Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
-
Size
122KB
-
MD5
3e2e14787c8cbba2592fcc4a4de57951
-
SHA1
e2d262a8c8e638ab81508a35fc4274ee33a924e1
-
SHA256
5d97da550a7dbd1ebcadc9edc8e7074367ae28791850d76599c5192344353fc6
-
SHA512
bb6d372795feb21d8f449443e17524bdfd741e0a1ccd545f87de0abeef5a22bd38c610844145059568f7c040334b3c4be71a99511ef72e956177a84264e642df
-
SSDEEP
768:oxFipqMbTv8S6IlvZWm26eHw+8J8EV/6XJqOi4QwJHsYYGP4/U+61b1Ec:oHKHHV6o7Iz8JbCXMZ4/uTGP4/g
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8050686a7ed4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73FFB251-4071-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426966017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000087cb1f5d9070257430e98edde4d2aa494af320fe6b834803395353bbdc6b4faf000000000e800000000200002000000083a15f92167aa8bdb1450ff8ac5cc1e2cdb57a58d00a4242be80a7d6fb2791802000000050763a752631ae7c33e307e1d81f647847c0335d9e1af71a78578ea767d63f03400000005d3aab21752711ab8aac2759bccbbc56c7d099a003189694b5e1c0c2d00304132cdbd9d0dfe5ad3ebf564d90431ed413d7e9be67a9bcca78e9f273cced8085ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2104 1652 iexplore.exe 30 PID 1652 wrote to memory of 2104 1652 iexplore.exe 30 PID 1652 wrote to memory of 2104 1652 iexplore.exe 30 PID 1652 wrote to memory of 2104 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f24804999505abf2fbc35d611de6410
SHA1aae2685402d3e16aa7c737927dac44015ec9d1d9
SHA2561dad63e47180e019ce65519b05d3af04690cc25f4012679b7a3b3efb8787f84c
SHA512166eb163b99e44fa06f2589fd8765e5709d62a0a9a2fd704450f292a394feb55cd51988be32a07e0fbb612831e8c03b2e81cacd3873653c530ea8d99fd70cb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077bccf9695620dfe17c051957dd3ddf
SHA1ad8cb4f59b150ac6960b7811fea3ac4dfc9ff0c3
SHA2564400e348783b3312345d180b360aa8439c2b1c5a1d56cc5ae055b966f0532bc8
SHA512f38a435fa124abc80dc1212efe9ec7df3ed4e228d947c004edfa4740366386150716cdc29e6ac1f335a6ff314fa069bfb32d4b01ce687963555bee90e00306ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804740c2c0be8a76c19b8ce4519b7870
SHA110b83819a637886145afafa9e604dc92da0a45df
SHA25624b2b8cab290e69881059ab2d1cc26bc9b0056ff2e3e73a7ac32cbd56730adc2
SHA5122c4338ab7a7837cc6e9046a537a9fe7deb7545508635573c897d3e18777ea0bb21fb8516152a326c310b5495eced0bbb3294fb806ff6f30e851cdbba17bea864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fe18d50a45511ee179121765d4a291
SHA1f5a88e54db8f5ca93ad279086834628cc2068775
SHA256c1368376995077bc431c14b9eba29ede12c7c268ff07afcac07b3bc4b0a5bc80
SHA512b19f4f98e04438aae4fd7040aadcba0e853e5d787dc978010b1bd17ac75e0c6829addace054a0e8096259a55cac79c510e3dadcb9a8593e2d6f120b492f10bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58106db4910f25230133bd6b6e38a4aab
SHA1c30fe5754a1b044add2f210a9c921886ff52fb00
SHA2565e85f2719a2b309072079e8893e2f8b835615b16c084804da4abad7b80e45932
SHA51218a6e5375fa681bca94d5ed8adc007544872ff9a2bde2018badc34238d6c400979935d986a3ef4768b33c610ce0f2d225540760bb61ce37bcedceae57dbdd986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716e5c09e73ce66c1e92cdc1ed727eb0
SHA128b0cc5f13ceca23ffe86034a29528412f9e276a
SHA256511d86b3ffe34375bac8007faef28c2c3b40bd5c29683fe7f51473757d9bb715
SHA512b1a068263101e252e509963330f37a00619c4c2081168d7885c755c557aea04a6762c766d8edd754ccea7122c859b7b7d55a4a1f0d93f55b0b2274ccf3017a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949deba7609bf5163f8e8f3fce8fa472
SHA1c81aef82788176b266e0fbb59093a747ec7daac5
SHA2566713d188f4c11cd953badc998d4f1a822a000fa9b243375e9749ecb797dfbeaf
SHA51239f2e3e435f83d66a4ce59b99655d373f47ff912ccc0e5994e5310761b0cf0e8382436026191e16dc457bf9a9bb2f6bf56b97f5ef2b7cdc08b38a35d996e0922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c31970127138dbf28a6b7f8572baa3b
SHA1fc902a1ea42ad8210b6dec5e279bd22c4a05a89e
SHA256232fb52e09b129bf980c18c7c0fea13219d46f37616b45c244be2334ea5b1334
SHA5120f936b664422203906dfd44aa39e565ee9756549943364f5c2649cda8336edb25512cbba1931c684fb2151ac8ab5c27f0c7768cf187116f2565d49a7dff8643e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab817b59249cc0e257cb82a5feb2197b
SHA10b559485b6573308d4dffa96323e31b268926983
SHA256477ee606ad4b2c3924cd9759c0f5b35d427b5076d7c0b4ffe379efb1a36e16f9
SHA512cca8715fb2729d4be8b167df57496fd04af5d07f1a7da4f401d7e8631487e08dae15d7716b3a41e57a3421ec971aff488bc52c816ffb967a68c2ed57ca0241b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a092e6c3b67032df46b2c22f6abaafed
SHA111036e15997631893172aad4caccf04a822243ca
SHA25685b10fdfebbd6e7e8ff989c1f71c5685bdd1668c7ec5da44e3cad196f404f374
SHA5120de9b44df6ab4c3bf6a9bce738d033e08d6ecc57f77213ac4135df4b12ac5d8056432ba3f2ec466237b14ae4d857c09effc1ee4a274cd8337a544c9f95790a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51116a9280b7e28bdf704b4ce9fa06be8
SHA1c3818abb34878e27b6359a3032259a64659cd1fe
SHA256fa7f16f7aca04a77b9b418f156ff1ebb750b85a65798a097dbfc1f0f333497e6
SHA512f44353001eacd20f0bc317781342a79ac7897a63ea7b2b525e551db13ac31eece473baa1f4ec926f08807c45a3fe6708cf8395e29d87577b355807529d047fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38464638ae5b9321e1df6ffd557d257
SHA1c61f3f90ecf514be99c1a3eb3f60bd0652c1452f
SHA2561e560fc6ec4236197c59d9eb512f77ffc4c1a7b98cd7a46c2c7b634c4970bb84
SHA512c92966bf271799666c482ee41872844b97536c0aacfb933ba226424f563c05c9994ccda667eb6103de09e4d4a263ae4b04b60e111ec5177101064ddec656605d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0c23ce026f7cd8b6a8135730b10dbc
SHA1adb8719fc069fe00447cba8d686ad991f44bf628
SHA256c57b579baac26679385fa2248355f25563e718abb2cdb61101bb9b476ffe095c
SHA512b2e7d5fdf12f5bfb9380279108d30d7b034b12b4624ce47f9703f52e45a3abba1965da2a3c908c58b2a65fff107eaf918eb5f7ae9b96d1cfbda429809e954ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6496558e19c3ce2f62521887a10acd8
SHA112fb9b17a729869190798799763f18a51278fc23
SHA256bced3547ad9011db2a1a88f07fa7a8b049c688bb7b254a753d0d8cdc04065665
SHA5126cce3a61d8e5ab8b5444d399e2e9fab8319c1060fc3a2ada33c67112be1d069976aec4c9bcb0801c5cb9835d0da041ca7c54910e5b02a9e4bb6223cf30d1c055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bfd902637ac29669925cca92e99c2c
SHA1cea66c07d8ccd872361cfa82c78e617df9681fa6
SHA25663c3f09e16994db40542d861438802032d2ff2c75790a289dbbbb18d19b49574
SHA5122bcf92f9b9d57efdb032e5ce51120484fc182f7807903b0de69417b5e8a732c3834b98b36963ffe544632b41c6a97aa39c07b8169102bc97c54760fb1de9958f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5a28328c836f5abea01043e655872a
SHA15ee3383ebb0a93c6faf0e2d27ed45b979ad1f2d7
SHA2564bb076157da8345c3097779157e57972578c6bc5320d1e8938daf548fd14574c
SHA512c0160ca36da66e408f9e3cd39685746eaa70263614fa751cfcd9aeab669826732339c9cb981bf2dfef245a5915ea17c296ce276909845db3cdd83b8ef3428254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec41aad04211cc696186e53ff64e7d76
SHA16c85ef08d115b196bd385eb3c15508f37fa0e96d
SHA2569ad4d7934acd207c7b13d892342bc9051dcf17e81ae110d5b78e34c20537df6f
SHA5123be930bcbe783132881a88a5dffc1b7f600681f5e4a74622955cff81b342619d82e708058a56bb8a6d21eacc7b144e4576115aac3fa0ff9eaa8f84b739744702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51c0ac6a0c18b7127facfa512262844
SHA1b9edaccc823c97126da810b179514093279847aa
SHA256aa43dd392d62f18f5b7107735211c608af7535b9816cce5afaa0fd5e0e2be7ca
SHA512d1f3e55053ca246a3461df94964c09f764aa334d79ddb94d7fc1d1ab39477098eb63b0f81061b5edb54f09febbea41f36ba6d88df9e5b513289c750579fae622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163c8a0582c0abfdbdc98b6cbb81d759
SHA1352042556861aa632cbcef70ff29e2a44c4b5d4e
SHA256192672b981058002ea4ad82f3cf7a6b9940e2e20a797ca7c16f18ad79277f46b
SHA5127b2fca2a6f9d1721d969464ca7d3f7a6217d78ef20f4837477dacdc7420eed3611dcf48074a4c625bd6f071964b4b983299800be5e8af758e09932525c4c8c8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b