Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
3f3c4307bcfe7fc8540d0f4782991148_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f3c4307bcfe7fc8540d0f4782991148_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f3c4307bcfe7fc8540d0f4782991148_JaffaCakes118.html
-
Size
44KB
-
MD5
3f3c4307bcfe7fc8540d0f4782991148
-
SHA1
afbe2982ecc87d63d07efc2ecb0e0e3afab2f29a
-
SHA256
a860e1cc54567c635a30b3631607793f4a1ec74de0e21d7873f14e43223ac957
-
SHA512
8ba15e22caede23dc7edbbf4ea0157975d5c985ef7b61a3ff1cf6d35c361b9393c701c78cda6ee918eb0d5111e84fb95027fee865b5046621fc627006187a255
-
SSDEEP
768:SPpoPM/YgLqbxtbcu2EBNMS7nqCdHgR50nuUyzMnop+vgw8Hmf:SxoPM/YgmbzcKQSuCdu0uhzMoplS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000004c8ea53618a5e536e64c7c2058c2e706e7e9a440ef290c669b20cc808cef9ac000000000e8000000002000020000000119ae62ff8d886b6140334b690a30f5c210d44b476592e4262bb2a3e7146170620000000643db9a08ccdfc191dff5e728846f5c0e6e4e343a85ebd452ed2f54ac96dadbf40000000e0158cbe71a1e63b1f5f7ef73e5a548c6e80fb3bd1dc7ba7e6e717c19e0011f8d391868268400e525f30a0df02fc9978fd1daab3edb21b40b8436fc624fc955c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e39c8eb0d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75C3FC41-40A3-11EF-920C-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426987497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2696 2064 iexplore.exe 29 PID 2064 wrote to memory of 2696 2064 iexplore.exe 29 PID 2064 wrote to memory of 2696 2064 iexplore.exe 29 PID 2064 wrote to memory of 2696 2064 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f3c4307bcfe7fc8540d0f4782991148_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4801ee524840b250ae8dfe8dab8654
SHA1ba889d8f6b6baf5513e413c9d28d93a5cbcc3f16
SHA256dd484fe41bb5e9d42e3e25f9682dfaa6ef08c29980a81326d512a187a5597751
SHA512d3caa968ea55a0f5adbe37d933540dfdc04a8a277f8600068ca7e8d0f6295a296b1897343cb4529d62634b2bf988fe95adacf8d22a408b75300305143df4ed51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844be04790b6908968ac4bef807a9664
SHA1a2392b2210c30e87c66c13091389c46ac7c1af48
SHA256b979623f7996d1d03f788b1d53e3a7e2a3cacc84ca7f04da7a8768cffdcaba2a
SHA512bb4269e4603cf3fcd040b6dede2ecc8183d1d2234da29a645277946d2b3d7dcd758dbcdb06638b632701669785bb7db99bd587bbc06e07d1d18081b02946fe06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2401e0479715d8a7b0da64cb96defc6
SHA1a93b05b8baa0459e1ede19b5abe276efa3c0fcf0
SHA25681c2fcd81f17f1047c1ee13c9f8b4b0a668c3f48ae1b96c91513e55d2ed52c8c
SHA5128728daad24aea65b8239c7433bd1aca99c3684aa1b0dcb4bbae7344749c8874c2a47a020b7a5a46077fb99c9fc2a4d253797336c68578e8f83f8dbddf8f7aadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c078076469a2ce3602cb9f9378610f4
SHA11fb9f16e318eeba2e291836e9d96b0cfc57382f4
SHA2564df986204c38a6894e8451a8f4c85aa4cb52acad3e5ea5bf4bc8c87a40504eb0
SHA5125156ddedf55405160d2c52425ce0d6ccf8f997fc2e473a7a327db96941d5254364a9b97979357d7607532af6568256e6a03fc69dd7ca82a9b9149f47a3570bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578348df895d8b4a7a96509ae75ac3f47
SHA1ea352869b368fcaa9ec416970eb04a5b00ae52ac
SHA2565f507130c7df5d2e99692e967e386137f3faf385cfe46167f8f192bd56f83ee5
SHA51229e2ebf9f548aa2175f6bedab286234dbf58f75cc97ecd466c8d6888456978d0ac7e4efd8e1078c8ccccc6f3b00837ae43459c59b556503e5ab8475e340cde6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f649789d4d01d2abf4bed4fff1ee820f
SHA132013ba4c0f517d639275f3087d768b9b63cb315
SHA256e76a9a97753632607b18d98cd3259192ea7b768b32a9ec240db02faf7165aba3
SHA512f5bbdaeb04567eb290bdd29216b791023db9b24978780f4be23459bd0b9c1e0bf912782993502a434fe1732204e647317555969afb5592716c35ca11c5168f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780757ac27cdf068dda8f7033b1f20c0
SHA14c14595c27f5f9d68253391d13c93750df620a91
SHA25648fa2f13d6dc66387bb35445026f589d6e3c0d2d1e476cd6f1395c4cd1ce62c0
SHA51283a38151ef17fbd75fa54bffdcafc8ac3d6bdb0eb4833c6a66eda8ceb87578fac2d6c586933f890f5f33c037da4ca17a39fb17743ac9683ede1b493f0d020800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abeeb35d0d987eb392fb5ac2f2d892f
SHA162cf7f65bf51cd1d8f419ffd22aa02dba064b9f9
SHA256ff541e93c834aa1d31b7ed20dbbcbefde973bd814e6dfdc0f2767a0c3bcb698c
SHA512dfb98df3bd4c5b870c8e718729f3836c0b39b14374509e09a4c82358ea4b111f167baffa675def237f91c6c2f769104c0d456654df1dcb2ff0964cc3dffc121d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df80b7617e39cd66db766260fa944092
SHA193e69ad39f0ccc102377007e6e56d0c78fa2cccc
SHA256cf1a9d9bc6d1b87a20a7fb6cf6c6bf26a73db8edfdb4b3cf1b27bf286e92c47d
SHA512767bfd8fc9ca977cafb8b5c7dfe5f2f8988960c217feafe3a2be2bf85547c5858c558dd8b4cb390b3129bb9325fc09a1c0b941f4cfdf87629aedb89317a6ad5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcd17d2fa37aa3ae86e9a3aa9d9cc44
SHA131375b73914ab2c9b529c4ae1a5d7c5b6a71ec86
SHA256ad5eccad0b82c74618046c1aafb7104f2537f5e57e36e24107b49d5bf99802ea
SHA5125c574953350a0a02b1d2dd3a896a34206c9155b5c77beccacdf964e45630daa49c26c6747cd1b414648ef6aeb33ebc4231319ca448f6bada1d20adc929392906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0caaf138008ac22ace3e5cc98f1e9d
SHA1ce55fca4379224d2beb61af6dd2fcd6670070f27
SHA256141992cd6378a1d8ffa7058fcce41b274908290268417c4b36d0bc22b57bda35
SHA5120c4d9a4a610d202fc1c7a1a0517fc9920e65f35b5edbc049c462f269d94bebcbd730ddf4712071ac942a3bc449c926bdcea5c8eca2d151b2d7c7bd5bb2c6ca7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2e816e8c26d900e9c87d763099053e
SHA1e52049fefe383502297f44aec13edba4accfdb4c
SHA256858cb937ad9394401f560b4a725b8985ade26b3645fcb2fad2b89efae212018c
SHA5120636b1f025dacd74ec7700229205966e9b5303b82ab9039e638bafa1146f2d525c2e6ec3eee4663b7fe4de9a35d463e624dad1f34633588cf6cca378e1f6d3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505abdea85ee0e94f5ecc20d5c7da02f8
SHA148e17b3840fe47dec7e95c7380eeb034d4341fe8
SHA2568be656b583d948619ab20c4dadd4419d7e8e89f4f36c3d8f61fb57791bfe58de
SHA5124b920997a981f7e169d2d8e096a6de75f3881831c04eb4d2e3e08d6e1481bdc161234ee1dd731a0e9a4ae4ffd7d59e88d43504c6f614228a2b1a07d6638a3316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974a9bcfbb30b8fd7636096f5449416c
SHA176852b5d327f1f4df419d9e56c9d27878039249a
SHA256a3905c333ffcce9423b069516fc38115816a5ff3e217944930d824be6d4150cf
SHA51235e9e5c388f7829fe214e133525976bf0568c8bd4c04544adf263b0e0b9b8474d05ca5af764f1e44b5c447ed308dfd6c13b8f347f741b6dc4ad734e0d824e31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a78cbd200ab510c7c9c5411ea457bc
SHA17b46a45feef0da6f9d7c529e5e1d16bcdf25c933
SHA256e0473bccbe6fd650daa7eade6f6738111671498a5269a6837e8e7c80aa26297d
SHA512c3a84e382ae9aece0f2494d0484a8e329b9332b5cc2b6c28e189cab48c2664d490ebe4cee8a521caeddad3f92d56124912317dd525fdb510c1963185b645d5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b507bd01a9e8acafcc987015456f93
SHA117fe97283ddb87e6d1bb67ecd2b74cf437978c44
SHA256aa6af31e4f3a34d0af93e10d034f527070291e5f92d6af27d2047b9f1e018942
SHA512a815aae951efc7001cff423b6963f1db1d8301689ee551562478f272e0d39b9603d031c91361c3502c88649baeff639c5c9143280bad593bb1aa3891a4eb22bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff1cdbb1c1de093e57b3a7616f03073
SHA110376557bbdfb85e14451dc143ebc135b528e6bc
SHA2560dbadafa5e333a05f7a815faf26ae43a59b1f4c38908143d866a17b4f5106d70
SHA5120c67257003b48a33e476eea6061aaa4c1e7027c2eb6791b0c6771d882a0ca54dd225af70ba666032a3044daaaec8b396deeb60f4a9fcc6a13fc90891f0f4d66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be87674310d41e74bbe64bccef241159
SHA1127f52012532bb63e1febd09deddec26c89e21ca
SHA256987b3af5b1ec0a05e16a29ed2aa1915c7544349d217c44b8eb513024c8e3b61e
SHA512a2d8c3e254b203de2e28eea86d49742a7827b6f4b87ace6419db197e65017af76bc0e57444f769cdcd0ce32a891de83e3246b328305202c617ea574b130198d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317662a38cf040552d591e287e01c96e
SHA1ad2212e5b7c4152209e78c3a4237644904919404
SHA2565c621a98cbb46331f3be982db00a267e3662d182253a25a9cf3293b71fa08f4d
SHA5128675537f3f935f8bb5199b76dd0b25a0067ee3b9d43b0d296fbc7e9e87379619ea321321b5c150d7b051b1ec799164e3ccae44a02f8098e7acba23a732660ade
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\jquery-latest.pack[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b