Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
3bfeffc8a09e39aaf8bc0c43fd69cfdd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3bfeffc8a09e39aaf8bc0c43fd69cfdd_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
3bfeffc8a09e39aaf8bc0c43fd69cfdd_JaffaCakes118.html
-
Size
14KB
-
MD5
3bfeffc8a09e39aaf8bc0c43fd69cfdd
-
SHA1
bedfc05e4e71ea1d32ce07488f28753bec3c47d0
-
SHA256
a2fb8973b69197f8235324d71a5f2e9f0251b57ecb36606c9af438af5b393445
-
SHA512
37fca6fadf339dea2b1421a35e4d1f4dacff7e8a2129dbfe346452a02d1c882232ebe45e5ecd9d93c69a4154626699740c7e486b01bb925fcdf94a3be1456318
-
SSDEEP
384:FUMCpC3w94diKUmM6ck3NKF75UINCpn8tC:ey44dipRkMdCxZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426920661" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9B59701-4007-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008dad9416a8816ca338d99aa38f089e49ebd2a650de852fe335cec344148361e2000000000e8000000002000020000000881462fefaae3fa00bc75ecbdb4b2d935b50ccfc74015faa45f7b910fda73f9520000000fc398a2854ac66efbd870d14cf791f972f8cb82bf5a357027f4ab02edc2939174000000022d0ff30d25c616026446fae11b77af829822b913dcdb83d7eb1fde76ce5597c27fcabb0791ee16f8d2a46824a59e66aee187286bab857d8eefba4a16528e181 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d19c9f14d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bfeffc8a09e39aaf8bc0c43fd69cfdd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5868a68400ad71446b83f8a32c45656
SHA1aba5dfdd3952f9ceaf49b21436a5d2fbe9ce0946
SHA256d6baee0ccbca360aa7c1e45aa55508b6d6829042ba59711099c3c241693b6040
SHA5120fb3373664bb712cffe0989d1cb300ed1ba887ea0b35da094cbc4667164812da708fcf417ce67192be84ecf22207e17b23eb72923353f6bc1a26384808b0608d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50bc83e0229d5a4c94e7b39ad3fe7c4
SHA1ec67e6e227200a6b567df1404d1dacf947d5a683
SHA256d30a4d6a861242b29626a9ee88f063acbaab3bf2377cfb3901e052ae94518191
SHA51214a0a4e7171aaabc1d43b93e15fac349aa2f756c4235782541bf8819f0393bcd844bc88bbf5d01eebca725b69d60e509566690f4588f1dd155af0b3dca21b8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5417d03175358738a06b4346853031
SHA1671c8b1a8346f0403dee3c2b6021b58b90482140
SHA256e138e155a96216c7ce69c84617a97749571ff9fe25f6bef30ab858f80ba816ee
SHA512002fbfc246fd0052f799264575b42f08058fed74aef134d82b5e155c29ef797e28f8f8d1d5aca983f44e8f42d4a3975099c4e938a7c33a34bb78671c47989868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e17b9b169a6c0753845be093ffccd5
SHA1b76d7002a1c8f2a8d825bd297e2783f29d82bb1d
SHA256a8f230070f60acd44da43006f28575cc1b2226e496c90e366ae6f7f966d9db20
SHA512244d7d08928a1a7bd06b8032355067189912c8b24cd8af64ffea30a76a10591435e20fd1b78d271c6eb85e1b9335cf368a2e613e0379bc46be8ffe8caa0621fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8671729dd65d891ac16be05bbaa3b7
SHA133b9e16bc0d2a0ae0c11d699e349c5ad156c3a0d
SHA2567c5ec03ea396b13d7e8ef89e7f79df3fb6510b7ee9abc68c91df67324601517c
SHA5120e81b1b7e8977527cf080b070012c06ae50ad206c8e140e64f94aaa20a6a750f8190c5543080f49e9d46ae31b7c3a1689ec7d63b42ea9951cdbb1f03563624ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8ee3e85690689aec3e850ac2ca1cc0
SHA14456cc4dd63b45cbd49c6be8b97bcce4cf595b48
SHA256dde59ad271c86f41aa8c053438d30d30fab09f514a581af6f412e60c82e2fec9
SHA51219051b6f7aeb8216a65ca8aa10932d19cef0d10c379aced2804f49e914d2e42fcd2b91143096ab34df2f4c193367407b59b0e1da9bc5458b6cb2da70bbb58880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a175770c1495118500fafe017c4df6
SHA13f66356a0eb578d1b445afde3795272c466740c9
SHA2566493d811391953b4382b51a98ac23ee9fcfeaa5aa5e53fce94fa7f88dcd77e75
SHA51299a7bea0199d7fb39543b5d295d0aac696889f7227ab8de376c4af15aed2e33cf6653caf212799a5ab5910572526210cc1ad8e5eea66833fe941c08f9e01bffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd8067288dd3347f64309c653fc034c
SHA1e331656cd2ddea5b5c629f1d0eef9aa9c0c983ea
SHA2566964c576efd5774d6cad5dfce2e5d80439f41fd7206d18bf2b187f74ba40ca62
SHA51260672056062e2d747090c33968c7eb69459f9ab8658338f02178f9a59136bf28888533376c93cbdcc19eeca9e6e3dc64871eddeb1e458e940504912d6c49f3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2666f4c249396a0f94d0c8b3b3ee0c4
SHA12432e435902fd29a02bf01ce24f3359fbab854f8
SHA25653ce059c8477afbde9121be4834c77f6ad9dd443be56cf4d5d7181295f2be6ea
SHA51273b30bc44e526aff51ca60c16cc4e28e86b07b72057c11c49c2928da06f3b224f133b794c41d95b0839590ab40d89422923263aa21ba6d51f68b022c3a21537e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0878526341ca789acc82cdab0cc6d82
SHA1fd42fe3a21d4bdcc348fdb0884be729373425748
SHA256b719c67f8ed3bf9d84f683d28a27dc7a72b4affe567f7b0e509bb101e134cf74
SHA5124f92157328cd396d2a4e2b8f52bc869a09f687cc72324a21c81dcc9fd2fba2ea7a55d5e3a9a1b5f72d99c6c6c460a40f3a6604039ba325bf3305fd3a7b48c7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b604bdbd7fae06bf8738dd7073b63f7
SHA1fac695549e0182986f215aed790e30330f38ffa5
SHA256a01140d63d6b116914aa5f9d6a3d0bbea01e271e4c73326167e5d4f19052c1e7
SHA5123b912745fce7a4a093767cc43cb4cef587369bdf2058b8432d6a326b4094351bdf4abb0bebc1154db93479cbbe1cdce4498c5c97ae98c174633ddb26338bf52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b327f7df77638a59fa2a7d5b9774a3
SHA14ee3ba946f0e75ed1a10c85fc534159bbc7191fb
SHA256b1e5eb59ef45ea278766202786658c4c08ccad76eb64271c20f1a23baae2bf13
SHA5121398d411e586816aef18ea23644e3c84642f525c59fd285bbf6d0793eefd55174bc195ce2b94992f4a3612ff867a912e1fa804b9eb81ccf606dd3d8d77e775bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82748aa55223e11853d9ce568d2ef5b
SHA1492973a6656de52d55bfb6bafc3d2ad8314367ad
SHA256e0101255262af12d04542705902ee91707d23399bb16984085a5db67829674bf
SHA512a3eef3bd18cb3d2b30623eea546f7b02e41a820d7286791a16d5c5aa6151b1a404c7a32fe5d5d7c5ebcd2adf99ad4caa205c95b64f8a88b29701e0df9697931e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ee34b9c67b06f81df7854860f40609
SHA1b70a47565b32d0ba7e25d94dd223bd84737803b8
SHA2563f4ca35edc45a1dbf49ac7ce8bd23cd559ad4555d3f40d9ce2cc6e16239a60f1
SHA512e2d5708dc5f1b327a91031c9f9c01e52f1de440b1442c76a6c7e43bfe17e86abd9709377cf575587624db01d5c03f397b94a992d9d975ef9e187dccb3f9b00ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208677ad656c954d66fa79b518bddc4e
SHA1d1aaf1674bc2b8383cae92bfdf4badb0c0fd9942
SHA256fd0b39f6b43aff92708568e174c009353b5bcad65894643c3931bbaa1d6ac9ff
SHA5125d29a5078f16ba29a60ddc4c4d4029397f56b630ef5fe212ef9bdddad968330b8263efc0a55bd40d6cbb14a93f87d47a1db6e9d881d9e1cd8a54948c0b1f6005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c1430082041fb5ae2c0bdd44eb55ac
SHA125363ad996d7fedb3a61f889e9b3f0347e2b0b0b
SHA256ab768644aea4ed72b748843444dbd32720116a56748cb197bbb5d5f7e4be8734
SHA5125df4fd52412e72494cbd3d8e66dce9a2ddf17b05a421a435d866a6e33f814f1b95504827297d1aa72a9f9c84635533e173aa7f8b31ba6b566cd273211b2e3309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ab0f74e13d0efea71335aeb03246fb
SHA1c8d367bd307ab9a0735930fb1c63cc6e95c58e25
SHA256d3440207c41288f1dd322d5f38fb1bba956403ca94e651cf27127f1259588a6d
SHA512549134aeda4248be8ec2c04890698fbf92e7dc3f26c167ccd52027f86b698084be147035cb5c73238d4247a747f76789c96db1a6b0705e8bface8fc0fc543965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aba779ed6a84a846e47258fdd3348fd
SHA100bb3eaeca55fdac41a81f3066c727793c67ed6a
SHA25691b95e1f7ed96906ff27c05cc75a09b03c126f375307b92c56d171fdc148d294
SHA51247d0403d0a2bb7e672e65d5887360a7413f3a1708eec6a7e2b0065161722f0c61675d4b7a2e78b0e659464a731f923148a3c82e9326e937115c07cdb09ecc3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d423d39fb184555a3e39be5e3c774001
SHA1a7665403c81bf1327532fc739ed99208c1397658
SHA25662f7421a971460d5f26256331d3060d530b653ddc447144713b27f84598f557b
SHA512f328ae8a1540a2074a8643a7773b067293cf28bfe815d36e728e3d7312952170a4d3734efd86aaa25362ebc3d4131fe6fdcf7815f8e81ffbcb1d55caad528a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1726140a1d827c639f62d7cb5269f6
SHA12a0e7f1e22ed9dcd7c5822ae65d40d0bfc2f9359
SHA2563752883b9c4f3b3825c8c041a2b0b8ca04618e370ea3fc5807106c34a41d8bfa
SHA5121e87323412c49c2f928a53b5bec2fdc774b47a74efb64d1a43732a35bac42b7356e9d0c3dee0a6cbdbfd4b00c3b6dad3581685fb57968405b1f5728a9cfbfdd0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b