Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
3871eb281252973c7039e7495d8348b4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3871eb281252973c7039e7495d8348b4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3871eb281252973c7039e7495d8348b4_JaffaCakes118.html
-
Size
53KB
-
MD5
3871eb281252973c7039e7495d8348b4
-
SHA1
9661306cfb97615c1f4e5b96c037f03fbd6c3756
-
SHA256
c4e78f92337462f750b2af943182a983d3d1ba10779721abf70038020a46f367
-
SHA512
14fa80ba4a6322d95f4bfb4d28e97328c46f17382e7937c2435cd35e91bae1a437a06b89a93cff72491161c3a3c8b299c4ef5639fbf4e5a8321e8188a822ee29
-
SSDEEP
1536:CkgUiIakTqGivi+PyU0runlYN63Nj+q5Vy0R0w2AzTICbbQoW/t9M/dNwIUTDmDn:CkgUiIakTqGivi+PyU0runlYN63Nj+qv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14D810C1-3F62-11EF-83A8-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426849465" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d7cd9ee336cc659e827f50d37fbb8f44575c4c93a259c1d2849fd3104f19b63e000000000e8000000002000020000000e960243943b0814faecd205cbf0f36fdb01ef1111248c7040e44d02ff90bc987200000008b757549f039bb6851e420687f2d4cc4e006949d4862cb326f830801d3fc34ac40000000ba720caa491fec08d480ce1341e83e5986a604c62da6f4fb6255fe17715f59be45732a2f49135ac42f39ce41e4e1409d9c611f89386b9b48144a7c2bf342b69c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d020e7ea6ed3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 824 iexplore.exe 824 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 2716 824 iexplore.exe 30 PID 824 wrote to memory of 2716 824 iexplore.exe 30 PID 824 wrote to memory of 2716 824 iexplore.exe 30 PID 824 wrote to memory of 2716 824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3871eb281252973c7039e7495d8348b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3e818c7ad0409339077f90c08319b2
SHA120004c1aeb21e01b44acb01a8dfc964ce72f20f5
SHA25689db6a87df57368737edce4610ee5ece229c5747c3ac67fe2cc9a5d401f6a55a
SHA5120dc14f08680596cb261422083b69f4d6f67e4bb3405db6091a4e7128c5aa9347147efca8368bafc37158a66e538191ad4b54c177f7f65aad156342605f90674b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2d3767f33c4435571157287a95b5a7
SHA160e6a9eb66f45c446c59b2501be8c4813a4ebc85
SHA25630dc051794053dc58352f274c3f694644fe6aef82a0bf2ab889156ddbb8ab820
SHA5125c9941420111a51445928a07d38da5d62c8004e1e3f16b46fa173256675d27481bdaa6460aa9a0b33cb63f401c11095074109b71e42a673b14275305a5d864d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546db21efcb49cb66506560fb22dcf206
SHA139c0e174a5ff3bc9f14df085221e8659362126ca
SHA256965d19ac80131d0b52ee3c5c435f41942ee430d9729744e16c8f1ac435267ae8
SHA512c0a38012d2f84cd36d7330921118423fff3e35367d0f2495b3f32d7f735bd729f31af4ad5c4f025bef36c7078b9b67d382fed390617b2fc9f437fbf16a1bebb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d771250d41c1449f67da5d9a046d817
SHA1c70b686c02b739f55ef85b665ed9d741f7c11424
SHA256f88639505571d9c02c2e86e480cec89f670c9d83f6ae50e9abf82dc009cb819a
SHA512ed2678c79387b308d521c3ca7a0ee72a73275b20260e8b0170060eb621919b58a012bb7979bcc526238f261fc94bd5834660ad222fe05677b1035c1a536d51ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef3f0c5dfa17c1ccedcefc618ce9887
SHA17950f08b9f51fbbb57c364482add46405a8456a7
SHA256886fe8639137ad289155d524cc3635595740b90875612314508cbe50decb3047
SHA51227d1f770269658f5d3d1de457af15083c7ca653c512a2a95b97575d402afdfbba7513011d47c8f16b28d2409a3e1880aa4b18b1a8d22397e1474ecfe9407bb46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e2c6cae2e88300951a64251275d8bc
SHA1efae5f55d90569d68219b8ccbbb3867afc2faa47
SHA256f6f0cf0ea7973d2791a28d525cca8e564851013f8459da53adb02a6c27f0837d
SHA512fffed770da11936de96b5c78076d2294ec290a1931071ec728a1e3228317e49a551e23eb18bafa247844f88bea83e8119959ed4829cb512e26a0fd8542bf98a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a14c75b749eed5e9c680f9f8d54fd4c
SHA10b7f2226063696ed5914e4223b144520eef5d1a8
SHA25607b07ff77a2efedc8b7cb9a022a25e8237428abdbf5cae628e137311e0a12ad9
SHA5121e5b829120989e9e0b42880b576759ca130696faf292bbde6a65c2be7182ff96e4a477fa071fe6660812cf09892bd0d84215b2ca35734eb4bbe204ef8103e94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b54e43f6dad8020d3f453e7be9185b1
SHA13fd62669bf5c4257aa07acf630328152b97c654d
SHA2567c7fb413de46bc7241cf5d563143c02ef1ce097cdd841acf3581eef5468dca4b
SHA5125d58b6193b58bb8ad3ece36439dc9c6f274e2c2582ddb633ac62d340d37850d4683021b2312c4895927002c9801e1a8ea8b982d1d1bf3ac0e76a81f240a6d871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44e2826f77f692b27794efdd154a5a2
SHA19f569c2fa3865101d8bc2d1b5b17619aab897bb1
SHA256f97543b04a3b02aa5d9a971eacff1efec0dc3cf4cec691297780bfa794488fe6
SHA5121b64198d2d2774f02bccc729d4d5ffc459ab4dcaf48399ba3de90696eb6c7139e1a1a635deb307f40d4efe69457025f02d2f918694e1278e70a1baa09f14d619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e528a96a080cbff9dd1c80732c5a1e2
SHA1c5ca58bf3a244f5e434eced370f144ac0725cfb2
SHA2564a0663cdf452015709ae49b50857f3b210432bf3ce19008a30602bbd11408ffe
SHA512bae2d6a16b9d5dd61f19d0652db9d433fb80d891682cae45fab4842aede73fa342b0eb1a60c3f77d0cf9540206c8a5ed06664fab5365fc3260f67c6d98c23f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55e883996885e95f11f403bd9edc439
SHA18a3589b4908a3dd810114ecf2790624a03471f0f
SHA256e18e1cfb60c1f330b36b9865e95229f2b64e48ca8b23f6d471960fd7eb44c36a
SHA512143a0eb3522d18acf9f0dfe88938a93334873b1cecf4a1e7236c7afd3fb400e128feda849f6e0449060a4d26ddb9d494a056a3bcddd30382295b1864eb1cc136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2b9272a54da6dfee7cab17d1c56764
SHA1d7ee5c7fab90ecef4bb890e198461d219227f9ba
SHA256aa5308b659c1efb4cf2225f48b292ad2c9dfb858aca22b09df40773bb016c0a9
SHA5128d22dfed99e2c16e20f5befbf8d7274ae4854d49dcffb5247e462b0d035ab33a4ac5a76bcdc0ddb36a01e3cf8e6dc95a064bea4106c59fbd5ce27b82ddef732c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f75c0a717099f0974749ff44dfafae5
SHA1e5602c77ef1e045d30fafc7bb4b0cfccb951410e
SHA2566065b635d801b8a9110e37bbf2defe5003e7740b4623c59db9e70e2f9853863a
SHA512e22ad30612f3d315c2d405c86e23a6cd6f3bd8a4599d97c329dce5fe2e9c7c6db5b80188ef84661a561671f75b14d5bca9692508491323b2d6ca1bcbf4f7d5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a026ceb107f57904daab530c86a71b
SHA198c13db8bef3fbf3a3183fab11956c48785e3044
SHA256d651fcf0082e9c8d8626cac263d930c328cc33f46ecef0b396f9150eb4eae849
SHA51257ed19f1e623939522babe1bb85cfa784aed164f0904088df06212d4534d9fb25cae31a9cf896f87ca23c37ce699ee2a046f034a5033782d81168472ee811147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96e197adc23688b5ee554dcb7daf1c4
SHA13518045c0ea38f8e70da2924403e37aa26b664e6
SHA2567f0daf710d267e05aabd05803800bd29cf0af66c4874a4d288ec20f55839dcd5
SHA512904f10dfef17623e9ddd705ff7e10acf01d30a65760264683866015ae11a4d510325f5c0f335135c179ecc7494e6cb57d6e78a6b368c1976ae421313b840e739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7517e0f9cd9cf4614131482acd90222
SHA1cc74fb4853e3054041587abc4afb5e654bb80358
SHA256c9d8aa058867d153b5f3726ff8d66cee689a602f3c7f244920f062a1f0359202
SHA512868a715be5bc58142bff8fd1dbda1cc371b954489eed00e8d1f1edf8b6b9ae8f974d7574335541da63ace88ab6cd337eb78c92e0522eb628e54fa4766fd65e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da817ad994f397a5ec09b6ae56bf084c
SHA1e686c20174a484c1964d133d77b7bd0e8396144e
SHA2561d2440b64e8717770b26c9a77ad9b4e0f8b1550df18f9c938451faad757dd5b2
SHA5122088e34a32106dfbc68dab66f12a0ecfa37345b42cd848d5db695be0deb1aa889d209c4c0877e6b57f4804f7304e0463269168474b11704e4fd279e4bf93f968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff98d8e7eae4f003a189b1718db2b8d
SHA1e52e03be7a1d2ee042e94aac6bbac2c6ad755410
SHA25674759b887551cacc238bf69b62806a72f088c41856ccdbf1d33b70f4736a8754
SHA512011f4ca06866471040e1149f4b97313142245a94c369013908b7ed885c4854a56c3606df3d6cfa12918464d5d0f759d1c582baf8baffbcda87e140643fddf138
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\useroff[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b