Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
3251ee8f2d09080c5be34e956853d4a3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3251ee8f2d09080c5be34e956853d4a3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3251ee8f2d09080c5be34e956853d4a3_JaffaCakes118.html
-
Size
30KB
-
MD5
3251ee8f2d09080c5be34e956853d4a3
-
SHA1
8c538059684cc7de014d4f28daf0f771cea303bc
-
SHA256
1cdb2488fa558a8e5951899481d92f30ca1a6eabe12e4d1648e95d4206344133
-
SHA512
8552689ec8f1374ba090a612999866b5e294cda4721580c63e3184cd4b92a5d476dd0ebc944c69b49d209d1de06f91acc84ca7daf5fb009d6617af5e3a7bdd56
-
SSDEEP
384:MC12DGkGfGJG8GxqGDG+2VoRvQ/6K+xYQ/P:MC12DGkGfGJG8GMGDG+woRv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{830B4461-0F40-11EF-B804-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000054bd3db581a28a7093613b18b50a7690a90a492c3c6c1ab5938e10db83982164000000000e80000000020000200000002f1b6b153f6b59a747c45358b815c6eda64ac75db064620f031e42b8c9e209e4200000006655f28584c85d7e6784560d3589c68415fb61ae1076046aa0853bab89bf8b944000000002232a507967091ebd8cda35d1150e1150621b7d4b95a89c321b4417a7bdc017ffc0b7f9c3ae964b362bd18a47c8f2b99b2947b13e45856dc2752685335a0ef5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421557389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bda5574da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2136 2844 iexplore.exe 28 PID 2844 wrote to memory of 2136 2844 iexplore.exe 28 PID 2844 wrote to memory of 2136 2844 iexplore.exe 28 PID 2844 wrote to memory of 2136 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3251ee8f2d09080c5be34e956853d4a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4b671dbe6b55af35b521c01e7a58de
SHA1912fcc4b4a773ebe02359890b15f9907c09e8ff1
SHA256f7bb845d64b04dd6691edcaac0f1104c2c84d6319e2ebb05d270efa94ce387f4
SHA512b3a43d521f876141c119feb75146c029c66fa9159e6f4ab6fadd7c00ff6ea42a224af81d30e796c12d25a5b9eb1a9f429ee4383eefa1818e22f7ac84f635edc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581325e459c9934ae36162e5aacbd2b07
SHA1fd069dcc943327dcb9e5cde28e0c2c488ed0ee07
SHA2561b25db54101e69b50b31baee4ff56854fc8146793463e62bec4766edf20850d0
SHA5129b07dfbb0ed3454883c8cdfc73a033816ea4abff4238daeaa3e737be9b7ee91053647167c2b2c2478c883903121d68f6d04b2a644295cbee3ae89ae0c2fd38f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840f797d149e6762cd9af4ad5c139b9d
SHA12c0b9d45e85f54ef0333b7e346dec59a5991050e
SHA2569eef15f5b7f79698518de632700e6c1d7309e4e525cb8cefde3e645a7b30187f
SHA512499b842276befc369ce9db241f420bc665e8035dfe542935528dd3c03a99ae4751d122700dbd85279baf80190b19f87cddf1ecbba1fb1e47ff0d6471a4748a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2f6875654b5fa4bb4d5f1a9d3200ff
SHA129a806c38f2c19d0b52f805a8acf6cd028108b4a
SHA256fbfdee15d9c2f726d155199ce64631606dc1bc77f061245a59e9cb97d97497d7
SHA512c4568a4919ff52d9db4f61a8b3b9c55416ed815c234c42c9b421b0343673f2f601d2676edf4bd11c8b1a33137f3af02edb143780d41b0a8d680833ef7456511e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e18d3bc8c384eca417a4d744d7cbd3f8
SHA1012452de553bf8b1995a77235ce17f3f5b7acb9d
SHA256f3f3282f995fe06eb701ab053d7cc35ea67af78dbe74adb632a2a6e39ce854e7
SHA5128c3ca469451f7626377e74e3cd396d98d42c18fc2d3c89738dc7ccd2f67b7a8469b3f6826e9f347c87b082743a8f232aa7e33c33c908eaa5fb4e089a29f3f783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58770f87a16159f9ce8ae4653297a9365
SHA1a62328dcd7e014d2e2e5677a2fa02c103f90e8c4
SHA256f177638a9fd538845ec9cb5d67155b70317c6b100d06e57e9a8ef732222b3989
SHA51289195a12dce66be4391f79cf94b4738fdc5e8a54b2b8e0241f3227428cd6e1dd0007af84eb703b4ec4322f12297abdd47f10bf8b72d0a6429e10422aca423613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2384f12c0e3c2350a13dcbeabd6717
SHA185c4022cd8a1a2494605941ed489edf58d67ea53
SHA2561dbb8cd67e4d619729e8e0bc0edc910cc924d97ebf511325befe9d46e17a4704
SHA5120272a58d1fb05a4c5df8385be739acdb2223672acfeda01f69ecfeecc658a5f8198a3ebb0cb2565f0202f3a2e9759f15af65aba56e6a29f808a60ed89fbf727b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1da706101f1a5ae26ada2a1e10c49b5
SHA13c8cf450f4521a036240f2b823698c10589ff604
SHA2568d2fac19d77cf598d0348128e522273a5211d6cb53ee2daddcaba7c54d8989c6
SHA512ba6fabe18f0912b3fbd4f5420f2ce1a310843b3f45fe8edc1e854a63fa98405528997ccff6838924b928786502bf0cec2e6e27c40aef430150765ea811b18eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab077c5bf2ee805c37f1972c56fe66d3
SHA11a0b5a0a8bd3b3ab653dd9b636d2099dfc1d61c1
SHA256e7b2f92d49e0926c19b944e6fc8c849dddbb7d346d9c1053fab2ed9e4ff11868
SHA51234ec7c18c5a5a7a11c8a5e27c1906a3ae982d39f05717d895823a8d4bd218c2dc016127d1c1ac4593b48053dcc1b76ade8ef73ecc835b84306f38a7f86a960e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e714c21dcd9b97fab82d60ba392ac608
SHA158b42a4c9adb64257c07bb0dcf7e78970019c58c
SHA256dcc674807e2461811c8c88e826dbf89f4d7842c4effd2c04651d05848b4f0d11
SHA512f5560fda45a71c16f37daaae6a2b298b08183fc2c9b44c334e3d20db471b8ca864eda56c8b8d9abaa5ab092987b70946c23e3f759846376f213c65ae579f4dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142eb11c15d90dfbde2e710c865359a7
SHA1bca1bf3261d5484a465908aa2271430cc919ef84
SHA25645855b48777b85c34a2053f3d875e8f05ab1263c5bd8863cfe740f33e0709b49
SHA512b5712b6bf483bdec80aaf9bb18478bc0c8964538b0f63b466f3e0f81e956aac58a53e36ac43a282d9d3b5a1c595f4830d169a8917d56b7c912c064c76b9cac90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152290cf8c674a37adf0d0258b1e3d54
SHA11fc656a3927979d0a0665e9e4ef2e33c4fb906eb
SHA2569a2c3a123fabf5b4bf66a2a8267c433ce118845c4c5c673c09d836b8eea580df
SHA512db9dd5479fc5a8b0ce6abab403d4958433e170cb646371c5e37c92d77ed69a93294f819c1f438c80bfa4c803f95653357b30a573fb702f68557f790414c55eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a88b696698eb70735afe4c45b64ae5bb
SHA1be8e933cfad4df1583bd09652c6a4407cb1eb254
SHA256bc6049f96f6f38c7fa7fded9e07973c08fc4b5683eb9a797dfdfb2e3f97aebfe
SHA51250f678fdc863d7148c4207acba640776a50a6509a7a0a52a1d4afd513317f8121b3d0c72a05620e627302bedb9e22ed39c9da26b80b7d814bec9bfcafd117cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c623f0561dca0343688733438f6cceab
SHA1d6f0c1bc7abaaba114191097fb1469b392e7805e
SHA256285a603ffa94b4043308effa83c753e5171a172e4f1799421b9d0b853d3bfb47
SHA512a7ba91666caaff4df7d1337b535f9f22c4c8a27afbf743d60622a147f2826b73768a5d55f2f1d81dde43260c72f7c65a3868d5c547573a1069451ae796a4876a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594ad02058919e029c016d0794db260ca
SHA1ed93f010f584559cfd8fc9d30e1e105589184e7f
SHA2566ba8562f216a081feb8205207e408f8417ca1273f1af09b5944f6ffb16966484
SHA512f558ef6ecbd7e7289387ce7c86c5e82e316e4722f142eb79eebe93aa9dc0e3131ddf81420b755735448e758ff54a8bc5e91b0f070519b475295ef5d8c2a6ce98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9b39b62c43e905044e200dfcc0a7d2
SHA11b6781889205568688ce03d93308843e0a42de82
SHA256f7b2d1b2c619baa1b189781a109faf2f628d02876b887023e8fe7b6460f074c0
SHA512d0310806959237cb472ebd04e8fb6cb16861328ac1bbb000066163703bbd24f86d1232629102b759909c07cb214806a16bb1fc36d85d91fdb7194070ecb47758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b0828dbd07457706879f5f14bc3836
SHA14530de4a414771beffaa79dcc7839fda68bc8133
SHA25659978dcf72dd4a17195de1625c1165b8d0475ceaaaade475fb77bcb54199a88f
SHA512c434c2d65ae0f80c41ea389acdb0f5e5a44535064c0238ca793ab55a7634b8b14541761b1d6344d33263736bef9afc128ee6da75e39036ebd291f79cf2c3c034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598eedccbdd3e06dd8a83f45704c04cdb
SHA12105afee4071bfcd0c4ab242d0aff0503b8ccf43
SHA256d157a1e1f718a0dca2b3e285f12202b264afa582d78169928a3ec7a8e949354c
SHA5124707cd56cbd6642c01d5f76614b0bc8b86865bb0c3d29f87e4a90fb4703dd5a6f06e15b7e67d5143955b690cff87b3708e1f4e3cad725b541fafc2e288732ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512ad7e4d1df4d8114068c77989c00f23
SHA1b96bbf76f1b767e6de57ca68522eef75070cc24f
SHA256f49c7d32b0bf597e7bb937364cff0b58862b507e0915e0181b3871ebcf620be9
SHA512226518e5c32f33203c12797e0bbfe2bc4545881f2dfd3943d9d085beea269d6a7f70a395211d8db0d940b46878e2bcf5a37b09aff5d4aac79cb35dc1044e22fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a