db04499e46a51e8fd8534fbf9108bfc97bb6604309a799b767d9d89144065f3097b4e651243222d1adde4fb59abb0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66053893748b8cfebe05c7c6c9c4b96
SHA11d75c2b6a18d49f22c5fc75d318b82da930e2bca
SHA25602c12a11ab73e2a76dbe28b4005ba20d74ace4ee6f377d5d678e1bb211fa6603
SHA5127dafc46fae51deed3f771529309bd79501d0bbc96011ca30b7748b67412ba621d1f822fec267d92acc75e0fe56c044321bda851e3b0a5c57652d18a6c938535c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15b904141a5d0442e1e1079fff6a045
SHA1fddcb6efb2095eff6c1e542ca97e41953b96e5dc
SHA25621a49736a09e8ef15ad9b070ce552ab4017d4433603ba56d0f8f5c70cadab43a
SHA512691f57e38648533612f284f01370d2c8b33008ff1206900a1bfaba4f4258805b2b88abbdc04dd0867ae913808bbfbefdfa82644b5927deeea5474f578144ebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fda87363a5fdc875f1289426485c9b
SHA11da7459dac22e7ac04ab032f93ccc6870c683def
SHA256c939b11bb5e6a5cf2451ea73aad90eb41963853dab5a168ba2a51315be7a975c
SHA512bca9af609b7ea34fb624ef2b93561a990d91e7b30fc3ae450655550577d5c073d07eb10270748ece640c6deb1e18b314143e9ad3f4c34726bf3042991e011f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7887221fea5443ce8208e00741bc32f
SHA1ae22e5298d630843c9d1541258d327642910e40c
SHA2562ec2c7473ace910b08450d9c2faca19e5a06c8509c9b79ad8cc063527122c30d
SHA51250b0125e202be800f5c62c5f02330de6809e442895e1239962a2eeb3e24cdc06b0f0becda8bb3a0114253ecbd15d3dcc4e054bcc30b7cc1fdc41a5ea1d4ab8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d4325eb1812fcd1dbc25a43fcd900e
SHA1a5a38f188828a20ec3cb31fb6961b02dee78a92b
SHA256f9dfabd8d7bad800b895c66390cf79f5f1f15773e6e68030e60e0af11e191247
SHA5128cab9343ca2f3aa57a41d5a798e3e059475f27b826d6d0d7804cdf8334ad03ea28149cfc02d88c95231fec976ade33d0fcb9b78f364dd0d08d293f5bc97746db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51423f4d1e676ec4ea89d5e553d1a3b75
SHA1e3d9665138924bfb179622b19fd4144695d840cb
SHA256e7de075cebd542b9bbd57ea6e3db85cd76e0cc86fb37c59908f81e02dff59be1
SHA512aee27bbff4365de4dc2126dcc03b2e9193ea57c75d9ebe81b38c17bf135adf3c563904c289f955925be704c1986e100b0409908895dc5bf2011268231cd7e62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54491d372ac4aa884e805ce069f312e
SHA124f5970f2dfc5b60e7e6335cd6b68ae322c748ba
SHA2569c208a4e1678bfa5e78213486b7c2eaf78dfd4ceda805dfd8f10e7850d22b4b1
SHA5122f2e49a9b3515b8c4caa14ccc4b31e4e66bd744631ea343719db83de2e4d4bb741d6c809d2278e1865c3e5fd808d5bb9be454aef698fa5bbaac44f380c354257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0287e1a55f0ff2a932dd67a6cbd6613
SHA1975653908247405ab95226d1084153abc17ee71c
SHA256d69af4a52b20200af8c67a5840eaa513e9e40355444e67d6f63786a5defb00a4
SHA5121bd526b979973d3ba67f72d8f652e1974583e133c1f0c848b21616ae904b024af218576add88800ecd747740852e6bded5953de332731b3364367f005b912fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b645ebc3dfe2b6d7d279baba191455
SHA1bedbff05403033b3ac7a7a14f07be9351ae423f5
SHA256d7e45ad56904fd51b12862732c2ddbce007e439835758bb226956b14d2925504
SHA51281b1646379bfda17725536dbc23a0b33cdc953969728cfa5831413744ad93995dc77ecd3cbdcab58f851fa81fbe89ae0b77c29bb34f27d2fba2416c5c92af05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52412ab2f307825f01f8630439c16e3ac
SHA1dba050e0bcf6fa65b0cf060878cfd0788c8cfe09
SHA2562fbab44e2242bdd4f2716155c9a28bf8f9a8878730ead9d4505d72efc2e8ddf5
SHA512e423fd0f6b5b3c1983bb704e7ba45f31612cd1c80dd3d05f2f37a06b45ecb496a4815ec3971a53cb392579b324ba29b316ed0b44ec596cd406b1edc7a0b4a77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f290a3b6c22d8f46f86b16696357df57
SHA181108947dffc68b5c743053c562cf0c0aeb50f15
SHA25675567da9c278329205520a8c62aab4e18e77dad1f9fd4406539305ea04f089ed
SHA5122ec5e3c6a2174f534700dd00b4a4e199b18ec6bd6c12e105358765efaa8c4f976313116578ecf5301864db2e7ccdd74b28eaac4d799a0bacdfb9dce3e00d8a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805d1fa62f43bc9ef87353f8cda9c778
SHA1ea98b9b4d0e17777c5fcf1fd111e15178e3231a1
SHA25697c82a49945b5ff43763cfe1d7055e8c37f6ecf03947ce6cd796f03bc181d9e7
SHA512831a7aed5d3979745cec53bd2709a3ee58566d2dd60d0ddb1f19a17903cdf5473a17c3cd83cbf17bf76a45c6fe9bb5203f807800ee565dcff27f4b99d80530f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540a068cd6acc85eba3da830f217cd29
SHA1b25642ba6ad9b7f72803052828b2324fa1e7837a
SHA25637593ba75c6c0a6e9ba86369c65904471f601ba41c0ccc9b6b205699e81b97ee
SHA512bf539ed6bd3032e3911810e45ee9e9f23db5f318d7b6a92a527afb9116dd9c50593b6c9a499b7da4738fbfe5797a8f9ee01ee72ac0f0be6e788fdeb80107bcfe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b