Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
3bcfc237ce7d4bc66ed61f21b51ae64c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bcfc237ce7d4bc66ed61f21b51ae64c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3bcfc237ce7d4bc66ed61f21b51ae64c_JaffaCakes118.html
-
Size
53KB
-
MD5
3bcfc237ce7d4bc66ed61f21b51ae64c
-
SHA1
e9b9b9cc825f5414c5b54a14841751a1d7190be8
-
SHA256
d4e58ad39356767004e990bf1017753579d8db7b21b1b3c7d8cbb7fc8ac85fa4
-
SHA512
ef57de7f2be5f623e7fabc7cfc4e28d49b19120eca91b660b8eca3680d7a666804753d68773441ab522fff29e1cb4deb552da3c32bcf65fc1847d5eb40540e61
-
SSDEEP
1536:CkgUiIakTqGivi+PyU7runlYm63Nj+q5VyvR0w2AzTICbb0of/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyU7runlYm63Nj+qI
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004b08ab6b95e229b40129c31c6d5cbe5a1a909be93e4672d5200755484fb72a84000000000e800000000200002000000021c84acfd254b8168c10b29a0e47ab5613b0e0308f71fe531f939841bbe01b7d20000000e63d3e1826e0c94ed162e0cd4e9f9c127c08808f9c7a48461e72173e182ed0ee400000008527054663d24c1be1dff98865a971fd3575a0ccdcd2fe803d5d943563b9384f3ed013e29584f1e4f45dc8d10939ffabe978b6d270b112b3a87a95a26d92e0e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fd6d7e0ad4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7972131-3FFD-11EF-A5E5-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426916281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2304 2148 iexplore.exe 31 PID 2148 wrote to memory of 2304 2148 iexplore.exe 31 PID 2148 wrote to memory of 2304 2148 iexplore.exe 31 PID 2148 wrote to memory of 2304 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bcfc237ce7d4bc66ed61f21b51ae64c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30baecd7ca077c5c8fb454498fb159c
SHA11027e06b5c9449f3a733b8e81a36694b4efb5551
SHA256fe493469cf95df92a4e755da7ca7e57d768e1a8711c2394b83eeacdafca2c8f2
SHA512558a9325337f2d433319eef879510fec67a6ae4ce2f0b14e3f76339bbeee069d222567b35bad3f185aad4eb336db112976267f9d7fd8e70e72a05d6e7014b8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b186fd24c1d9aaf835580ada448b0a
SHA1f495f4c20899566ff26aa19e54ccc715341c3d3a
SHA256b31a233b3a9aa17ec5e1f1d2902f1bec3f70416d373b090bd2bd643f2af2fd3e
SHA512bba68eb1c32202976f8550da2acc391f4679cf7e5eae6b3eec33c709efaf33182ec31479cbbf82f356a27575d5bb0d2b6d04ad075ac3201ce7c4ffbc71e55931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b500b204f9fc0c0ad0bbe6fb263e22d
SHA127ab7d3b73672e296f8df9c11c349c2e3c894860
SHA2562df5895bbbafb0102f03482a66f63517b8fe04e4b6412efd78e85c9a2bbd764d
SHA512d31fab89d758f110193dbdaa66bb2961c1c2208b7281d081525bd641a017d2b094ebb0adc2b1eabf6a8dfffa46aa941015b1ac6dfe5fe359ead2a283ffeec292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a034476774a181ffd02b69c066ead5c3
SHA1a113343039a451674a906e72481a558bd2fb3108
SHA256f40c7d47a34de51294dd2c70829c73f170baa0e78e8d1ee810f790c8b054e937
SHA512499b910aa31bd55158c65e25538819027ab9b42f9ef7782ca0cea36bc6b865d09054750a66a845e89773fb190443693885011f2965506e9dbfba257da6b97db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb39bb6969582bce6de2abc3c6316b6
SHA16d5f90b4d16b95d5400f90fd278e4f8df86d05b6
SHA2562cebd197d8d9ec1934d52bb39716a5bdd051748b458cea8a44273149bbb9baad
SHA5120bae8e5e4509a5b0d1ef1be289a63d859f26d29efd669a5c4c3410a10893d7d0eb129f56626ae79e353f4ada91ea90112008576be0fcc379f23747274c18c803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2823efda93aefeb36fe73ff34f442e
SHA1d83e3b6b11ee6952d2e3f7d8a291883f048dfa0e
SHA2569591ea5c742f247c41bda23ecbfe5e8f0629df7e1daa17a0c0319bff449c0d4e
SHA512bde2617e45b78f3046ed2d06323805cb269a4541209cc6a1e97b9ecd5e258d8ef70ae1214c31152ea505fa4972c62e8ef206c5f898d9ee6c5563ab8bda8c34f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e713aec2c219546b4c40095d090dae5
SHA1f46a3dc8937e873112fc370048cf4cdda093dc18
SHA25618d83f04eff774f591270a696e69962635abfc3d78ba0653aeb71336783b35a4
SHA512060ec915937571ece0bd958487fd1b6ecde1ad7186c5415f059e97051495b1ba693bb44623bca3519b6c487c5a485ccd07386d074d410b8e819c24097e105bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55013e6714cdf1f1ec1c3e791fa9494dd
SHA11f3ea9fb3b154fbe4bf562fc87fe21ec8b6be7d6
SHA256dffa650152c1a768a4a7852b29359a93543a3d2b7b1b416f99cd62bd686d60a6
SHA5129b3a343287a7ded5ca9cae8150cd21c7510d731b240a9cbf56a80cd36f7cb57dfc9f1bf647a0cbc5235b47aeae687fec40eeaabbde0c2a416e5fc53303086834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc81f6fdf7eb6d401b7f44d33bcbd610
SHA14a3a8375ce592a17f35ffbba876a4694558067e2
SHA25619481a293280299f3341d63ba63a10952d407f39bbee3ed8d650bcd0316454e4
SHA512cd7fa0d4558595c9038b1a9ef9a9fa51595c11164e8365d0a6057ba5d82026e0a17a5fdb5836b63d65e6f00781f6e55548d10a5b115fdee7324893f68ae5d370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d82b9f58a7d6fd1a7917cf82658fde8
SHA1a5c9b49775bd85cd8a71cd44336469817407e0ff
SHA256ac0ccb13d40779afa58410ab4a338db9afefae88e7c00fd08fdf8860ddeb9868
SHA512f66e3af6a3ee74f6579705ca4463b3e69fabf11bd08b8316886cb259519d372b7dac8cd5a59aff51378be2e19c7743685ebc6a94b84ba6bf0a857ebe602a6f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c038c691286a7e3a628a9636b37e26
SHA1837dde20f8bd047eb8a76001b1639a6055fe0072
SHA256eabf3be3b129e66b3204e76dfe0ca45fc85bc29ab5fcc5edc17b335f26986094
SHA512fc0ea49d6e6025325c2c90faac79bef078c539d10014edfc402e32fdf43d833d7e93cacf4226141879476d22058bcc38a5bc3cc3a105c413360e040628038034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a472cf30b5f06103233c522a2149774
SHA13d84e662ae1940a8740be999bde8a4082ce8426d
SHA256d95d2b17f3193963b869a4ef6ee7916a2d39b77b772f3b8b1ec380781ff6cf59
SHA512472359fe205fc4041b73fafcd8190880c0776906c6815e4cfce4231fdc1b575a7f1cad6345e0f9a1e6eb1a7363245301b5d8abccfea08596fabbe447d445bd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88859b69a0dcf2b176c1a85a8cb7a3d
SHA1095c3bd54a07e33d43c955b9a889b46735630841
SHA256b8210732e5225992925e5afed4abe9871013ebef48a1fa60b75edd5085ec5f2a
SHA512ed9328bba9d1ca86717d07345182daea98fcf2a0610dbd268fb9c55c77a0902561fc770b66400e8079bda4228eb9e6240c4231a48a615cf3d18fa0ef54926f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56191675e352b269335942931fbfdc631
SHA19c90d9073a0b11d1ab6144828bc4d11e05577488
SHA2564ff69970423b5ce98b9a003b4cf588e5f2360edfff4bca3b9cca3434c3d32fe0
SHA512aa7dfd97057e147f05549a31e7745e70807ab80abe74c11efe74f0246dbb1d11d745912d173fe4c734d139a16609bd16ffd8f534c3eac636ae9400b3bfa97602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96beebb90588df922bffb3e2145fd03
SHA1171874dbbd6f8ec8d3146485f269a83968e7f1dd
SHA2561b5001faa81479c7c90a91aa1fc99187b237c402f7ff261490dbd87cef7c7ce0
SHA512f92760c3c3adf5f036f5cea985a83459916d13b85bc7e0382b72d7d99891d37d9c4985070234deb3a7315f8e571132782274b9f09de9dbc31c7a4301fca59244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763e597d69e6f7fa4a43e81df16e4898
SHA12ff7564e58fa8e039b85ef765d9bdf3fffee54c7
SHA2566bd0500e8acc4723772c9abbeca78d66d7cee7ea320998cdf9a0f54304d0801a
SHA512f591404ff88ef8d97e93322d51d261e5c5953e7c03463dc8725e9dd3f09d819f501deb936d5189fb42a76bacaa03546f1b3714f8fc80fc0c7b1c6a94fd399b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39868d6ab121620d0096582856b3fae
SHA1a588c763fa127edfd9b85682ad3b005cd0bbdc9b
SHA256d09227ca9c7642db88fcc3b24a862fd16e1e7db0b5863e06b334843da91e4220
SHA5120c6eb0006e437cdbcf35523e664880036c81a3edbafaf8f4c756b570174cff619634f15f66d035ea877809b54379af24d094f77b3adb114ca34de14ee0399a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54680b600836791de9b9b86b0e68b3331
SHA11a33bc8dcf6a500f0e244db7ca37c6e136375ed1
SHA25670cdc83ac9cfe319cb031711c5ff9484aad5f8e0a6e65ac8e3d9b67040414625
SHA5125c9bbe10c3859f701ed13828bbe915ebeda3d1a159c8f4845684d990a2c9233921b831578e83ac27b62c9feb0d9cd0f12f848fc5fba6c5e65ff8c6fb50e1ef0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a45b47f384180565bea476c147eca9
SHA19c368f54ce830199fc45462a2f063940ce5c0594
SHA2569b5a2a905743ff4079a075dc6f089af1e81308820709175c9e33bf2648207f3e
SHA5126168a121768461b3778e6a03fbcb8e15d9097301e33e81c2c1e5db9ae7207697cd9cf638714b8c675fd54ab3a8634dd05b3c1a2da14bc3939d43af01785bb73f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b