Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
3ce3b258807b0cb153c8fb974027c059_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ce3b258807b0cb153c8fb974027c059_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3ce3b258807b0cb153c8fb974027c059_JaffaCakes118.html
-
Size
3KB
-
MD5
3ce3b258807b0cb153c8fb974027c059
-
SHA1
6bc9bae8c124cc1abafca0b73a0957212fa10255
-
SHA256
e71e7df1de6bb06fb7d93ab79407ded81e348571fe1b6b998889717bcccaaab2
-
SHA512
933c9d8680ad480c6025c00ca5b903393954f6e596aa6f734b086b468f3ac199d23e3ee7900ebf79cdc9f2d132a5f1cd7747da5fc57f876e537e0b53fa6b9934
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A32380E1-10C7-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000419f4c7ec11fbb06078388897faa2a1483a73b7653cc139ff17ecf74aebb3bb3000000000e8000000002000020000000e7b6d7f791ad6766510dfc80c7935c4d3da4c20d9e9232e5afc915a167f5d3ba20000000d5294c048dfe86331b1aa86de12c94df8dceb9cc594a735e9a244f7d1da2087d400000002bf0f279ca52bc960ab3165f9e62af5407fedde2b9f0d1c33c9475d43190325ed77b6f952cc384d2542fc1bcd835269a9274beb7a11595492b441b0eb5cbea70 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421725377" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4088dd77d4a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2504 1904 iexplore.exe 28 PID 1904 wrote to memory of 2504 1904 iexplore.exe 28 PID 1904 wrote to memory of 2504 1904 iexplore.exe 28 PID 1904 wrote to memory of 2504 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce3b258807b0cb153c8fb974027c059_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514f7bb8cda151246630e485502b1bed5
SHA1d2154c50dcfc17ed6e8344a1cbdcbd86a241bdd1
SHA2566377b10b6d0246921c87e08598978b5bb3a0ecf56bba9b735fcb588b0f0f0e3c
SHA512a151c9cb0d91c358ccbe9764684d3101bc56d507d6d3fd69a12b4a07baee346e60bebea82ed82fd9b5cafbf9d7f1ad72069d487e5ec40f817d7b45b44b1595ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b047b9d8c880dbbf9e9da938eb8f22f
SHA16b280c4320d5c18795e1f4d3aae39b8a1cfd7c2f
SHA256d21b1b8b38c5d42a60f798be3a436093fc5ee3fdd6656b510df620392d0cecd0
SHA51257f14aa21970c1af9d3167da1dae3f18da85ebf3ca26a1953d29d84b7d90577d74ea76117278ec16ce17bde21588a43a37bc644e7a87a0be8a4c6c1e8696165f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b81141569cea7fdfe4970b1e51434dec
SHA1129997050347529113ddbf6b8653955098abdbd5
SHA256889be5e23fb1ce479d21933a99ef9f50bd7311bb741e275c729fd4855ccc0974
SHA5126e2340c0fc67a63f60662878427a81e41a7080a4f9ce7b0e4829b651a8685d3b2e7db238654d352299538bc98affd4252c44cea1fae8d67b90b2319ab7287c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d12030905f4b8f5550fd07d22172864
SHA16be9178e50c2a9feead7b0034f43ed25ff20874a
SHA256ae39d6eadbfae0986d819d40a013cff9969568529a3db7396a56d844a28b9b2c
SHA512509435057a8fa9e09ac14b7865c16f320d68b8a890a8abfdd2a5c20f26be8e0be534bbdab02e415b9cae19dec89f997c338a1e0131015a9a56327a3a90748ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e5e1abb08c06dbf20b99aba2ecfa25
SHA12a2d33cd0711fbb7cfc7b1310ab5efc3498d8311
SHA256f82a145641c66c77e1bed8054681ee81eeae68a8a7e85eaad0018a75ceaeba31
SHA5124e34c1875fae56e2c4efd237d4872d3b94b62c12e83da76c093e59d226e654e08ae0c746d91987a62d818dbce4fb614d37f7e91ad7a3519beacfb909fffc0e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2d68e7f50762873d549f4a954e7458
SHA1e8a0282f65d0590a200ebd5a96037078a7efaa8c
SHA256a5c34ab7de5073d6d688f11407376926bec05952215efddfb32884d3c322ec5f
SHA51281cae8c0bf0adec7ef1e555e7edd5d620ef7932bb33291c420d2605e29a1a0f0ef3291ff41d0bd6f775ccc5d2c1e4bd3ba441017a49602314e044bd20795440c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5924c02b6050c611e3fafa8965732446d
SHA18a0bf7a14b5db0887857434833a9b164eeed7a2e
SHA25614e1a647f55ae082d505cdb3923372e48195a7865ec82e2ed758a198d9d01624
SHA51240e7f2d123cc762738a6fcfe9c38204cdc69794a9161be799eb7676c253a02145c4bbb813f52f8571ba05bbc345b24e5776b1d65362bc9eac2fe2e25745ba281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd0e1b6c56f21941f86d0fd79bd8324
SHA1d98831f8e6edc543a7707ac8d4f0fdf2c261c44f
SHA25605cc91ee7bbc0e51ea273cfe5fe5e400c9c3bbd35068139edddc815c684e4349
SHA51255f014fd7119a098558a63325c1c06fd94f28ada37a00da2e97e02b30fd51fbb554e18a746dab250bf78cc9c413c8be6d7eec8f8c022614d0cb75bca213da4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201dd543cf035991bf4313a50c6e2137
SHA17765071ca9d3908085f28f2fc7f87a3773aae988
SHA2567c52a6af7a744f46d317829c8a7b97a0e77c242dc8471384ba12a494813f3679
SHA512168d29ef2bd919ea33af9668a89f56c48191b243212cc18c3acc70586d29afb2e2f44992feace2d8a633a28fd1d6297aed34c2865073188f57a42dabc8cfac7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592269b14e21a56427597d0b5b02c32b3
SHA19d982a9939ec978aef5f3a0decab0c67f7a973cc
SHA256da54bcfc5991cd36c25d3faa2ca343ab685f5f85d56ceeb4e4cc0a556b18ec41
SHA512606a75e48b281796895be52ccc0d17ebc2f73ee8978e754a5338de3e8b211e22cea66024cba5730de6e10b44d52f72d6fb88d3dfbfd54fa657daf5187e6eaa13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53637c229b5fcc7ba0a56ec2ecbf2c5b3
SHA142ea4abab0a0e22003e82c6f0fc946ed904781f8
SHA256bb738760f9c28da97afeac7750e92c1175a17f26bf09179e38886c16d9cc32b0
SHA512845bbcae9169b0915e7b13778b90ce308c2a4b9d9bef770289ec1092cecd67d0c5179c670eb6ad84b8a879dc8c7029378e9953aa9aa9be750434a8d001c8129f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b90b6d68707845c7e873d00147c00163
SHA1c2c6cd4acd295869168aa5051b00e9aee39f9317
SHA2567b5d93c6ed046979ad26ac09f5c07fe064e014f8d20ff58a92f314d9196e5461
SHA5127e58286106cc22b250d0c615f740ceae9e5963844da90a10581a2e224412716f5ac72134a4fd85b826b088e8737d14da35fc9f5eb9d2f0529a39e7d49ecf08a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fda397cf9417797f6869089b2a3a678
SHA1854319728af8f50083cc333d6b0fab8ff605625d
SHA2569631089c0c6971cdbab04e4827ecb63b09f5d8a92d7f855f73868470cdd1c25f
SHA512298aad5c14de1771ebd51648c0874db87b6eb11c542472975cec458fad8a36631b142a9406e7baa50286a9f0921970b7df19f15d1f7439a81810c3328396ff1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a8c77a71eaf3cb0c7aae1b893886631
SHA1a7277894861ef564bee8b715ba2569766726fd4b
SHA2560d41b6204adccbcae6bbdabbc09480f0a237a0ec0c550fe1b6d63ad319332555
SHA512b7f6d85037cf9eab4ebef18322aaf7545d66045aa3bfac5e421fe5e021f86cc961e330cae56ee546d2f60fe71c3cf263cef08bf4dedb2318beec0913d4104473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ca83853b3ded410d1c45d051bef357
SHA162296188ce0e31a064ce0382480c000af51c867c
SHA2563b3efcf0f422c3e920574a27f9da79f3f724c29bd3da8246d5a39b1b902069cf
SHA5120fe75874ef19daf83f7d28df68becd7134b62d0b223864fcc5cd19d94c7db6440d3ba74e59ba4af2947c8609fc0356cdd7a175f32c27fa1fcb7a57e387487639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616668690c585434f109151979608f86
SHA19bd330697603ef9607fe950f0ca0088fb04ae31e
SHA256148005ca7af9797ca85f9959411c546160ec73492258bbc83cd40666c39373df
SHA5128f3743a52831fa63cd8cadd14955db064395f13e098bfe0a74f0a3e4dc68dc32dcfece2b6ffed2406b49adde39ae865ccb1d060e949e1d050c41a7cee081156d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500ded80c095820a46a10ea9753f607f5
SHA1de00c5f686073b2e292dced9ec05738edb005d7e
SHA25695bdfc7854f1990464fb7c3ed6c3044f09b04fa28e7ba759967ce60ada41a96b
SHA51263d9818aa3e887bdaab90a00deb1f6788a1aa740a6792ebf1bd9e6fafeb417addfeb0c2986651b7473ae86fe64d212d37bf6521aaca18c4371bd77d05be27c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57082731d9403707d32fc6e9b626b452e
SHA16571f36d2f9ed79e64545c6d881c2d03b91026ae
SHA256f4987145b0d08e4404a9f31854282ee1cd07b13b7318a6a96f59cf4f2805cb0b
SHA5124366507167aecde46985b58e8c8891e5f13aad2c83355c03a26344cfe60a185f3ce61ae49d554d6f4db0c1392b6c2ceea19389ddcad2d5f8256f09625b4f65ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c48a7237220eac6ecc5faa1879e3951f
SHA174aa14b288cabe22184e43a9099eaaed2ea54dfa
SHA2562694f8a2b7c15514eb62c17937c05be0dc5b0125c51d3254c91b51a098a85ea0
SHA512a5c7e88c5be060431e77fbc37e04edb4b7720ae3a7ad38e13461d1e89c3aae60968bd21a4b03d06ce14d5e2461c9d7b049abd836601ddc9337c29539b5719b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51803f7956bc7aa3c14f585730951ea8f
SHA1780509446d4434d1cf143a8f9d3e465ef12dbf05
SHA25689abde2c22274694a63093013dcef910c56aaedc9263b2ec3077d19cae5d176a
SHA5120650e5482e5931e62b05fd46d98c4767b02b7802f3430157c89ba5b0e842fb34af91d45d9fec27f2ac3bd1bafb1e73fca5e7c4d5a696f5623eaf3bf57aea93b3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a