Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
f3bbb4e93fca43d502e53989ac3ef8f4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3bbb4e93fca43d502e53989ac3ef8f4_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f3bbb4e93fca43d502e53989ac3ef8f4_JaffaCakes118.html
-
Size
67KB
-
MD5
f3bbb4e93fca43d502e53989ac3ef8f4
-
SHA1
cc130e4e0ba120d9fb25ce0764164ae76030ca0f
-
SHA256
74f04fa8c00232bde38c4da69cd8ea57ff112d06533a93f1a26368ec33693c7e
-
SHA512
d12bd009bc18e7b23665ea4409f6d0ad0622ba190a64666575b3a235bde51c5f5e1c634c9ab556041670ab0b146783b6e49b4090c8bd0efd9ddb4e39719b3547
-
SSDEEP
384:jxlwbBTKjFYslkCF2nkpOuNL3fwamQVDVHW3r8Io76njtCF5WjLpI6DSX6Sp1UZB:Ws4amQMrMgtu50pZ5pw/brcXOc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419441558" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003f40c537cc12717192b4093f3ba21a9bd897280eabc9c0303a42c1686e9ddc2b000000000e800000000200002000000022c8c0156576552133b9a8755cb613be9ce2d060bb13577ad4af04422d6dfcac200000005f1b67653e59b0f5c9e242007ae2e81ca649a9f4ab17d094ac65b154aae6a9f1400000007c5670e5c127b4dcb94c320e908a13c4d3bd1d034e6cb4db79b8d95ddf684abcb14c0ef056ec3d8ab7d0249ef824cf39a1faee0bd5a6f9a2a98cc36492abd929 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34F87B91-FC02-11EE-BECC-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501342480f90da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2640 2928 iexplore.exe 28 PID 2928 wrote to memory of 2640 2928 iexplore.exe 28 PID 2928 wrote to memory of 2640 2928 iexplore.exe 28 PID 2928 wrote to memory of 2640 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f3bbb4e93fca43d502e53989ac3ef8f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3059af7ae64b7afed79e1367550f42e
SHA1f32fa24b1e024b20f04cf3eea8672f71912d6f0a
SHA256a8855463a3e801054968d7d4c1de49ca9788d9676c4639c747ec39d022c8aefe
SHA51282025d2932094ce82471de115a3c87b10b7c48c6096234435be84b5afa1969a0fa39cc0030a0d2f7d90625da8c9e16fd36d3b988f8f17a442483ea179e669bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534562826567fe9a2f5876870582eec8b
SHA11344e13b3af7e441fb09815c21157f572b34a982
SHA256da3bd65c8fca97360a6bb8ee3d879898272b6ac5c461e6eebecd00aa73035046
SHA5125e40e914b72829dce7e3e6b1591a5b835bf07a068e06a7a4a3669e597be96026250289ba23b7aa2855e69284dea1bf99505857df0bbfbfff6f90514ba285b08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504fda3ecc9a368af59056a48430ac39c
SHA12172fc4a124c1a99639bac4151a47ef03dbbb441
SHA2562b85dd21b3bd0b3834cfef17f6210153be740acd3b8eb090f18b588dbdcf8226
SHA512e6e9bffa8f91c948f10813c1d771d06ba4c6ec664b725217182462d2e18ed8feb3dc70f35901c3682898591c95b4690a3df6722b9e5ae10c35d0c9d8fe501a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e4e2cd44557b3a2be4977c60a96b55
SHA109592ba9df678716181d0cd2c0305c6186908bd4
SHA2569c2b4ec8ae48a05a071fd6c29c943257351cf370d62919dd19d3e688d6020f17
SHA512be1e1e28dcb5d4fd4ab4978b3497d82762d2bda1001b08fea75d74320974c5eff898f3bb457d301d070107829c3b482218f6a37ed5fdbefd4fa5a5276c3c53c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570562bd9993e0fdba91f9077bc3a7acc
SHA1585ea9e6d6dc03d78c9f533b58ff42f9532909bb
SHA2564ad55c2cfe3a6ce9eafe0675a1f5d83f5c75da84924b8f398aa1691f5a76acff
SHA512bdd4fc52660fcebc76ab17e6586cad4a8dbaa0237842b953ccd57be0f5cce9af633681bed33a68f60de1370aef962f5b180c4e4c9b06d8ac34856e77b7741dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53491d9c01608fe8b4c13fc55c3d96ed8
SHA1626980bf659bec1d137f1baaed9fcf8111e14896
SHA25661b89d171d5eb3b4b4f3864398556b610b46b2a70c57ce8e90865a6da3e93b67
SHA5121ed3c4b621323f86e31fb8973a65793d01c0f07b3896de55789eab262710bea69ca7351cc7bbfb243c325f088b04284f5224b77322002a08221549b46ddcd814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e094872a22f63d419a72c83b266150
SHA1e5aa12330e8f117bd64a83cefb5326b886227330
SHA25638fe2f46d535631719ba5fc8c2729a7c83944a61f78872b1a7a93d7d16fc894a
SHA512f5a565396f7c0853e1a1aec41020128787195cc4e1820bdc411d41f1af38f9b8c1f196e9150f3ae769fa4bb2cceb8e77c785eb7a8afed59609eeb44e556b95a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab88a55ff88bcfaf2316267fcf75188f
SHA170e5277652e3264e371741dba2b0a055e222d356
SHA256862e700a084129b033c816a48085a03689b61e4c798a23d60b39d4a03496fd5f
SHA5124a024cb847a602d222c1885a207f4387c6115f2acfa69819cd29bda57ae57c0401e6a625c20adcfbe306dffda566bfde09a099ed69d85774f00b3590aad4fe23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a4cffc361ae8a9ddcbce1f191b56b2
SHA134b9e47938e7c2a90e732be4f277c8e0577261c8
SHA256f89171fe3394ee7927f797f616e1a8e8487baff8ed8ca3b7e7b9b57ffd2b4140
SHA51265260790f504cd3a1afebb3f52056cc6f334777dfd1f1f8960342e121705a8415f3f0c4ce0a75b2d4a2cbbe64ee022d9c505c84c8969b9e00fb9fe1f8091f40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bfdf842b647f98516c739a0903a7fcc
SHA11ee8c608f35636c0539cf91c17db9cc163f1b6dd
SHA256ef37713a775dd58ec199ebe4fdd7b3ea2f5abc3106427d7da7b9de2fbf36721a
SHA512d3c68da51a23c917f8f20c02787a7cccd7a832cbd1ca0018c7207e7f91face79c5faf0c2514a186068d514097099f6bae089387260cae3d08586fdf9c2946171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81b398e82d29c56d03fbc6567a7ed28
SHA14c164a69648d3fd752e88f904dea495c751f53f2
SHA25658f32226a7d3012c420da9bc18cdd22625eab48f698c6556e3038246fcdf43e2
SHA5124ded9a40bd68496cd105bd3297c1c95f200e1329e30aedee702706833c7173a61be52bf8013a95b9183adc95da3fe65116bd5fef68b5bb44b349ff943a130689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56afea41622bb9a663f3374a4348792a5
SHA1d886aae9686d5e3851227818f8dad91d09a3f4cf
SHA2560918387e37dd1158bffccf8bb84d8aef6a618ee2ee01ef8af47ec8dbc0f7f80d
SHA51278a3d49b8dd21375244e506cf43a76aa1ee20c6d48728566a6eddc087ef6178ae754c3efe1c37904151c6ca1d781ede84f175624c8eb8d2427bcc45ed4499d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be72f85c9c30d70af812c4287fbdaa2
SHA1de343985e7d15540c149be9eb2c5bd5716592a3c
SHA2567777bb1eade0169f124cf2cd68afe52e778af8318e84e1d1984d8be788730b49
SHA512ef77b84b28504e928f07319b007e05ea93326937cced18272624818361073ef761cb9c626d67ccc58206d8b7861cb1fef8de28c418a2605c47b79fd4ccc33785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51158e8f608b6cf636cf846ce0a7d284f
SHA11ec83094806a4cc0ff8bf50a5b6d192b9d351ff6
SHA2565fd6a1192e96cc45f3936e1d2b9db5d6a2fa9a191f408ff288774f26d5132575
SHA512152b792705cca6409ce21c3d54b123162ecc10651d2886d5d28bc4c3b8bfe610c1112defec8e032cc9b71d1608d6fbe23560aea14ebf54dfb410b491d6cad3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e573bdd7a78507c1a971392a6d2070
SHA1aa164b2b04fef39ddff9603c4f818bbb6d542edd
SHA256fa020670e31bbfd6bc32434dafd453efaadc18bcdde947a734e5cfc5afa8efd1
SHA512cb9cba7cdfcfb5e48353dd9c187276849cdf82f4dc4b23d84ed9af4d1ff03b076ba5714e5d5e18dc320397fc3fa9c923552c9d5715fbc7bb2b00c7a2523ac543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed8d43c2e0ab7000fe46283fa719babb
SHA167ceda1bfe0cd0898f2cb4467198983817b1d50e
SHA2567969bfe8a1714b9fb69a29b8e658729ff7ade34fec64336a6db9d156c35dc4e5
SHA5123917230e8c1bfacabc6322619b9a5cc7f68ebca32aa4a5b6ea1d15a64f5740141ea489ea2ec3a571eaf747e16691af25ee844fb2697d91cbfe2e59209438b262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23fddae0411b1f60a4a66c1807cef2a
SHA16587da906a89036a8578897d2d9977687debde76
SHA25692be61df4b49fbea589b39118530954d828eb355790ecd6e11afcdc350ebb07c
SHA512ccee080aed69bbea458d7aee07f63c5b41868cd07f6e7ecb8fd1b124542deaf3c522109bb17f9b07aad17c33abca3fc05ce1a7aafd33125a879d97c4c19b74da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168d91d01d40a93d3137a8a8497db8c3
SHA1899029108236757e2e78138a72ceece1c897eb46
SHA256d889dfbba0a7cf829bb4ab2c8c860e97e8e8c01689cbb836f5684c635ee73d1c
SHA51243ff2077d5d4c5fcf91ab429e80e0e5a9c9db14b8e1924b4f99e53145f248655117f63bad99b2200725f4d781c45aaa74a6dc828caf46ca633d112b77adfc0d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a