Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
3be3cc3419a000c7098906920bed33b8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3be3cc3419a000c7098906920bed33b8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3be3cc3419a000c7098906920bed33b8_JaffaCakes118.html
-
Size
460KB
-
MD5
3be3cc3419a000c7098906920bed33b8
-
SHA1
03fe66f9ad9a41eb32280427cd624fd658bc0b42
-
SHA256
7d9ca14a3cdb6e96149dea43ef50c0a029dc57a912f8a94962a23794d55efa75
-
SHA512
7ca50603ecf425997a341dd6edbafe2d1de95fa26fb81c2ea428340247129e6176dae85812937845d11300b97a209888f4f5167375186a6917a87a542d27d3bf
-
SSDEEP
6144:SvsMYod+X3oI+YNsMYod+X3oI+YqsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3P5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B6F7A81-109C-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003c6f3dc751c226563c7a4832063cf878938e695c1cfc316473cce59ac5683d9c000000000e8000000002000020000000487cff8878e687c7e3c97b2caeaf215259fe9e90b7e4c971760069b2bc822ac22000000041e4792d9beb1e418db70240321c8aabe52a5946b37bbe1636ddce9aa1ba717f40000000a36b771470105ba87d0a14e400bc680bdfbb70cadb33bad17ee6b988e14035993523dfbff225273bd024aa647e816378d1fc910265271e8a13501487e14b0014 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421706682" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b013fbf3a8a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3be3cc3419a000c7098906920bed33b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818332f8bca853ca33f4f5b01bc6e28f
SHA1fd0f724dbfd7a1fe0aad0d37badd204d5f625027
SHA256ebbe7edd02fe1b0ad87eb3bf022c406b29ea2cffee3de95c00fa66d69b68cf63
SHA512474610f59e0e8147a117730fa0e2f4d4e988ac820ece9209b89090e9e5920b2eefa199e4993c2050f6ad9d0394ae5b84de2e0098c5fcd84b5a8b8c2e3aebcb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58988d21ccdc4bec273214deee54998c1
SHA1d669136442d58327a397786bfa8631ef967c010a
SHA2560f7cc80114f15c3a446f9b05f389238c4890eb0e9ef10e9ef0d2636ddf5623f3
SHA51221b815cdd485ddbfe35441d7d93f868c1fe8c45a4e9e7fd57660143664e0eff91c28d06bdb945698337a0e5ad1a5e5e55df82c7e5e2e4217598881fd6f41edeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6ec03b68a3cc080bf0f406c2b4e8f3
SHA1a0f41cf76fccde8ce4f50431435aa42ccacba0b4
SHA2565f51d18f0e5747d309729dfd3baf8d6d3a35ecacd78bbc912c167de5586f64f1
SHA512807b65299391402c10555b1bb9382dcea2225550b1ea927b19883dce0c157fb20db24660de7c61e29f509710beec9e5afaa42b65b819376588d511965a084517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548325aa4ebbf4faf751eb483b2c97240
SHA176720094d020cc1492c4acdfc0f790f40ac9f9cd
SHA25654660afef6ced181fd39f0a1caede6f87377e89cdbc9b43f312313b5e89252b2
SHA5127f7cc105e8c769351e46feab887d32bc4b9ec056b510083b4c95b59c35dd04fbaa1c5b2544c9f6e7260b35918d4cf40cb482dcaecc54af48676badb951bb1f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c252e60dd4d63c67b917a022d193ad6
SHA1be8829b19ab38a3a945943fef90f71ff040bbf95
SHA256a5afa5ca920e7a5a4f6220c6e5247a6f317fe79b3ac335c51a82bfd3c47f8a6c
SHA512bbacb71d28a8e8259a47384bc91a5ff33753dffae0dfe841217ff284eccf705a6c567c18561b40ce8a83ee618c90f0e8c8026c0b9eeccd9a280eb33d00fe6a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af4f9e7304d2a761e41ac2560552683
SHA1e81d75d582192c9d7c12229a91acd989a19c5dd9
SHA2563f593935e95cf12f0250f8d291ef7a57d28dd71ff995076d9d541128299b4333
SHA5129e93080c47be90a09db94f87fd69534e573add08b983d2de301999b116568c5277b4eb95e2ee58c9449d33865c5b0824e875b3bc32629de55752cdd4d099853b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502eda07060645609c90298d7a8d8919
SHA1058bfe46f8070bc6de83d9d22f324323d61f6d9c
SHA256b03da3277d30d82cfea7141bd0c729acdd060efbaaaaf3bb75a3ed19b47dc419
SHA5126f8b5cb6bd58e73351186b252df1c27db7ea2344dd6443e83e30dbf14e97e5d498d14a0237c0f3734de5f03c00d3ab03eec3518baa6e0581411bf7dc6663d0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5071a7305aeb760320a9cbf9760ebaeb0
SHA158849940d8a32b9d8e85bfd7d4a2c3d6370835ef
SHA25640d76c84f10d26ca5c83e5f8579325e3d9297a253f11523a74aa40bfdd3407c5
SHA512dcba1352d263ff8be377353604dfa9214e2e7bd1ca97bf48fbd141e45aa16ce3d08606afccdd67b481df77329f68d22fe0a41dfb46b36949424dac52f55babe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b3eb6512c9e6cbd337a545b9b294bf
SHA11ab1863de5c212b636483da8519d60fb9cfc16a9
SHA2564b0952e78cd37c820bbea9cf62c34e79568c40c04b04d3505df9a3b6629bc7ad
SHA512fc2c9a65f1b97652aa4bf90273f02465f10654381a58b61739301fddcad546c9d877ef12c2c01546bec528bd5b2593a244ef509857c85b299b91766974bf0b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb1e96890e7135c1c74615cbc1659b4
SHA11fcbabb2868a381d9c7801de1c6ee4e9b56610d2
SHA256aae3d62b3ea16f89c180966bd1d42de249e0b16303b39477950b7ab6dcc1eeed
SHA512feb3c5e951fa80a6acecaa8d6cfa9cab3e5778e4d8f56e13620ce3face49c4a6299066c9a4b0f28b7ae294b4f8f9a32a8af247dd5b3d9a52c086a4c88256e250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549074eb110b9af93f2162502f1710626
SHA1eaa0485d2c80bfc4bb9e84d5dcadbec6531d5bca
SHA25656574066cce0dd6579dde2f195de2db697840e6290c7f070b3bfa2925f846356
SHA512c05dc061c9a0ebd6861fa8710380a013faf74298ba6cc78eb6b6b6e76ba03ba7935ec22d235feff2f30a59fe270c068a1f804ebc4eb315a050d778621ba5e1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c508c404d9654d2c12a6571f51e966fc
SHA12f222165f1bfaceaf6106f7f5418192cab340047
SHA256213d6d7de5c6557bdbe807b28c57e6d80c90371137e772408ea6b551e3e27169
SHA5128c035cd33a22453eb22a416b2e1f985f1eb98646bc4596a46b557db3f46e76d62ce53deb209c708ebddbfe6101bb9e37b8bc3abb9088381c089ee51c59dbb054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5e83df6913811fffbcfe3e9af9fc75
SHA1867f57234165a92c7a51d9e1fc7ef09458ae95ad
SHA2566ade9bd922b93b61ef5cf8636c35296bfccf48f986c5f3320b94f7e7d875b5c9
SHA51294fa453bf91c3205236e3a4cdb4341d6b7e21c06e91ee686b9374647c39a7956746f37a3c3d54e32779b5f19de8ba7cb16b27d8a3ba58cdf5b3b7ca956f5c9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53313a15af556bde8de1a7e96d349c351
SHA1b7066a9bf81b28217be00fbb22cc39b96e84f795
SHA256102bc19d4a8a7777a2256284e0626a6748da6b9add4784f30bee20a7d26e4a0e
SHA5128c8d33411b9228a00560cb418e80d8234b5e7c233c88594b7c94f033250ed275439e5023a2f92d7144327fc228e9b50c85f1222413b2746c9f382506f3bc5ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bea039653ab7f7e9bfb27975d809267
SHA16c9e4714e4a3209b94c4833df36fdf1b64dbdad4
SHA2560ddd9132beab5c4a6f038bf6c7c402d2388c7521f188952e6355d5435cbf0127
SHA51237bc19d6f743a94ad65b95b3fba952dd443dc14367609c14b2c4c9dd3689870fa256c684cfe7245775b98338a3ce6b48805c632629653eeb08d658d6a45ba913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b81edb965208366820e8f46c1cc69ca4
SHA18ac8d03132fa475d261354fc1cee7a52ddb3b347
SHA256baf28c11a4a05c5b239f6ba83b13f6a83700c7352ca20cada5abc44a34f305b9
SHA512409c46a6bc1872315398b3bb8062076f987309aee1bb8c00792ae2e9eaa5784e9623f12323fe21ceee19b9522b816a8590d5987a4933b4c43fc71e30b26b5ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513520d8b3a2589cb6b8f3083ce5e18ba
SHA1ccea0b097d2320f1fbb165d895d8b94ed84c83f7
SHA256b10c42405000e9ad29678474410ce52f2c4e06fff755a489dc438e8a3a032446
SHA5129152a0b294633b2c7092226a389ee4daee746d2a7cc24984b5fec89f2f3bec59aa7dd7252528f4f8cad25d25875de2e054c722bda3d844d844c0d0e9fda86a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501cb306e605dbf1daf0b591223d9bdc9
SHA1a4f81c620d4280f196d6d83008b9b7f241fbfadb
SHA2564cd755eab8a824a1731994a62d210aaaa42652685b6d8021a0385710616a34c5
SHA5126a2f37bd8c1e7b6963b178f73a53f4d380b84e78aaada471ab3ef2e835cc12b73ee7ff27d413defdfc27bfec884e0d247d7d083ba03829ea6740b70ea3468c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf73d60aaa6171ef1224217df29cad7
SHA17cf767c23215b066ac7140b85f802fd2318ff6f0
SHA256efb6249792ed5cc71d4711b41915bb635b8467aa72fa41a2680f049e0350f6fc
SHA512d2a340f9fa791c451a71c7ab3a17749af876daa12aad9703c96016293220fa2314e09779c8d0f7f9c7017afb895901028dd304a666f1cfc77b58599878059ac2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a