Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
3cfd8854fafdb372b2a4cac9393e328c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3cfd8854fafdb372b2a4cac9393e328c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3cfd8854fafdb372b2a4cac9393e328c_JaffaCakes118.html
-
Size
52KB
-
MD5
3cfd8854fafdb372b2a4cac9393e328c
-
SHA1
66b5e51a3367c44bb9033767d7bccdfd0996bfdb
-
SHA256
c5374c42a1118326137369bb9fa06fb6bcccf726cbb4e0add527bf065645caf4
-
SHA512
094ea87d9366916afb8ddf5117f8c30cc3b5bd0aa35d49d898ccb09cc7e701f707e57cfe143c67d0107d8bf260c7ba5a33b1c7ac258e1becb2ecec526c09b9d0
-
SSDEEP
1536:EyDnHH2gQ+66d5od6hMc8+5Fod6hYG2+YgRb5:9DHWhWbod6hMc8+5Fod6hB2+Nb5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426941685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0928ea445d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c3710fa6c4426693b1d82899d8f9565925efdbce6643f7f1f86baaff86d367b4000000000e8000000002000020000000e58ae3b9ae01d24d5578d5c5cbb1b3bca1e2c4b46e2b00a9c352f98efad0dd3f200000006661dc7b6366e20b3cc326c6c8e3de1956c91ab5be9909b1dbb9b2e9b14abfe640000000c9cc7671eb67178b45669a8231985c8c53acbe4b1c4a827532bb84690880265b095e8395842805b62fd1647efc7e26a32c1b9ea357c4a4bd77c8e213fcd72004 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD8DFEA1-4038-11EF-9225-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2376 2068 iexplore.exe 30 PID 2068 wrote to memory of 2376 2068 iexplore.exe 30 PID 2068 wrote to memory of 2376 2068 iexplore.exe 30 PID 2068 wrote to memory of 2376 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cfd8854fafdb372b2a4cac9393e328c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dcc6d31b1e99f3cc820957927140a21e
SHA16340318970a11c3bb9dfadb46cf2202bd474237d
SHA256b248941a798649bf8e27a903fc0e535c37dd41b1385e2f80f11a7d06e80184be
SHA5127da88db059edd51100545fc0de7842020558697a4cc5add19775e5e906a441801f0b4714c55af4b3b18c7838d2d14fce53f0d71c115f9631e930fc8858fe3579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e690f93581e0dd735999a4b3acb1d34
SHA1c702abe64448eb87ee9cba1d2d2654fe659bc61b
SHA2560b905792ddf149dbc5b65c8824d045e0fce9abb797147cc010c8e82cb8389555
SHA5124432bbb4cf35a38a0d1b4672be3d8df3cfd8ac114d9759f5dbda1297f8b482d4955fb6c2682c3520b946cdd775f8591f0074cb04794f9e902abbab23376dae82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57051a38eb7beaf9994c84155da7dc0dc
SHA1018e3a0d04e8daabc8fcfd9c03f3bd464404d9f4
SHA256f55d920369aae62bc351158be55d0cd28cb41f83e78a85ad0d5e57693529d13d
SHA5128f3fae6cae8d5c8581f8df48acbd7c40e8808adb65a21b0fe472c0ad7cfe90401626bbd7d88b679ac9790c0f80dff2326bfda2dafd4607d7e956a8c942441dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5926da9ffac45b0b4e1d960daa57b82
SHA1ff07366e6ed18c4b6df5c635b2dbdc74685ab57c
SHA25608c29be4aff668cc446385384d44962b8533b2ad1fee435026a88ac576ae8889
SHA51297d491cd7e4cff6eef64e0754c7f4620a92c75839f082301f29c1408d5f4fb329d297b9312144d6c68de36ddf7adbe85f5849c9bca5c95c0dd96499ccf6ed176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57cce92e5e1aca6bde35c54b3dc32ab3d
SHA13653b61d436e71a8950379986c728f52471dd1e1
SHA2560b78170af2b14b3cae9efb950df051a2bec119ecdfe79d44f13746447ef21fed
SHA512b620a99956125fb878ccaac71cdf164ab50023c53b1d2b324f508189960d9deab3869d2636872f3e8ad14891048a8fb77f4bd0cb8eeef0e8c8d475265d903387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ac8f5765290d856eabb33cd83270abf
SHA1f9bcb16da084194dd2f088832d7847774c5d9931
SHA2560c3f0ad9546e0e863fd317c9776242b87403389ecdc0e21a4f05699858809e00
SHA512768f3318460d865a966081faa99eccc5364f7c3ecf671308f06faf3a607b628c825468afa51f20476bd3c5f66405df4245b39d2856f92906fabf8998611b6c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5986c386ac42f6e99724e5a84b24a4455
SHA1b25d73ebc6bbc652e0afae624f788cb807bf3cc9
SHA2562a6c01706cbad290d58cd97e52dda92382d42f9f5e0ffc96ecd09ed1a155bd5c
SHA512e3a2434969dbce935a79f2a60f0be3b267291cb7ec3b135f41a08b96ac797a5ebb99bd2bc5bceeeebb99d7a5bdc885831a106a534060f33524603129e9bc8195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5236b192dfa5ccf2005abd10a8d743bcc
SHA1d14065a70a5636e8e4d6a8c12b4c89b059f4832a
SHA256aa419067b9e6674c80f2cdf9d032a205d9a7b939c8db90af6c5c68eb0f986bfb
SHA512e3e09156b2893bd663507bd026cdf25012ed90fc035baa5c8879b6050aed0151b2cf87f3946fc9faac1de333837c18504b46105ec11a4b8b8b6b722be3beaac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9896651f3eff9c34fb243788ca36197
SHA1ff7d353ab6995be46e407c0ef39d7320e8463257
SHA25604b5dd2a35dbb6b3c6270bf78969a510992533195ca6737ccdbfcc8789902b9d
SHA51240ee45d26fc8137056734084b39ca1ffce79d9ff6245e60c4fcefcb9f2f27be1641da94145fe236b2a3f636f7eefe6d1774430fd92ef67b1403c87eab338336c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bef970e3bd7de12b9490d49e266397db
SHA1da99a0f6af7cb9c7169d23a79962bb058ddb7df1
SHA256bf153b0d035131e95556f92f77c41a5e17ae684a278c0911700dbb113f7d6794
SHA51234987aed1341eb11b705d6609b3cb92156bc980e47cfa5a240a51bf90b7f6b5ffb4c4476de81afc02102a6675219c69cdcef31a5da14753eaa952998a8d9eb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a524770f59f5fa655fc72fb0cf9165fe
SHA15180c0e4d78451aefd0fe4a0e4ac70928ecc35cf
SHA2563cbfbd43ca21bd85f1f11a2547564e2de8e592d6c2e62c2d0c996fc199f3e44d
SHA512dfc3a2bc72f11c4b320a0ddf381f6f15e60a830c5efb811482944885ca8ebfb1107a4ea1f39928d46422029b8c2ab730a4299fc655413b273de8b099374b0b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54713cb4dba633ca41f9ba2d47793dd45
SHA19b17e4c11b60f97909e2f478fd503cdbf09182b4
SHA256f85b1c94bb043442730878dbe11406367a81943211713b4d4858f8b64166f4f0
SHA512a59e3865e845be575d827736e2208d6095a3b0374e13f1f66a146e9a38ba16bd93586ced49ef645919feb7900b3ea75cc334911fdf25a3148ff6883c0be829bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afa430a42367a2ef33b63fe83aae8e59
SHA126085b55e58d0646d9511544af7f556160888f37
SHA2569cdab75a5be2bb331be694386f88caa1817ff4bd5560b3be794ccb901078586a
SHA5127d1178c74a1541f5b8d444fc3e004281b448ce7e40b498fdd7ca916dfb2fd11cd1f6059bb8fdb70374491e500bf9f5c918dfb43aa2d00754997709fefcd0f855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9f989e044fddd0c1bbdc40f250424ae
SHA17f1f06b77ec669250870f0733b3f378e7252d27d
SHA256d1900db747a8753527c75c68da426c640c098af51fff794aae89f45eaef62920
SHA5125ee50f0498b5c5e946b45b80e3916f3fb95c6557c47156cf12d0d36318b1c7d22d6376bc1ba4b65a8398da0684cfd91a7e6c0ec962f30459f40a8913962ce97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585ae93e0d97030e85d5732cebf571c4f
SHA1be72e87375675f8c4a4fdc6f8b59aa5cd19126c6
SHA256885ab0b0a1b2a6480aa42a1a42729388de3e9aab5348ed22f6e07c86d64fd9e2
SHA5127891bdc59ec66305634b0c04e2c0ae06f1c4169ac51513f09f77d4fa9a8a839229e15eabadfa77614ab433a40585b4f04570530d71d494c4635df5020da1c497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6d2583308fb2d4b8de5b4e3178210cb
SHA1c7b04b1b4f06edfd434da4c3d01ac69c371e083c
SHA2566ade1ef0037658ff66c56edf7c6c58a0119c9fa0f24a1e13f0ddc5de31914214
SHA512438d32ba0dd52f7f1a0a51e52f85e7a66611392a84efefeb3db0a0fe8fd248e19d8b567e9d37ddf346c471f2d907c4d4776dc4ef6a9cbe9a811e482543add1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5056f2132534d46520fb60690b2dbc75d
SHA15a4ee28c25d81662f393b3b0311e7b27611fb2b3
SHA25629375b8ea0a4c491981e0ea5e5613521e0b1f5b26107c0f0273131fbab90aa99
SHA5123907efb154928147503ebc8b5bc6f7aeb92aa1434c46b8008ce1567b7b6cffee970e6328d2087699782d8e1877887c8298ec4ae5d1fe27ff0a7b92e8c55bf6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c00f09685582cd24fcbe5d514ac54e0
SHA151b8018dac89df9febdf1497197a65bf33c609e2
SHA256add0ab8c2525a4a79c06a967b7c70413117a133afb0e6e73d9354703e2533bbb
SHA5122ef914c7f6efa5c64346baf54f84a5d4aa8d3d9d772c8692440bf905ad8cc357e24ec4203b3dd3ddb65a30671931bcc11e4a50327cb94a07a932ba703e7f2b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b45113422082832a02ad381c1e46f4d
SHA150b015b1c7823773a0e65534b53557c3a2c1e957
SHA2569538d38d828a32e7592ca922b793c37e53fbf7187a66e1f300269370013f4cac
SHA5122aa666907b0db23db34324a71e96ccc50bd5a430ce4387eadff1a4d9113ee6d7f124efa1fb3bc0584567a496813efb876c94292968b5c2549bf5b15b12f04ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e02ab7ae6e9cab46f1e8b04fe855a6ff
SHA1a60d8745749d2a9e07623f2c2f8c3e98b32e7cba
SHA256f5e22bc77af22e237cd42896144a4d429d4a8a907621571b8c3fecfd9b8a25db
SHA512dd8403ee6d3550ce04fb245b7a4cbe1e303da5c919e5a5fee38bbc5f0f4f856fea723cb223ce0a68d7ffe0a1ae74d5d46dfa83442c5403975be597afe00173c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b