Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
3189b550c72d0340156d251083cb3de9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3189b550c72d0340156d251083cb3de9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3189b550c72d0340156d251083cb3de9_JaffaCakes118.html
-
Size
460KB
-
MD5
3189b550c72d0340156d251083cb3de9
-
SHA1
163101acd6443621e515378f1e372e895344be57
-
SHA256
556f618f37bac190dffa86d86fc97a3c6070452bf2087c2e8c084765458a9c7c
-
SHA512
e244b24b088d10a738f562a5ea98358d8861640fe70a8573689fba939b0851cc2454e91b6cb3fb04556da9c3ff0af27e2805acae8edadc68a084db7d099d1690
-
SSDEEP
6144:SMsMYod+X3oI+Y3sMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:R5d+X3J5d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89E15A31-0F23-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104f526230a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421544945" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000d746926c8c710dbc6918a1a32d9a91ab064567a52920808bb0d6d01f0a7ee242000000000e80000000020000200000002cb19a8847e65e11be9d7256e1e535ca91cf0ff8c0f34b2fd44db780a997f30720000000478224cea33c39a036981fde0916167e0765b12e94158b36208863776c59c7a54000000000b75f57dd3d7555a43f698531a194d7e4b1c230e5b2684fad738172b824be994ede140cee4661a44f4e0aa8ce7628c134f02604f84b3b259df1a13083c73bed iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2492 1908 iexplore.exe 28 PID 1908 wrote to memory of 2492 1908 iexplore.exe 28 PID 1908 wrote to memory of 2492 1908 iexplore.exe 28 PID 1908 wrote to memory of 2492 1908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3189b550c72d0340156d251083cb3de9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4e57dced076c236a5c3c4ef9899176e
SHA15db70e6ec22b07a2ceff2c7ca2d09cbc42ec7a0c
SHA2563fd9b68295147220d7d31dabb1c00c421250b52f4fbbc9060f9003cd1e656f4d
SHA51285fbfcbaf25e12a50aa444a51688f4a16a651f08b5debb72ceb3dc46b31eb04f49abf5b092936bb8acf5e08dfadf6939a8b1bf3b406bfa27684c554b23887049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56821ec1eb6088503120ab23f90ae03c9
SHA1590261f07f1cfc18a4c8b1d603b134a80fcb5e8b
SHA256fefdf44bc4d15ce6e847c19ea21dbf085ad26d9dc186e90c69f17fed1a7a4b8e
SHA512a8179af343f2a35ec5831b23be9f60c4a73b5f7f49fc73a9c867c67371c845f5e3aea9975a593d59c27fc09e48ea89ca0e702851454811efb75b7dc1966fa354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdec577c9a14871081010a13255df473
SHA10c1db4bca022fb51ad8c14c70b5fb12c446023b8
SHA25648977ad2b425b1d87058573d4089642ce34fdc5993cc7b31ec03c919f5d29a2e
SHA5127bd6bcadaf952fc5ea2068b00d0a30cbaacd322c196b874cfa8efb29feeff65e6314a4476b0773aff989c2422dce8ea86a7d303f0182d2afe1a9ec74d35d5db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f682e786bbad418fa422aa9d8dd3ff89
SHA1a41414d729572d973692a5e9088598fb38341200
SHA2565b5d4c040386af457b9b618b43f0240d982092d09b73ac4ba90ffd5c955dd2e7
SHA512fe2ace734e862edaddf4d8112d89bdb64b96b7e9c55918bb4e7100ef462d30c6ff296776518e999125bb120c71539e45e3f9aa0c19d78dcc191e06f37dd3c1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a184ecd3447f6f77f59592e29a618627
SHA108eed0b9b2614e9396d820557ee7b22206b8e520
SHA256a4a30195967717a91016daa66558a1988bf47510794662539d67ce6c6a913c73
SHA512abcb2c1d5a7965b52043cd08c6b1df8968d8e71d0c6904b57be00b82f3ec4bf0d7426b4ff6e6ad4055af14207e41ba3821a7e10dcdd1b7887a6ef2ffe4ada1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b7ac22b0f24103a4a2e4aa7b6af557
SHA111c479c41acf87faad5192fcf884e494fb262582
SHA2562ab91ddda711b2c0a6739dfe00a77022662636bbd896ae2d33ea539210ecbc55
SHA512db1f3f4d79bb57a28157e15daa65ee61ef5df04041377258775d3f6fd0ea6c58fdb13596985a343b54e3371470d1fc16af6bbb90839d3dbb012db57e4df2e372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac118a7db3dcdb42247b1e3ef9bd87d
SHA1a88acaa18b044cf6d801721b1d696df1774dfa72
SHA25654bb7eb4f60f6e7fad9653248a203e1706490c55efa5f47aefca797749df72c3
SHA51254c4bf8e20dd1baea0ae922a03a89ee53d478e5c6ac66cd8c169fb325c0843463f114242b4dd695e419713d2d4287e5d5434dc670f417c1c94e50936ea836c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773d7f1bfb6c009ef700b25075c59ce1
SHA16e7f59fa698ff8974d2ed667a9b36931d0802be2
SHA25652fbb338e7bd2d75d1acaa69df7ed54eacbc78b690e855309c8a2e77507bb1c2
SHA51236b65f4fa8c6aa3e9a2ff6f5242459f38ecefeaab09c21c9bdc8e2cfbc783b82ae9b96b7f39dccf6ad46f3058442714e7e73e52714e8202629334e525aec3610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a4baefbf12bb4d4c281cd786b9c17e
SHA1bdb5989d2344149f3fbf3e1fd26c32934980cc6d
SHA256487afd6bb1bd0aea1446a584b104df8e667390df6bdf8918d6fa72aeb5cdd6e0
SHA5123afa647dddaee2b135aa733917e063796e26880a287518197f95a790f32f283e632f36d2fef7ed6b93a269ff1ea6cdd9377290426e03ea6ab934956e6df470aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bf7a0d6633302c98b880a4be4321ea
SHA1ab2429ecc090e661a424c12d80e0927a2904baef
SHA256dfc324fc9562e78ebbe7b4a892dda9bd3a21a2d4fa3d25e324a59462bd000b94
SHA5120c25baba2875be0d86697898721a50153aa284de529f45aa9abb6f14c897ee964c1ec4b0d85a1a2323aa83a6ab97089c794492638a24bf4f6738a3af5a1e23e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e1981f755957345e05ff5461c0572a4
SHA1cda7ae61773765f34e5d32456ac3acf90f04e473
SHA25642712c045281c777ef295953f643f0dcc54ace80a6cb1602de0d67a219a02ad2
SHA512031e16f4be7ccf802c9aa02a6990f2e60102f0e9f1c5b5ae1427c0e4955f3eae49e0e66e99e96b04129e17acec7ac9aac7b1abeb5f3e3d53685563c6afa9d884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922fab878eb29ef2c44d47bb62231d2d
SHA1067e961b483c8f147b08790cfdcb77f112d88c03
SHA256a3038139d1db005b65ba0a7ee7974e16a65aca62d3cb94355d618f7c7d88774d
SHA512a44440f3929f28c1136a611ce90a499d60baf0759a9ea92d3cb1c4345afe38c07a72c03987ca7f53b685f61f3c22d6d73204b58bb705f716990ebe47f944aa8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453d1edd242bc01fc874d7c8beff1fcd
SHA168f489564a880b91127bb1a37ddebc5d6ea2333e
SHA256421f356debe9b7d053920fdc45cb5068c10713e25e51f89b5867988d454ac0b9
SHA512a5280383aa53943d868a4ae85ce5578f98a254ea94436f32a232f04863d1665cfa40efdd17761b41b7c71f53155968c3cfc1bb3b0456b4dfb81d370fdbc8a018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d60811295d1b5b26e4c2c8937d8d8d22
SHA1182ccd087a8d40713f80084edf96498ac3366778
SHA256a1c5b8c725d9da2128fa782ff7c85dc3487a79d1ba7b2ac68b5190b960e91c22
SHA512624545b4df63a31aaaf5909d9f5fa6283c7a6ceb267820a65c6525067bc13fa7b00813d9b2234209a5fec5c0a385cef47c8bbbda87c0df824fcce82416260d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff0f84e2b0aefaa1a1c1338362dae62c
SHA10df276cd1b65ec7b1060d16f93264ff533602127
SHA256ef6ae6d067f6f0b6f5bf3bf1ec6ea457572706febcb7f51fd3d505d8b0fe7ebf
SHA512187f27d68d6d1476c80439f4cb5ba38612c9cdb2c3965280bd79d114d3922e1746258b3e396abfd09eb7cc7d7118635deb64e925fcfb3f94ee7eed99533612f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e791485035f9a8e6c930ac8a02c74c2
SHA1692c6ec920f363312fff535c538cf06c90ba0816
SHA256ad2108c7d8d3cdaef51de72e052948daf2e5468e14e80660a52579261a98db2c
SHA512b97dacb4e644bf056246cfc916f2dc2791f20a0e8f58d679a11f5c18d2524f6eb63dda4e40c47a0ee697a81ace5eb4e9085cba7690b2b33a3d4d90768b1e3d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec1f085a96bb138ea0a5c274c22066a4
SHA171a924bbb5a11e8ba796a43bbb220aad49b1ed8c
SHA25606dd8070c1f27cd06d1c780825dc200a7e04d90de66a200fc4cb8992665d31de
SHA51293d102b6bec763a5f3e1f8536b7ae442cf06d8e93dc3af7e1ebc1840e47ca9a775ca8d95e5253e4994d46a78659abaaea81a7709ce4be24271a4cb0698afb98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5165669d66d6a74da661a9f7f685c9e0b
SHA1fe83e3332dd9c4f34ab1ffcf1bb51d5ac09ed332
SHA256d8c1cf6775e09a73a37b5a2557c68119bf77c3104ba3c54fd93d855bb36242d3
SHA5129bbd264f02f29e5db61ffcfe114f21be5288b40d15e8dfbc9d801d710b851a9e427c2de5477b6cb37ca26b95e4a512697870488255ff1655f6f52dc22966a73a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a