Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
341b46812b3c456e5b9f4c30b14be391_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
341b46812b3c456e5b9f4c30b14be391_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
341b46812b3c456e5b9f4c30b14be391_JaffaCakes118.html
-
Size
461KB
-
MD5
341b46812b3c456e5b9f4c30b14be391
-
SHA1
419afcd8ed0498d39bc8e46640f3fa75d1099e02
-
SHA256
d00ffb9fe408cc3fc24eea95cc6112e3d4a4bc3a58c72517a727a5ee57616093
-
SHA512
f264bd743f62e3819a072885d66ca728a48100dd260b61d337454d82035c5d805616f1a4df41143aef152e31850caca5546bd56c0b7beecf5fb8cfd8fe131b84
-
SSDEEP
6144:SRsMYod+X3oI+YZsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3D5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421584983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1D113B1-0F80-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d58c7df6b387a5acd2c6955c3213bc5f24baa1f6aafe8d690d0cc7033ac3c4f3000000000e8000000002000020000000710483e431b4ee8bb72409ae857090f9a0c596087f2a5828f9498230e185b07b200000000788f94e99581e0d880327027ac8ac8ac897e64e470fd71969db1c591ea6a5334000000016ab28379de09414f80823138d001699dae6c786cc0b2176a202889f41cb49544710884d812971dc0c601f1f3f2ca59185d73a90e56037eab873dec815dd44ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302f539a8da3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1808 iexplore.exe 1808 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2272 1808 iexplore.exe 28 PID 1808 wrote to memory of 2272 1808 iexplore.exe 28 PID 1808 wrote to memory of 2272 1808 iexplore.exe 28 PID 1808 wrote to memory of 2272 1808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\341b46812b3c456e5b9f4c30b14be391_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a51ee896661009b217b3c9194b67f5
SHA1e62956edc927785d8589f652ef09af18666241db
SHA256a8eed30b62fdc57c42437ce6eb02886c5ddc1ae657855b701ebdc1c2a09a9f79
SHA512f39cee3f8284db13f487c322606a218a68559b2439bcdd009b6ed74dc7aedad1a1c2e918977ef650560993abf248858d4d205b93bbeb3c96182f0e2317294521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acca8169470454c2172e599e9565cc2e
SHA136ac7e09347275c49be20ae159c550a2edc75f7b
SHA256843dd693fe2f6f60c27d6f4fb3ceb722b38a5b7429409aca9af34691d6ba50d7
SHA5126e70452bb25978418a20036ac8fea8b524c36456f9d502699d27c6b000084160126981044214221b70d2c799702e012be8f6eeb121d0dbca631ab5eb399b398a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb7cd6ec47436cf728dfd9f334fc428
SHA1088155bd12025a296b11ab6259af40e1b37d6ad6
SHA2560058d59aefd8112c1ddd7436bce10f91e5d29772de147e17120ca2c5390b1f46
SHA51223c7b38332ff240041345e32e9cbd557f9600042566bb7e3ef43ac01f05629af38e9126d3e259b54d033b51aa45be09646511ac9b052cd7d65f1270627ecd689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa94dd0f147eb39257d712bba82be5e
SHA129df1223e21b139e11c162b9357d055922610dcf
SHA256b14736f67a13ec9b803c46ce343b50cddb4fc2b601e8cec310c9efbda9bc6055
SHA512eddcb1aa10f67c29a2379828f4fe076447767d4be4c1674bc65b14c63d2e889f4e52d0501180925920869e0df111b5699fa5bd7ebbf6198277a30fde72237c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682ccd1f748a8f533020a5acf7619d61
SHA1583fb4d93083a01c23652ed45289d172310f6ee0
SHA256d2a05e52be3a58f785b98c672c4d0d743c37a8d5ff9c49e4a5c1d886a79bd0d7
SHA51267bc8a66c17d9a02e1ff812ce9c6660dd4d0947d3f1057b73a7c33882907d395230431cd05e3d41b7c25713453c964dd59a773c01f7693172091b2578b648730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd6593770067e86cd4ae2fefb440729
SHA1b718ce43060894339bad63c223d33be152e8498d
SHA256b37daa5296546e1ed0637672ff44a64d7b2a324c077ac234a46cc136a533c9b8
SHA51235cd18e4d42ca1890c332a2d80bad71f20896da368d5fbe504fc632ea09494db2c5f5a08a1ea8fece4d4fa202b50e383c53844d550b40fd4dbfa5274b2442436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a584ab4bf1a554177dc95327baab918e
SHA15bade0c469d2b18da0b8ee164a96bb8c8b1fa3be
SHA256ddf49ca039279375e16f0c40920e049791df7a3c5397161290e16539918e9963
SHA5122117f96ea89773306cb157a474d78ea2a377548a67971ebd7c32ecfd5e6c8021dcf73af07bbb0417c6303c4f8eb7efa0cf540f8c84289828b2bd2a9bb425a6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56350c41c7c5f887014a5895d56300de9
SHA1044e5988fbbc8d4eba1d0e8ae1585cff8e74a548
SHA25657cfd7d7cef1a8e3f849749b1aea61863133adc2f47b68a267267ca0718e6341
SHA512bbb68f25ea3843705aa77a559eb52386003da4e312664527cc38fc1d057ea5e1d860b7756c0ad32fe0fde9f6fe681a162d660166f35c9a240bbba0d9882daacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5119b5a79e404cf7f4dfff60bf4eba113
SHA1d371f45ca29a7bfda33858203db175a1434fad13
SHA25638632f2e74b14563ade4e6e642752a473d036b9a0728565b623278830de2bdf5
SHA51275d9195c95aa2100ec554ab5d8452e9134046a242a731277d984f3361116d76b69508b637bf1d4f5f28f1369c930a976071698b8a4490bb3a645238681d1f8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc260584e50c0e6470dffcaa08f90c3a
SHA1cdbbda6b650f3f1b641f6cdd9cc06d4bfeeb53cd
SHA256fde07d2d9ff42fdfca6a72766ed478eccc7eaaf6403229dd55809c5105df954b
SHA512d8eeca69f6336e300a2425035bde68fd37c7c924e98452cce6978317deac531f3a59d076b859cc5d2e5054d91a4ed5465f55dd0f9ba149038f177bf6b2abe7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aa0dc8d0f0f728889396a6d6a3a478
SHA145db297a40064003feab0929a14c9c616f386200
SHA2563f1f24f3fde6cd888da02f2a23e3a5d600649cab59e00f7e2c527a68f3c3b105
SHA512db29a2102f40b285641c080b42835e8197d1ee6c23eb9001812a5738c02bbf0e9dcd84265c26c861da851848107657a24d43354bd1b802e0608a22853a633f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6b3ee60fed9e09cd1787f14c1f9087
SHA168ef23860ac8c43a5e8fd01360013e499a3b350e
SHA25666881e4b3a19538a50dff3596754ea7e849e59dcd8aa3c341f9814fd33a90197
SHA51235ff817ac85d41c6422e6f52e39a1541ef0342b0c4b69fc50cc48829ece80e287fdd4f1294f31f5f627a26d62d282b2587ef1dd0215bc3b2143713d8a2615733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5302c3ce8f2b0701f04c7c3cc4ea57d5a
SHA184a333d22359ad9e82669077f16a9557bd2d2c6a
SHA25673630f376f9ab48648fe453986d8d4633ac3b07eb667bca870f39e79d18bd39b
SHA512d2d8f46be43763fd0b6893a1a2473c222ee5b9b5666b1b4382bb3a725e36bb5290ce05b0a609719dc64623dc44e7781a2f039e1057915799bbcff972864c79d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a434f06ce0c3fd421ed438f804ef53f1
SHA1305ce9ecd458c9ba7df496c515ea9f8bef430a25
SHA256cbec12588c4f5a842f1706d2c94e9ff132f4176309b515043171e8e12c28ad67
SHA512cebcc613ecbca90e1ae72b9cfc091d60f04be81c10f1d2def3d92bdf8ef16f0bd1b2fc60669e7df27aa4a74ee58f8d51488b92e3427012c093d99189d61a461f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691d8e4102d026e32e93cbf564f53fba
SHA1cb3a8fd15731f401de06ce43f4c41fb500109ba6
SHA256e8094f2fd231b2d9ca347abe75a2f844aeb04732d38b792c57752b662208f787
SHA51210168278d4f2d484fbb9be2a746db876efe31589bd7948be6e3e687db1021ca86842ef2ea84c11502013b5108f9b2d61ab939359697c940196d908c8203ad875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d12b8e4134198002eda219c90fedbe0
SHA1548259f2f26a27b260ce9c6d1993f302be9b8bfd
SHA256ae7cff2b7b90e242d20ab40244c55893408d96d24e979607e3902de1095e5a86
SHA5125ffe3349a82de6126afa91fb289e96c9e43caef4c7c2b4e579093d6e57cccb134d55d3ceba54295ed71d9500a0cd81bc1eafb8867e671f3ada035bcc75ca7e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859c3c13687fa6f31a046454382b65db
SHA1f45beac7c8099c5fcd3c4630441c96a65c476b1b
SHA256aded4e47d8fe4ac06eb58951c65c23911bf731459d0a70b52bc4976892a3289c
SHA512939737e909f753946f53ec0d19c9d7c1d3e127eff67637f9c00d7d39aab36c8617b2c450faa00235185f698c81391c72ff426ba01c51e1020f52776c29671259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a6ac71fba13fd37b6aba1b3b3ad8b5
SHA106a541792aae12db3a9eae8b0e6c0ae9eca4dafe
SHA256ebfd5a940cdf328eba9fa33313cb7e9c7aa0fbc3a5d7b7ae260703da3bab85ae
SHA512ee2e80bd5add2eb37febdb5d3c6f011f6a6732fa7c381de2cd7f7e96487043f1ac275363dff1a7a80774f2137c7721d5e9ebce0349dc1a2ff3833bef90736476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56495f8218fa6352bf9bc3d093d84216a
SHA175f9865f0b74e7c2ecc865c0cf0130481ab5b083
SHA2562413e4edb0fa93bd24898636189e9f98f5c221e2d8dde8f16f075c93cbd4e53e
SHA512e457c858623af5ea0e927c9db709e80d3a5228e182baa65f0c0414c9a523feaeb6295a5b94276588d4cdce1d1e72bc6d56c65d94a1efbb587cc23fcefff3ee44
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a