Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
3e68a55e1058b4eb201c691a63c50aea_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3e68a55e1058b4eb201c691a63c50aea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3e68a55e1058b4eb201c691a63c50aea_JaffaCakes118.html
-
Size
16KB
-
MD5
3e68a55e1058b4eb201c691a63c50aea
-
SHA1
7fa84739be1a83a78813174dc88c21c6123e9526
-
SHA256
6fbe6864fb45861244594c9d6b766dcff44c86b07a50bbcb08cc559fd794cd01
-
SHA512
dd16932eba91fa1c8ad67ec8c4a88947c02b107f604c81487697a2b97d3f7776bdfdda76cefaf31005c7deadcff3e84aa8c58fd3f65f226fffbce1c2fca9c490
-
SSDEEP
384:WREZfibZfDkgX7nTo0eIU9bCM5+Yz3PxQw5R:zKZkc3Mb0aJQw5R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207fb5da08a5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421747877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000ce5ef805ea18947555cfb7a4a9ea35b547c1ca1fa765f5c9c63436c66250f0cd000000000e80000000020000200000003b183afb5761e75c931a56fa04ee1a228c131b43f8682026fbffed5df2ef9f17200000002773347cba55316b5f8ecb33c264ae7dd08feeb268fb4faa707d3ed688406faa400000009ca8dcbd2162c19fbbbc87fdbe4a069d06736248c1e23495e8ef0b4ec00053666d9ee2ac8e4bd4aa80903bcd7aff08c26b770477b63db16ee89fa73aaa32141f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0627B011-10FC-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1504 2272 iexplore.exe 28 PID 2272 wrote to memory of 1504 2272 iexplore.exe 28 PID 2272 wrote to memory of 1504 2272 iexplore.exe 28 PID 2272 wrote to memory of 1504 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e68a55e1058b4eb201c691a63c50aea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbbf2adb18396d900ee1d418749185a
SHA15db883cb983946bb061ba69cae15d151af25403e
SHA25699bfa593fe566308a3e311ee21c1ec355ffb7fe545c06903c9891f93ae878ddf
SHA512e107b78e32b2f61d19347271a1f7082334cb0f20d8f1dd0f3f6615a63523afeae6a9a3441b787b6573179b3d7bd294ea882e29a3afd8a16b925459dcc6c62406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a02af47590332d048eecf9590f3a3e
SHA1d6068369453a40fc43605f667bae6beb87caa0e7
SHA2567abbfb7e7480a4b7f37efe8c2b4bc8fb19f0ada5782b3757d2bf20a12797e9c4
SHA512764460f947b39ad5813d02cd3dee131e7ab9ac6e4ae0ed3f18b8af515f165098dbea3253b4874793841f731f6e3c1977feadbc3df9f7342e9eebfaf3dc2ada8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6004f7ca57a7f4ea1ece183c3e38e87
SHA188e6d78fa17c5b2fd4ccb1e04d98f7707d594a16
SHA256a7b324886394d73e6b2db6c52f309eaf895d1aa84665a07f9d225959e2e72d40
SHA512f68b1dd2693aa298b9e862f632da69848365641c4d11114ef790a2900a6b62fc20743fe97ee00c9a155fbfdaf420cac45d266e96f7ac4ad6b18a0eb7bd2a60d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d296326a29df691dd18ba0be07e6022
SHA142712fc15de9019e7377cc8ff354fe9949b6e08f
SHA256d2010b688e058c2c1cdb3726c2a0483b485b8646f6cc9a227cf0f907d491a10c
SHA512335589adb162cc778831b5d6da8b69a58c5cfb09ab1cc11b246cc802172f300afa1e0049245a4e1da8888f7105e020fe3fa0251027df6311d4d9115f72306600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542b2682fd199811f69273968b3208681
SHA154fb1217a561c751277d3d4f1786599faaa8cb09
SHA2568e6c08451c3203a9e1c6cfe3473560cdbf3551e527d48067b93d46f3300bba97
SHA512fab3493d7f80d2a3b1b15f3efdf57c565756611de5d82029353bb0398433613d289a5911df4df5709ecb0f82809eef325b19bc33b09a7e8cd802669c70e1c0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508daa45f2cf69d17b393289e888bcb15
SHA1f3f2b3f2b06a37eb48648dabad0385ed7bddb74e
SHA25601598aa0a3f5c28c667d23e6d2945b90862df1db5a8222384dde17e3cfc2d669
SHA512e46ecc26f695b2a674444e36bb1fec7f8b3b9e2030f09328216992b697a093f85ebc2bfca63f6bf8030ed43c6d780de3bff881d6bdd1979b10f4540f493435b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cec9813b749c9c799651326fbe2a9f8
SHA1bb6baf8505c6f1a9ee215e9bbb8e3f80d248d861
SHA256334e5bb2a8ba09f38252c39b9a5e6768c23fe92ad652ad90f993e4f4616b851d
SHA512afcef65de9437e4d2c562fbe4c5b44c965b9523c191b6c6a94359bd0b54b3bfc08556d72c16854d868e7fd576db6a9f442b6469314668c5770293e66f1cceda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c24339ec461c4d9bcab475506362d41b
SHA1218fb7bcca3ba8d6c3a64ec79708605245223661
SHA256d4ae9d2c25a9a476ebeae0fa2ef4bdaa53fa2f7c80cdccf665ab91f4339d4c90
SHA512a6e2847e4ac1a7c314f469c96b0dc63d7ff0104955eef17f7632b3c4563b885ea3dcab83934c06f948d89a4ea5946e84d23fd98cc0917bbc8fe92ad1403ace86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca22547ddc474c7b0bfd752c063a1a9a
SHA1ba03ff11bad9650e3a7babfe234a4e54a0e64dce
SHA256d5d7773bf316d90cfdcb2adea36036e2a486bab4d7b2a068ab5c00ea4debf4a8
SHA512d9121eeb46d532e3b39fd5787bb0b9bac1eda80ff9d2be6d70a6684a2dcca3294d4fe4b58c06579e565e6fb84dd37d8d04b5330dfb34e80ae2215e53816b814b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57223ddea038999397ac201929c86f5ae
SHA1d4c4b64d3bd4ee8766576794754e494f957f06cd
SHA25697671b0e4ae5b5006dc2cbc0a0dba77c4106f696c305e2f6ad13f1e7f6c3f7fa
SHA512b3adfb0bc2a26f79dee1eccef84954a4d1f3ba8d1ce7e31b12519da9c909de2b570bb0fcb15899b58e8a792dd45709aef6d62ded3c4a8a4aeedd20be4407204a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5456db5972db547b7e679e5972367c
SHA1c3d7cec71a2a04e9587828d23b0e743dde13b1cd
SHA25617c1d0e76448580cac50a01b4a7fc7104ccf845787322369806cca2f21697062
SHA512bbb2cce80cf7911426711bc65d1c27c2926d44bfc29f6a7006bd5a1fc83874957cfaf8c387095854282498adbcef9ec5856b42200c9e26795c8ca05a755a7e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e646631194f4ae1599c62f58c65c17
SHA1a4ed750e3f77d89e3e819b7c3c3a3719b1f42e59
SHA2561cd18aecb4b70cf2f2d1b340bddae0989bfcd72db70879601a57c567b07b8419
SHA512c22762bf694619bbb284914ae3d6c07e269786798503f2b4e94be940d75ff12e66c86b8d0a8d3e9660bb56f655b3eb64ace9a55f88e49a25c611944442468e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca03167e988009a8061eec678772edc2
SHA1c7fd6f96fb8d11e479c4dc0eb64e268c11f83cba
SHA256c8a90a2c40b43f1b0c1fd693ff6274ca0d92e9fabcba12c5703ee1f8bde0ce71
SHA51249b41ccea2cd5fc6c301173ef25c373bce14fcefdf2fc382c254d3a01951e693cd7234df4939962429da9c0d1ba781ae084c3fbd0172eda021177efb2dd5e581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63a3cf5c18cd7f574189f3d0910c20c
SHA107fb28ae3d974905d1f97368f3216438cdee0893
SHA25660fec0413e6720fd6ecd3be666202d8185290385abd83067566821b24fa2a26e
SHA51264c4c07b7d26a397d3276beefdb11cf74e3629df81a5d4f49467cf1c6b4d1ddcb00fef2c705347098e6a3f91a0540f12dfdb3ded4a1bb67642cb1aa1ad211a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e27d28ed2e91e8ccf71f92d0a1563995
SHA1ecc324b734ab834342ecaf6273023f6e8f4545eb
SHA256318dec6c2817922e7542ed25a8be0f126a63493d09a0b4e6ce35fb9f34cfca25
SHA512a00cdee60e26234861a374c2833dbd008930e3435a8ac37eb510980bfdb4ce423052f8683d33eb1556c4ce291f8606ca3f7c4f08bda4724a685c57840e306804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0e6562c07eaff9fdd99e17f58d1c5b
SHA116a96528e66c4122f0ed83721382a835ffced5d5
SHA2563f84fdab1526a77def88638f4acb90bb3cad681f086dd99903f8273c53bb8701
SHA512e6073e151f540d094c1aebcb35cb0b0bf810fb98417c5ed49d18c9135b84df02e337fa23ea8dcbd455b31213199cb70fd6fb81b0a3c51ed77d05944495fbfbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515aa133ac600815c7f0de5f1250a4dc4
SHA1a101ac27478f90ae640ff0e959bcc412feed4ecd
SHA25614a98c5b3580f97cb11f543e0f4f2800df1415060a84b527d0c4d6adbc5ec86d
SHA5129013daf815ad6eb6121a3d2456d6474dd434b5b2d8cd3d9b432fd44138dac058ceec2f029214c1b77472fc91339cc7a9e9666c89c9cca0437d706a7bfcdd2045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca8f038f4e01871f58d16e012833ea6
SHA1ae346a781a98a7f9aafaddf947335a21851860e1
SHA2561d6d970b1b2c8fec7a0682b26b2851fa37bd89aeaa5a79e7c4da9540cc6e195c
SHA5124f1c573777ebcba60809704957886c20b30f206d9a41d670f038763a58ee2a12b12bce4591b78bdd88a68e56b188f6b3f12b56a0cececc1445099b3d7eb5ef71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e042fdfabb4bb86b5ac0d3c7c21c90f4
SHA1c49e7cfa0dd1d9d20864ca0f8a5bb8233fbbd892
SHA25644439d9110c324c0f20191e24c9b11b4c10279647f4bdca526bd14a1a2ee3344
SHA5125f536ddd2bff2771ba12aa31d44a1c67308b82c6189422fa3a2674f49a682e20a968e8f3af59e6afa5ccd7556a91991d1a567c09e8b6a6de8c7c1f5a642a7b13
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a