Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
3b8cf227442b303fa03e497bd8e9d303_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b8cf227442b303fa03e497bd8e9d303_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3b8cf227442b303fa03e497bd8e9d303_JaffaCakes118.html
-
Size
68KB
-
MD5
3b8cf227442b303fa03e497bd8e9d303
-
SHA1
38ed46772753635189270541bfb17c2dba25ba28
-
SHA256
0e8d1686075ebee79b998811e951f6c672874f91d03f114dbc89c9cc79614a3c
-
SHA512
e4804cb256550dd6e49915234337417d17eee2d29b2552cf9a553ad80a54f387f9f6f0febc1e5d1af3c92e58b271a888ca610399ec57008b20a42df34a5afe0c
-
SSDEEP
768:JiK3gcMiR3sI2PDDnX0g6PkmCoYw7YDQcoTyv1wCZkoTyMdtbBnfBgN8/lboi2hX:JHQjzoYIYDQRTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2FFB711-108F-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c12f789ca4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421701326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000019a4d52343d07a0121e9eb16dcbd8d079b631c4c5427c4e4daa5eb42cf19696c000000000e80000000020000200000001b88ebcea5d98db9acedd8db65294107ed0490a51f553cdac8a4172e963b3c9a200000002a2af950759e0e75b8169e1d278f053259c199cbf52f1421f03b7783f922ca764000000068aa89a64121ffb1d526cb45b99a226e3af51ca6c8e0b0f760300522951192a237a46748f9c8d38a9440370f21e50c4fac3d5b29ed7df003935a9e9bd71f119d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28 PID 3048 wrote to memory of 2564 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b8cf227442b303fa03e497bd8e9d303_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde0170ce28f8387fa23968fc9cbe3e9
SHA1303fc645f5b1a914f419e36ae44b9408d958e448
SHA256c81759172437c0551060f2c37502eccd5f3ebaf69fc89f13c32674ede8d717f9
SHA512e2069e6aedc866d47097d781bcd8cffa81faf8aac6ebf959876c15338262172c9f245a7e232f3c7eced48237d8cf7c7a0f18bae9d18428065799037875b6ff5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565266ff022d2655b7a0bfc71ca7be303
SHA13b4abf0965a87c254dc3a7010873dcf048b43941
SHA2562331b989616f71e368ba1d1664a567079d901d5c4ae5a6b7419f70559c58da1c
SHA512e23b78c8774b8fe6d3ae7bf78008d46fa0f1a65e31abe5c657bc5c22e55b928e422b76f9977c7d4764a377411ad679124d7c8b229e655721092c1fde8d729425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0236ea18a8209c061af9b106e17eeb0
SHA1f344fcb34cf8c6f7c6d71aedcabe4402035cefa1
SHA256ca3f7b4df34a5ec84f2bab80dc7b2f1661bcf28eab5a70ccb67e77040668872f
SHA51212e35f5392e314662b7ed0d7fc7924bfdde5a548846607c05fcb9dac4b4ee0883095dc2eecb445d6b9955ddfeca571405dec68aa0a9192bf25f10173666d40eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ddabf7ea9fb7f359d0b01a0dd0ee45
SHA12a05c07fa1aff2dea2b705990e903165f802d6d1
SHA2568ca3cdfe2c3cef1d52e55af92b0b2e533ccb4dc7b5edcc98e8739654dee98242
SHA512ebe253b1e7b8d6f6246146bbb956f2553c09594f56330113009d9c255fb29931a39209c8b9bdb7b9f4ebe1ec9fdea0d3430f5893a5a45512a419dec4c958d60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e266bd6c7ed3b71b888a1dfb839b7c6
SHA196fd4b8674e2241162d6175257bfa734d39da5c9
SHA2567cbcb6821ba0780d35fbdcf1eadcd6cc3f217567b6953c47778f873c22c96d21
SHA51215fe5ba9769d17d8359d6019eff26eea7897a095302421dba8553220f58b03168393e27af4fb26a6f1c87e24678d46344ba4ddff9512e25cc50cd71faa1d6467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c30fa516bb41b2eb89c40a48a55ec2f
SHA13d5427e3ddde5c06414544d33483f962d63997bc
SHA256870001247746016e76665a556c03f6d055688f28cb836d6aa53f89b47cd841ae
SHA512d49a322a5c070502f4d9d3b28b4ff2fef78115683a7148108b32ebfe28ae89662c4d93f18c527fe3ca05848a4fad0072549704713d2ddb1110f7e25ac9f47dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4e1d89c433b6f2ca11bdd5a289b769
SHA1ec5e145c1d136184427fc557d75140694b490673
SHA25665f01897b66c7eccc61059642fb4dfe5afec40316e3bd7c20ab3b912c2e2ed78
SHA512b0ad4bb26bbfff7967449999b5d93bcd49e86fb6d8384efd51e7a9e5cfb17a29f861868a958d8c6f90cc8a75cc074eedaa0524c4b38d9b307d5f4d0ac3a93816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51352d38b95bdef6fa9106e9da5d79dc2
SHA1ee2ef7f73e663c9bae1135cc7bb4a0f2bf7f56d6
SHA25635cdcbb54b6ce8bb98a9a4dfb69e230aaab6f5422e993ec6bd886884a8ec9416
SHA512f82fb595de52e4d34594d933f6d92e764230825003a3badea924416f9a238a26b66c0ebfe7ea5a5759ee5d5ece39b2507375190497ae952a6686bfeaed9ce492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524fb55f14dfef7ac017cc9fb8ffb16ea
SHA1306d9fc6edbcb52e756860250ccb78fabf65c7a7
SHA2560d580bb1239b898fa57f2c960b6728c934ca45b9e21c57b38f710ea21d11ac5b
SHA512969f7f461a96fd0ac8bc9a4b2a28b35c483bb531bcc4d461a6639719bebbd8526edb6576fbd7f3543c3da39bd9ecd2535e0a1c8c58c052230b6ec91fda25a1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5308f7d6d28eb033bf6bffd998f01e442
SHA16869f3b4be886cabfb958c06d4e363885699795d
SHA2563e6a167a82a8d222d37a3d76c92155af094d493a6c6316bd598bb28733502805
SHA5121d191578741d6d561f6a55acbd7e6a0c7c54cf34cebc6dcda449225de8349c3314f280b948e8de81239e1677b8d80a71b6ea545a640663df1e168d668e6b6eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51312085777a2cbfe5d7d3d2ee47e6193
SHA1457cac5e036526731762c4dae608d8b0498df6bf
SHA25673757702d3bc02fc477d3ff3cca8e4446f656e7ac322aa6ea0eb8ac9bb193d6e
SHA5126b45bdb7ce0ff93b83f59aecd49c9251a30f719ca4be9f0618c49cf0b1df1fbcfa30d87913a33bfb894d1affae305a352f94cd7403a217b32797938a657e7d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a68d67183c868c8748794413a299105
SHA1617a0c6517033b18cb6155bd835e846b0c8bce29
SHA256952f7a5ae234fc810dd6f5f8bca4d85f491e49b855bc52ab24a89735dedcca7a
SHA512be4bb7188d27329763c94e8c921cc4186f35922f3db85ea5ae2dd498ebe529a344d6ee9b712fdadc0f7288f44d77e1ae4f890812cef552fbb632f071fd25cee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19da75d69d32d27afd0eb7298192886
SHA1b64fb51cc6b014d0d9b993050b46858fd863def4
SHA256ff7a8549551c84af5a8f57ea3071ca4ef85d9afefd8c6cae75fa2f5531b8b230
SHA512f934a1e50b5d8dffacb044ef5391a37fa475afa1911709579962df2337b07e4f1c076d57edd242aba62a6c92c044cae55eeb8fd615da76fab8b16733d946560d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61c1866be056a80a8ef6e7846e9a260
SHA19c720dac6dfdf0310fe473383cc30f15efff6df1
SHA256963e714656caad36f417151144fdf052e18836fbad4a0e8ed74a52739f7b09b8
SHA512585a70d77eab29ddcd1d0bba7bdcaed1025b2097a73485ae42aadc74184c1be35306014a0639cfb61507af5a05592d243a446c6f3f54cc0fae022fd762f0b8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ccf20441cf306b7baaaea6eb8b90d1
SHA1ee59981b61e7f3521fcd94909320c9ee4ddc6a32
SHA256ef2f8b05b878d672e761e5e052fe42742af97028ac82c264b53c95ab2a01d2da
SHA5128da6a26d95f157398ae37ae072854d2c6d0520f3d5999c031d24ef0a457d6837410f8ae55e9f0d0e700efa9eabdab5e8023944931d18242a8922d9b09161230d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b44f577108f5dad504c6762947ae024
SHA17762ee34bb16b5b8fa80e57edcb2df77ee0637fc
SHA25615713dffb8b74b01533719a518f3cef260fc86fd16a4517975fc9ed28111b69d
SHA51212ca303b53b385c6b3416979e728e21d96704cff4f4e26ce9af455c38bbc53c15b949fad95574beb55379093784ba744aa9f5c29d5cb4ed62a37af7cec6e113f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b9671c3b7e8a48f5fa54f2561e0b0a7
SHA116530a417afa4112549bbe60fd83c2e910b0c403
SHA2562469deb00ed5ce719b1c0a0e7150b2aeb5f7ea3a2d37e225c3f470843048ecc5
SHA512d0d0c3c065d77a2180f013d63fd8634b71ad365880b63258035d26b7a263fb9f8b43e4d9f5aec48d522477fe70cd5e1bf9527e5c430dac28534e3230db3c6174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180e44e1496b6abf6c7e8f2047eba555
SHA13cdf4a288548cb00ce8e64531bdb22c3d96c33b6
SHA25691eb946d5e694219f9bc4573914049903153375b541455309ef9ed005d817209
SHA512e868798746f5c57c3cf9f6c68233489d09c058250402cbaa17593f751f810d8abbee7997cfa8450d966e63ece0d814032b6abfa22880ee3da7885b36c2fc9198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afbd993f653d064f4b69aae9f31de7d1
SHA1a6dd54d15c2d17eeb8c4beb78ed38577473c8906
SHA25653f16bca43d1b7ba7599e59044dbf03a75b5c998d273382769d002d0d0206ce0
SHA5120a77e2c498ceb40c503f4db21485022b911c4375d4aa8ddac7b5e49c690cb5ebabd103d8440a979b6b6576ff8e729337c60bc6db1eaf496c6a9f2adcf4ac17d1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a