Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
-
Size
120KB
-
MD5
3ce3a00fbe5c0e063c9297f87f0b6b5f
-
SHA1
f660be57b5d5462fc9828693e8a713ec1b146b96
-
SHA256
60e4c428f7408e071f000c585f1f6e96f8c059fe8c641df52b4d2253db2fc44c
-
SHA512
a394f5b55c93100a67de91420fb3daa116ddd20fc319ea64636f26f57fb7e1b5cefc26747a5a1e4a2d8d23b30844c491c2f015dc21877221679d95cf66aa3ff5
-
SSDEEP
1536:a6kLcIDFI/FAjkCjOY6+Gtyx/k3PE7Ro5:yLcAFI/2jw+G6/qPws
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7083ba3c41d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{503A7C71-4034-11EF-81BB-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f153b956241b3e0e0b750280c91cc1a2e9a44ed720b5650ed430515a69869275000000000e8000000002000020000000326cc5bdcd979252bc59b4291d0735329f5e45dc65e79769f9f8a21e99d7c649200000000171baf162bb59a90cb5480c380d5fc3dd9e11f98c8328d0ecc71289857a062440000000f7512ca047c5557851fa8f9b0d87c851006c04628c1b53cb8315d90cab39f81b68e0c9c74e4e25a90987fd85888476e9658cadfe03d62b82e6c7de686f4ad755 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426939759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2588 2388 iexplore.exe 29 PID 2388 wrote to memory of 2588 2388 iexplore.exe 29 PID 2388 wrote to memory of 2588 2388 iexplore.exe 29 PID 2388 wrote to memory of 2588 2388 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90b29966e9e76fafd2d7e81a7248218
SHA1d9e5f513ba4c354fdf5c19671c79ce754d46dbed
SHA2566efde94e4ea0a3596a5d0e8ab0f7e54b629eb3c8332a710629f6713d984503fe
SHA5124b98b3b50d40184e580868260bf92768d646bf0c786050d68e8ffd9d4bf54a4d0142f54088fd90a247a84a96552f800c8307cd09f7b79935b540d238a5741ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e69f5018068257fad5b4669d8fc9f3f
SHA1d60d31668da0a5307ad11fd869f05fa2bbeff2ea
SHA256e1221b1f04b39172ec7e22ff33f49d41e1d32107ed80dd0645f7787837e946f1
SHA512dbc74c6ca45c0321b6e6bf3b467976f110d2b683a3991b3a08df183b661246841d81f56f6da94317126a227c75fb981e327f500beb912238f3f782c4632f7624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82e9143b405b18bebac1756809f2d0c
SHA1a82f01f775edb2851596c808eea3489a11d2d4ee
SHA256179e3956cb77330ed6612968ae70c45a05b7fdfbda4df85d6949fb8de0c47b0b
SHA5124a63e906451500d0e56ff05b819c99ccfd5d8fe53dea57737887f26b08f0c44aa9fbad9fe1c4a4d7d9b48e97c47090c992cff785d9c690cdd002b20da8113753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc7221daf51432207c25dbcadde56ed
SHA15cd3d707284c478347a31fb61b55f5666a5b191a
SHA2564748392743d79b8194e23ab437b931b2771d56785e3808045b77da852f72536d
SHA512a56c9647f5266bdc6b14f8438525fc5870ce69c951b9f0d8a8faeaf11f393f6aa46bbb28a0f57d25c3b4e8a9b5c36a2384ecc86205e6e288f6831972eb18c6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e626504cb7d8d9c5ca987119b2d5cf3
SHA1a85113f622aa392c3349965b09e9728db3954722
SHA2560377bbf9fc360761491837ca4f553ccef97d3c328ccec53a8e2c415e57f3e3ce
SHA512f51f6c65f61753ec0a4611cde33885345aa6e721a95baeccd213c12d2b15258907ae4d365d93cd567ceb7eafa120c2201331fe8c913c945d1cdecbbee3b0d20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b0776a9632a462513841adb4506146
SHA1f26730f308ebb455c97fc74815772d2312aaffb3
SHA25653421c1af2d25bea6644c382c2ee2fb055cc93c19e68a058efa9c1647ea467a2
SHA512bec9a0d618f1a007ab5efc291ddc12b048ead33453ec219c4d5cdf92a9ac7827c2fdda4b5e1ea1c2b06cf8307278ecdd0555caa2ed0afea723693a726dc466a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546be0032e2c71a9cc4152742bc8a2497
SHA136758d929c555d9af8bab31e04b27f0bff080e57
SHA2564c295038473f618efca35d9e3261a188d85bcb738a07f4635192466ee6bfbd08
SHA5128f3ba692b12c57dc5ada8f6babeac4a481958c2028ec2cbb1bfaddce49871ed2224351523f9a6795997e7cdb8789ba764dd746f3552d3919da4857fc3c5fb491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab76ad6edad1993a0d9c77c17c32d2d
SHA1acc66903a929775af61465055910f5be6b4de174
SHA25639e867dbeb92922ad85de1d6175d30caca64603c3223aff7c876ec877402c746
SHA5128c44cf8d39f9e756423bf73336ec8a3f0cc06ea71e166617add4bbdd17fca36b782368e8ba215107351eb42da159f714512ec2c58c849137c73e8f1e36c08219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045266504dbc575f89ecd2b56d65b292
SHA17b6a43fc634472506f605cc3a3354eb19847e52c
SHA256f3418e653c0d53956de81bc31d405880a0b5bcee2d6ef9d3916ef93ed315f93a
SHA512ca4f66743d132ace88be4f2418b04944ef120708378f8eea2c10c49c39cac16a70332e2a929d4d87979039c11e4b5c059525e3ac0a433f8e1bbc0fc7fffadb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c4dfc75cac5e443a0b4a178936d40b
SHA1881dfa766f4b7cc9eec038d986698f8909471b28
SHA256a7a6d98c605ea99be3c3d6b2deb0971188fd96d42ff03ee981acf9da8198443d
SHA512f17b63663efe8ff47d2ab88c112f7fcd036d1153b6728393af879ec2fdf03fed146d63123f0d9a9419b4a44e6e8b5de074d8e8e15dd19e3c50dc8c1f910f2281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412a6ebadc96f91ea5b455e55ad3055a
SHA1cf71e8294ccbd4eb489813e3a5c4cb88f46b20e2
SHA2561df50b1c048cd6bbaef6472206a3ecb6e6cfefeafb19dc4a8fc1545b2b643731
SHA51297f19df430fbdc6506dcd1a6dfcd398a3cca087e4caa4ca34f4b38f3a412f9d9a7ddffcf2bc213c2b9735aaa6c715542bcd9a8c80730671b45466253b7632714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522238b8723e27a8b6021423cc538b15a
SHA1cde6d832c186086f9108eb0e4af61eba6ff8dfc5
SHA2567326b2e6b3d30c682167d107dc57da2ab3f148fbc4c3fb674e79a1d10aaabeba
SHA512e4119fa57b938f7ae19c4f5aa5e3e9fca88d1c280c4662668b0cdd35a79296507c29219bf120ccb4a99ae9c4a537e48e997debe4e899fb44092edf6009d404cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e593c3bf05ca7d3b410bfe845a15a1
SHA1101039b31d6ba0e18f91a02db438e4dbc6588c5a
SHA256d15843bcb961fdadaafe0d16627ea02a8afff9163ed97361413b696dbcfb3921
SHA512186e2661b42cf28fa24018497eafbd10fe140320335722f4dc5b4709cceff5d79be502dc7199866395bebad36fb1a0564ab8caa64e73fd12a8597f69693d940c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223f8165ae14c4840499fa502c29d456
SHA1c5c8ae9f38701b3631351c59fd7f21b0eb92bcad
SHA256238fdeb3a8c46057048c4554cd8d0e276b3c33b49305f2185a1446ad69d61afb
SHA512139bcd136747c32e2e6efcca305b7fd2c8ce7e44cb25d6826ec25780c3a3316b584babf785d111e61f5b328fdcd5eadc01166f0f9fb19f362132b357e4bc03f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5124d6e1ad8e993d898c0699f8e8cf7
SHA1af19ab6e9edd56d75e588e6c5fb6d7bbaa1a6c6e
SHA2565d79ba9d1373edaea90b4c9bb709d004c55ee270506828cbd64bbdb2cd2bbd83
SHA51215f6852e1702a2e6134a752d495438b3884b2dd6fc3d1718b212803884637a8191290b6c24127a5d3c2100b43f4154b4ad5b2a1ccc48e129cdc84bbec9c1d36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dacbeaa6fcae9e2a7fe7f1db756d810
SHA14bf405c123a1bb258293f22a14a98031ff6ebe5c
SHA256ed1ab6d9a72d773b165692561172db03a9c2000834f8c7be90ba7f9c7d22ec17
SHA5124286b2019e63ddf29e9b97dbf8d334e85290e533b3ee11d962aa667c8139b810d3240c2b3ea06af4c41dfb833eeb09f349c2c183db9e89330f83385453f6ea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50666e98badb470c474a8e0d4cdba4141
SHA1dbab8e10e96ee0503b99a37bb43cc2367dce9e11
SHA256745bb343d190bf08ddc8c962569c3bede6972f0bf023c2e2d175cab2da508a11
SHA51230652483b4dd9302159d86d86e6830e0e2ecff504a30ca5611993950dc91fc31842bfc9e8de9b789496d03302917c7d614843d43437dc205391ab190a73d1118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505da2d76bfcd39cb09f08b21a138eaa1
SHA190bb2ec91a90545a3a725b426fcd38198676e366
SHA256d40a174ab40de2bbb0127a0c138e634804c48f2d0acb78e5e193fdda8416b445
SHA5127247fbc406c44f141eb95d367c436e8d50a3e83b886e889f808ad6a5081541804d415200450f4116cb5aef890dfc4445bced39a108caea512a8ac1464c271eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e38a8c82ea347348ea0bb9e1d01190
SHA17e351bf786a184bfc6e223a844e06cd9605af8a0
SHA2565e3dd032cfd64b1ff3a7c6d6825dfd49b61a082a75fb014bdb4df4aa487bbd8d
SHA512e2cc9a884732167823f228534276caa8f3ca82ed83c088278bb8ee45ce2a56019c955d143d2c30b12307d7ddbd1c80f36d6c9107593209befca16effabfb5fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274bc00cef2bbe3e1300199acf5c3ece
SHA1e7adfe54008a6906ba2332e01783a8a9348e80c9
SHA2568f2cdd94402790b8ad296476e684275bf57e3395ee71aeef6f8c948306665bac
SHA512a03165b2086d81218573f5aa575428f1eb9639b264ef7715a6d27b40dd0a796322086b901e166dde5a947ebce07db7ec75e80e6487dc611f9836c1d9f2117b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526132223cf4b9396f519127c2072269f
SHA1c066d64c74c2b7973fdfc7402f72bf1ac8fcd748
SHA256475c19ec88c1bdfa64f8c8eed44dfc4df3b1415551979d0d0563c0bcd006005f
SHA512d7f7febd43f6330fa28382b84270bf4182786f8f709ef907554faafdc14b37bfe6bb9baa4e29af30e75af6d800b79fe20127a1367a09387e4a5203ea44141f97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b