Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
3a537b7098d55f1d870849072932a893_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a537b7098d55f1d870849072932a893_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3a537b7098d55f1d870849072932a893_JaffaCakes118.html
-
Size
105KB
-
MD5
3a537b7098d55f1d870849072932a893
-
SHA1
24e2242efa4eb6b806a6890257d74df6616df9bc
-
SHA256
7062716cdd3055dc6bcc8868ec42770562254739ae5d31abda90585e54a6d81f
-
SHA512
bc23848dc6f234dc4b3f226666032cdcfd54175ec1f2c7620c9f2c388ce0299d44b6ce564736aeb75ed071887b96247ef81c94d066427dbf47b8996e699702e0
-
SSDEEP
3072:9nPxqwgowoDWDZImB2cYFcYFlPx2CRQDqTTWF2:9nPxqLamB2cYFcYFlPx2KbS2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEE07C61-1062-11EF-B390-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a0a1b36fa4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421682097" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000019f061e09f2bf4f31f31a61815f5b34b89a080e03817adeee85237ec2077a96000000000e8000000002000020000000f9110db127791480a390604dcc518801fb430906779acee2b59a7a354243c7dc20000000f71a522ea21c57370ca9e3a8f996d2deed92ec6dabeb5410fe2312bff45dbefe4000000026e57ac72e8c04320efc0aff26f16e61491ed67f010e91181487d2a8505fb1c1973403430b204f010b5d33c7de749196f59732753c84cc9483064f57e67e9df3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1976 3068 iexplore.exe 28 PID 3068 wrote to memory of 1976 3068 iexplore.exe 28 PID 3068 wrote to memory of 1976 3068 iexplore.exe 28 PID 3068 wrote to memory of 1976 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a537b7098d55f1d870849072932a893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b576520ea5bb466bcff8d757c987dc
SHA10c807a35a1699e417b64f8b78acbe8b8dccac593
SHA256eaed81908940dd80983cfb3428b408cfd1931e67bdd3250d74257f1c70582b36
SHA51252e719df987338045ca5b8a9bf2f74d60b088cce0de33678964d4e1eb325e5c708725ff69ff9761538416ed54bda29a5960d1b2e8afdbed069dd9b9024148446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b34601d9c67b362cda541a854083952
SHA11504eb618ff80daccc5f5f8d2ea77e68f782299e
SHA2564921cdd0479d481c849fb83e643596f7cb195c416a09e5b185e585cc2d2e62ee
SHA5126dfa90a183a675f1e6a48ce453e738a355571b38bb301a21243f4fd65c7682bbe94bbee15ea95d74dca00cef8afb547617e8eb6ce04941807f3cf6366d6aa2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d7b05591cb45c5526ff877ac5ba6f63
SHA11b43e3e5120dbc64efcee95840824af0640b6acf
SHA2566778b5663daabd305e39540db33e87ba7343517b6021b050345756747cbdde93
SHA51225f2396bd43aa6344b0300dd2916a4493071205aeaeaef87bdf72e930b44e08878774f903eae13295cde8db87276f7d5282c86bb19f1bacec6b067566b5bf94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91eb7aa9581b8218b13d4ea212d763a
SHA11ddfae14c4fde966044addc7a7168908335dcb78
SHA256f8a54d53d04e0c8324dba28bb724235abee1500e834f81def30b1d65ada5ab39
SHA512fc6008df826944fa6476fea2cc118d1106a7340cdfb28dce897aa56f4964621f0875687dbd83e48060a769527e3eb737b66ca05b7b8444bccb221c930ff6ae04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c20299b45c3d69d921fac8687bce73c
SHA15a085f09f1a5b885dcaa0a62cac643bd057d4cd6
SHA2565b0567144b97bf36ba9cc8793bd709a3d03d72483e17a9100bee8830180a1829
SHA5124224d2cfa215796419460574c57a0006ef018d4a57633150e7f3d2f16da4655d034b1ebb50528554a5ee76f15ddb2ce45feaab257fede27ab7e4b80f56115ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b844a74aa83756b3e513f8e1da97d717
SHA19e1a3ea49cb6061ffb0d01c02926a730c14db5ae
SHA2567196d88973fed7be5f7054c06683e9d2b005944372ee3c7c5012b7dde469e35d
SHA5126b716902543017479a77a0e2b119bf07e5dcfe22bc4a1580e7be858638bf0de161d50e65151183846d06057fa2cfaab47a93b2899ae32f5240c0eff6581feabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d11672dde75fbd0b79d170748cfeae
SHA1e5b4ff8b4f6fc9b71c981e405610f2303ea4380e
SHA256e5e38427a47d18d6b702fa27f0b69e80f54acd718ba1b97841ea1f356fd35380
SHA5125d81c684c3c2633f63525dbe09d1b4e080ccdf9e4952f46b8ed1f459a5c23d932f0f43df38c8e9eb6a4c628b778ad54a8f04eb3063b352b36837c912cf334572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b3ee94aa4353ac91c7cdce86a024b99
SHA1b79f1f3d9bf9df31907daa0af06ee52be700e4a6
SHA256600e8a8ce9bacd0383c440ec28f51692f069342ca2c2dc512bba44e12a1398aa
SHA512b7b7236162864af1e68ad96fb9072f6a1b0cd6336d599ef78ee6b0000d6b291148b62e0c09d5a89bcdf44df51757e1097c925208b252d3af61c9634b49a88c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb74c095aa5eedb0d270ff0ec015ed3
SHA14345abec562ee219063c99abd67ae123d1646b1f
SHA25675daeba3e27aa3004da3e8009d08e2f210de1d1c54fd66b6fdfeef4853790d3a
SHA512063e0c43270761bc45805396dd72600210b23a2a6351049a704aa297c3ddd405633bd15f266b2ef443312f2ec84c931e1fc3d7c9107f32ace6e791710367cbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4c05792abf4ffd13f13a7f0abfdacdb
SHA17fab17b8e91596ad996d93b63890686c1fb012db
SHA256ebbaad1d8ddbd90dc8662269dd2a6c73d4ca2995083bd4be0bf734f4a29ffbeb
SHA5122fc3e0699135fbff8b870b69e2d7a56a1240bbb6815f8746165bd7edb8fe16d60b76d5924cd183e1c9483105637f1072a569e1a559a3b5da52768c48f2761020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58274489c4364814eaa9c68e4db9609c0
SHA104a569fd710fd7794684db900708b87d3416eafe
SHA2563d95ba8bd114e825dc02ff3d7eb3f664ed611bdfe8d46a046c41084bed6227bb
SHA512dc9bb3d1a066df149184ba8ae6b55c87e2df7d58c8bffe0f1e6ebfbff849e7ad5cc64cf28db69239d26d0e063ed58d042813234038e42d6030b1c24f98ba06ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fabfeb8516e3cc562d670d411019ce4d
SHA1be0eddd2ce9ec7d9c7b88872d5830f6dfd55d205
SHA256928f2e9889a5eddb7b111f5636731265f2367e7b3cb10d74a3efdebccb2cebd2
SHA512cbec5665f6db3126ce149aafc719edadd88b70bbf2f44cd306ab9e439d0328dbed63225a8b7da41b4f89aef19ccd4b8690784c07ed9133e2d59212ad1538f153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc7167ec61c8ad66d4c6de6eb364287
SHA15ba17146e3387fee722009a962ae17da1f129bc6
SHA25688503e5e99ad3207c41ca089fa745b15a24c80dcf101953bb5652a5b34026fa2
SHA5123c7c0c2b12acdacbc77ee80aa129cdc0f2db4d196b3b9f8cab5826b4d136494042df7f88cd06f835e65ec2abf7a32214b0829599f4e07daf43ab12a07c37759c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54015b8b5876056f90dc83aaf77581b1d
SHA18ebbda87c9333bfe5e402c581048d40e58649177
SHA25654b457f0ab5ac8a047a0544d30a36588764d3cb1c982cde2b7dd06db9e0d5e9e
SHA5122b4e23674556400bcdaa17ddf81bf508e81692600006ff8be401998e30057d927fc51a76343bf08dfb48f3f62912f0443bd3079be75235b07f03ab6ca08688fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b1c74225443d97f477a3092def8c38
SHA176e15598adc0ce6e21178552feca00474c78ef5b
SHA25688c90ce67bbe1ad6ebec22dc1f4afe842ed1024a18776c393f83c6f2957b2eb9
SHA5124281ec9c8ddd0056b4e8cced941d1aad4b47b9d58638160e903ae1665fe5a01552a29b5754d51f4be87392ccdab12817b926d533721ed9ffdf19f5e32e443335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b0d8cfa19ae18f79305ca2c9852da4
SHA1902b7084e3beb18c083935653549688a50875d9a
SHA256d07ba0abde1431bdd2e13136e1378d49d21a78549ce15c4b2b5a9c33d7552b2d
SHA512274efd303d57f4c064d5d446b7a8a521f5091b6559fb005f9430da06e4df46750bf7910831a23686b3aa535b7169a009fa28a356ea51e854fb817e56e223d27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529892fe7519cc90b51469cf20b55a08a
SHA1634c857f95f4c10d408b1c76dc461f36fbbc92be
SHA256d1f776357b98ba59eab15885632054f946a3b1ab898d0a2b994f2e7fda761bdf
SHA5127ec0edd1b3665b3d19a2b8b3e9fefc13650de9626fd8df9c8f791b6cd94a22b1ba77f110b9457dcd931a4615961cbf2ec89babfc53e39a40b42bec32b8b42e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57091c4800675f8a0bbeac7667da62f6a
SHA140ea76cf0013cbad1d01e5f814d3e1d2e395ace2
SHA25633fda5e62bf6d7319bbe6e0a30bf6750122388d56ba0aeaf3d3c4a2a02654744
SHA512ec7e5dc88ef3051a2418fb30363526d511e583af62a95f63e9cb7f890b9a04039ea982b6a1ee03b9fad711bf73a15cc7e6e89aa3e602a6d632b99f006f52b616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527becad0525a512f6600cabb95539ffd
SHA17a52ae58ae31e95e2af3a76fde483e5c5c48b399
SHA256bba417086ce855e96649032be65eff9d967703db33e216291e34f9bea2091075
SHA512e1bd4d8284f7eb9d42f6e41727a3f9b6759e9b603f3c52567427a78dec62ddfab3e832f5e2e865df8d510ebb0ed8236a077d88a667601cc7c216f0ca4085b307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577145e072b447b59c4a77951ffa44874
SHA1952831e63b5ce1d57239be0f31f34f67847342c7
SHA2566792656f97b527e0f7b11e37725d98c23d7020013a9361d525664b03e6157b94
SHA512c20a9a9163aee52d6c6a3ea9c44e3b09fcec6cce7f2450abcc082413ad40e6aac97ac6232a59a2aa7c736c9177b96b2e0ce9dbf497b90d82a98291efb48d4d52
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a