Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
3eb436b5b502606b2e13ff892d3f129a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3eb436b5b502606b2e13ff892d3f129a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3eb436b5b502606b2e13ff892d3f129a_JaffaCakes118.html
-
Size
1KB
-
MD5
3eb436b5b502606b2e13ff892d3f129a
-
SHA1
56b317c3f6aafe2a414c156f15bb515a649717dd
-
SHA256
c8a7d0d182a4984bffb2fed314e8076bcc7de9839a7447b95bc5124b8b24c36d
-
SHA512
383449ce8235f46ab2fed4405fa30b87eaa660d1495bf9a658ca708f17bafc94e24f9af268bb158cafc45b2eb9e8de03c8d5b10dde9c06b02d2b7638fc8fa4d0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000284892079ca7cb803dda5918e6f715bd1d2da687c6656710eaaf69cf9770e185000000000e80000000020000200000001618e7427656ee2edf0239a6cbd2600d9112faf99f199457a00f4f0bca7ce51820000000ac39c0ce64364e9fdd975397bf006f227d01bf8aa0402d66ef3a277513d1b089400000001f00a12ab43892bad382e89dc20816e78f99a21e5f68a3bd04d3ed87d48ba1a96a189408b4bebb4a30715879cb348ecf76ccbb0e33e1de838a6398059c3db53b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29CEEC51-408A-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06f9f0097d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426976630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2692 1724 iexplore.exe 30 PID 1724 wrote to memory of 2692 1724 iexplore.exe 30 PID 1724 wrote to memory of 2692 1724 iexplore.exe 30 PID 1724 wrote to memory of 2692 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3eb436b5b502606b2e13ff892d3f129a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7eca767df8ccaf143d66287df34ec7
SHA1055327aa8ddb109dab6098c167af49b876a44b18
SHA2569bc98867247facbb8af06ed3d9cca4741604ebfdf32f3ced6bc96c3be4089aaa
SHA512c51154dfbb0a8e34f1af6a08a1cb00c8fdeba20e10d437a37b5404658e224c36a876006fe6df7cd10a217020028f53ee1da76f787e66c3d978a33078fc09cfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56670cee3ace629c145f1ac9eacd8295b
SHA1f8e4853655bfcd2e1efa9b5d1e71bad80c4de711
SHA25666cd4558c92309953c8af9b510c37adbe0abbd87d0cbc0d1081157d20a8c1417
SHA512b415e83b2a25870595b8e121efe4778d8eb3eef875cc2035e2d0dc92e1a5d622dcdec2b50f73d58f0e8b7b3ab38f033d71cd9de0765f168d8a4bae1475350d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc330c49f59e34679a742aa64113dcb
SHA1d6858812a0c0ffee0faff0b8d883622140f2c477
SHA2569763bc0ffd986be1bd6befa302569ee0ff7bfb9fa9571bddc6d175efb720a7e5
SHA51241b23619e2c2bec727b817bc6c6e4c9deaed082da9476cda877426e449671e96d86c6ffbdfa46c8c64bf6fce4f3146793ee455fe9bd3337f2304ab5b0160b246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd96498451d85729999934521e983089
SHA1b5a52c49de2b93b915ff77c4f207f0ef5ff8d7c6
SHA2563eecc6ee1169fab4614a66af1568b8c642155a8aedfe5281287099bf11bdf6b8
SHA512d179142c1e06ce33de2a3b1e93ed150e53c53ff7b2268947ad6d64b7614f14b39ec46c82e0f13622c3bc86c369761172495015d76f18a67af62e0126ee8b9690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c356968e86ff0dd9023f355a5ea0e6b
SHA1f50f086e96325eb114486dc1eb764f030330655e
SHA2567170b42de9ca6d2264c33963a6127a48cf94abb441f84da1b204d1846c0ca435
SHA512922e4d7af149d13b274b756e003bf81e03fad3c7f507ac245b8d941f187164d6d4a8b905006e80f33838c13023ece6caedc3f6bcbb4fbc7c45564762104b1025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b60d3011e4ab04cca01e5a27ddd63d
SHA1a97cbf00fe865f71a9a7c4b39e69a52a4e007d56
SHA2568e29bf3525af07bc413739cd75b3968bd7c0187be2c2f7be78f2f26ab318a579
SHA5128f5211164e24606dc2d061f2ae3d99755fb37c9551940880cd15ce7a6759e9919250ff09b36d2e13fd74ed56778550128ae98b96d7b0a964aeb7a255ef221400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a26559ad7a0df613b4dd4cdde35427
SHA148138f1ac80ac160a26f792782e4b1e29f6f5c58
SHA256791658e528f0162a2c61a36d4e3cbbb85346d0cce797d17775a1b2745bb67b1c
SHA51219d7bc6eb121932cafa2735c433f2a0356b482118b373033abccfadaa80c8ad84a72896f39ef430a05e0c4b9ee5847603eaf3d05b68cd096be22e1ba9e28575a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d9a195147fa03e61a9ad255cdd58af
SHA1f148be2e66771c32ebac9a9d8f26e7e26348b650
SHA25612f3a5d8bbed6af57a1754e8996cec5d24384cfcbe2447fa5cd1cfb00454db93
SHA512e553a0b5269e0b763efe2b817177e2ce40a5e34b40e683c6644a2832ff2f287667793ec988aa56f7f5c22dc4d34f0c34337d6bccff01491bc644ed5e1f8a360c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690f27dfd7acc111e8089fd40aba63ed
SHA1de6aca27a40da755b03d16ae215fcadb43054965
SHA25644d1ab3a4eec435f47c0f95d2d8e924bdd00b85ca1fd06d6063bd3c47f5ce5c8
SHA5124651da28ca443dc96edffcaf9edc7d7ef7c4dc70bd381329f3337a8380b65e3bd06a4c86362ea803b7bf4157c80ecb3661756cd2fa5263a0d8cc9c09d2753478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6b8251efcc60e902fec0787df7de7b
SHA13848148ee82988370fb9d159a811f202148155d8
SHA256db6a8e96b52a52c42b3b46ebbabfa2b13bab267c5c3c3aaaae835b45b09d5807
SHA512aa1d33dcb4be74ad685c1303495b48b36b84a5c9042008c1341ede2d50e4744c44c48eeda05805781977d23d1b1b016eefbcc8d3cc351fe8294fa5c68fc88f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563caeb741622c12c015e9ee5f190c089
SHA1e0f8ca99617efa20d876685e24782594c0c45e0f
SHA256a131d8e770050102f4ea53e85cd81859a57899151794a8f10430daf095d2bc5b
SHA512ad51d1af2271cc30b7ee9c750028a811408caad392dbe2dacf6740526b95f9aac53aa81b4db045b829b00e3bdc468a8b6e1d0cfcf61db54b3583f2696b1a445e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818071c7122201dfcd2ade690f6d1cb2
SHA187c361fc41656256e20bf67b41f6bc68ca477729
SHA25605431a36215962805745c72f40b6438b44927770d214a6fc1a01e63b352751db
SHA51267ab934b4f4423b147892914351fa5abcb15a2680c1f41bf2eb330cd05bbd12a0aff06fc6bc33180f415091bfda0a94ece360c0f0cf4269a95268fd781b4f8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7298aea7c9c6a16e0229b0bb1b3053b
SHA184c4aeebdaeff7cd0e6eefe34ff953f5091fab45
SHA2562b81dbf8f09e3cc47dec4b4a514b4da71415e27d46598a5203b06c04c5e14aff
SHA51222aae30ab564dfcce7439fb818bbfea5578b9a3771cd2bc9fc3f085118a79eefaa0af792aa4d5de9a4c7f986f3b675aa75503b1c4cfccd2fdedc41d694b65b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b4937247ec4092bbe50d51419ff0e4
SHA1f0d5de73d207d438d6e9e1c833fce38971354f6a
SHA25679666d20f1df464a8604e342b875cd18174da89f8ffe073d582bc44b1007239c
SHA5121ce5b4be12bd753d1dce36644719cb52394fd44f7e26d7863bf079165b94e5c95a84d276fcaa5f88122beb69dc91f4b16342198fe902bc20b94fbd0905028cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f593ab91f1b0c422ddc8400a2799b0
SHA1c47358ff2613ad339232ae6341299ccc99812f09
SHA256ec8c5db86b3fe1913789c13ee87f625be0c38aa61bf05fdbb1675f6fc72be350
SHA51271090df5e5e8742024f2b69e5346ae94e020596834dce934e064cc8efcf5e413b58f6d134ac750e0b7ddcc2bd7fa3e2354b3e4955303b1ba0db88b5c57c85405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b827add01d3f65c207de3983fa497fbe
SHA18b15106f0f6fe5f1f57057ea012a4d1ca4e62537
SHA2564bd74740a499cb6185a7bc62806e4c68c6b94a6e63e6cd726dc964c5d10d26f1
SHA512f95dbdcd03bdaa9336557306b440c4290f06591807f1068c889842ba9a2b0a0fb60cf76981b8f5a668b31a35435950b2821fafbf35c7a9f2049000f2616d2cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdd6f932390440d01abdb7284ed8394
SHA1a0252f064ed8012995950e4060e5f99b21e95056
SHA256a5535a45d8c599f4c3ba8cc21d10a7688fbd30afa79f9875e0894d28b2a2a4e7
SHA5125214292e5f04eaa2c1237c0846942925853f90adf9083aba2a663117cd5c32be432ee08c9906552d6b5af6392681c56f3cd0fa64085a3383a843b74d8b832f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0101a252809d0a576835dddc90d3f0
SHA142e0fa261efcdfe86379e66acec3a7f79950c4ed
SHA2565035b05a1664585fd9c7dffc85dac9514307276ca6bae367c848f81a1cf8304b
SHA51260df3893f85b5b01da232c68d7603450815592bd0036ce47c6008f9924befcc503c1e6bc3b0623bf2e518afcc83f4537c8d923fac2cdd9236d543aaa7d01dc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933bfae98136e8233b4d598dbb1b8c78
SHA1aa7ebf4657118b6fc575c9f017b0e1aa06d001c0
SHA256813880328f15c01599355bdbd9ec9862bba046d037010b588307524aaf1529ff
SHA512e5688e8f77373b3a3c076c69622be823c00797db8c23446a78d4b9b9f7a07a452ab1ccd18072ccb957147c85af2f910c2ec0eba62d8b9c058f704b1059a86d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638bed4a746fcb548623507041551b1f
SHA18ff3ae7b869eaac6060124e0320200d8c44265ce
SHA256971f9ab4369d7c7e5a04046c009a6fb8c5a7c775b95cf770dcbddb57052d9e00
SHA512db0aac746c5504c374315575668669c307fb999ed59bdf7c45018d500d9641bfae801034f709ebe9cd1b5c1efe74b03556535ed44bcbb2332c9662633de92149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8e998181ed6f43307a3e15f3c79c4f
SHA1f433d4a2e170c39c9f1428bdeaf20df4c47e7278
SHA256813037b9757c624aed172f32e6d5cf8b70f3e02dd56d6f83f0cf69eac6e3e5b5
SHA512d57f2caba826c11d54713c3b2c49db3502705ae331c97a5e400f51cd0a20ad5921dddd4b75a80e2ad57591139b5cccbd896a2da30e97ac2d48121e0cbe510d19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b