Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
3695f0c9bc7cf5272a38d0f16ceed8ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3695f0c9bc7cf5272a38d0f16ceed8ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3695f0c9bc7cf5272a38d0f16ceed8ea_JaffaCakes118.html
-
Size
61KB
-
MD5
3695f0c9bc7cf5272a38d0f16ceed8ea
-
SHA1
acbaa8dcb54d1adf426d4a232451a51a1c2c0f35
-
SHA256
7184a30777434138238d44bf335d83b74b701402e2a1e37aa4c46e83908e60b5
-
SHA512
851ffbd415605305f4ed57777685efa93aab5bc5fae0d99617fd45a89cf2bf00214579fba9fdb91f02f7469a1868c935be7ba28d182fc85448ac5bd04262a568
-
SSDEEP
1536:X/mZXHZLJShep8nD4OY3Re2g8usFd/VA+PEkZDVzkfPKAkp9D3leuGT7U/0gZlM3:OZXHZo4k2g8d/VA+PNDVCPK59LleuGT5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421623995" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000068fb448c34163eeeb0e47d3b7abc37a25c0856c454b88da05a3296205f166eee000000000e80000000020000200000009997d3b5a31ce9aa79acfb2f4f0ba42ce412ec40ee8ef982ac4f4cc4c4f42b1220000000d79787bb1022e36e2b03ba0d7214cf38bf18bbe65b36fbc7db096445b9d0e15a400000009ea6fb3628a996811c85721b043cec6ab40788db1d63fe85a145efeaf99cc44f119e2f0a37bc2bfb3776b73cdf72bf994ad00a98be531980f64616905ec2b7a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{962F9D21-0FDB-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107c546be8a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3695f0c9bc7cf5272a38d0f16ceed8ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59306626694dcc3cb30f4fafc3eb274ad
SHA13dc2c2e3eeb1f6585bfb5424ec3d8e89f84042ce
SHA2567d8ee25a8ccd8fc6368178578c4f7b60aecc54f1e536101b856ca25feea34a76
SHA5121e8a90e88310d534cbadc3e6c95480765e7ace21a557f5dda98d27b0375653a0b1f339add5a014c3e9bd81512bcbbb0da74bdb4cf2fad1f05332a476ed47e635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ef1713f3509e181ac987d9736f8686
SHA1fb4abe64fbe88bba1a3461a837ca2c8752d94e44
SHA256628828877b35f6f9890a4e3ce641d6ed4ce54328cf9e8c84fb93aa877b705052
SHA512138e0bcc8038d75fb43309847f5c58c5a24e6c13c8e715cca5acf1af8f4bb5e80a514d40072ee96c24d7225ac7f2ed46689d13b57c73557957e585f405cafec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962aa70bfefcbe4c5cc603219de92a74
SHA16b60c2880ad5a10b397cef54631b211e9be6c064
SHA2567f722b6bf47269d28e6078d1054e96c7cf0ff0c7c1415551144a648be9497e9a
SHA51229c61a80b1d9c1e9628096c9618fec99efc3fc72d3df1248b56042b920528ab2889c53b8b73a48a8c85c3a396f6d3596ffff42e9c56ca72c115df9d27170dbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d883558b54e25897edc7908c242eb7
SHA17b80541908f83410f11e527cf7c9dd6e7ebc8404
SHA2561138f0414ecf53fb56d0e6e600de336b2d4b854994327f979ffce69f19cc419d
SHA512cb7dc6778313516d4d61c971f5893f85231531cf292ce219d84ee5c2d478c19f9805d66ae532aaa5993e031ae138c4cfc6e701a9805244ce48cf07d0d9cf9aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5905ef518a976e661a86c98cba606624e
SHA13f36e3a1b8c39f1fa8b658fdf96aa260a79b288e
SHA2560810ca87570353809f30b50735a974ca1e9588c54523c8d3ab20e14fe4a28887
SHA51228b06f9afac3a0a038fb2a653c522179551fd0791c2e9d7366397a16316591377431c8c7fbc911516b926e9a1352a78596b564078d6cd2b46e309cfbf10a0035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0fc48fc01d6450238c904144057f717
SHA1eaf567ccc154e322331997276cae6892abc35856
SHA25667082b1e7a7cf19d4de87176518d2384c155c73ce3804e2e8109fdc202155b23
SHA51232b50e8c5280c8c411e7326d1d42aa46a7029cdd42a80f91bbb496a4517e353bc170eaf42e999f66b2b5c13880688f2451c053d7db0f47deb10dda5e7788a5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9318f7c52b4b78a1071381c3d2f850c
SHA1350eb2fb588d91f2bd6c3882d7b2dd10ff741b04
SHA256660a9ad02e3011dbc09995ec0b4d84488b0f3568ddfd31558e202172e2e9aeef
SHA512b1c5373d9d349e68e062e7eadd5fe6dcb4f762dc499f5a3342fac71267f0dfcb257a8bacec640d1aefc4f6b046adbdc86ae80f86f224a25ce999c17ed2e0610d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b86852b8525dd0569ef27adba4e8291
SHA1f997b4a0fcdfc7536064e94b89b14ec8fda5d10c
SHA25672fc7f146a548945b8312473e9502ddaea10e2c1352c0c88f032ffcb46663820
SHA5128b2c4375ccafc7d8d7b2d117000be4c333f106cf3948bace394423f6622d211ba031a69b62389c89ec08d6b2d62f6c05d32284b904ee4814ad8064ee1a0d42dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d561ffbe41f6bd5f417876ad2cf9a81
SHA11b72ebdd6f1eca8db442d333bea035979f5a4f12
SHA256f4882ad080c5cd3e9a990ecea08e92a42347dfd9517646c0856b11850ee6df08
SHA512ff6055d2047e7610d91788a8011f65ca4f5ba871c18477d6ec905107ee759d87c72ec3e271a198e3f27e957698216f26180de6ea15e4e036c8fefbe203021c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57068e46c99718a4f50a0c6028710edb4
SHA1d537b7c2641b4eca48265ae6c87c6be38c2d391c
SHA256489974046e9a524e7f6f7a99a1907af02741d43d3f559b89037348226915c9d8
SHA5123549e79adee865c120851a9405d5e4cdbd51eafe94f34d0b28215336412e6702ace5951e778e5fb66f3395ad943c35d19beec0f6089a4feda0a87bf8b704abf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5586cdc641165ebfef7963f4c7142d8cc
SHA1cc9afae444d734f0d9dbaff8f6adbb66a18988fc
SHA2565f2edc08472cecb3032c321101e51140afbaf507d80993ef1908ba8dff59bf49
SHA512b282d8bb4b6cffa2863ad60dd97c759885b3e7f34078c68d81f732a2ebbf6b6f43e1c825fe48ec9577f24288367fde9a23288b1a4774c40027cd883dcd7693bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f73918e68869671ce48dd708cc3bcf9
SHA1afa4fb0437ee0d9a8b780b69eb5c9815ef4cb677
SHA256b904e672628849e177f245671181a5f4e59377f9df006fdf9bef45fc69ce1fd6
SHA512125c0ab773d8fd925a82d007bcb59514f6b82c256bc964b323fad5e82a4799d070a7af800eeb807c8f03d085638c13f8eb945416271d76b7ebf9584c4a78a467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f159ccd29b016823db437d41bf46dfda
SHA15c66eab7bbe9f59378f440aa18b0b7db667e8106
SHA2560d60aa9d258c028c0dc224e7e22a5484ba517dd8cd69ee89324e25b6b200dafd
SHA512fd047ae286b2530f54e905db050428b72c282e2c14be6e98ba048ef6188b5487f0dc8eb08f890d968574b336ad6e3093221bd7d7bcae4cb95957bad7dee8f90b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a