Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
3f31e4ffa36100319c8cb4a13e0a20e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f31e4ffa36100319c8cb4a13e0a20e6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f31e4ffa36100319c8cb4a13e0a20e6_JaffaCakes118.html
-
Size
30KB
-
MD5
3f31e4ffa36100319c8cb4a13e0a20e6
-
SHA1
4ebe934780f16d7dbdd4291c6426bd22009b6e06
-
SHA256
92a52d7e16767501bf0b7c949d5bc0f0b6ea132364045ea54320478c9d53e6d8
-
SHA512
9258f62990f49a922c18412d6e4d37d99df204b389a6291be706b54b34b256c4f7303afa87c5f91ad44a099b544d3b109f631191b5df4dd1a50ee3ed1da6856f
-
SSDEEP
192:SIfuAJvAknCnRnQnGnJtrtstEt7ga1iF6PZQErivWFIj8Qo8Qgm5hJaYvRyZ6Qwh:SIVCRQGh0FsNuNDjxSUC9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E04DCC1-40A1-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008ea95efa39da7f4c3a0ef3591142aa89432e4eca606aedf02de9a772f99c2b34000000000e80000000020000200000003559ef0933e3926891b4936ddf99d1b408a74f0e99d687476b5125053ecf83dd20000000d2d3e95c2ddecb6feb8ebf2a81f8bbab521794301ddc7d899a69b7853fc359184000000096983b87f19c3b8f319fcf6047decab292e883f9ce32f45e0b06f14b39db6a61a0279311f5a7955bfe11fe358418f22c5bba9a54cfbfbe7848febd07bfb2ea93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426986596" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ed8b32aed4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31 PID 2712 wrote to memory of 2916 2712 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f31e4ffa36100319c8cb4a13e0a20e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6c3e48dd2840c7b84d30702182a598
SHA19975de90fd6230cf887388e38adff4656d2867eb
SHA256882a2b98cccb6a5cc9b2ffe0259875cce593cf643b23b7668825b25504986255
SHA512d609bb6b957663e9fe5378e1b821ce93f7124f5bfbd7d01d6b73689331c4f1a6787a59b97c169c594c7de175bf38905109520d0f234fe7cb8905f035239fccef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c197b934d700032652815cef7510ace6
SHA1f993dd972ef53d0168f346cacb2e65f18f905163
SHA256f329621d71cadff6b7035178f03097d9060b4164088d0db335294282f03889c1
SHA5122a326bb57c2cd400faee395da3630a905380956aaa91751f971b713249489f376ab5e6006160b764a45a4fc4d3424232f75addabef49abe77e24146c15e19bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b066bfd5f211dc86109836c0805d5fe5
SHA1d21d659aca8170d35ed71bd71cba5cb5bcfe67a6
SHA2566966d268737dda97c73a4085b26456088dbed88adf803fafc2b17e4033872db5
SHA512f69d98ed8e1c50b164e5f5a976d77b985aa3284668baa7e5f4a54685c0850255936395ce951043e56881d52e37ec65cc2da0acb2ca785dcaf47272a6f58475d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7add07c703979b15e7eb988453a953
SHA16f122f93db0fbf4ee91f29c74d92d0d1f674acbf
SHA256abef6d3c08b77463e87b9a98f2242dc67772bb92b1482f39ac45a1502bfa5f9a
SHA512d0a0c9b3dca00fd1fa651d29fd3a72e2fd3572f39532b527b82662c0b4b7e160ef4be074605dbf6f4be796746260696f7444ffcc4cfc1c58b26c1209e0be63b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaad2fbe97ce6aa1191a2e740e06ec1
SHA1f7e65c7cd5feeccc8b4c06d91cd88ef131444b46
SHA256c859992d342ac60f99f076464217760b2c7b990f63174c6ccf9bbb6eb88f3da8
SHA512e6cda61560aa654a474c9f1e277e7f97aaaae4cb445297ba8943b0e5bc5da6665c6bca011dc3bf82d44de9415d61c7604dda8fb7b08b7463f53bf9350c9a0657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568af735ec560130b5f0b3712241b168b
SHA1b31b128b763c7593fb25363a5d66a78c5768ecb7
SHA25692e594370ff04ee358dc3b14ea4d567962810abf54a3481539c7ed14e46076ec
SHA5121401b71da9eddfbcf72db75e356e14915a5ab60fb5e27ffa8409d4ad4addefaa3b76f4274f15b43f90af5cf35c736619530f7ca49934b6cea27f1c14371fa30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c83969312338284b6324d8db00ca43
SHA10048fff74ced277582ed86f665b4e434aad207fa
SHA256d189165effdfdb9ff56c6857e5ef5f17d2295c77f850c0d5b28c11eab9012027
SHA512390ce6b9a9eea89b5ea5ab466459f0e82f20b0886f9b24ac28f477aa351646b3855922ae9606ada471ddf3d527b2f6f536f3938558532d1d608cbb0d52acebf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12ec4401ccc62f784877a6885819523
SHA1b19bf938616df578ef5d399c1503ddb8e6ef39e6
SHA2566ed231d9f14517f80f196ba4f288059c7b876f14b78f93f0b1af0d4d5c07fe55
SHA512e83022c3b012a932bd6621991340701c01f745a80bd1805be7e4bbaf2fb883bb9fe99b89fdc7b45db7cc682ebd450ea69f42f06e0cb337d85edcf78ba0c2c59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085a5efe1c9991e312b5ef631c46190f
SHA13d693df42571da3aa180090611321705829ebae3
SHA25665917df99abdc8d53bbe4c1fde3dbc59b7e93cb283951ac0a054548a31ceaf3c
SHA512991de5b41c0cbdf0b277837a121069f0211c072f6d4845e51e19b75d51b78e286b2138eb0a2a533fe15ef63c1cf953db7262ca7520e7e12f4ec0faa742bbf673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647e0b063c608e0c5cfe599c192726b6
SHA1876ca035828f2100ca2176bb001c7950ac3d4c90
SHA256398c433a76c71e4e0e8bc35286b867284d68dc3def9dc37b4fd3f3c39f9a5db6
SHA5120b98f457d0f685cea083a7d0386c0c6bd2c5d2739124cf0315d6e72b22b04ece0c8f9a2f42b3059779fe906539e7e2e42b1f05c66f14b22097bbab5beb5bbe0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163eebb00c949af642baf9cff9ef15af
SHA17b590533a17bd0e830688614812798132dfe3c6d
SHA25636343e444679280b82cbbc08bcb673445dcf7846f2813230c4801f05ebcd3e2d
SHA512766ee37576f8015ae96aaab617b1fa0563e6abdfa12d4d8ccdcdceef134002fd8464370fe70c40075abbefcd9dd3151a48c246d9658c958d78eb4894d8cffafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688168b8bd930666c8062ece4ed7f1de
SHA1329929b975cc0940b9d0fab08f46e8378c8f3882
SHA256f7d980a350ca185e5c1fe2d8a71d6e8e40789fe6350b582c80dda58439fed1dc
SHA5122706d1089a550965067cfcd4937bd2b0a0f85699ad3134cc39f0eb4df2585819f42369894f1e8cfb5eda497453d5caa00751a7ef58196b41e25242f6c46f7465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55845c08e917a66c7f01c846251260460
SHA1fc43ec64fd3dccc697fc90fed4b86fa5da4993dd
SHA256908d21cd99e7803cf68a1ee5f1a3146260d3f5f1227090003326b2da62d17f9c
SHA512f5f7250a3cc357d1b4afbdb6dc7817de3b1abc33c1f8ed05ce69b4eb34aabe3c58fec3def424f8589a2e9d8bd6ecd9b67a30fe6fdfe09a91105a33593ced3a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597df5b189e3410a94d07b57bd3fac6ef
SHA15741233ec8f45f508501f76c992882a3802c14c1
SHA256c012e1298d2e7ebf118215fd14659e5c786d034ec797d8873ad5fba66c896350
SHA5124e5b48fbc672fa087e05baaae4d10c27d5f7f150daf46479fd05b4585286356b34d2c5bdc67e2bd957da8efcc2a1a00c73d85ae2c519a37b7f68de9bc76fcb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2ca5dd5311343b35af3bb951253250
SHA1a4aa6171613a753a658553fc52bb5e6447f76589
SHA25653b5dcdad74f9d85e11f11b5c1237744371c34e0c46f29e75be73476edf13f2e
SHA512633bafba6e345a92f663fcc9e16c536cfb7409657dc40d7a6596bdafdaa5560df32c66689d9b2e52397ff7000bff1250bb4f151554766cd2e67409316f42e953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed000ad69ed9e1d12e81b03ec6b0bd5
SHA10be2fbd1e9120603bfd04a2abe0afea6fbe00835
SHA256b94c0aac347ababff766ab91cecba876cc2386cf0a2d247cc28e9dff8204adf1
SHA512eba19a2c3d299a3ee8ea54ed93f65a16a799a3f477b793d072d9dcb8d127f9633f8d8c191993a78fc6f38aa1af5ea73b620649e09e5cf0887647476beb235537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfa0d49e62d88ee782f265b313b1e73
SHA1c70d8442000e2db498276a313f061dee3cb577a6
SHA25639e804bf2b801def907a85caffa37b3f121ff4c636f556cb41ed00f6e89c1ee6
SHA5124fa94f432d3c2cc066cdf2b000084d6ee0ece2bdaadad5a2f12541b31af358877c63611996661c84edfb08bcc17ee9359e907969e7223f8976c53ee387b078f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc542c4ae785887c1706747684b2cc7
SHA18864f1f6473b2fbdfff9b8fb321146207d5b7d51
SHA2562b64914cd6f2423328f6608275d9c9749002b225580db56a4384a0dcfdd3792b
SHA5122206ff48998ee2805784451625704767d2b1e9ed3c98b876dcbdd9be50cd9d7df76995976c82ec98ffa170ed5556b33f829a55984dce2b2100ae1f5f5e95be24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4a4a112ffded0fbd83ab21662cc4f2
SHA1ce108535e1b91cc97b958db17b75011b6692c08f
SHA2561a03c422625ff1ffbdb2837a91d858855f688e8c35ac08d725694151c0df790d
SHA512c5f53db9d665e9bf20227548b3bb670d27a506a55f05cd7d7fe88969a515fa2487a26cf6baf739f3f13a159d87da7afedd304adc14445b9191cc5fd1d1bf6987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8f2700e4d794f3e073822d11dbe42c
SHA1f8a2584c50a190394a0099c9d7c8e2ed10059e54
SHA256330acab786e56d5d0ccf2ca6994dc82c04fb3a0a36739e16cc7e47e86b9939b2
SHA5120879e1429001465e41d148057256b411f98fc7f23bd7214a1bec16051d46ed3117e207ad73b28053282854046dc7dfae59ac770707c593211fb8d29a36bc50e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b