Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
3cfa7910e58eb06ff6dc51ace292d893_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3cfa7910e58eb06ff6dc51ace292d893_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3cfa7910e58eb06ff6dc51ace292d893_JaffaCakes118.html
-
Size
18KB
-
MD5
3cfa7910e58eb06ff6dc51ace292d893
-
SHA1
c775222028b6c13e57ad390907399b45b1eb42db
-
SHA256
1ba371862286bec98ae10f9840dd56d86b6ed0f9f2f1417eae729542cf88f6ef
-
SHA512
01d21e72aaf0e19fcd0099b62e318a3c639927387d062f44fedfd06455e961a810dbf2df5f7702167fdf2cd275deaabe3e1227a01179373f060f1843f00e69a6
-
SSDEEP
384:s/lIcytG48ZaGTHkm9RRIRCXc/gckBgbnJGCKx+08LOXguLZ:yZwThgiwEExLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e037ea3e45d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B90B421-4038-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426941440" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000241179c6070b96a226e0d28b0059defcbc53b92871763f040acdd6d6b6804663000000000e80000000020000200000004e2e41bf84a5a4f6b7447d2b5342991be93dff0e741166cf56e1c4edfc69728220000000ddfc78df75ec8aab6786b248d1139c897dec9057fa3aa1a5103f61112b7a817e400000009cc8d9a8bd6f8cfded50bfa448b20644de04dbe8d8c88b7a80f21fe3e2596108e0f1d2b702d97f3e2ea02260bae1ef53951dd1e6798324412e5a28c2c92dd7c3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1108 iexplore.exe 1108 iexplore.exe 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1108 wrote to memory of 480 1108 iexplore.exe 30 PID 1108 wrote to memory of 480 1108 iexplore.exe 30 PID 1108 wrote to memory of 480 1108 iexplore.exe 30 PID 1108 wrote to memory of 480 1108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cfa7910e58eb06ff6dc51ace292d893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53399167fe9ddd7102d9bb01d72fa8067
SHA1caf58cb67f60bf6ac43392a811559ba7b31675b1
SHA256b51c1c2b563099951c1ee133aa74eb5d170e38ef64962baae7b78b9566af31b4
SHA5125d61341c6060fedaca3f9123db106a476cc00ba669218380ef7c184a1b1f68e4ba1bf9f5db36dff12c50054b409a6697c5676cc1b26913a5b0c55b9b37d8a203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d54998b7b8de46e2ca927ec4db2e3dc
SHA187a018974ab41b6b396e7b24b1e8ed890d390343
SHA256b9bce75bda5ee7de8e20ab4ada3d6a7f731f2fdaf9890f76d61cabb7185e9104
SHA51233fe9a7dfba431b0891897cc9b28a8e94b12c60012330f4e92f11cd3d98e4fd0cc88a75c0c622b2fc6144a9aeadc6bfb6762045be1d2e8a3c53ee10f838559e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7749e036b4e59f94e2125b34c8bcd1
SHA1e2367ee8ad5ddfead8ae07fcd31699b309fc50ff
SHA256c0988479033e2325de153e65750af48c81e0f03319aa6224e8012af41dece557
SHA512c67b98cdfbb5667d96fd26c89b87860a08a1fb52d197a06c8b77090bf4924fb2f98a996edbe1cbddbc011c4e858acf28cab7348798d3a33a5431f1507ab2b279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b688d8586256a5aab98f54a5927cf0c5
SHA15c9fef510c97b334c29b4430a8fb28ea69868a0b
SHA256e47cabbae93e7e45bf4cb86a0d2e1968b6fe45d5d77c8c88f60e9378ff406fbc
SHA512247c0c046bbe909ca3ac184a39076032a357d7ee5cf9ae64a091e24d8b7811a251b6d5cc293f37aca2e702bc370b0f0a474db28413b4463c1e801665ba5299c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585431149e233f239ff6ff7479a603fb9
SHA164f099d0e31c110f363159478e1f6f2354a16bb8
SHA2566dbfe91d143267833b3740c8176402e7a26e4e6a5384da311ab3e857fe3bb981
SHA51279a385db48f6368b754904bee555f8b8cfbd172073f179a1ebac0ab3980333ca8d4d8bffd061746368a7a4ec6ad9762b8222f62f20493f0af34f8969a8839058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462fb853e0c306b0eb021441ad65cc5a
SHA15d13ed843fed2a6a7c32e83b95dbc00b2a7d1d04
SHA25679b42fd58d62eb3d5df29bd656c010f278ad055897be907a37a6a542a10ac438
SHA512b8ebaa9164fc32a9a2fc7d8beb3a8f24d9e18dded54509cec4f758ca123e67eb798a442e4aba171df5d7f1ae283ef43740b2a913c759038410029084ab496f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3a86589e5e7989a25fd2095d538bf6
SHA1f0a29769b965ef2352990d7ec22f05cf8c176a97
SHA25691a2e9221b923686ba6b406e16df7b82f7d5d47046d7ef4933d654492dbb5801
SHA51276eabe2e15ba5b7a9c0b4d64c80cb6c0fcebdf8f7ec5c78c47db6d0def412fdbf3c8043c14dc91f04c75e98323893b7a3c1ff9f7994ca7c2a6285a8a63ebe9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04ca71849db9f7019c5c87810885cba
SHA1543841ba9826eabf7fcf978073c887b1849c1044
SHA25686a9958082c2fee509334fdbb6e6ed2fc8a2228431f87e09f0d9db8d81238729
SHA512dec0997758ee7a660d01123e705b2b52200b539a280f029b2d3eb1673b70362f4ff8324d61496c304f3f3e1f0648f7a9de511b8583d50b1ad31f19445c5d3acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a70fe1ddb9506cd18bededc5aa19487
SHA11fcd4232314bee441f6e1bf4febfa7e526e1ba28
SHA2561f49eb71e320202a2f83c1f329aa5d1978e7ea5300c937c177dce0c10f0ba3b7
SHA5129920ed7ab69ab76dcec71654d6a40139811abacc805d9313fc68fe89a7c743443233ed3477a1460268069f10c799c5563cfa4ac50672822ca9fdb3d31e77cab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54423c0c6c63cc9b42fa626f3078c9521
SHA145ca54382ec3306681a0cf85c95acabb0740e1b8
SHA256bbe1cd7771ad3e99c79b7e53654d877016d557ee1af7ff8b24980e9f06fb6c37
SHA5125bced823bfc5475c586c58ffab76bcc7f8ac6a1a03fcd867f5dd00c792a461643a5ff5057b6b72b97ede60a692ceb0b7fb56509b8461736f35111f34dd1e1f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458038f49cc89913109cbbdf88db5994
SHA15cc25f700fe023cf66c0ef03b4eaaf4a35593831
SHA256ae44ba141ecf1ac0a56f6488c5882dc2c71e2bcfa4ef2d56a85c79fad76fb44c
SHA512a36f8b3d6e234033756564bb90ebea513518f694fcc8a5fe63180efb506d5a576adcebee7fdd0fccadb2c9e059959c79a7b582160b021559cd3bfd92df83666f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a0e4c6978dfd4de052a74dbd368dc4
SHA11a7c0fadaa41c210e01728a9c979659a1eddc442
SHA2567ca64ca246e155f4ad854e432b49d6ba272e8fe5702b9263c98ff90b49e08ea2
SHA512cf5828a230d1b61aa8ca179c742940bf2d0ca7255ac30494ef74c4ba99f0292709d4b77f98a04efd07eb2af146ff6d5596704323ab2f5d640d024a7115fb0fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b858e03dcaf361c995645d1af18b9995
SHA18597527ff3e98d98ef7ab9120fe63b0f58d7fdbf
SHA2563d82ed349463f3ebdc8b2e609026ae8a220b572bbf57544273c2ee12cd9d8926
SHA51276fb37895ec82e8c1185da3bffd6a545b7554ae15a751675a7301e8a6ebcbd9b7f147e9354d5016c6b4b3438486d8d1ef6a5ac033bf5bd5d936a6fae24ba71bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb3e5431b1b590e27ef098890064853
SHA1b63f16334d3fedb20b5367983c37377adb3d073a
SHA25689ac0e62c597a52026336e2b9dfd8f33b67c4d2174f85f65d1cacdf84cee7026
SHA5124ea5c0df8796ef1543d236de33421ec2070a16d31ec60433866e99d66899550f82f4be71976eaed9b83ad2094f2322372a2ba8870b5fff03eacd358a73ac7ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315e839cad25e8de7113c7d642e84b67
SHA1d9cba47553ebb7967f1729a3cbb226bddeec643d
SHA256b08bc3524539b36bae37754bd93beeb53d2407962db0ed25b59a1bbb9f7cc18b
SHA51256d59138b777fbd307d3cc440034e88dcb2574ecfea6a522eb64abcd1eb4614c9a8a6ebfbbe15b720e7c6f69fd03a28c71ed344fa68272d4252d264a5b0fa3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d8d19c2f8f3e0e759af54007f5ee5eb
SHA1c511e79a2701fa9304792a646ccd87cebfb647b1
SHA256e739ad7206b0a46cc5c8af0a56e912083d51a98640aee9270d77215b22691bec
SHA512a30fe7a59d4f6ebe6551c6f3bc636813ca574141fdd952fd2a2ce07381d54d41d1623416abd6421ee40cd68ca3668a2b0c1085ac0258e4f46a2c63cd41ef24d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f843000b90393c9d9d26c61307ce9b
SHA10730c41f4680e2326763b00ee313fda4b8051795
SHA256f2d0607ecf8b50a8c0d325010b45c03d799a045ad4f5c2b8b87f33e51f2e2c36
SHA512d4ea156539d0e1ec8a89690b88aba2af6eece159fb43a110ec821b425c7393da39ccb5f417825f5ca4a0ff86ea5d5d2491de3d684f334f6a4fdbd376dbf6ae1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736cb6dbebfeeb26c18008be596faa95
SHA12bb55e2302281549466cbddcebc42d2b1c6c877f
SHA25639bcfc1953eb98ecc7090e5b2e8ebe699070e5bac51a0bf6bfd00384c0a3e9f8
SHA5128284ed8e844e2863028e116a2179bdc8b80806430e8ccb2b149f23fb7416831b502488013c42ab0b07a5b16f21984bab760888bec6006cf3f157709b1960c13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c205d3da417e70187b559d45a597c659
SHA1b9d6102b33b716cd51bcce3f5fa0935f775e7493
SHA256ed6eed7df65310b8a5cbd5c0b8774d7723693b5f9c17f643d728995f14638119
SHA5129bad39bac31e6b1c9ff641a2f3578f5fc12f8101ff176bb8fb792f538358bf930273b56c02fa2f3f83f5fe2c772b889c191e6c153d664f4741970a812e450806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810b1ecfed36e9d2dd8034008cfd49fa
SHA1d674a9638806a797e261818bbc1ab6e3c1b2da66
SHA25612eb6c90d47d8bd25b13f84dc7a329812c8e6589b177199eb90321d884d52f06
SHA5127526d72306e6563b9b79fbabe6d84945868b59e8d330106134c76be8ae117df9e44fc1e737aa7f0b6ee0eef0de28ce0e1e6411879587d7a3f25262d769d11097
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b