Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
3a15aa28f940dc75d468fd949ce15307_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a15aa28f940dc75d468fd949ce15307_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3a15aa28f940dc75d468fd949ce15307_JaffaCakes118.html
-
Size
461KB
-
MD5
3a15aa28f940dc75d468fd949ce15307
-
SHA1
f80d3084c7934a72f46e541a1c7bb01556afbe77
-
SHA256
ca254e85f9e6848cb2f1c8258365478568871d5f9bcc96a9632d18a7b9d7a90b
-
SHA512
eaa339ca7f212a9f169af501c4b1118d0b2fb082f66e6df26eec9a913884bd5280d4d5204b7738585a07e15f70f073461d63faaefd8c7bc7bc5def9f626fb526
-
SSDEEP
6144:SnsMYod+X3oI+Y9msMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X385d+X3g5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421678364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000079f442a84c927ac7fea31e082bd95ad1268f97c2e27a9aa5f95fb58ba0838635000000000e8000000002000020000000dc5f63e1e50047c71003ee8c6d19842673b2ce48e6d00bc0161707c66e6e7917200000005fafc6a4db6ae7e72586268ff03e3e4b45587f0b1a0abcc9f54bd464cd8455304000000083c1ad50d7aebdaa257cb16128991c42c011946c6776fb5e95e0454cd59f773c590ce5aa19e2d66990abed2500398d6b2f0e7ee39a2b215869457583dd8cc444 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000060d6f190589e0e214262e28a7f679078365966ae0290c1648d53aad370417b7d000000000e8000000002000020000000fd1b4be543085755f0df32ef0a67fd4f2a8d2b3c7d428d527b0aa5b51d5d5e3f90000000193017c24d3d9623f33d2f2a5792360069b56b1e54e2d287193c68b08b8339964528f0a9526396eaf28fb808bbb21f9215a53bbe9bc5694c057607615ef2b7791211ee17050f0e8d572af7f7ef40bb3491e4a1ed44e6c3634c2af3cc3bd315c0f12d6828533def52580ff0435795fa54722b0888e6dda880f835ab4d2e44013980b6553ba5589bdebf01c30a1ee777c140000000c3646528986990cdd091b9c1695acce5fe25b7716fdf461a5f6ef1f2329843b031543fd194cd0d5f62f820b1670da80663d54a6a3840078d1d16a2dca4c7dae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D34D951-105A-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f3c20567a4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2340 3048 iexplore.exe 28 PID 3048 wrote to memory of 2340 3048 iexplore.exe 28 PID 3048 wrote to memory of 2340 3048 iexplore.exe 28 PID 3048 wrote to memory of 2340 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a15aa28f940dc75d468fd949ce15307_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5908ca9e22cfd4c4257156a9b4bba0446
SHA171cb8c6035081e70027dc8aef83e9facd2168ef8
SHA2562297c6b036d7c7db4414f8310ebf0471625a2de7dd2dd40fc8cbbad77494e15c
SHA5120d02e3dba44de46eb3fef703833949dfd18dd83e149543574dabe77081c94278b44a9cdf521987d7b9440f7a080d7a1bc70c264527a3bf4b95b1da51e99e60a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fad91b89e7e998e861d0f74df42c480
SHA1c5edab823d41ed5ab942ca8e9510fa4706ae1742
SHA2569c73a9c8c884b013934c10daeaf54cb4e237e3be01e8b8d74e40a317833b7df9
SHA51213296e50198b7a2d4c27ff178cfb8f04d4ba74bc748fdd6189007b085880b5abcfafdea03c94b7f0559fea24cd369cbeba80c878f71a490f02850482f5997cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513cf21f5293636425c285f3689ddb42f
SHA16f84bf6e3f6a9e1c72f5b6c81c302ed19cff1ef5
SHA2569cd4bb2a876fb396fb83f00f4ef78fcaa7f3908152d5cfe3cffa15a695a3fa10
SHA5122b4d25ec6e042b185dd2cf3c6ef508ea8deebe0f69bd62976c16e1433b8912fab42294cf0e49fcc59046f34c8522d931e23d895eb4b880f7fc4a26d614693d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b0175c7f959662c037da857f10abd0
SHA1a139263505b0098c6741589a69ccf67ffbf91e6f
SHA256e722a64077a885bafb534a04f4d81e2669065c6aaa9b30e2277131345fde8d37
SHA512fd5a8eedc3708246c04b0960f0c953ee51aff50ea13568f59a37dbe1051468791d1175e8f95652722f028777ea0a69745cebc6878e1e1c9ce667ec2923d6826f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1494e50028344cec65c70f3ba2b51cf
SHA1a5321e4e7b54dacb978dac26b6b18150248ca578
SHA25607affd495d1b2e2e6ef961e56c5762f04f34b3b90b2c77ef1ad8c1d91de374dc
SHA512dfb64775b510dd3f8f7cf1386c70e917ca3246c048a505cbe3c12b742fa7186e9b85530fac92849b8a4b2b502cefe01268427ad13dffa8fabf5a5bf1d5640d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff0303d4cd44a838f858216fc9ccb57
SHA18a80e4f980b366981cb57920a011e457fb206743
SHA256f264e2159b516d8e0ede54bd4256d304e9f7a95141577e19a2680ca9538753e2
SHA512763e18752584cb52a533dcba9b51ec123c77e03d85c0d1abefdd60ec63e91672c746ff247be22a2908bccbb5fb50b1bbe9181ed54c823f6b6c1c934a09eb2362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a791d42fc3ad1a9d6d836f38df32a0ce
SHA11afe038c6463671f8d57538886b2d83003a9fa0a
SHA256e75217791a1129e52c7b898e237697b71639512fa1beee88247ceef9a63c5d9c
SHA512cf7062114e36cd6473b38cefe6132b0c1f10c92147365da3d478cd885bb605a1276635a42b4bc1c1f9161233b00eb3e1bf7ae0f3553f96fd06cefb4259fcfce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a5aafc7a747cf498f72b9c27c7222a
SHA15b1f12148a9e9729ad69b859cb3fc0ed32a7261c
SHA256d56a228766e70d953985562943ee7957dd29723e37fe6d090999eab34b7f7a6b
SHA5129e03f7ce278ba6b45638fb1958fa032ca839ff871cca4ea799f8bbc4c9cb1814adf25c63e472664000acf9aef926d5f7ccb5632feb34ac6466615bbdac774614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11bd28ed0566c0f11f799cb3ad8ad32
SHA1bbd13b6bc7b478dbd324999e3b7aac9ae44affdb
SHA256534eb5d97734a16a66331b3c1365f3dac05f96bb50d87310ff3492b7f8210e33
SHA5129a99dd5ce5315ebcb034a7d6ae4329f53d1aa7793ad5e44342603f9733de53210cbefbc277ab09992a4991f0724afbc64184ff39ad39a15f7ef929416158f4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bd3c91214da7f0cfd14c7d56a467be
SHA15a413118dd3f0c050b77107d14e1bafff0c50912
SHA25645425b2de6eb3bcc32fafc2bbf2bcc4c14092271c906982b76fa9c6fe71efb2e
SHA512567eb12f0c5b9401a565c6c7251e29ac79bda7c49557dc537cddf756d86af169e7d27ea4024c5bc8067ef251a5d222052179f88b33d1fcebd10cc1b843e89b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc117ade94cb97ba8b8a1727cef3cc65
SHA1c1dab764ca7603929a9ed13a166f72a0fe215aef
SHA2566ea6e366296c892cdc16b099d1133706c49f82431155b10da92b8a8e5f22b935
SHA5125e1024d22a43bc8dcf7f432d170b9c74532845ffa8ba61ff9bcbed397021b5cc175e9cdbc8ade1c010a24f8fa7be1752349899f3af0f742bd2b675a3b2f14a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5dd615774c809e8f6875f9dbf00597
SHA1d55c27371e4f35e895e6772c490c80c54e1a0ab7
SHA256f019a4224ce63a1e690805a966a75a4706b02e3ab7b78ed35465447f6c26f42c
SHA5123f450198015722dced25cae090b694d25e01dc2de6ac9e28a80210aed7eabc23dae66c4535362501400658c91b7c909833e2c995abe78eeb7ccb40e60441c249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af059651b26a9a424b0cef3a33c13248
SHA15257466d64604f55f4a69a44d92a90b1dca39e78
SHA256d0bdb925172cec8ec2e972d3975d90d58ce4bde70af33ea588e925a6134d1a67
SHA512eb3826938c1943872418a9ea3261f3f4a069738fd9ea988abcf4451ec1142844cd4539e9889d062dfa7dd52fd70945dbba077ad7de7cef44b7bdb6c4fd90d181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e47fd9d88de97b130c89c95b60c150f7
SHA151eb1992674d4967405c368530d95fff42f724b1
SHA25667fc180b1b46824307b02d235a8d3bf02fcee7cb63ebca7d6c1fccb08319279a
SHA5121cde83c1b5890f79a9ca271a82cd18e43eea1f937f6efa874ceb644468ff236ef9790f92a64d8c1d315e62755f29c85e678a268159ca17a38a8f735facaa1fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b493a3bfc9706d5dae010d253fc41810
SHA14215aeffe809b49a569060b4ebda7dc34f5b9f42
SHA25614ed45112ba259382d14b193065b90abf1200d53b26f8cff319e82dd81bde886
SHA5121ca77eb502dfedcacec7c20d1ce1e90c6b36ab3979a5b306f7cf204f87468a6005853a9d579d8dc4d93bf661fdbcd066933a9377dcd1862f49f914deac2660c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e51195780d18a916182c200210fbd6e
SHA1d6b9931d556aa0351a1b253f03452dfc3b3bfc2e
SHA2569e5d4a44b5801b8783e26533cab5c44ea977f5bda100378501cb1ce152d20412
SHA512165e38a2114fee0207ebd5a5a1b15b8e21bb0315c070644331e594a868053dd0af4eaf07f2b5d68dbde8594ba53c0d4ffe3837d874f2aac753b30ed9662aa38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f666438173ee7d1ba8c6aa6caf214ef
SHA171fe1370eabb65de35e058034146a58410626627
SHA2563534e47ec54ef0697d47d79ebab6e41ae76e00baab832c986cd87802d6209470
SHA5129c2249d35682c63a75efeaa5639024a7601b1b5e8d23e8f8a5e9335dab669c96cd08bb4386aea006461776e732a3b637187f5c2b82e40927e2fc4688acad15d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b74a257dbfb45e39bd683a9f1fef9f8
SHA159f71a1ce35148b59f9b9ab755744966e4c3aff1
SHA2565d8fa4313431355a4f94c1813848d19dd4290a843a53613c5bd4dd16d5eebe2e
SHA5121b3edb1ee9610d45b00679f1cfb31d18234bfd62b609b2072be704f98f97df28d7d40c829efd9d0ae756dc36ffa9400b85cce7cb69a1bcd4f0384b595dcf0fb9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a