Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 23:51
Static task
static1
Behavioral task
behavioral1
Sample
3b368ae0c50bdad9116a457b3ed65d66_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b368ae0c50bdad9116a457b3ed65d66_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b368ae0c50bdad9116a457b3ed65d66_JaffaCakes118.html
-
Size
182KB
-
MD5
3b368ae0c50bdad9116a457b3ed65d66
-
SHA1
665013e33e33ff0e6f0eae532b44db0a51a35fa5
-
SHA256
ad98d0b7c7f7fea807d71557e95bc347e30573fd257491f0c4b4e63c4fc47d1e
-
SHA512
42e4eb83c2b89a9bb474b245bdddca0ddd50cccdf381a2cc78563f88f2b3d3b879c04d35b4d041256e870f5a435c3976da67f1be5e17bff89db5053355067636
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fccAXHAEssLAcawa8UcZfGGkCp:sCpFL/a8Ue
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000020a94e6ff06a558caa8e895eb7b4d01e7360797e809930c6e0acb6ac7632a592000000000e800000000200002000000007fbe2933df2bf9fa5a6c12cb7f2fcae4ed98d40344de9edbf65865e89533bdb2000000071de3f8690b76e363521816c3a3b95a18e1f678d966629382297b1895744b492400000009c60f0c7e698cf2356b9b415bf52f8743cb95d39d1381999dafe80ab0db1ae65bb3e306f53856d87412182c3af0b6ccb765aa82c942601fa5737cd8f716c0e37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a1987fedd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{909CEBD1-3FE0-11EF-B467-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426903787" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b368ae0c50bdad9116a457b3ed65d66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd7bc606eb5abc9fa7b17b73ceb07ee
SHA1b09b3bed450a555efa4f2822c7eafdfa025e7cbb
SHA25651bcb0d51e95c32bed1e3596368538061f3678ddb508b422c93f49f010d0cefb
SHA51286378e9947a8c57d7a80f2390761bbc5470b3f149cd09f03eee9dc00bf73f702374dc32fa128384c4a5e3da3ac03285ccced3188185d89c1665a83dedc836024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea9db09cf3a50f9ee67de7e393f85a4
SHA136328691833176301f1f2422b3c15f0c42e726a6
SHA256974946552d67da8889a462a0ccc14e1cb62c58d5097e7afffab24c6fcaa61adb
SHA512ffd8aa44e2996490257e59ab72ca8079fe1c034437cd142a1840c52d0c06c3c5c4d92b670248d67a04f79abff05201977f6a610b0f74af765d0133743ca6513a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f796b29cf14387e2653a6d930127b176
SHA129509e57cc4a3a6a88f87656d09e40dc026db574
SHA256191dc6e6094e7399176d83c28880bac2be78533ee1ede035c4453d24df5d0ff8
SHA51203bad5da82ca7c5c07cdfe26df50d8ed771a59ec7f9efd6a38f11a9e51ee9545b61cd2e3f9a2230ffb138a5d5e3a3b9ec9e195fff333e60ae72c8ecdc07c2a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e2b19b5bcea368a6c2742ee244b052
SHA1f268cba821df3885ccbda276b723706eee9aaabc
SHA256037a0529048955b11b4ee1bc3de1ce0be2887e2174021db9295f8fa8f2592926
SHA51211a4544f7afff6d4ccac5cae181eac1120023ec8e06683dbe11630ab147ab0fdde3de0b9d2e6e5d332fe85feedc9132c41cc80f112e30b7014631692a8971f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598863e1a89275eb5ad1f79a68dab6757
SHA12f098181d94dcf4007424515a6b66dec92c26879
SHA2563d4b7a68356c636e255d2834847bd28dca91860d28494c574ba6689b004f19ca
SHA512bf9102fd0404264dcbf2dd460592ff9f9771bd86d6fa6c70d28cead04e97b9346b60e281d8561de245ad4941792484b094cbba1433d5febada3afdffd9efc539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae227cd6773bd12ee7f01e2a9252c21
SHA1e7eb8fcbfea726f7970c83fa2297fd62e6b588d2
SHA256e4cd353b0395d80207273e43d4214bccb05218fae9dfe74c660fca0eda0b720a
SHA512740145c7068d307969e7982145aca7c998ada7262893f781f80095f0492c7b16034a7751c0812a39c384c3915bde03a403502ddd7ff6634f4dff60bc48187856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572827428b419fe4aa678b07487976d65
SHA1508c9bd67ef42a07b7f05bfd34b2d17267c10a0c
SHA256fcc590042c74e69840a195cbaaebe7c0212d62f369b847cbb4cd0406218ef9ab
SHA512a44f6a1856544f3d5fdf0248e23dd0c8c946e63cad2b0a198dc9f3ea4b1ea86463ccef547cc80a706bbef62495c8769f9771d7ff85c1a8ad4fc98d3c55928d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50825bfb5879b2c0158adc0ab40a25f62
SHA124ff57966dc9548baae2fc6a3a047ce6d4d15baa
SHA256f3a5e06b23a4153384444d6c54ed20c140b91c3619fcf5fc1ecdb6bd024f5359
SHA51275ad825d56bac1dbe0dbac7280f4c176885fba4747e1d795939ca15c6d3c06b3fbe11ebf4869bb5b4a1941f9da52cdd4f4ed4de4b3b254716f4a190ce12a10e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551af1feb0fbbd7671cbe64e737fb67b8
SHA1a71e2f80a63ab8a603e21ed8f607af7242cf9814
SHA2564bc2afca2cf67bff142c6cf8c2ae5af046885c1c433027ab7c680e5dea16a59c
SHA512e159b00fc76b90361ef762793b26c775e3fcecc33cef86dc5f0568368e0902c101324a828e49b87b413d6f033b2df20b420453a59705c1f02f77a61920fd4aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a4294919299aa0e9732c2368804c98
SHA1b492df17af8da0519e61f23486cb528631fc1b16
SHA2569da930f3585221d1ddb9fcc6d4d6d526aab9014f5c2d64eab8a7dbc9f9dd4ffa
SHA512a5bb5284fcf2f739f861e3ccc9a372f520235e0f5ed0ba900c997fe3781c9010a8a542ce3ccdf07b85a828a5d72a7101f3886eaa56060e6e76bf1c4127bdb68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e404ec9ed5423ebe384581f25eb1445
SHA1233affcad205a29ac7ac61548ad6498d016d3e33
SHA25619036568926c90f4e2f051bba73d8e367d6c2e02864dbe9bdcc837460bb28923
SHA5121a986146513dc026d713a912b24bdd362a2000227e9632aa676eedea3bc18e4972d4bec7ee71e7d7da167aa3276201975a545940be32080c01d65e4acee942c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56199bc36a3febd17d7a1e445ec9efb35
SHA147833a9efa81caf13768a42c34056efd465b1577
SHA2568b1d715be91dc119c606f446c0c83a6b84a3d7ce21b0a46d49dbfdfb4513b478
SHA51272a648a623367a647d5674f00e8ec443c77c13ea357dab1f0a52847ea3119820ff3d4c9035066da685b477afeb8d379dc1799a0a6f271b80a5f1ad61aa3421de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b273089df9acec0861016af475166ee3
SHA1ce287aff07ed9c168c56b977ca12c2750f41226e
SHA256854ea5f11ca11b1de2bfe127b33de0b1bf465d0e8a84cceddcce552a44f0d99b
SHA51256c4a870e71a1bdba8dbe5b019cc94af50d2f8c747cd991d4c9b2b033d96af941f1e7b953431ca02818e4bc95eb9f0740a0fe9b15e99944f6285e44f02bcc1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18701d5b27af6415c3d42767dadf6ae
SHA1d32b9b9d887516bacf9c23a65b22bc0f66881a44
SHA256c74da1b0ec232acabad21e1c4f44e0ae50a4cecaceb2b508535b82ce29ba4bbc
SHA51208021591e07c64761da424eac8988a98928a56eb394e2ebaa4d067040617f81957b625aa2b5e2d6812cb0223b634d4dbaa519e41af8c112e9b54291e1bac1a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba360e7e9e7ba807b783d1dbd629c056
SHA1e3e9df5b2119bd32b18105332e7428d03c1c2de1
SHA25675281cf8fdf709cb0338a3a9058f8fa5e1b180d03a00dcaa57bc744deef46c2b
SHA51237412eb9f30f5272650776a0de82b8d4f25f41bee2367ab22a0760c6b047046749019908bcd67d6899322a6def5c6a98d07a3526785ea4d7636d8a2491d744c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02a298b39e5fc80ad70fdf02d021328
SHA1f4b0c9adeab54453598518e0c1bdd6b7d32cb823
SHA256180ae4ea293514ce944d4a560ca820177a551b0b7999b41e7d75747bfea9ac48
SHA512f6e60a1430558f765169a97499e0d32784ed5051737e147fa4f4c6fb76fa738ad4b812b824e644a3bf3e7c1dd5d3a621eb2378f28d9b74881b033bb0f3e497d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a52e100c27c2afa9b8c8b331249dba
SHA197ab08b6a6d0e22681b014f7ed0b44a6f68a308e
SHA25614cd29ee2d7a20d2e63c41656523a3d5503fc30dc9a4fde7f939e21ebd001419
SHA51257c6c73e355ed87fa7594b67bd0b1638ac115c6366d27485360a00aef07e50630ba525d5005b243d159f754243ef6e1c2a5386fd86dd4fa2068ef2504dc38542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb15c88d7adab839d06e93e45558edf
SHA19faeb2bb6513edf38d45c92db0d76dd89d070bd1
SHA256e2ffefe5d12b15b4c517b351594c6126060ec67f309347789649b4de4bec1e92
SHA512e0ebc51b1a4fb9532c01d702fe3acd641d33db434c272da3c7e422fbdf4ec0188a79e94c58a767ea3bf5a07fe131338aa9743d29d4f0e30d8bb516b2dc509929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd246050eb274e14869aa92f93d2d576
SHA1bf30a3e312e382add3525f41a0803319fa2c77c4
SHA2567f509cb3adc0a9d335d1e45f8b8f1dddb24ca1f33dd41d980341642f22119f23
SHA512fe3dd0805fb11f99028ade67f7e50ca5425639807f1b2765e5827a126a98c34dfd9c5cb4cc46d3392ec4c13229a92aa5e3da150aebaab00453912da07c8fee2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b