Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
3e47a795565fd83ad5d06e27c7b263e4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e47a795565fd83ad5d06e27c7b263e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e47a795565fd83ad5d06e27c7b263e4_JaffaCakes118.html
-
Size
3KB
-
MD5
3e47a795565fd83ad5d06e27c7b263e4
-
SHA1
077da921b98d71317c4c43a6fdbb96918ab1bed5
-
SHA256
b51cadef2429b7743d1e105d988f43617a24ff42b246718624f9de7e612fb0c3
-
SHA512
3b4be574fd9a9b5bebc915fcbc51ab64c1f37778355e8776be1578a5dd4095f4bb3b805ddebc6035e6507f2e98a48d032abcdaa11d10779c7a3a1a0c4d9be6f6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{417749F1-10F7-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004c6a4341905dfd303d7a2613a25c8ec51e2000485e3016de3914888b09077dce000000000e800000000200002000000050496a52981c154a298339835feed854a00d7a86f8eec251ddd5f68ddbcdfcf52000000028c00ce968d6e1396ef5289718f2dca4a77f4c2431debdf7649ba84ab991f41e4000000014ee3f03a5b1db892bb256b0505db0cb789bb9b1252abd0de44dc7d4e63781b764f31cbc16e891c7180159f08f28ee8fd97c00db3bc30030165d52f6c5d14f3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421745828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cea50704a5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2696 2128 iexplore.exe 28 PID 2128 wrote to memory of 2696 2128 iexplore.exe 28 PID 2128 wrote to memory of 2696 2128 iexplore.exe 28 PID 2128 wrote to memory of 2696 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e47a795565fd83ad5d06e27c7b263e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650de19ec71d8e241cd752eb4caaf1ad
SHA136ead057f43d8b185040bddc2977413b57ea5f87
SHA25606e6d5dcfe0ad60141dfe72a9326fc91b8ea1fe2e4cecf87fbd4304ec9c26090
SHA512fd58efdfba4517bf3feb4951c0a3a329c1410c4d5ce1bd05fe8dcee6e9e77e32a0f5b4d3de5177958605f933126079997cf80cb1a4abdde09d273b2371139c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e211df0d18ab6b7abe8ba5f8cc39222
SHA1f526b72bc61d697b5124910d371f4e887bfb7eec
SHA256b8d6923a06e80e40ffd00df8d8a39cc76d3819cc12826a18f0d2871d217cf96b
SHA5128868f648a7a77c36961dca2355822637baf05722952f36b04f73ab36796281872409b9afff04f1db170b1bf6f611487f8a61d9f770532e73bf91e022917b235d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52207e4daa03a16cf78cbbee56bee8b0a
SHA152551afb98e18bcc89bf094dc123ae39b564685d
SHA2565ac57bd25658504067a1410ac3c4bfcdf6d9d007efc134b6695dbf017f9bff6f
SHA5126055e4e659f121f9e55756fdfb9570613dc852e4e3015c31194b0becfddb3c32b4c6e36ac56af9b6243c73c7d8ebca906b8f50bde8d61dbe070b59531ab1f670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e75a4240129e17ed765e0c574bec5fd
SHA11a272048198c43076e025cbc723da966ebe80873
SHA256ba548bddbbe9146e128fa825ba17953f474f2703612bf90bb2e87199ba802427
SHA512f248c0df1f9cc0dd9172bd8290cccc25c64bf945ee9ab8a94763fc6e8a4d5d8be04e20a73a131240aeb37142f1a6065ae43b95fcb6f0b60a8b0a151cca0aec4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548785001be087088fde2d44b05f1dc4d
SHA129a0760cf10cb110de1d017eed946009ccbb2629
SHA2567993fb4316cb31d2cf6eee0d311af8f6852e7d72548c1058861bab051a78f449
SHA51213965412c97877a6be51d5fac32f146eb7928912f0d71400d22004202d08edd2252d0fd188d989b1b590edf268d26cf97e03e60dcba2c17dfc472fed8b25a6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa0d551a2a25c33caa0a748f2e45de5
SHA194ae360322b4ebe19badb6be6c5c270e4cf222e8
SHA2567665afe389422daff08a75eaf75dfd8462a2b413a2c098a4584b956ade4f62d3
SHA5121b21c02cb5b0d641586a32feab1e392388e90d248f27be2180f37b39c4f054833cc94c54718766421a8604890e9d532aaf7377c19c297634bff128eea7693fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7befe784b95cf58f37793100aadc79f
SHA18b1326bb1d94cd9b624f5b7cd91907efe87eb3cd
SHA2567041a0e27643b270c235017bb91095e0b4125087cdae7a9e24106977e4141644
SHA51200d1d49964086ea32f875f85e56cdf0c1060e9fb01ce4ce84dc612323bae96b8a39cf0f6f88af173b1a92312dc33ca5ce2577aef679e8fa27f054b5e76eb3465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658d6ba019c14c6d2e764a4ca92d04dc
SHA1b565dec1b63b5fa0834062e42d711e98d21c83c4
SHA256db8118ae1e0052c083587095ef1a37d3ec3799ef85928c7e2a08499c0c7181e5
SHA512bdc3d1d79ddec3ecc60c6d0fe234cec1bbaafdd1d83a5db176a9e6d09588f76c67adc4e06be3812c03a8b59fb3a98979237389c1f932a46e8ee860c8df7080fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52fc90e88dd4d6448fe958cc0516d69
SHA19ed5da96464c685ddacef206105cfd7d7fa36510
SHA2563f95b2584b35f7b7e68e5ad0f0f0f85487d8236f7329460d75de257b014d341b
SHA5128d89c1b520f71fb3a234545288d6b8e2ef96fe95101e83525e161c9b8a4ebac122da0ed1b248752227066b863b65c076ae624ed15e116e4ff9e483a179d59f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4544188682849edafdcf3c4bed1d4e2
SHA1bc06ed432a6650e537d99581d18e97187afc1cba
SHA256b94ec2d1d807a7c77da3f7f3b9ed5d8a80c3b79979ba1404d982f569bddcbe36
SHA5129d5f0afc5e29dcd1d585896c68db96a2763198d9d74564fd9382acec6396959ef39fdd9ac562b55397c887e7696aae66d3a8280c489d18d860814ae52a337ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc9b4e4b3b2a6be1943415423da6690
SHA1763c5adba3a0638194b8f2905e94875d0a63e003
SHA256ef4e746855fc6553fbb552524500876ca894c115df6b47141fb4453e46077579
SHA512fad9c798a3f9c8b6d7bdc8e378ee93dc092e0e83a0734f7a994ff1b8c0c66cee40aaf4e20207416f274b1818496179a85d19e78aae34cdf7c9fdb4800048dd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5facf64c91275509c2cfca82b498a2ef3
SHA1e41482a048ca7802ec5faaafb748e72ab4a21862
SHA25695d994a3e49dd234dbe0a497bff6f3d6cd9328a6ce2d6d4bea08d3e536be3f7a
SHA5121dddbb2697a825a6a39abb6cfd905f4c24b68d9f35c80641d61a15d9489e03ce8bdb87ff28f97b20fe3c27bc89a003e5ef6de54336d6c54f0c4ae0bdd4c00ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e770c2459928af650b946429b581d29b
SHA10853a0765205005a0bb42b579e50cb54fa338c09
SHA25613b183e2dc0b4bb0acf626e934a384d4f7ab17aacfcf435f69178d1764645b88
SHA512b3e89deae49afb7ef3d7aeed7d0573ea5b4b68caba42ee57ae07e6aefa4971c1193cd65f97cef393b1688f5fb088b74cf3f2118e46570ded33e6468d9a0e024d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64ae4670571e80eb683009a9fa7ec6b
SHA126b9c332efdbea191d585e86ed347cb8e40495dd
SHA2562aa105be3e968de844e56c691cf96583b5a0ff3d32918b7df2d6b2a72255c125
SHA512d5cc5c8106e9fed8231d19c2e480a470fde3b81c744546e98b9002d36539b0f717ad7ba2acf7d95874298b1d156d51daf566a5c149289c2b80620ddb2873e177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4264f521bc8881d971510831f28963
SHA18d82b6ad7c65fabaebcd0d427dca85eec3ad51a5
SHA2566ab6a24c668eac2dbe83322dbb4e4a5c723d389b2896cd5a4f2936f1c4359d16
SHA51236d377d28edd878c42e3566851edbdff466e6e91392f9131c94821f6cd0d8398a659c628fd5a2deaea8cc6bf22934d6ec6dcaf6225ff80009d16212161123b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551cb77a5f8c169d78d5f1247e163aabd
SHA107d77b62a3e296130556385b9b38c722b0739ee2
SHA2560da90e3f012adc48d42e1438a25b89f889757b7b9c9022db87158ccbaaf193ac
SHA5123e295e498cf784801e95fe50214ec4b820b392bbea98986256abfcba32a9b0e3aadd0255605de5e01df9bf2cd32722bdd14db1e7096c9680bd50125af2b57ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfeb0886657af960004147f909a089bb
SHA1fd4a4620be8ec84c4b9c1b78330834a7bfbc77b7
SHA25656509965632b7b4a7b187a081f18d9cee29ea9871225ed1ecba1d5bb1fa68f14
SHA5122726a3b1108b8ebd1b82158058d9e26f70cc5b03edb6a7ab34ed7f91e1058900489aa139e9f7921ff0cc79dd070d86dca438468de2d0df57b936c0ef2a9f595f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4d0763287dc966ca59961f7bbbbe29
SHA18420f78524a54e2ce107c657f60e76b55b6f86a5
SHA25636d3f24b1ace7ed29488185e6003f8f4311ee7c5994ddbe0fae94d4259e84708
SHA512faef4be528564f2aa8b2e1a1acb8b90495c675c848e38d5b7455ba7186525d6241c56f6170ca02a30680ab82d8ac831c63411a5dc6e8bdb33b14a56879414062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc49a05ac9b1ec2907cfbe6b2ffe2e43
SHA180cbd40696d7a216018b57a0e8877aefb49ebc39
SHA2569dd28b5a07f913fe90817f5ebd5a4b3e41f06cc9e70918d8ecfef500c26183d2
SHA512d4d1acd68aa7950601b8fbd86ab9d164e96b1894f67c422487bfb75d3ed6dc2e6527dec000e298fadc0baeac31e52c6970d1a8955d04fcc28abc375113f46313
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a