Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
3a54194b4a096c89d138726664938d36_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a54194b4a096c89d138726664938d36_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3a54194b4a096c89d138726664938d36_JaffaCakes118.html
-
Size
21KB
-
MD5
3a54194b4a096c89d138726664938d36
-
SHA1
a5c36c9b69231a81746578d25649311232a5c0a9
-
SHA256
00396f11abffcea4cbfc50fe719dad30dc1ebf6ec0132cbf9e30a37358a331e8
-
SHA512
8b445478dcaa7d118733b52f6094822cfa1e2478e4a20c733e4728b655ca41e5e10152fe0d670018427e4bcbf82b4981fb5306ebbedd7f199628aa5891eb78f1
-
SSDEEP
384:VOEKqq8uh1ABtV4Rm7zKyaYJxaRRBcxo61qAVqzW4Zb7+P64S2rqNJK:4n/8uh1ABtV4Rmr5JxaRvcu6O064S2rH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a8d7866d6362ef1011dc98daadc7b996903c53bdd36f7902715cf095d7b10d19000000000e80000000020000200000006ea3eb107be424bfc6bd73ae0c30eb7111470280f923ca7ec16a8d780ab570cb200000004049fd519e3e36aa2ad81fcd819edf300a531a2900ab544585880bc568c897ef400000006ac27805103725e5e787461c9ece291d3271bd987589f811981d3834371ec5cf3ffbb2450384b75ccbdb5c5ae144bbfd8a993962aa9dc5486b7ff86c4903d2d0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{020EFC71-1063-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09a50d76fa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421682157" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a54194b4a096c89d138726664938d36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfbef53db9446980cb33ec10a90d9c4b
SHA147e20ce19d5302063ce2eb74f308b7b4c7897979
SHA256fc815818154c351a307dfaef476b7edc0e63ca708a19adce9a7c34f780269052
SHA51216063eb487b4a1c700db426ad07578b847afe32b12a890b1e7feda28f0822f826ce73f2ea24bc765165aeab19da45d9edfe6acf5218162340a8f5389fc6a75d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b448bb4a241cff48c37a95a9e08b1445
SHA1f48d52bb6d287091affd6822fc98672c08c29d2c
SHA2564b3a510b2d99acdb71a1f31ed66f6455393e21f86f73f2cf15ab2aba681f00d1
SHA51249510ff687bcaef98e97d3a786f02603b048f1cad1efe0c9d4e756f429aba711928ece2740a9ae61555c17daa7a9b91aa73ea062ebd25a722acc9219c8a83dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b052a14f85ee9ebf2e83b739193eb9
SHA1d73c0f5e2cee687f391ef7c5392ecebedd41cfae
SHA256fab23ca7af5e6497311ea9e7d0cd7eb2a2374f95fca32fb73f3322e7c1e5bd78
SHA512151bcc4c44419664209a864870f392a1975b0e80d3474a5f610df5ea5ab01abf177bd822789930ab60fe028353a1f5f4bc647971b07e943c6e0499dfbf6f5fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf2616369ea729a49af33d999c9d8680
SHA1fb3ba979a05b9df9510cedbddb3fbf6e2bf0ab16
SHA256b8343418b7b9639ce4460e18c852d513cbbe65601ae960dfbbcced098f6c2fa0
SHA512b35f6957390ed569beed57b0eb1d603acd1ef2680a744e2df0b747417f57fc4768bacf174d7e8b86a7c8485f91ae9eb7d0aa8fd5f1b947150b0b94251c4d50d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dbf51a0a5e198e9c60b2810a6e7ac22
SHA12bbc2d4aefbb9c8780031fecd3af6b523423bd82
SHA256b609cc3b487a3e481951b1b7a49e0d8e4aad462b8d6c2b1abdc2197be6d710dd
SHA512e1f23d60dbbd36279c87f02dd665bb60ca6572856e780210064e51bb1e1dd400f130ff91467220876e789d5ab34c4976b5ca9d7b4d5ffa80fdafdb8a2ee0392f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77a68b99084b7380253e89313c294fd
SHA1985e512ca0f3494a0bf10a1ee6a47d81c3f7e894
SHA256dbcc8bf34972aa219ec726851761df75ac05df7e4cb68e29967b48de441c8650
SHA5129606c09876ac6a7beb40bb3f20685b58b2a9a86cbb29d4d0ca5c33c4e7692185fd76c859f58769497fcac42a05a91bd454eab27624435d7b9adb81bb8ef7b1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57115514bd6491c8ee6efc6bf298c591e
SHA1cd74587358ef3fa0aa9d50a0d5711b18f6469a74
SHA256bf84cdfc5777c4040c7a18ba22a12276faf8edf9996628e331c6fd0f44a5e5a1
SHA512be3a87c298a5a6558ec4bcf94a58cfc442c67c87151ddd9fd00075ffbeadc3a1bd9d3714ff43fe3f23e6cff604273db345144a687490b654fe5019c45d150731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e000965b9426b488d520e588ecd03062
SHA114a45001699553994accdf0cc5971f3fdf219e4d
SHA256e55c164c6cb7395781615e36265ee11a9bd5676c17c26feeaf05fb66283ba80a
SHA512038944cb292eadb139af5f9f71224c6c987f8b1de65ad555e5c6a0bb4d0b4ece1a7c03bd0b62b0acc9e0a22c46582230bbc52f7ddc241d4533baa3b811cd2841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ea1877f0a38854f48aabfac8ce41e6
SHA18274e3e1c2a74d7a56d0d80d7fd4d5c451caba83
SHA2560c2b8f086534b3fb0fb12333031a09a95a1ff6ac33d51833b752cc5136bbbd1a
SHA5123ce5831d4272056c8379e4881c425758a6cf5e78a8a04e560417d82d3f5fa6169c425a077647022e07596f06cb21bc6827466ae172475ff61956b529e1309cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e45c69a56ac296b250b2a7237c1656b
SHA1d378ec154c6c90a9c320754c1022bcdf945fc04d
SHA2569f2e4817703e138eae4fffac49e125d6770e297d05aa00a6cc5af0f122dd75bc
SHA51251599d71073c5fbc8471396cda272b26e4fc0bf4715efcb532648cc5d4ab4314dd10e4ec1b5b29ce3fe1c76721a74218852a771d27d52198cea3dbe9238baf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de954643800bbcbb17224d4614fe3ab
SHA1bb8a0aeaf8882cf3461c9e08144d69d71590ba02
SHA25658b28db8f68b3f0f825c584010d5ed3b6e1093479af373dce5ed4da4b56c1a2e
SHA5126526136a7a8ec6f63de543d017e0e35e7209f44c8d0d124ff44669affb683a18b0ca7659587fd4c8e009a47c33d79bbbd7178a65ed014869885206263f200944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5092e9617150e3f20f2fb61cc8cf5c26d
SHA1471948aeecbd9c1af1aa4efd10a1ce443197c5cf
SHA256d9995f31f88e09c674e24551e44ebcd00b454b888b936cb19bd27fab6f511fc0
SHA512ad40169bb97ca4c3c1c05f9beda1791321b3198adfe300e1f0f1119175025d589f633d999683f36cd18c29945ceb55259cd82612a3b7ac70b52f4f57b7238966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba112e854b65d46ce62f93ceb13dc307
SHA1eb8197e2a7d1cfe05cf2457dc2d3f29d3114c649
SHA25675abc6a22065263c73c3d6acd7688006c59b5e2a55a9739e57451921da85f787
SHA512524d9a389832c0da29970edc7e033a9a877a33a7e44bfea0c42b2b9e1ffdf3fd38b773bd87fbccb5083d42516b57e4abd6509b14659622b2205dfb52a0c94e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd97bf28bc58df0715f6de638cc4bc32
SHA129c0050a5538d7d9ffa9ad1e79cea40a14bf8bbb
SHA2569e8539267032378591cffe0e4cd714cd7605b5e3c8699ad5ac50c19895283100
SHA51297dd99da2612da7a9d1ea696e463833492acc854ef0cf379b9e2bbc10255705ed345be44c67d753773e2b73f6b6df3e74f780241451467928d7e4e2d6dc4a427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57507962e0a071be8d7d4d39012e1ce38
SHA19cb1eae820da678843236a32df641599652625ad
SHA2560669d6a1d5c0a5593cdbbc600f6849bafda28ea9254b07637337372e6692a7ae
SHA5128d60c4140c60664a6d141c660c5294f4f608d608d49fe6d236d120c8ad0ce89a8271a82712c0c36189974daf0e8af5c7e5f10513034d0a551c1bd99eaf717980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19afd2f2407f4f22d1b20a9ac0a9bcb
SHA1bb1c75cf3f8937ba9f0a8c323b13cb391aa9c244
SHA2563c3d08600c7e909c54d7cc6be0e550b9e571ab8d51f698b0196810b8d43a7f2f
SHA5123e9765219469c888f5cb18ab8bec8c030c8734b005e840c220e3f0669c5fa18ab2925e0e30573ba0ba85366a890071d0cee8f185e65c27ff11790e3d3b43cccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fea28fd0a75e4e1003119a53010dda
SHA12d06ddcb1d10f57117647d0d01d797516bc34583
SHA256e20834fe5c9fdd9230670a992eb5d7c0808f4df44ec1d02a1e0d6f48cccbb564
SHA5128d494efca6b484ddd3d04bd2d27971fb6471035f56decc6cd011d5f929e6e925eeb44a4441722aac29ed36e4ae7fccb7cf53d61efede9fab51eb292e353821c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504b74ae4ba670300128f1ffc7dc38c2b
SHA11a381bbb6a67da202334117d1326671f1e76d77e
SHA2566b730ede46bd3c96f511083ba6ff4f9c248ec5736b9aecc74a799054189bb683
SHA512195b1e446291942ddb27b276309f0521ca691452145157ac1e2994d22d5b72dd7cd62e42ca11b9542eae688193aa653de374f0659fe9c06799bf1a12518187d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381e80dd762047c62e23115d1b2aa5a9
SHA1e3c2ab44b80e7e0ad8e96627d11435d3921595ce
SHA2565c2f03a0e7e9b51c3107b0cdff9367481a0a3bafaf16ab969ab79bd73c9d844a
SHA5127cb4c66b09b43e5c99b4dd76546ab4f463f709b0821dba98ec0bf3dc1c88153a085128704b1a43038f7be3265e4e3978766274f5391ff5856913a6cb2c22eb69
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a