Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
3c0b9955cb98d8aae15d1d1665fdae71_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c0b9955cb98d8aae15d1d1665fdae71_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c0b9955cb98d8aae15d1d1665fdae71_JaffaCakes118.html
-
Size
53KB
-
MD5
3c0b9955cb98d8aae15d1d1665fdae71
-
SHA1
07b22367a41db0cd4b4abce3bc96a5662858331e
-
SHA256
581522ad2d78b6dfb80c7fbea8019857e99f7da7cf97db4bcb52f68a1519bb94
-
SHA512
90130703b850e183572a92bba5a70280229072d1a934afb3b6dcd3ed4f868039d74e3665d39a98b6ce061a08ae5439e7ca9c57dfc8ef3fdeafe907e7863d4be0
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlY763Nj+q5VyvR0w2AzTICbbeow/t9M/dNwIUTDmDO:CkgUiIakTqGivi+PyUMrunlY763Nj+qL
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0013da017d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C958C781-400A-11EF-8266-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426921921" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000216bffc88c803a7b69d5652f97a63b86cf8897c08aff4d3fc648878586937e59000000000e800000000200002000000053174616f4e0c0fc167904f6003646ce3db2d34fb46f89ae3c8df9f18308879920000000d53bc700bfe3587429863297e5b7661c755a94a2ff04d54be7a10411b5830546400000003d3b4d47e1995f73696a10acab4629a63ef92e9aedf24de918ffd7cc704e438a39f5c42a861736ee06ef8121cab788869dba6cbf750f2ac3dd227a9bf478d675 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2312 2264 iexplore.exe 30 PID 2264 wrote to memory of 2312 2264 iexplore.exe 30 PID 2264 wrote to memory of 2312 2264 iexplore.exe 30 PID 2264 wrote to memory of 2312 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c0b9955cb98d8aae15d1d1665fdae71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf502554f54aa53ac1239d873443ca3
SHA1f0ec96f61ee597729e8e7299718238db0f13598d
SHA25682f1a2bbf4086a30f8997b85a73bf86e5e901cd0ab5b6fb2e39b675a452cef04
SHA512d3cd5e099257a4173803ea9df7a40974f9af72693bd39c314a286bfeded589a8abb4f9646bcf4ad2b5a3709b3aab7dde4bdbe40d5eddf2a62bf74d9fb3bdf02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ae2b4e95382d976de5ef17e0b4c766
SHA11dc8a099c33c172aecda3f4d925d10b952334fd6
SHA2563777880b68499ed54c83e72383547632741942c587d5e8dd0751dea35c7f126c
SHA512e89b028e59388e0e9a035e3cfeac87638621da0f9ccc0fb5052a43688fec77043ceab772cfd89dde2a135b29d60690fb73f736b84760aa790712d59fd408a197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1583acf0a0c714acef243d448254d82
SHA132a5495f76f6f63db8f31544dcb9ebab5881c63e
SHA256a834be0c55fb40ea8c92462ac3fbafd76d49706e357c67e03fee4f30944a7877
SHA512f2a17bf6833ffb74e0073570cde588fa125fa18a93f07b882d61633d5c413bd3cff3da374980ba1f62b31d5bdc96608f4620e967434d1759ea3ec8244157d90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d0b883137ede2a326b279903409a3d
SHA160be681780a181e93eaecfdedaa34c7602e5bf93
SHA25687d80c549a919985969cf2a100c10a84f46311ca63dc10bc73a28472e202f13a
SHA5129239f391a2eb2ffaa0ecf273b7aca6a5ade9495d7b04ee57a4089131b4515ec1b263a910ad27a6f955ed5d4fd88d8d4d7949c3942aa8ad201667b2a2579de146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58346dfb060eb8bc654f073d3db8626ff
SHA19268e9bd4c932183c9d56aefabdfd76c9d5fc22a
SHA2561b2d70dd0a2ec34a7cce4b291c629ea955016f35f5e61a91fceb22a232c012ca
SHA5121abd50fd15c25353c8476e526acd3ca775958a6a4eee2beb2ccc3105b2b76780b9d143b76c3703dd7ecce69e9f364b37bf8406f249754ea630a6eae44e305ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab072fb8a78c2b94dd40933c366115e1
SHA19922d494d178e954aac63ff556bd92c3363a73cb
SHA2563259a8d202811be1d5cd620f0983b193ce0b3efa2efcf69bb20b3da43f004a16
SHA5128d0073cdc53895aaba3b07f203d9455af19a990d8027f3cf044431b8d1e40a4bf31af7565641cb988950f25596282aff14ae244d9bf12ecea199b950c827883d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14df1ecfd3f6cc301e158669f4d488e
SHA18fdc1ec9ed03c71ce1e478e40cbd23a422c72f09
SHA25610d7622fcdb2a6602a23b28ab4e804f0551de68df9144bf2992404e9c9f95b13
SHA5128d352c7aab70845470856349992b336376e1d58f36292ae24b62aad57ffd57363e9601ce6c0ef55e557adb1731a6b60417281c0f1e02203550617013c1ccfdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae4f2cb3c843012c44e3b227a53082e
SHA155ba9537b8ec83dfe3a42c016d76104ca4ea1dba
SHA25661154febaec16292b0b18f971dbe06664b518af2293add3fc4499c1d0996ae7c
SHA5122865549a5c28ed3c4f75dd923bfb1e69d7cfce63610347428c632c8f3a8f451ac8a84218df10f77efce5aa36f98609a88252b08965787dbb9ec182922c576b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543af1f0d653b2f788ccb2256c44e9835
SHA1a1444e70e05234d047b5a3c870014d7f47ae59f0
SHA2568aee502a1d99642bf1c7e4951463ac64ef6e8c58860c8307016b0d232508cf18
SHA51249e2c14ffae8383b9e2bbde5ec0c70eeeabd4a33967905c57b5ab538832caa52c4a97ff4e5c15b07a417a18239460a02b5db5de812b484532c41d8f810d15554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001478c099978ce3e4bccdd4110e4ab1
SHA10698d792c5d4bbb0850e94d8a52f7e3a519f6a6c
SHA256fcfd8b8978fb15449b8a6d9554ffc94d9191d137024b21ed8cb3a12e54d7374d
SHA512293a4fb444370eb5e47f52e1f535d41ee35263f0ee2468ba7b878c92dccbfc544d6cd2a8534c24964289d86de3dc32a8fe8d9c38c6a609c560f48725dac9be7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf29f0d3b90c8a81e5214dfc65b7363
SHA139a7c5fb139aed16edff27c8703fa308a2759560
SHA256a66884dd0de2517f1f6d517f844bee48759e9eb53ff50d62dacdec991bbb4aa5
SHA512493a0972c358c9d7459d738c4e545e2d2e5fcbaf7be5f4999ef52ef751289e3687cd2b0ad098103021f2d170f32fd3f5d5e69ebf3cf7ab85ec90455386711de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323bccc580677ed655efd6c9a3c7a658
SHA1f98e2156a623a517b195fb53bda3480bd5a4e640
SHA256aebb2110cff1eda9816b0d6447c01cef4e94a898f0e3145ea7049a4907ee037c
SHA512bf08daf569a52193b0b8f7b074cf495398779bea04f19520b7238d0b07a03392caf9823fdc4589c9b2b0fced1f001034cd5f70796e5c234ecf8a9c0d3ac4a31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30a426a5e49771101f506fd1e251e56
SHA17fdcfb6fdec72c3bfb3a95f9f731eddf56d2780e
SHA25646d5a4c511940d8e626948fad9814853fe68ff084aada7b2ca45ea5d2090af64
SHA512549dea8342c9639e13500f864ad174cf222a1769f8a36f2d2d47a55ee4150a9d9bdcdcb1570884e1b472230f97590ed4078509c51d7fb9500bf8adb05bca2deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfdf05dec2b82f44c7b66432adfc87a
SHA14e114640f58fcdd35aeb19a37e29f9a5cc83ec6e
SHA25604c9ae860f6e9cb889709c01035e77ee81a1aa00b82db258ea820af8ec76f839
SHA51249b9f30f508c7e5f3b0c6ff11c180aeacf4aaba61773abb39c11c14b29dab8f0047cc11907af52718f35038e667e32ef87bad829e020ff35931b992cb6df0628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55325779f59f2a242bcce6c93ad6be0f0
SHA15179b6303cc6756e40d8f9a10c0ee37fd6cd5694
SHA2565817db08df03837cd6a4464b2babedba116c385fe79bdf003ce70c50ea9de250
SHA512b90d8fa91b846c2435253ef7f29a1eb27d237b8b3c719ff7f54f028b329cbbd3f35872f0facf6603346ad1c7f57ba8d23c2b98d894ac2f6b8a321e58314d4552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50052ac0dd5698cca1e0d30c25b06f8dd
SHA155541f43a53fc849eb180884a18de22d216da088
SHA256d926c8288666b67d3d10a721ed9a07c82dc7498c19070ece4fad225ab925a528
SHA51220c9933d2edb88cede465f59edc502c8ba295bc684fc98658de34e0d1ef95bb679a78f57a406776c23112d22d363cc58787d0ec6b746005212cfdfe9ce8652d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2041bc27deda3936245efd51bcfd65
SHA16f29196f6f34fbf06df935246bb1b88dc00ce564
SHA2567629973bb31f5107cb448164018e9a8ead16eb2680d138bee5aa34438e2eb623
SHA512833e1dda3a5cb23ef4dab4d50aedc9fb6a0427d77972345baf11c829f8d4c9ab19fe5f9949e3b9e3b06dd0618dfb2c80033533c3f69a835fa0b1ee2477446ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b647414cdafe440b2548c051ccc996
SHA1c5d5988568d73702f77a5c86dd0efcf0154bb40a
SHA2561c54fc5ef84b7b98f1270669d3e6cb1c20b2b413fb33ac955459067f9f654f20
SHA5125d87232132ea6624e9303b5aade48b15d17f98b3f0d17a4421df5a38944a389a4a9e5c4b9cbb749e9365af75f3b16209aa35c640650a2b1565ce8d1172f3497c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b2f80a15ea3287dc0854ba17f96ca0
SHA1499a2d7eaa58f80ebafa2ea58817d0c488ecbea7
SHA2560dc578ba65738d7b904fb787d8b2f839e257195c5dac7f8e1085f7ffdb86d1eb
SHA512c063d76c16f3e9a65f31ba48a18e66e6a9773710cd78c96a365861baeb58dbf3c92f10419d0292f007b4f5854cb85886a740e94c58c55098a7d137d355aa3623
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b