Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
3472f883121adbad675c8c203b22c732_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3472f883121adbad675c8c203b22c732_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3472f883121adbad675c8c203b22c732_JaffaCakes118.html
-
Size
2KB
-
MD5
3472f883121adbad675c8c203b22c732
-
SHA1
e9e496589d01f63652f5a9cfad5b0dafbaf4bbcd
-
SHA256
07a917d5309fd4076deec759c7d4129a6d8664f0fda17bf2d36250f8fa98c7f5
-
SHA512
1206803e9525fdecad6b01671c329cb436378055b8053b429aac3957a55e1a23775e7a2d217abb7256a668e0be41c4500ca1a8b50ddd0fce7c1ba6666484d76c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06d70c399a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5675DB1-0F8C-11EF-9C59-EAAAC4CFEF2E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000ba3542ff56f8fc472236f32c9ef067d3415b96f4b817df3b2d3f164035bb4f42000000000e8000000002000020000000864f6f643321ae1564c240a1a58252e76905d9544cad25904af5bdbe008eb63e200000000c3e02928bc17bd2a1a7a40a81c29e655a7eecf82b4b58732466bb1aaa9f29a440000000153f3a6027ff16af8f3ad60349fe2559d4c4534e434843053fea6f85ee7c166ee3d4521fbe1f4369cbd65b24aea425bfa4b4ea399ae250b0d3f8bbb7329d7ccf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421590170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2256 2072 iexplore.exe 28 PID 2072 wrote to memory of 2256 2072 iexplore.exe 28 PID 2072 wrote to memory of 2256 2072 iexplore.exe 28 PID 2072 wrote to memory of 2256 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3472f883121adbad675c8c203b22c732_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd482aaed38bb0937da083a4ce7ade1b
SHA1b3cf760b9506a4af637640ae0b66e523d5b539ff
SHA25683f6b57248106510a607e4369bc67515c602ca5aaf0eb2d937a3b1a3c06c45b0
SHA512e29fec6ff9c8b51f6238bef13d22de1aebdfefa6d3d90d1577ed10f22a5d9d8f5259746d2bc80665d362ceacde1fabcfcde18d87d12bcbe9e9a86c807772d60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6682e2dd93dfb3bbb98a2394129f42
SHA16fa37a53f84ea6048bccb14d1d0690c77734b121
SHA256b252ce8754c1411087cde277d94ef97ed4d771eafa8c11abe330ba6911bde6c4
SHA512188b847afaf599e363a3f284aa320b67a600345c109e61892d7af445ed1d3b13980ad0fe86e2593c3bd8998b477fbebcb2f8a97bd4de16885b86f5c33e683d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469dbfaf194f97bb6370e5b2e7e6f5c8
SHA1dbdc9500cb8731652425828a2b85b1a5563e9e14
SHA2563c8bed1b87fec2c94011f6c064f2b03b63186496cfa4405fc3dbf92326d3bd41
SHA5125483b3a633b5755628d86974af6af3188a0c04dd50af7ffc58ff2704ca3d6f9e67b4c8f529b64d23c6f5f8ae9349caf90565891d3df3b989d8ac26687adba774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f02907b0edfd14561bf605fff42ed964
SHA176a99aaa4906f513d753e238a8fd07931490eb35
SHA2564fe96a2bb1c3563645a8be00a92f584d916e47ed41b70ad312218ee5dfe1348f
SHA5120696cd4eee86a48801aba45c108fc3de4d5f5a99ecc76065f60bce3538232c096290be7178c07e61e9f21bd2cd8e52e5dfce135e8489c3968d6b992e18519fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f85bd29f40ea9aaecb52d6973479afc
SHA179b20529cb32f572e374c7877675b673ef651a13
SHA256cae446b61ae3fd07ec8471f1a708a9d52980e184a54df8eac83d81fcc99ac732
SHA51280e5e7849394bef2724427a6975caecc04dd20097c2e3ff484d954dbcad2e70cbcd0309c552c7f81fde83785e8793fe43ee426666f4f21d89014fb32d7a16204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56985abfe476aa22c87c13eb9fcc15019
SHA1fac62247a1e41918dfc73b08f89c0a118b4b484e
SHA2567f577ab4cdc8b679674260b5551aa38aab09ba59e1bbf8f53a24978bc5934fb3
SHA5126da0baa841d52a56033c8f379b0c5e52507d829a565f5d3fe29ba946e56d9902d367c6f822030821ee32a0ef1821198df4817fa11f414552e6e26949e2528c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae0a70c27ca17894ff20587705672461
SHA1176f0fb9874fa88ba397a1dfa888aca98015b4be
SHA2561885766a286673bb1f0435f4be9d2cf5570c45f443011005e040c3e1a2389524
SHA512beece90098bb6ef2237430895d737ad4a86dc609063aa135ea3bd1e281fad337627246a2a9ebb806f51457a6ff82d8748f89b914ede5696ed12a95935c397e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7f92377dc4166badbffb1e8708792f
SHA195e8f073273b6a69a11a182537edf3a434e7c585
SHA256db73b498e31660d018ed1b84720afcae65de727dedc92c0700cc0402d8cfc21a
SHA512145141ccc47f56c325df93d1ea348c73a003f4e2973f5dba2ee8a4dbad3bc0c5f658ac0d0b8a8967238e37319df098265d6d9f403a17b4533f94a73e0eb56308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac4f8454373ae874d4b819201c0a652
SHA1293a13e02637c940653b269251987fa6f882e9eb
SHA25645f748992525a111bf959ff186ed22e4ecac91776da71911f7077d87e7323cc2
SHA5125349e501b8d438f36308d2b2b15aabed1e511b91f0e3c943b68796b73bdb14e9225e16cae058cbf1aa532f1fc492292bb8e24df1597538d4337527558f06e067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e422bc5ed7cadf2e680d696249a9af
SHA14b7fb01c3109149ffe8134cc16b424b4c182d742
SHA256be4d9ab0e64698b05ef7b27962d793a0c98a1b238fb3967f5575b0476c43e2c2
SHA512ae3ad04863ceed9eee879d4ca2c83015597e8117af8056d7353ca3b1df7006ea5ff3526c03c1b86d6dd846eecfe9546b85e6461d0d48f9bc56d66416af4ded2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fce216544f8513a9b8a33285471598f
SHA15459436f0cb609a385118666cb3636a7af085060
SHA25641e77e5b204685fd3a407241b488b2507ece6b128bd29b97f3438758b1d4bf7f
SHA51275bf0e082185724729a1c5e304ad618d0214218ba84a77a0eabb5ff83e0cb9e7a4735300370da927e7d579c12556f2f4246b5f14ba49925ac5031e731d97d7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e867698791b4a5aef96ed5c1d8ff2f0
SHA1c1174d02cb1a5714bf896f483aa702f05e7485df
SHA256145988c8354146126300c060244a90b03bb97a3eddc893d29359e60bf167a445
SHA5128276bd39945389045039585f6575a46da5d69afe929970b9c86e0e1c073a6bf23ddbb39df53fa9d7658c6accec276f9ec4efbb1f7c0fc82b700f617ed3044869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b76add94294ed8891d2c1e8fce78a34c
SHA158e498c65d93788670feaf4b4b9ea1da3c2d8241
SHA25648e470b43032101aa2f89059651a2d782f3b9f88faf6d15c05e80b7d6d49d493
SHA512db6cfed5954c1046a67ad0bc48c8c8f8f6033943604c4308cd48416000540b0adb3bea37c83d1f9d3afeb899ca81ab5d83e3a1a2c516c865c878c8bd30ed4dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc20b4ab7fa82afc3d9acf2c8d73211
SHA1b117574d362431c6694bb48582af31bb21081942
SHA2563ae7332cd5f61f6376c5175c71cf4915c160236e2b6b2bd50a5e159d93ec80b3
SHA5122a92f761012189fa20d49efd48cb8a49d827f223a26cefbe707116338db5112de7fee11fb7ee1fd99d9c20381beb71bf427f41aeca0591e789049cf8da1f2410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526461c0571a649123cd37d966f23dcdf
SHA19bc13bfc87260193e99b60db0b2ae7c6e83dc627
SHA256c601e4a3d9372da8b2e060cae94d167ff0dfde1b49087965ef609ff04481af9c
SHA512ed4d92a58c882487ceded841338dfa6397458c596fd6a633b903cca89db6378612fa5be0f9868a27b3ac44d3945cbe1bfffa5305020ac840474381a3aab75740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3c4133db931236f932f63d3259f0e1
SHA17326c5b5eaa30ec4da4b04b5f5c1f0d3f606cc54
SHA256007156d9901a79c09a55749a0604be22ba60b54f56e9c28b8c7586560de12218
SHA512b3011615dd44f6713a5ad76137a483ea609bea7b4419aaa8ae7376c18d537cd500d8251c0dbc6dec109d55a766e0f0efaed8ae5cd61521361363940355646c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358f48a898c68b6f325a6540f1f8c67a
SHA184ee97666cbe47cce7580ce24df9ecdc79b08a96
SHA256b242a29a9684b7f44a1a6a4e526c8b05505c7e1bd5e5e1fbfd2fc9bb28698e28
SHA51267ad6b9698eb095531bc33fc4d15b819ba4e8f4f55c231c683ae80d289ad4e083e264685cc0dacaa515e42f6bc89b0d966f187500978983b332ef8cffbe35dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508e94c03ed00bd423c4d44db47348115
SHA127eaf702bfb3e8c2395f199dccf624d1c84c6104
SHA25617c125f2ec1ba05f38d08630bff0c1ee69cdf63aaa7115cfca1f21521c4a1db0
SHA5120bb31dfb2facedc9e7d1e05ed510db934c52cbce5fcb79f345e9922b89ee7d8191e032cee966bf08548f387a203410d7f7ededcf2830552e7589ec843c162ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ead7e21e367a9e6c0f3a09317a789b
SHA120a2745667cd66f2298142fe1cf05cb62d43b357
SHA256f0d3961545a998a81ad92bc4f6d4f9a5bfa3b8ba0d9a0f2646508927542b5ffa
SHA5122b51b5f305dce0c83204b8a4bf59eba13b95dce4ef69044cfb6bbca2c09b16664f16d198b04d464a28fecc83506302a4256b64f945c5f185f6500bc35ad0403a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8cea4432ad51dab7923393047d66b79
SHA10fe6473b9ae0531f201029ff18155ce45552e518
SHA256d583234e522d3dc50fdc9ab7110505495e431a765cc4b699704819b3d1212599
SHA5126aa001dd20d43b8b8661cad065f2ec17fcb1b75b7f2f7f66f2ef508dc024db7826cc9961614c34025454376902bce9087e5b54a6dfd9acb9409b84e160756ede
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a