Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
3a2817a71bbe3d3cbd7b99daf8f4ec3e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a2817a71bbe3d3cbd7b99daf8f4ec3e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a2817a71bbe3d3cbd7b99daf8f4ec3e_JaffaCakes118.html
-
Size
1KB
-
MD5
3a2817a71bbe3d3cbd7b99daf8f4ec3e
-
SHA1
1e9d6cc8b023b5a856f5a97d1438ec6435cc36f8
-
SHA256
1da2e60a25b608dec78a916a26abf418d7d918e7d83ce874ce6b1651a33b70e5
-
SHA512
c5f0c0d4e18faf9cf520a6f08f52b2cfeb87a77dd51541c931622065f408f6e6380918027f96f6ac1cf45c92d18659e254ebdbc29f7ad48b3064f0bdefa5c062
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A64005C1-105C-11EF-9988-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421679430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2011a07b69a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000000ba8f95e9a476de49dc930afa6ec58e2b12ab478850fe965fd32730a3a5c01f7000000000e8000000002000020000000da94d6eb532a1410253751a751954aa2be8febcad568b8a2152ba6024fb994ff20000000b0e4b9f2b18515f28eb711da489e469257bf42dac7e267e3b43d7e9080a9b9c240000000d234639d1b406ecd48f31ee49b0537412c106b2b0cc9c23683e1ff64f28d2f01650a449eea826ddaa4d204862c90e8ef46412e828e2b19970ea41a00fe5decda iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 996 iexplore.exe 996 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 996 wrote to memory of 2532 996 iexplore.exe 28 PID 996 wrote to memory of 2532 996 iexplore.exe 28 PID 996 wrote to memory of 2532 996 iexplore.exe 28 PID 996 wrote to memory of 2532 996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a2817a71bbe3d3cbd7b99daf8f4ec3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bfac1aaa75052efcb9133524c3147ab5
SHA1aaae7a468ddb254dd73eaa5b2b9857b2a5ba6d92
SHA256d8de6dc4a1b1a3a71fc6e87b4743005130c9d399e2432497bb9e8876f7a54af4
SHA512a6592f32fe3afb802f658b427033a572ea933b7d5ac277eb56e743edb5e3324e4eaccac0b4bf8cac0d932a4eb829fff7778eb67b4bdce8fa45674ea6a0b4aa52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a81cb89a76a89c160b638079b0473f5
SHA1d166be403f1006c94863bea57e1284c3b4498dd7
SHA256c39f21c158c827c5b97f67ff1dce2bc498d6bd989f29166417fb3e23fe820f74
SHA5128d4e17362b32b54258a4380919e3c1b50b33322edaa2c38df86ab9508e810903107b1f173ac010b78d96af1a753465f42bf8f171e1bef692e311ef6f47af97d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f49d3dba80d9372bf9754fd63425c87
SHA19cb16183bd13ee5703bb35cbe92aa4e236ffd64a
SHA25631038ac529a6020b5621863286396e7bf330bb2c452ae88d601d7cfcc58c3292
SHA51252216f43ab0fad8ff7c434137b76dfb1c89bf6a1428b2a7693e7fb6c86fb2bb37b69b90c7d69fba85a543bbf999d954297e62c7ecea534c98ab216b75bba589b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6cb84c90e7f2280392e07e941f354de
SHA1f977210192d4feb26ad675266dc343ed70278121
SHA2566b5e58c3b01df7a09aa33591762dcd3c9414233cc84a42fc60d772c4c4e96334
SHA512aa5c46b50d34904a3c4414ea44368ba778fdca5259dc4da3a1d1c25b9e516804fb1e336189fba3aa2ca9a2fdacc4ac56e246aaadedb4d1e843075fb43341152d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33b08bb05ec36f90f6fdb6b361da301
SHA10614d6c01d1ba8f7c4559db71fa916cac037bbbc
SHA256ac0fd513aaeab520a601ec7f15501ae0a92995399e7552ac1aac05478ca34e73
SHA51260ce28279b86a17f2287fe587da7184bb817ba96d2a858df6a558ff6c831c07952ccb919b557d4464076d9a02cfa903d71775af3063ada8905f4c1fc927a30db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac9e41099c39041e65e0dc400f9f83c
SHA19ca768cccf05d878a7855b05a9c61a2cbc9d496d
SHA2566c7265553dd54d27183a4ec67381f71fb673ae7d54c00e4883701322954a2173
SHA512e1c6c75322180876cd20e30870dc4cc95b92b50e3f52d396f3a09a53b5b31181557c7208305a1f744d587c3170ef618bc32527a8c56a1ddc0445c8971917053f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516391303d7238793f4c70c41c1a70d01
SHA1653cf2f9fe16892740e9cad892cd6177f35c3949
SHA256f3a2f20d399733c4e071ca3148d5b1641e47582ffa35bd9793e46bce88d6b808
SHA512a571a9d4b2f57c0a0b3d8534c2c0d67f224f269bf8d8ca0a7fcc657f4263a63502646168423ba69da345a1671712465db0a48c09467ada7900aaa9bf43d9407a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d14a05f0d258384c738d263b3aea8c
SHA146e998db740656b1a737ecde3c3d0798168727c5
SHA25667de4642c330d40436fc252e1dc2eaed999cdaafb249447271386a6021624e7f
SHA51297d3dd97896b1029c49bb524332a680d4554e6f4b22a42930c13f877ffc32c233beeef1f4d6bc7aeebb27726590ba3d0fdeda6dd85f5ec7db9d70966dce879f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568aa575c621faefa0e90a1f5d887578d
SHA1627e5c309be3d1d81c78cc7bb09df08f1dad3efe
SHA2569a6a42affe4724dab1413b99feffca9a579c5a4b1063e28575eeb776780ad9ff
SHA512e457a6fcc26120f1e59e8d468b33b3b0d04c9904a8d1c39c588ca0479b12e82669ed653f9561120f14abdf808071bd641de4cd30a3257c3dc6d845abf1e20d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59344c336bb1f11958283573b38f51161
SHA120c96af8f3119ae60246586caf2bf115ce0f08eb
SHA256244cb576992c5efff9f17026e0decaeec4483075c4a23a08bb03ab91911e44d5
SHA512d63ab3ec39634871904a15a97e1ae90010973cce21cbf6468fbf6f89238c0cfa6c2171dd9cafee533a8b45592c167a07d91c5a269b86a7ba9b7f8d4dfd9d8e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570049a75aa4e049bf61bef485da9dd8b
SHA1d5bf72d52569c60a021bb92176e7e23cb3d0d6b6
SHA25609379b0fb91dcc4fb97b2a30d53b72d78be6ec5a29b2b1bc6c7a08f74989396e
SHA512eda353890fbaa307a77c8c8aa6f21a6b5478d83c12f1db9026fdcdfd3cb9e175d5fa32770fee0b041fdf3d36f595e73c19e288532b44d8a052cffe1fe3293ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51260406018d8c45634908ea8ba9bc6c7
SHA1d985277c7935eda260e1f0bc22b8327c5715ab74
SHA2562cc1e08911e543d16f99adfd1e245e6b58dbde22be16763a3c37433feb1948ab
SHA512f1105a9027cdeaca5a5d70bd2d6117411fcec4dc5ec47416d0eab3f567177a620de03722b8dbf595198dde60bdbc4fa2f5b037d4c4035dae92d0057b4121c355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b87665b53497187fd41035a721a1d8f7
SHA1e40076225bd2d965b147dcd3317d5ff0922500e8
SHA2562f281b5286e462c86604bafce00ca61dca8e0952ca251cf3b95b456fac48aa8e
SHA512560595f76b4deecc9ba4e364bbba909f892cee464d8aff1129595f9e690fb165349fad2e1cdab606a27013fc8c74ed798dc664e41bf093ab91c16d238253d1d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a