Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
3d4af9d485a63a4c954f6df7bd449393_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d4af9d485a63a4c954f6df7bd449393_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3d4af9d485a63a4c954f6df7bd449393_JaffaCakes118.html
-
Size
792B
-
MD5
3d4af9d485a63a4c954f6df7bd449393
-
SHA1
e3108f62a168e8290a30896c037a4b9a5cd617d3
-
SHA256
016d2897ed55665a91538b08a7a661e469817b7c57e3ea90f02e67ad14a40bc6
-
SHA512
1fbef700c68c43a6fef96037b7fc22c5add2073470bd88b919a7021b1117fe3812c0e019cc5fabc8f9e9b168719432ef464deb164076bcf0671cf82063f4b4e3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D3998B1-10D5-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000072fc399e2dd23e2cabf446c880e83ffd56aed0a4d388ed31223e5635aa1cc20a000000000e8000000002000020000000418c1c75ff1b9001a544d5cbc830233826a83c8b52decf97e17afb0d1b21b35b200000007a198fc08c33bbf3d09dff465a51f57a1b5bab6b7e250f2576ceedfd7a786843400000006e624742c7f4ff1e63000a7ed075db5687830478c85151201f2730827929323f61df9726aba2a291d2e132fcbf202705b452390caba8d1f522c9281733dc83c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421731219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2010bc00e2a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1712 2188 iexplore.exe 28 PID 2188 wrote to memory of 1712 2188 iexplore.exe 28 PID 2188 wrote to memory of 1712 2188 iexplore.exe 28 PID 2188 wrote to memory of 1712 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d4af9d485a63a4c954f6df7bd449393_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512dc3402f70e9924330bb859970f7e7f
SHA1a4329b393a1af4ab83fbcc07927e2b12d35fbc73
SHA256ee7026881234321a5e520c65e08eb57e6470bd961f8df1e5a608cd7bde8e699d
SHA51262670e7b5ae11d0d06f1c25f24e21c3a5f48dbad58c5ce85a275cd18a373a730a13d823a2f30ca3e656ff10d4294a639ea844075131e4d21b88a9778ebcddfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7227c6f808030cc33d258a965273606
SHA12142a2d203cead76f1ab7e7cc17803b592e2cdeb
SHA256e8b1c703a72cbc1e1ed0762e347d2b02cd32ddd7519415c7517d6eab83198975
SHA512412d1a5c8b25c48b388ac1bb85b8f3b48ee34f72236ea90d7146ca7132f18d3ce26b48af8a648427aa0d934226cec786edae64c728e765677128a17109ec3dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c0b59c73464524901ea31d7a7447010
SHA18683a5217b121e63fffb82abb62876d692c0d075
SHA256ed392e5bc7ca2d2e35d5f0bc1b1baac376903cf2bd2f82881f0fd466c208b7ca
SHA512606572fb2619e7d60d4ea3962889df04eec2800bf5bb62bb49d64bf56241da654bc36c1deb9be59eb0f7b7b5bbaaddd5eed6b736668191a1568e4fd369a0f1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52394df8ce4959c648b858b0a874530a2
SHA1d794e468e72d0e109a13883729daacc981ec025b
SHA256238bf52b7a7ecbb3cf3d2c8e413aafbebc2e3a0fab698d90f4e43ea8fa340aad
SHA5125d3562f0081af99c93c876972c20790453b03ee02e9044b292e6150c159192b21ce357eea55d108035a3a9e29b14eab5f03d52bfc4cc384b0d7046428820cf52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55624f892a4328be3bf14b71069d37063
SHA158ab8e54e2ffa560f9b6fe01df4de3c8bdb3b9ee
SHA2561685d1788c4e3371faddf0c5cb624649fc12334112ae61d3caa4f76a7c3e21fe
SHA512cd64cc2ad1662790f97977f5e9f5d6a180adc7df364941afc8fd46231d4bc4772fffd4899bf38eed3fd8f15186d83590734d88af409d185715be4afade41e12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d41bf923b2e5410a0c9f3e2cced408a
SHA1e00a2ed704808d93df279918acf49bf41e5e3acf
SHA256ea4bcde71a052f524edba6b143db7c6523c9e267f93fb4314d01628c8e096fbc
SHA512f845783cb9682954ef33047f817d4b255a2d16529f265d3f2ca3be934fe28c241a868a0eb1706a2e67091cd7bb247d966bcc70965984e137454f9b82d1e794f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bfbb53a3e3ecbafd97fb09cd1badb49
SHA1bb09580ec8a7f69a95bb854f6bc763d3e3877158
SHA256b136376f3d4d60b604dcb81403823fe0f06b3c482cbf1b931fd3a4cb8910c7bd
SHA51254b2b08dd50cf68d5fcc2c2c64e9a59466f81057f847893fd0894781828c04f65fd0563a034356382f64a85f09f5e7538c9d762d15e622246d3f572a7ac5fda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b27c9b23d87523078ff32993ee5d64c2
SHA123c0396748ce21bedea7c51bdb8fdc46f24645c4
SHA2568fc60e801a5258a319e039dcb846b78cf1b1ac3a5247663b318f26a114eaf134
SHA5128f27a77a8264c217127d0e448b25ae86ab7f2704813c7178d8ae5593256651356df394c396668f75a515e1fcf0d1eee59ff0a3ec00d3b358f009ef1bed4d0052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5811f0351b5328858543ccd26a674cf1f
SHA13fe8f1c1a995b78bc815b136f0b2e7afb6c73c62
SHA256a29794415399bd46f8f45c6d99e672c1487e36067862f668f8faeec1dadcefcb
SHA512c5b04e9692ca27f8ee1ccc46dbb3028a4027ea3f3441bfaccadc86cd3025e10fd18e2ad0be3489a1a3d9f0d68d788bd85a9468e7eb1188c7a70df580e7869a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD515a920346ed5e927306777220cb7cf06
SHA1797f5197696e349cf695e8eb1c16c0a90da59ca4
SHA2564686e42cfee89a20ed5026cca63378f5511e85bf48c15179bfadd84da6b77adc
SHA51221824f4c745894f2439824286b5db7831d4d29c4bb9fdcca56da1d0f2a53f987c547459dfbb0e47bc00fa61ef41138192c3a8ec563295b26c8c7132742fe4ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c55ae5636f786f0a7c1b1e8aa32624c1
SHA13ac333eeca0aa05035eea7c7fb50cf49a00d08d1
SHA2563d6732ba074a6762f7687404000e2dd74d8d401ddbbf2c27aebddb2df8e79f81
SHA512750b950b1ad784458ea232b2b72e1364d0cf3b7401e7491e7d3d945ebfa9927c56fdb4510bb910536388983fbec7d5b77d5fd0f143cc5ea1ec1390cd6b3f3a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fec6aeff9357f0e703336949d7c00e8
SHA1f0ad3f9c1f48dfeef15ff617268ba7cce7b4ed9e
SHA256b5f04ede1237dbfea42b8ae2dd254cf9795cb6ab715be4a50a365508ca110bb3
SHA512594117c69e313fb52912a0234f317a48735fa5de0a306455be5f2262cc217cf4b7f59036ee55946e8f3f3e558db731d8e57a4799399fcf9a0e160a25e4716c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509dc0087a910d0f6194711d228f344a2
SHA12d0c1a692c70f774cbf3b96a20a0dc313832d2ed
SHA2567d35339bdeecb52dc69ff140bc98ac78ebc9bc5cc085a6af6a5bebaaa0adaef2
SHA5124b2c3031cf0a3a4aded32044dda977e5d1247a9737a35e76437e16eaa6ff9abb84cce1eea15270454caa0990c07586b0798cd6cd115923e229da24491004396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506402eeec0d77354fb38159de0dedbc7
SHA15a5705ad80d046b0696dd9d847c7b9db2be37623
SHA256cd089d39a4674503852bb4c46740b5b8cafae3397a60840ce19317cdf1c89e98
SHA512c3bfd9b3b6adc42fc815446fcf1d22e906cbd303d18f7997c7d668e1fcbbe077e6523ebbccdcacaf3df310a29f62d74b2f1732206d26600f4d5aaf7815a26c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5150f9b85ec0476e62b74ae87cb08c4
SHA1edadb52171434c6bbcc85c7973fa297fc3582373
SHA256ff5f63ab14371bd3a0cfa6a754db74c61f704f86488996bd6773b194a56bdd99
SHA5126b12733321a608e44b141db33b6cf878d6753b1eb9610e41bcd2907fbbdbad49ad64724099f0d515da71910913ba5e3ed12e5ca7fa3ced3b86ec7c6910f4613b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5edc251737c73be84c4563aa6917b9200
SHA17f7ae58b97c0679888ddc52254c162af93a7cd96
SHA2565575f011391773ebc20c21554fcb1dcf60cb00c5489d4aa45d4b3080a15357e2
SHA512ba4baeb607079a7d362233359cf08af6229249553f60bed75835ae95910a9cbe7546aa32ee60b4f9d75d62543d5196762713403983fd162af65e28213ccb9522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58330a9a1040c3280febd9ec901f28041
SHA168f28fc40ded4e6f7f65aecb7af6bd1d4da69ca8
SHA25626bd6a58e9e845cf80ae6c2ad8cb2b663ffceb13030ac33f7831a26ba3068dd5
SHA5123d36179771cdef425d7731d7b11dd67195035af94832a23a6e7394982229bc14aa912884e8b782e9485d339a21a6350748d17714ef236c29ebe6f658b8d0d389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7ad60756506706c53b5f09c6826e4b0
SHA1d6fd79453795f395ff7294e9cc57b584f0342208
SHA25676a1045fb40d84533ebd3b447d2f00650f60c7da4c296f68e749009363064953
SHA51247af4956b8f8e62d841bf303ec7579c011afb5a81213270939b4c95409e49e12ba5ce23ed79a8b09d8e687590fd3d37859cd801fcc0423782a5ffd96c92abe9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d663bbd68a6cfa6606a5b18a58401c1
SHA1b3de925832540c426b7e4d7daca978238a72cc79
SHA256237cdae30892683988e2250f236ba74acc1fe0e634aae0f8cfd971d9b075e8ba
SHA5128c69553e47b7a746457a94490fcb6ddbbb7b6c2c945a22afe6dfc14c0fce0dc3295c86371063aa7306070487165250bbc1d2393c13c49238f6ea5c07fbb3aa9b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a