Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
3f9d6a850c6ff79e557bb27b32dd242d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f9d6a850c6ff79e557bb27b32dd242d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f9d6a850c6ff79e557bb27b32dd242d_JaffaCakes118.html
-
Size
6KB
-
MD5
3f9d6a850c6ff79e557bb27b32dd242d
-
SHA1
a030c3d72c6825cfe865102db0fbb7c782923e44
-
SHA256
efb84862b803f71ce964a9bd8bdc74c8b9cec423480b727fbc17f0b4d58491d1
-
SHA512
ab959df18f50945333e430c408c2f21c127fd8b7d5ad6b5824a166a74a152098ddbb7ecef3d0e78a854c030d8228b13a7042b60eb5d9f6180fbf97b22952415a
-
SSDEEP
96:uzVs+ux73HLLY1k9o84d12ef7CSTU3wtMoRS0ocEZ7ru7f:csz73HAYS/u4MoCb76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0303e0bc2d4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001785b94a3b858c2b87e33f85e4e194f0a0821d3345a43bc7175c541b7a482ecb000000000e80000000020000200000001224d8ea546e1da6cba5366eeccacb7902d0c06e856d5a5e57f3e03da63e115620000000425c30c60abc50de5bdc3b21a67542d9b97aca218d25322d003a932077b7053940000000e681d4edd60835cd4dfe6c8cc40df58a8975b6c27f56299d8db76435b40edb95d69d06fd7df65857665c70225ac42816e6d079e00527f0a5337bcf49bdc5a683 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36238351-40B5-11EF-96E9-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426995118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30 PID 2664 wrote to memory of 2920 2664 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9d6a850c6ff79e557bb27b32dd242d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e374e1db62e27a45250ffacdd9aff6c
SHA1954a8644907fcb90ffadf2af8ca580479e006411
SHA2561c0df45afef825e72a55f63b9c9f03faab536e3eb0d7ca99436f8fd3c3ee01ba
SHA5129bc266c96c2c42ff4aa5fecf2769c7d770bbbe6e951570642a07d64aca3e539207458d84562a566a11c5454f9d446cc8b150c4535e4fdd81acdf70590310e63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34efe33d3b6cd599d4e8340a5ca0b15
SHA1d189b9a276e2881cb448c45e8e5fc749c753d0cc
SHA2565e465e4bfb080bf5d8a8a5c2ca83b0b2808f4211f34bd7bf51a8896ba95cb718
SHA51208c9522d9e7796baaa6375b519fc71d73ab2b06c714d5e574a5b28e66998503968ffa34f24f8188c3370510e3bc18d0fccf5e14eaaabc56b126895db101e4f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9187945cb6b4acbc42048130b458f7f
SHA119ad56105e4280ffb88d79d8a6012818bf09bc5f
SHA2561f610f76c2b1f1fe95af09f498aede435e7981e8602b7adf42b1e7a6dfb3a431
SHA512dc620ba589d12cb9897f36fb677a65a4efa25ebe1bb53a94d093b9fb13596abbe7c04f6d7bb42302aae9cc7c12df9d0344ba6055c8505ffaa8d1385f6a1ca570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6a5a17c59ce237814aa1912d969f72
SHA127b530af81529c0ef6257d17bb80f0bf1a31b876
SHA25674afeb1e75baf45b4cb74c2a24d36990502822d0ca3adbe4ecf6459d49db535a
SHA5127594a58d53b64ec6f46c01839827753b603b25b5abe787498e1a0823ad0832f8b91b700442aefe0e1b2f1b686bec1b989d4a848152e9e25110e607bddb5a68ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931d9e572bdf47c9bf029a70e4572f62
SHA18017e0da550697035e625b27ebb5afe84c8fbb72
SHA256668f13a941f934e7e512110d30512a340b87339baf6a52ad27e1d6f485852106
SHA512a9d0c34c1a95935405692d851d22831efa865ef5196dfb70e8b4d9c20e667dd29b9c07ad6ff3b7382376102dfeff4dce2926f0a68152db74eddbcb0d505c1379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503eee3f9b8fb25cd7b78aa47a81c5a63
SHA18576e4267331b1cda6b05f8db26d816f2e271fa5
SHA2568185d3f1aa361d2907fdbb15d9dfac8df37c537dd230f0c518bb23cec547d3d2
SHA51235afe92306888a9c3d9ba498437da4e0c32e8e43bd3457419906ac471a6370b8941bb71ab9d58a916c452ac0c5ae4263c578cef88496ed25656e3fc520aedc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9343b17776306c1c25f0aca0448acff
SHA123123bb0bfb4acc9664ea1a3a90090e118e052b2
SHA256b1f1fa5169c8544963596eb53d59232a680aa463f35042ce355224639cfae828
SHA512698f656b390c3d95c710d8600673f7448a108a57d6c3469f3f85afdcca9a4c1bda03c76f760c8ae5de943a232be77cbbda69e3194c74ec9b60f89b722e4f4a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69798086df8e69dbe9b0cedde00f61f
SHA1ee56fc18556a2762a8e6e40555ef6fc017ad9fec
SHA25696d3ffb4b25e310955a063a99bfb0f8917f20f0eb403b1b84044b95dd8ea37de
SHA512eadf60607e5eed1cf542244d21445f3c4dbd48dcfe23693fba68671255e6a60a78caa2e2789ee1044ec802e0c9bba9e947440f5ef0d455adfe823534b93e4bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c9d6d318fe048daa78c8b7858deb16
SHA19ef8a2f6c5af9410098cad00d109f4069dc1d40b
SHA256f2d084bcc3bb4166c30122acb1f3b71285636636e7318ac8d0e78659386b8035
SHA5122267ff20288400e995993e54f6d6079029e848cd8a67d5812f9fcd4863d5a76f5be578dd12ec772f3dcb31fee7bdbac23d374b7eebb32ef811314955f4ea8a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a65cb6f50f813295018e9147a781d9
SHA162398bd8c0731e64198e0d123446c3d36d206aa0
SHA2565996d16fadc0b1ff4a7b673ed44aa2df96d4e0825ef4133bee4eba4c9a7eb257
SHA5129bc3247873ef2b9bb2ef9a354b0071f2ed5e797ce17f29cfce9ce71da4398913bc76761af5ad9b7ea507b7cec887d8600f949cf1378269d0dca594ddf233c874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfde48ac4fe89ee37c9753ec332b1d0
SHA1acc43dd32e93c68a82bf407d441f5e66f5b0e7b8
SHA256ea352e7af29209e8728469ca7ba03662c1d84fa8e48e5744b0a8dab5a2546ea5
SHA5126695b582bcbb745f662c9f379acae4086a3a9b4916075579689766e3901c7a07ca91f0b341dc0910c21a8ac89aa7172977c9234cd690d3034625284dd038a371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc8a9932e9bc2289ed0214d11fa875f
SHA13ceba23ca5c7aabf9084dc300f751a3cfec9bc79
SHA256b57825c81fc1861d3759c221e2c2f7030ab1e70675c335f3ed5b263021bb24c2
SHA5121ad4adc5ea396b97c8e1a14ba993c392e64e85790e99b9a733904ac93459a8cde559df946e4e741dd41d4d9083ced3cb1c0bf25a46ccd9683d8b58ffb622e612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccba1a4c5460f1b1b30ae30917da079d
SHA13e0f914e17828e2ac00eba20e84f766906bf9e8d
SHA25656cf38278e1d0b334179140c2dac870d680d75dcf62c725d270b37fd77d49abe
SHA512ee7fcab1cff6f9038a23104c7f0412adcb3ec8dffe16a97ad06861c3a8178816f62d6b81e0f6d627319b070f0f08135d517ac4587e1a89d9df0020b707513b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e83c5f327f9548dbc8de92d44e10013
SHA107bc594e21fe39c5f9cb04219a3cab83a4199ef9
SHA2565ec7c4cf2253794a6be76e47dcbc05439a9b063a705e257562d153f276ed597d
SHA5120583dbc6c4f8c91135d2c06eb3123fc03ceb6751293dcf27bbbd878af2007d771b458d51e4375f13fb162a32a25e19b5908c6c5195676d97eabf131d34abaa52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aebe676ebc9a6f3d527f1921d1bc70d
SHA10dc8781f67675707818f395dff9cb7c7eb10b569
SHA25646cc1bb8ca8dd175efd0b4f08583ea87033edb7428eaccdc443a5963cd222291
SHA5122952be23e9848e262a617ee7bbdddcbde89b3b1654bb3ddf2a7734aab95c57e31ebafa7195b29c1363438e75e8dd65514c2d728103815b84332f0dc898605084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70e9642026355255d7ad446c773198e
SHA1f4924310c71dbd7268761a33b631107091775e74
SHA25640ed500d7fa71066f239ee4e89ef9983a908bb67e9c09cebaa9bad2fcaf4a5e6
SHA51232449579920795f365ea94bd43528c241441fceb14a1475b27cca4869e0a7269122be05aac5cde8fe6de25eecf65dd6369e99e798928096ea6061991abadb873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10f696d177651a1840c4617e57f8f0d
SHA1b34fbbed9a25e63e18bda75a053f232a31c195fd
SHA256c8c2a49350cef781bd211f2ee952b0822bc91288e7b8944702d6be7326b20a8d
SHA51220b669271523a5a5ef88dc122caddd721cddf7d3849e80d1d8d100e7ec5dd2717a68d1426616701da5a3877851c19b01ca5a98a403c42c7e7fecec230ffcf61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcdc6ee4d5ac71c8f29de088cbc4868
SHA19d5f5406f9ad29ec07d0fffe27d291dd3b05dc8a
SHA256fcc31b5608c0ceb7e4679848e3447ac92535d7b20b5efa1273d8b9ca1139f149
SHA512cd2d46302d12f3c29d4c21ec0955c75e9a88fc44d8264f96a515b70e6274487d5eb751c0bb7551934c43972d5696c1b6c886e72ee1207b91d591f4c4c721ef0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b763683623c5fc9a07b44ed2da134650
SHA13c35e2ae58d61fd6282a82df1ce91cc81d524a71
SHA256fcd089132eda36cd46e21b7f9bec1cd92c5cbc1ad3f465aa448eea0beffd8b7a
SHA512a3a68840e5d63cd50fec2ebb60ba087c733beb793a0141fc0223bb67465f38be8102b0ea9b2d1feb2532806b295c78ba985f7375287d365bfb04384b942b1b4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b