Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
3189376c453ce595816abb11fe95ed57_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3189376c453ce595816abb11fe95ed57_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3189376c453ce595816abb11fe95ed57_JaffaCakes118.html
-
Size
68KB
-
MD5
3189376c453ce595816abb11fe95ed57
-
SHA1
b7471fb4208876d1cd2f75733562958b3b0f9b72
-
SHA256
13992ef04f72bc29aa0f6c49f6fafd1a7898b4073ab735aff5b9d06da58bce73
-
SHA512
d7c80233b94d4dff83dcaf52035b87300abb2b5a3a3cb6b116129bd8d7525766c4522bb1e655c9c2f420babf73a01b45031665cb7a3d66df6c753d750838eda6
-
SSDEEP
768:JiWgcMiR3sI2PDDnX0g6U3MzUMcmdEmNMfoTyv1wCZkoTyMdtbBnfBgN8/lboi2h:JeBMIMFdNNMATcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cacc4f30a3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421544920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a9d7d335b7b1b98e89cb6859dfff5a2797830f01f1b38cac131ee5ef5796aacb000000000e8000000002000020000000aedcdc3277510beefd377a904b285219377f55045ba00ba96e520c19a05b51dd900000007b07f59a972bbcbcdd2b49977743ce77295b3e683347945be1a14031afd512be1b04fedbf36c644a2bf464737fbf463dcb78ae8f393775438cfed7fd84aa3fc99e8ca75f5a058da710ebd7d8e71da395f498734d9d045edcef8d5634f0a507b8481829783f9cced0fd911f5a782008fbc7b22549c5fef56cf79157f2f61d58e68b2a7f0a3eb69a3177957f5ccec835a640000000bf603fbfc183eb8ae0972acac5a6bc2cc7a91e2faeaae95b975668655bba6a9bb0a07f289af00da0293751c822b933320480de66822ee90d1faa3f53f50648c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000001f25067b75d093133e76a098c7fad7cf50361c559c899e2b833babe972511fa000000000e80000000020000200000009c39116dbcd6a36d3366b4b761277e20fbbd9ed158cda54b9b28e578f97c0f3f200000009646a0a708db9c758730a9710f8f9eb76a408ab8f65fbbfda58618f4c937d2a040000000125fedc12f5fb552802dceb7bb9c3e3f114df54081b9fa4ab5f007b0418b837e064e163c95f3c0514cf3d59884648ff50c71e5f05c744b89b76a1bb08bf0b21e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A698371-0F23-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3189376c453ce595816abb11fe95ed57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522f3d0ffb33c8e055575eeb779f47bef
SHA1ad05b434d2b447ef14c13ad436e1f2b234813c05
SHA2566bc3e207ffb996671b4346c00dde000805e1a50e80bc086d6c0d5485a5af92f0
SHA512bdd6ea3d4dcfe949505b1761d433eda5274ed2d9454537a5978c619e4e3b6a78a22101df57fb464873819aead049f357103b5f9999e9f49b4f1e9dba1cda089e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598444063369c966254d158a1bda49bfd
SHA13a344a2d8bcf18f2513384c53b14e29dfcf0fe1e
SHA256bfa8256148e014c26d73b9aafef10e5ac9f4858713ee14357a057c5855294162
SHA51284273a2c3674b77444db42464f3db4e6b69830debadfc92a9a5282cdd90132d1cdb7ee21e8af3006717ac5c51ff16047f612034fa0bff02b8e6ff35b01771906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36dd7bced2ac37fd34ce2bcd3561ad1
SHA1f641c49140ad082e7a28e28fa5b9bfbc52334f33
SHA256441ce64c8a6fae1b522d3df71f1cfde8f00e929c7aea4c102e31488fe62bc9b5
SHA51214962de336fb773d6544a2383949d0c440a72f67bb475f065188b5f9cb295ff6601633c576b98db1491a88b8962b9a50ac3d19d77fac5bf2bd200d4101e08ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4154f838e5a9b65bdbe6304730b9d6d
SHA16e739fab1618cde3469770fbaf382a7a137c0f99
SHA2563b9eb8b74e13ab129f703dc73546e18913bc4be5f45c0134c49ec382c3eb18b0
SHA5124b7cab060b63126aa632284167ebf8cba4d7fef997d58666089d4df86b6ea015d01d8c2a85c8ba2c0394838961e06260d2cfabda2758cae938851368a83cfc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac4ad4afc73441ed2c5803b998b5b20
SHA1690515acafd265cf581c92f67895a7cfddcbfb89
SHA256fc16122ad3bafb4da1f72513a174942b3cce5719a9436562ab098d4a9ed74045
SHA5127eed099ac569fd2d27108fa9c8b1883426cab58253d75a9bc6ea11045aa8a965357448e1806586258054a5c06bbd9b074e7415f5b28ffbe187dc41cc5f5ed882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbcb459b2afa15173bf97c707e9d2a48
SHA1efb5b8184fb651bca3b22d3fc44d2d22c1b63f6e
SHA256ebb1bf7f8dc199a675d392e931f04fd4a4ffd8f3638f3bccdf733e2459f817b6
SHA5129eb17b8d84b2a7ef99b823770031b03ac7ae29604a4c9079f5e435f1032ec9eea97c8bf9ab1431c1de9f2b071cf8db7bac071dc9f27ccd44fa3c10e4ac78557c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560be1ca23aa205350728fe8958721c4e
SHA1f1df86af82a239188c05a30baac8fddc9671d4bc
SHA256f8ed361ccce44be9947c6c0fdfe97f2ecaa7f64c28d741149e4ca522327fac58
SHA512d2581e991e94a9aa11763736f474f3514921e7a50eac9e45e46535dc2da5d0daec3f87158d53cff8777743a75d9500c1f8e65757cc9dc00ac7bda1bc68d52180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e5383b40c650c4972df3dea45cdcb1
SHA1444a1a9c8fa9bc7bd55271cfa022e26203474501
SHA256b3a2ca4381d73518ecefcb5733f08c511374e8325fc472d06c6af35091827a36
SHA512931f8497aa6a6bae3582b97d0ec10b7b41b0ce03dadc14dc8cc4d0b89b86ed0831821554c163446619b0c301b8889040a47608abb1fd4fac4e382170e8f795bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5659536ae5463ad5220c137f26fe5ce91
SHA171e3a60df0a11b4228962176e9249fa40043d80b
SHA256d21e22d981eb3a0473bd6d228d21954664ac0fd2c00b58b2e70231f7ca60a401
SHA5121247a4f6dd6af4f1e33f66fd562d8d25613d851c4c1b6a18184958e42c0df735a70f19503cb3815400e3c3b4fad1b019054bfdc0db5b764a8fc5257e70a23455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a93b1b2d0a063bdf5567c821b0b2041
SHA10f0a7d09dfd6660d5a2d910aade15b5a6e051799
SHA2563bd19a5e0af8c106bf472d51707d5a3472bab4426cfcc36b812b20dfe01739ae
SHA5128b48aa6082066135e5c766b87b9a3a1eea7ca99bcb1350424d027fc05bd56ee5ef2114c9d7a195be23bb63607236d3a70f05fb30c4ae3ba7b5838546bc73b119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd45fd57fe159f530ed57151abf68dd0
SHA1cc60327f9b31fcf1212cd50652e2ce4485322119
SHA2567d679c22c15a1f05900df914a91492c1c025eb8eb882e7c6faa3159cb3e18976
SHA512d33aad7d5215818a8b91bdc001cfa4047d48bf0251cded5143c719f03ba2da35f6c94f8c6807e2ef6f8c9dacbde936adee74f781b496bea9d28188c0172db575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffdac2433b3b9878e4c9e4dde1c95db
SHA11766f8ed0b0d6c0da97ac0284d7ec868c9b59eb2
SHA256ad344fdc7a351e9ab8e7d92508176ff5453d2c0a54a605e336f967884696cf30
SHA5124ec792e1590d7179dc46d2bd21d0641f90e6a553fa515121a8ff91ed226f344a9f2dd7f7e7f5d008d87b43261530a56928d7b9529a819d54c48844cda8474f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06eb5f02366310f40fbcbe2efedf091
SHA1acfb0449e496e64e2714a42726411b559244adad
SHA2568adc5d22769c41bdc6f4f9fa6731d5f9864ba3f3455895d526c573f43fd60c50
SHA512b90068e280c87837ddbcc529123992ea37b18077c514095cc1ae45f40ef67e6cb9c6ce16e60ef0d1c7ef0fcdc3ae2e29c9802aad8ba482a5b365364bcfec4f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff03b023927b1937f19bb110792f1c14
SHA1cc38fca28a2bec09d0a3b67299730b1ac31acf69
SHA256944fb73ddffa74f5d90a7d011c318be3037dd458c4ff90041a4921e01d59f390
SHA512d3e260901546ef966c0708f0d2542065ceb6858edaea897a84881bcea9684b6530c94c925703c7541a69b8df85f9c48c965c6ef587ae6369ad4dc067a1fe0d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50021eb9c73213e6464ed314d3665b184
SHA16e927aba880289bc37f79873df6f53506340d16b
SHA256be22fa90ac30c63899b67fb0b42c09818804ee3692fed0fc394b6e600c73cda6
SHA51244831a7a07b42eab1c767332400678cfe89c4f06caa9482bbfb204d0b328f4ee419c35666a913597e75daafa7b65d44a66dd5517f6abfd88eebb37b08b0de917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523eabfda5e270780f2df65a0d9b537b8
SHA1e3a356d779e715fa8f00d7b74e329adfba095f45
SHA2566d31a2cbdb8a63cfbe1cd3ca817cd911a5751bac4169596490f41e67df6aca73
SHA5123f822d6d553a96f0e93c5372a8f234027bddfdc17138ab35deaba43869fee40b4c24afa9e65edaf6b9da5ff37254ac6d2fd050fd1b0cc7c0829c944761a5c732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5737f8f55f137999cb11f632ea3388c6c
SHA1e3fe161a0e33e3ad88cc2f6f44a1c711bf54288a
SHA2561ce6b8596bcc82ea211f9de3392037ea6539c53745d1d5112bfc4ce5b4e8b5e2
SHA512b734fe8375ec4bd10600695e5ebc095fdd414267c0b7483e52822b87a2da2e819611785a0b5ce9ff364c6056d765c81588f87e2a82b157c9f1cb82c5ec3a046b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592af029706f591ff05a4952e91528239
SHA118c883f0a3d5c8976aa56217b13b2f53d012a880
SHA25678d38a2eeadb4c947d706e6dd9994fe8062adea68162ec707742a1bb8af294dd
SHA51285346756e1dbaffd1cdf4d3ff1b96a58a8e70313dd3fb9e30a8d531826c997307285adb619e7de989009612b5eb1f72b1af06eeccb2c5ac70343eecc5888bc8a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a