Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
3f2b99b2124ed17f46032a51931af6f6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f2b99b2124ed17f46032a51931af6f6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f2b99b2124ed17f46032a51931af6f6_JaffaCakes118.html
-
Size
10KB
-
MD5
3f2b99b2124ed17f46032a51931af6f6
-
SHA1
6c717cf88a70996cd8dc08f9df7425f199162b06
-
SHA256
81b4ec3eeda74d397e98eb33440cdc968122f8d8e2f6b3260f2d5f82ed3c0a49
-
SHA512
11b9183bb93616b70232a3e8e02170471576c9fd724cff044b407e4f6822ac0f5f5b3c391d65ecee7f2c1a12cf5d6353ed17cfeda24f39e30dbd67dc159d9629
-
SSDEEP
96:uzVs+ux7jaLLY1k9o84d12ef7CSTUOGT/kjyp+AYjK8wlVHcEZ7ru7f:csz7jaAYS/T0PPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426986096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000044dce1be589c25b1b75a963fdf2638d7451cfa52745e6a62e65fb47656853244000000000e80000000020000200000002c581181e181707bfb1ca13462a0c2ca874ab436703e71e18574b8a4916cad89200000003c68d64e5a7e3bce697236ca93da32ed330b649e7aaab325adaa33288deb2c424000000093b50ac077e9701aff52d61f87ca59d1c89adc52d706e69c60215065b11ac44def48002c11018eb7caa50de88f715782afbbfa1cb805f530286e26face9f6219 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0611a0badd4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{349B4231-40A0-11EF-A6D9-6ED7993C8D5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2440 2060 iexplore.exe 30 PID 2060 wrote to memory of 2440 2060 iexplore.exe 30 PID 2060 wrote to memory of 2440 2060 iexplore.exe 30 PID 2060 wrote to memory of 2440 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f2b99b2124ed17f46032a51931af6f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d298db4bdb4f885e44355f32da14b2e
SHA1df4c7fda37e219a016200914d180617e3458d4bd
SHA256ffa2d1346d4a14d0bb2a4a929429fd66b350eb5af31840cba7999867e9a956a8
SHA51257c60c26be4d96c29669e390202f7a64fbb199de28b55fe961b767159a4644c55905cc6d4ed2dc28628d0df82d7f14f1687f853b137d44040478e88067638b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538732e0197327c72170aea7a9be446e8
SHA176e7de0165e8c2d63901353891171afe085f5f53
SHA25614f70a5eb284cf384e4905125da8bfdbe1451cd3f8918389f5b3dca79ff634ba
SHA5126eead0182b05561a96109eb974328f6ad246b61e2846ca3d256e83d91f461d73edf2b8f609fc829fc41381415827a488b9d2dfb67354829f8eedf6d0da631d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379d7b8a56875f9b0ae767e160422f38
SHA1c1c5655f521fdcd05c74391b14faa831e4144e1b
SHA256753bd281f167e0b2a2d7b90f68641ad0ea5db658ac1b3e9d87cc0036892de866
SHA51202a2621e46ca4d56670524b72525b6ee59ffddbf3de399ebf88b37efc36b5284f4f2da3e204f2c335e95daaec4b6c01ab351f1b2fa58011ad514322c4b14bed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b94ed4ff9fd47b22e207f762242bf2
SHA1164e889a265d0fd92e1393ccfbc2a69b5db78781
SHA256f73a1661e7603afb10cfad062381bff8af41d3ffe16812b24b15b494457f7f9e
SHA512554c3ecef8d677a917817216bb24d96a5900a736cdb6eb147cc1f890d8862fc72bc7fbe33c2516873f6c9c95ea3e2235ed71617fe564ef7fd394e6cff9fae69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7ff816c61247d51d57dfaf5690ca9e
SHA1cae4ca3e73a1cd2383a4020d3e9bd98e50d329ce
SHA2567edba823695d4511a2f1be4a42b8315c6708a29455fb8121347ca6789e44e7d6
SHA512f5f536f6bc7f4e1719c6f919c955b99bd7603ca0ca96f765110105a92068e7e5fd7807d77a1afca73c1124e52868ea160719aee3fb9bfc1c057debb2887a72ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543150a349b6bf8771f8a8f7eba73cd76
SHA111e69a5e62b935612fdafcc819b2c3fd681d6f16
SHA2560237de50e930767588b5115f0b24e5aad6a26c1d02d7034084805b067c03591a
SHA5121a010d3f4657900436b11693a2991f9e370fb107bd2834f80d0f4a0e4a01fbf1d8d932667c16d822b37de1708ff50d8f7688910e03d5ad6012d6d63ae0d7c573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501ef5a267601c83c4e6fda063dda11f
SHA1fa4288793b53ad194aff4d9341c80970157c2917
SHA256e452a1b2ee2606cdf8ca505baad1503e16ba5275fc8780f67d184de83749aa7e
SHA512e8ed10019fd4850440114f894d76641c216a8bce238f7d1e35447dabba87704c90aa64830122bbadafe3d1119ecbf5f47fd4442f36bc51f665558d609a7e4063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbc837e6370495ea9abeaa7e39e3fef
SHA1bf71e7778df1899536bab27236abd698f4cb7d5d
SHA25698e52906e31964405da4c5a45f53aa96f886b74415ac8b2a6e62bed51b4f4edc
SHA5121ef239358586e2757f1e6930de2c1a3057cb3e7bb699c1112cf98ed6b8a67a61117fdfe5196e1b1b05133c1b345c363eaeb9aeaceda0bebf7ef0808301748198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ba5cd62a61811cfb4d026ad35d366f
SHA1167475c03decd82a24ed815a0a3241ef80cbe6e6
SHA256921b836bec03279cad1eab2096e2a910723f2ec8c5c392c1b13d32971dce3a67
SHA512046055f72abbe7570e7be97af11c3c1b17ef9994a1b569f92ab499bada9b3c5837504ee8a8dab2e8977e856194666133c2e1008544d26e157d6d28c0fc9e729f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f7acaf2c68f66c6284667c6784f6cf
SHA19cd4b1301835750abbc901caae5dda9d95624ce7
SHA256480ff319d2a01e9285b610ea67d46c4fc71238936f6661e7d5f64362d48403d4
SHA51277919d09a4c14be51c96862d67731034874ad9f1acc7451793e7fab171517ebba3e9e510cbdaaea0095ea22f05fbfbe62d79f1a1a980d5de9edb4e0ee56490fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222c1f04f50f0e228d5e8c5f613f1268
SHA1ab850cd28c901ec65b671b25aef0b3ad4672d118
SHA2569d96254508375fa86fff8eea0e5317095a4a9835d6583f6dee3bb596d14af58f
SHA5129142b681bb8ac511b7786ab6af2e66b8e5ae1663f5f0aab8e127fab77f598be51f6db778cd703ba89451b57ea4b3449bd5e5a18f1087ded10da8c63676a12700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbcb099e59138ba0fb2ac16ba069af9
SHA1f4624b8eda67d05913198502a992242a4aebc794
SHA2563d69329176f0a1aae32157c347a7ed53054754820a96aead9bbd7a5413552801
SHA51225595f233be0766e5448c6487609e8680ec99a42fbe2ea9635026cf5b5a93fae306dda72e15c61d051812e51d622e7525e1963fe9abb21959e2e24033cd3f737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a86c9f5b75946b1aaf3f4e9e1e4fc01
SHA10447a591294385303e9cedff0babc83308168ecb
SHA256cfa4fedbd2ce33e26fc531c6e0a97be9c71e09fb8ef53aaaf18a7ea609f75ae6
SHA512087f1be470859857571ba1f0076fcb0e465db6dc9dcb01f2bd7ef5ba5531ca106fef94a8f46b6b8ac0b2758a98fcdc033334ff66b7a81527953f718ebd980732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cd6714a48602a19ba3184c344ec467
SHA16d779e353c523c0744b2a7bbabd03b760be5b6aa
SHA2563e4c1435a4767d450c2edbfab087f61e585f377d0ee1adaebcc4f6a9f510d4e1
SHA512e27c3ba3848d66a30444c8b9af3ee5ce5adeeb5b1f360ff5d7a1e493ee5586222c3d1cbc0038ff8d93529dd7b433c94afdfe7a20c67b7a06af5ef8f57ef0df30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504e74801ea3faba073994cf05d283a5
SHA18be73f62e21998d68ee04e60f6166a1548ee075a
SHA25692241d3483b62fe80ba17675111345131e197c4e0ac9650facb225804830c579
SHA512a4e30d25a8845a7fc438f497d58c23017e31d386c1d5c1d7c04e1b665f66edcfdb0b44877b9ae275a8e578c3513efc4d2986a50c185d05fd66c756e810ebb0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ddad33c316ed8739fe4411a85d33f4
SHA112a7addadf38c3b6f3df242be19db129e778075d
SHA25618d0af20a1dc4ab32e2dfeb5fe56c782d09c27e278ec614e78bc9d1f2078f7a8
SHA51235d4579039fc1fc5a99af69b33f54566f37237ac16538837d851ce9caa77a25a36ac5a31c8b18f184754760ee06d7222113e020bc2004652b057127316464d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478c62488ef92365ff3d298f189cd955
SHA140892891c04b86a76e960a7e961c7f0478da7822
SHA256e647da605e3bc1ccd2fb7fb4c6f39b62ce80905414e5b3c898c5013a9df6d0f5
SHA5120e31975d588d84dee63c04b8cb8e691fcd1a0b5d2dc600cf70b01dab10201f495c9e678474989c99350d32bdad6875bf6fda1b6c7d6ac728ebccf6ec345227a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cba09dd33850f32f64927fe210bed8d
SHA13a064b160c2b4edc13eb2361e256037061072f53
SHA2560a2494cc707bc7a110e24b88bf67cc12e8fcd41b4625adae9bbb0493b8ec7611
SHA512f1d8e7843f7e96f50a7248e3017602307c95f740095d6d611fe58744b27e1c3fd8297d3f8ce0aaf3162b4385c3104864f982dddd727be5de513ef3ecc8a81957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffd45312f81d3633b602ef83032b1fc
SHA1d02f6002a236b14f80dd997f9233aab208111ad3
SHA256687c9adf0b05ec5427216013c042368e357dcbf9a9b90852e5e943ca5063a6e3
SHA512f8b236ced248ec568ed6bb7f03b1651ac0dc034973b3fe940994b38ef5a16cb11b08a6508ffd8fbf54315b464fb69abc0d35698c68face773afc879fd08bebdd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b