Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
3d94ee4fc4155fbb33dbe4fd25d86bbc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3d94ee4fc4155fbb33dbe4fd25d86bbc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d94ee4fc4155fbb33dbe4fd25d86bbc_JaffaCakes118.html
-
Size
9KB
-
MD5
3d94ee4fc4155fbb33dbe4fd25d86bbc
-
SHA1
b11513e2ea479523aa1624f53fadf121fe71fe77
-
SHA256
f5f8893ac5011ee94557087e51e1144d89773e984d4d76447b1e292794c1356f
-
SHA512
648801e790a52e5fc81859684b6ff7105d8a7c2b2d48c5f6e0d550ef573db19f1a4f5ef380011875849f69026282ae83f33eb49f72f49ef22bab82628a44c154
-
SSDEEP
192:aHst3Oefcfdma1CpcFL397NdcAGRoOQiP8G:3fclma1CGFL397TcAmoOnh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421735268" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cb758fd7340ac10f61076245a94bd0aea52a2a7b71c0d9cdc73e61caed3b0595000000000e80000000020000200000005da85114a7b78507c31c81a87b994f938cb5a4dfd9ed7f0333bc5fe2f9ee2f4b2000000080e8503e1c08949c83783642e0c9001c6b1ed72d118e7056aa9932858ea08f7440000000ec78a37ca41cf8bfb6652b042a3e4393ab8ab62314274d0fe037b830354a9fddd871c1a564eb6ac1858c144ff2dc48ad29e45b59d9d99f1bac85bb2bd4cad0e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e5f0b21e2397810855cf1d85ded15049efb84ae8669caa9ef76b4b16f7a5a8d3000000000e8000000002000020000000d65b4e7f94f55a9473792b0b3cd394b7cf25abc8617dd8e2c89164e29877ecf19000000005455c41888f92e9f808585e5fcc01b1b92b1051f08ceb8caa78748c6a38c5b1abe147bc06bcbb58cdcc78922f250f6f8f08fca96d1ec410684e13eaf1cb1d68cc7fbe80d3027f7f3157489902bb9fc863710e690fd5ce786cbe3b9a39baa7ba11f73a182920a0a8f68d8fe514d51430f9c6ba949bb3c0e4930fa5e443edf51a9122edcf66ae98fe72d3f63097feb59640000000b78be5ec1c632d41978929e94c94553c0d767a7a6aedea318a48fa072ff94d5997a4a79647689999aa1565742c2f683dbe2b794e9df232e17764c8c789209b06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB3341F1-10DE-11EF-9CF3-F62AD7DF13FC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f007bc7feba4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1060 2012 iexplore.exe 28 PID 2012 wrote to memory of 1060 2012 iexplore.exe 28 PID 2012 wrote to memory of 1060 2012 iexplore.exe 28 PID 2012 wrote to memory of 1060 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d94ee4fc4155fbb33dbe4fd25d86bbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae1ae29c60cf781d7d76bf5a430e9b39
SHA1250bca1e6257863a9183da6affa4f493ae06dd8c
SHA2569ccf05a8bb6ad08b27c8188540ff6c535bcc72d64bb63320e66bd112f3505135
SHA51233529198441f5da61a88aed656dcd2f601360e143889256d56a16ec295f9d65a27920ba68e48592b41125b7c0486bb01edbb5c821f9b809d4f44fed6461f23a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27fd0308b3331ac893ee34eca22f5e4
SHA15fd0d1039ac6a3b8889c1a7b95ba34bcf026b131
SHA256c16206a154fddd1049bf14300967cce6783dfa6c860a0a66cb4876f84cc3dc75
SHA512720b91c487a931cad792a9535b5ddc7652eca3447cee7d55fea4ea080be39f798470962ae63245a97d9be493d478c2c4aba72196a923cf5023e7aaa7c63b6d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731a4f13f543182de478a26047f8ec53
SHA184054121fae44337198eb440125a4ace7967c155
SHA2568b658aa2c446acbb7fd3a97417d6bdfc83f874bae20440aa7a29964a860d5a17
SHA5128f951ec5fb93032e51eae409e1c72097b52eddf9a219206fc68a20f9c8f397853c90a7d8f0de37885a0f0f9f571785347ab5d51135afe31b5a51ef266619ae0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe1f7909f7881d84331c351238c26db
SHA163830c4715a9b2cd6492276e9b123a5b61c36b2c
SHA25613bbf4798db89d2a869c1769d7c261fbfa4f03e336b9d8cb152b2df50baa1717
SHA512b4d6089e98e6c92770b61d1ce809025fafed74110d11a25ec8ad0a92b0371a2634c79b22e64c67d51c14bdc1d9b59660d30e128061e0a5c017978eef5faa32ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dcaa21ca368f38bb6948e2cce5f71c8
SHA13b6927a0e9320e83e624c0fc2778a2d6aaa33e4f
SHA256bfde38f3ae2024d9dd8d994192c74905b09ce204b3816ad39ddd7848e56d24e9
SHA5125000a5428215a32d7e33b703e2e8a873358335f37f4a4a059c5311a5945aac605af425368aa7bd285347aea36c9f038fac4eeeae20301b6894c5b3a9bb536719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a5b8ea3d5d5a97af18b7ec63736cac6
SHA13a60735f2012c9cbcaf1613518bfde4e91daa0f5
SHA256183ab3da80fea33078d753aea3fa743555d0c8928b47c3ee922e551f24564230
SHA512898206f88f86f385524e95f334f5247826c5bc06f1cea1ce39e31b99dd6f727678e838feb60141c7d9f31f7e469e74f6b58047adc746d5f746b39e356a5e3486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5456a9c0d55e118e87d30245d0be9df
SHA1ea1cfff84c179d68e36e7d974cf6ca68e454e417
SHA2568d3200cb98b22348c4d681b984684dc76ee2cda39346d20b8d9c0822259d2732
SHA512b35c7cdb046b6efdc9f31aad1a28897d0fa71799c2419f4eb55616dd16563df89430aff242be20eb61d78a9e5095f492f19efc25a321cff210e8e458bee6e4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f830113e15b3aa99759d0a0c164ff71
SHA150e9321910787ee8699f2151de980527922a3a5e
SHA256f3fa980d5d3432179ab86480fd406b02dd5efbb18a29faa7b1062e31d132ba1e
SHA512707afb5bc7a4f069493adf5bf7bcc5155494bba7e7f21616ec4ebe724aa1a671f352c7bea45b0bdbd7a9cc1946432e851b7c310b994683994e3bfbd2bfac633a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d686f87aeeef35b5e0e4af9f4c6dd6
SHA162d0f4c7d85351bc9d329e642dfc0f6e23d600ee
SHA256d2725fee972ffa235c0b535f8baf3952796b25d0e9e16cb10e45c8dc6bad8ee1
SHA51217bb2fccf2611a257d83cde4867f0f3015104c57551884efa4fc6250cf59f388ff5a28339e118bdb9aef83ca813356aa01524bbb7155cba65307a9951c988d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b1f44ae4cd03d50f0ac903172ccaf3
SHA1cd47ef8444676a5700cb60fdb3e4b83e440f2920
SHA2562cbfbb3b1e74399fbb9362faff80d55863b337ccd53d3927988e014b141c9e89
SHA512d8bb348b1267212f075baf186bbad2f768c183d1a86917945e0c74da544f87c73717c1be737428186a013d2ed4395a3fe6b72b5ac0685b7bac6c1351324127fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eb3ee63998a2acabfef2169979500fc
SHA166b6e00ed5b0c6cecdb1380febe3c923cd166c14
SHA25615de3ca1fc913c75222f62fff39626d56aa7404fdfbdb3bf630165487471986a
SHA512d45d8d3e15112d07674b3b8af47bd9b09e6627574cd03b2be73e217a161f43e3892cd52d147371737d28362d3dd566dd24d82dac2c574972ca8ec9571640fe96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569020fb50fd6a1bf59a3c0933b6d88f9
SHA11a02ab81807b394f35a9ee2551a5b5c9c71977fc
SHA256e1538304610a88baca14eb4a29bc308d1f7ecb276f2a17b7dc6e4314e341b94b
SHA512ac4dc80f7ee5541ca421dcb124f051f3285ee8069bd2065270b48194f1bf473c18cbe42056166901fb59d428587aeaedeb14d7b86274da896d93739690d1e917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c566e00667453175a0e030579ece27
SHA1315bb1435d40fddc0d69832a2e2f3d4ed6eecbc6
SHA2565f011f34828270ce1c88e4b7d5e4ca1f5fd782ea72cceeb8d209f485ee9c6019
SHA5125e118a9844390393303ca2cef4a56aec5e0b2285fa4315a06ef921b06608d3264d61a39835510798c37471928d1721120020a9ff586df4da676c12d129febd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec6675720293b513e17038889bda0e8
SHA1ff406f578f4be1c1f580fd3880cbf5517113656d
SHA25672a3ff50590a239037ac71cf71d007cdeb3d193bd3323f4bd6bccfaa25a14fd5
SHA512befee55134b91ee9eabc66e85cfa97d7f43b850b0c31fc81b35a167953013850a04ea0d2a4d4d719fce3ffd42e4332e6e79a0ccf4661b2b7ac6103937e2d434f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566911232906b13e9a0bb1fc40473d2d2
SHA121c0507f962ae886cdd365125abab247f590ecab
SHA256a93e014d9cb78c66d1b73490a4daf4222a768dd8a9c3e7a26ec7c9f368f08039
SHA512cf6a898cc6a2feeb6f1ccc7c5a7cd8463c1d4d87ad68a9a9346c1ad775387cbdb4d04a4508c0e5f41e4fda8ac776c4f40230b4d7587efe6ca84187ede9f54815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ba0fcb6a152a95b559763969bf15e9
SHA1e3233a434939cba99b0d9844198e66cefffb96a1
SHA256b8f3a7c09a75162ee023fc074c93a1eda902a81fe7c5277db6672ce1eef3e3e3
SHA512d94636a558e4707bf05fb070474105b69a01c3944dd94eceeacbdc2688170722e7fde5861256ddef121618b2b71d8496a1d5c74ab041f1d88e16a4f4f431b77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e766ebd6cce19797e4460de10c85eb
SHA12993c6a527240bfacba22469e3077ac512c8f84d
SHA256711077c62e29a4f55d4297014d077a3887090e54a6431820f96d44913349f4a7
SHA512223c39c5d11ce04a21179ca036cfe8619092a004be88105433c9dc364110752b9999e2fc53ecd25ac0cd9a45a961b24f54b42b1f37eeb8a39ac7856e68015cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f40bdb02cb12df3b05ae07e302c873
SHA19ca131a171bc10d47a9e8ea11f7f5141e5ac7838
SHA25622e9df7cfa74b20494d96f08de487de47c720d212a43378a915a919810a7d701
SHA5122b3b94161a925081be58e87e4f9e095beeff3831292bd523e754869587b7755cb33b576ccfe584ea0c941d2f287935d8e3313b7d54c108985e12abe84c57e7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568166d847215ec86a0790bf643e36e7f
SHA14363d9743f65797272c9b78bf682e8a016e3463b
SHA25620863cee564abe4856303338ec2cc22f4a97410e487cb7065ee6d17ad35304a5
SHA512d8808717ec6f1c0a1963bf0de8c914d5e6c6f486fad33b1d79f41a433f8f8a08e9d9c969ee04b816ba732dbcb413e8a19712fa755ed075028a079b2bd28b6345
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a