Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
3f0a70e04d126ebadc9f2bd90f749b9b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f0a70e04d126ebadc9f2bd90f749b9b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f0a70e04d126ebadc9f2bd90f749b9b_JaffaCakes118.html
-
Size
22KB
-
MD5
3f0a70e04d126ebadc9f2bd90f749b9b
-
SHA1
5b448ee5b59a6771086620089bd86091274a1ed6
-
SHA256
ca323e96a61816e9b15d96426e9e41ed82cea4c8b20cd6e20fecd996ffe0db51
-
SHA512
75973ca180bdacfa25b7ea66c3a0d5748bb7632f1d10f92cf008dd9c4a091203ce13404ea2482fab56004aedb1cd4e6ddcda391b4aadf6937cf03f76c67d9c2a
-
SSDEEP
384:vQzXZXwX9uOf5WZKh58+J4JBJt4UVkYe3L6uHnJ+aXQyhyigFPHR:+XZ5OBWZKDifkT3e1aXfoH5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426983547" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{453B5BD1-409A-11EF-A0C5-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e9be19a7d4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000002f11506e27047879f0a408b91b578b2677742901490369810a0eca23497bc014000000000e8000000002000020000000b7a8ff850aeeefafad7e86dc237ca77d566ffa32fc652c94a74984b2f25ce067200000007db8194e14356d3620ced7c41da3fb2bba8c549ab2632d186511e010009f8e2c40000000c463d94d73cef74d3235ec6d9659bfe0a4702c9bcb97e8f59c0ca4c25f493cfb9643421d47926f1731fb7d7da159252bd09f439fc10924ead6ce3c458ce2a78a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f0a70e04d126ebadc9f2bd90f749b9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ee514e43cc385657634259414dbd27
SHA13d0edf5540fa58021407dc4f7cfc736c48b388f7
SHA256ecbc61f7d61ef1317ff23fca9e6e4a9141212dbc53a0a17b7dd94741b3fdbd22
SHA5121df0ebfe3181a9654d1230f27cc449a00f619557e53a1e6b2f58698503eb95d2245dd35a519216add54e27da3271edf8dadb2a7a5ce3d5ef08bd1bb8d6eabdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeeaba4a8df54242234093e3c8f6c6ad
SHA133424f8ed17a71fe666fc3bcc26f90d13c217e5e
SHA256dfff5315c5f29b2dd5c1ba9d60be1ce04c808afb5082eea4ae95dcb9f1e43621
SHA5129d4b0cdfd6b70b0c3d913b8ae368f45719a03141d5c32e45eec9832e4df8ef2fad8f5695d819fda4df85e16a0bf974ada901c3a1dbf9adb1ec8e8992a684f924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7f07bac50fb0bf93f3af88861a799f
SHA1b2436dc48df6f7aadde46411972723703a3a720d
SHA256c0f4cbb3ef0769f3ec23eb785625c218cecee6c91f26a27b7b97e47dc4a23ddf
SHA512f24da7d96e47eab62d593dab6603f28997c05493578f57499d591237a84ef4d2f3958a3099f7cae16ca8b8eefd487c957fdf0036b14f0055bc4a7dc46207ecc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7eff2c8ca816b008586ab36675fa79e
SHA155e8c5efdb83a29b2dafa8033a9675d935bae58c
SHA2561073143776a346e9928a90e41ea28f311a2309bf8801f78ca64812c0cc149f36
SHA512e8ce44167cc26b9ddf9b2906389a701438434e2596cc415ef13dfc96211643e88f48876ce882e8b7b6ba99eabf782390d56473e19bbbdf04c45821b1b2b42700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43b7dda4bd3135f30e49413eb3ec74c
SHA19d14617c1dda1f023f74b17d8f72ff1d038d7764
SHA25670f0204bd045574f11fa24bbb9e6a9ed13d3bd4572dc1cf1ac4c432e8e88ba39
SHA512ee31617d6d14123cbea8eea8f3f65a5cc189cf6b836f4cb2d16a60297bf7b502a2fc1876d30aac7af0ba77d8fd433451130f0ba5db178e4ebc13b97390dbe581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63721c73cd839239551eb3aa8872ad3
SHA1bb91a93db22c43c415ffd2ee6ba9c3c2cd9bab5f
SHA256e5afb537e74015608f0a9b0c49ef21a8fbf91eafb5004dd679b73135cf20a03b
SHA512e373762565d8213b3fc902e03a7072e51d749faf504dfe6b1729a245822375a455a78179e150fd18030c5cfbade64b66e9ea9a9117b62f486278c767aad9262b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd9e4166a0981df8b27cdb3227920e2
SHA1a1fb496e2144f5a946f10fdb2b40bea9235e266b
SHA2567aa13f394a9eb329547965f3120458ede7531777f8438b271e7a1238795eec47
SHA5128a01b343610361875b2f6e235b5ffa8ba3400f910cf9c16225db5bff821d9e4e67419a564722d3419332de5d8f0c8887c4818292d5082a3645d5b1645b01b31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a8968cfaff2f38e3b4d0198ba878f5
SHA1384d9e0a59099ab08e6ab416f568f517150a346f
SHA256bff320ed8916facd97aa57df60c4e53cd5fcc619dc9b4209ec9ad07fac6151bb
SHA512fe5c70ed31339d79fdbaaaabc3659cd5e7b00cb59c2e75798c53af6ce52d529fb125971be58017743075314370824059ac6762b4c0c2798256181522fe81be84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a81be29a37fead63e1f329fac51f46
SHA10be835de1b11597c5a86d89e46e4ead06800d300
SHA2566bce77f5fe632026916c5730be0ab5cd47cabe2fb3276c3f61ffdc80351226a7
SHA51298c48d99e4b9b06a24bdd4de147528e47a3e17560498640c2a8ae447cae8cd5b5d55983bdf29e3fbb2b413f81000c1ee68fdaf00cddf2edc1a7f468f5dbe966b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacd3af9fc05f9874286527b01c9a98e
SHA1098772235d2fc5b86656846c5eb1a9f2311bc40d
SHA25696d9efe8290ac60ea1967984089016393540c96140e7c75f3e6ba58732bb98c0
SHA512f0747a6eca3eaddd692169f8cf78515537fca22115714eab1b5a5b59fb276a2c0eae1942e93058dea41dea2e0457d814ef282cbc71246130e131200464242188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbeb419df8dde648cb44fd2fcd43e08
SHA13a4e08840b07b8d153eb3644d1d46c644ef43fe1
SHA25631e98d8cc0ad9201c5d133abed898177a27577d6c25e9d328142fa4beb195e53
SHA51291dd5d23a2419345409be8644e98561f15fdc48ad9ade49933d14ea05e55843fa28889e35d25d1295c4f2deeb4e72e25169d83dd0bee6211029dd85252c98255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6c5318e5f7e35712c9107d779ca72e
SHA132bc24cfa3ff91dce3151421d7d4f15f63252742
SHA25609d281dbabb0404604349cc54b752a19b1bdc4a6da13d5134f4d04a3a8dd576d
SHA512cbb71a6b544d1eacc4f7e85d549bb4212719d223f4af889e1f6af5b2db0509628360f8770f9724416a05471d01995bd6626e7f66313c76dccf099f19344ec3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1caf454df751537f2b11dcacc737fe
SHA17d307c4a9268f4ad7652637963feca532fbc3589
SHA256a1d567731c85fad65663ad5addea71086ce604196f3f6b4616b48beaba3c09e3
SHA51229fe2eceded01c317e144adf5c763591f9664fdf81d2afc8e84b74190bdd19726aeb17b72394022d9d8038977070aa4e98048c1a4fbee9ce8224fa7fe1786de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fb5a19a6bbbea8034ce91f40922a4c
SHA1df1aa378bb2955ee703d4d03962dfea39a24d2da
SHA256e5470857f04a45903f749ea2fdffc71b5e5b2a6ca2d9f14af3a31be767d4fc63
SHA512ec770f4c97e1c683e5b988bdd4d60ace4e2013ecd9874e74c221fa16f6905c770a9621f27e73c7cbf88a483ba8eb8273fdf2e4a323260107f3f9698eaed82b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666b03aecc95afdf27a64a4d4918adb5
SHA15a6f1ea776ad90a1bfed7c70b2f1b41eaac6acc3
SHA256712fedd0f3019920fd15bb5e736b94254f4f92b6629a113421d9eb251e9ac3ec
SHA5123da34526a719446239ec9a8a3a5d5224f19ce5a6c9cf8b327c9c74aa6e103899193c29b25da6aba40bc55a185a55c6b95fad92d57feb9b6e70aab5c338771e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553925003239e3863efbe518ed0f63a4d
SHA1269e4688cd17deb9eeb8abf48d1685c9101e3486
SHA256057a0b833fb9379f1c014002cb08c7af32ae0cab757246e709ecec304598f0d0
SHA512c7d52f37ade13a13136689fb8c55d1e8466c256d57bd81f294393cfb8091f765f0adcd445fd8c87a4feedf44699fffd65147accaacc31159e44138d055517bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d33e08c9fe342a6fca2c89c0bcce14
SHA11a1fcfc9ae4f7e0f0b97c85437734a871e7c13fd
SHA25606493c0a312edbe1675dea76a71541c6add7b2c3142d94d207606085447e32d1
SHA51254c64cf18271546557622ca385148904a73d8c93ba8bec5cc5b1c80f0553ba7806732934ce0ff13a87b84d2bd1043234f9bba9aae8cdde0aa5c042d0649ffd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e34d23198b08bfda35bdec7bc72cf91
SHA1ae95793dc2edb0cc54b21a0442c87cd80934c75e
SHA256b5fb466b672b01ac4d24d66aae7846fb3aa955d8d5224866e1ff63dff57cfb15
SHA5129c3592ca22042ec7137287bd622cb942717e291e91e13a10ea894cd2e0a091fda084a49ce2b454e40a480dd72bc1fc5963ceee42d820107b60ad6d5aeaef3825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea32b5ed32de1a777f9258e79d5f4ee
SHA172b8cbe6fc6d6dd3c22f6cba43d0517cd400a382
SHA256674e10fe4d7200b075315476aee3ea4ed9857debc106161ff5c91bcf6106d391
SHA5125529ca0bc40308dfbc3b252d2cc51632f204b398faf60a116d820ddd3d03a28f051cd25fc5543e3279b8f9ea81e7d74ce7f069d6b8c4d4aaa059e687169a704b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b