Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
3ebbeb87483e7deff23e9ec1604c988d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ebbeb87483e7deff23e9ec1604c988d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3ebbeb87483e7deff23e9ec1604c988d_JaffaCakes118.html
-
Size
18KB
-
MD5
3ebbeb87483e7deff23e9ec1604c988d
-
SHA1
d5462536dd8ec0acd794a85966de025257c84f20
-
SHA256
a1cacbb4c5a0a8fa758a9beec70996877abcf6f8059ae40a93270b145184a031
-
SHA512
14979c59e5b57e1b5b4fc2e6adb165877aab8b5d9625e244a70974c1d16e15417cee3fffa73eb65bc71feeaf2e7d0d918532358540107e7d27d6a4fec6014590
-
SSDEEP
384:SITpzKhyTR/ph2nF3vY3HgyFoQa4D/EGQP416mVb8bh:S6RzhWF/Y3AB4tUPmVbw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004824f3b3b17687054cb2bb31ebaef1cc15ca8b83d96acf05b682a5e728c84fab000000000e80000000020000200000005eda09d9c05f1b7311f3f6f43a46a2fa8e3e5faab11acf38ebd1a495421ac20d20000000412968a3999ef4381400dd8627045b1f0efba45cf6e05cb44bc0ac3b228c221a40000000043a3cefe635d9166b4febc26b91e9628f396c5a2ad307b30d677593fe1924f2e7f392f4694ec7376ccc7c3188e10b5d34564b877cd99c632aa95c56c5997ca0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06db07a15a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4F35DF1-1108-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421753299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2032 1284 iexplore.exe 28 PID 1284 wrote to memory of 2032 1284 iexplore.exe 28 PID 1284 wrote to memory of 2032 1284 iexplore.exe 28 PID 1284 wrote to memory of 2032 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ebbeb87483e7deff23e9ec1604c988d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b21aa79d293e7ef346d4ffbd714d5f
SHA1fa7286387d47ecbb5cfb6b8a9984e0e53581f0be
SHA256e11c2e660c002c156bbc66bf190c934010de14f91a1ea98758acd4e509e56cc2
SHA51242f4e4c4f03dad130186f1ba15479571bdf8de41f78af83121ef39cc549db32d98f1b3ecd9e9e58c5e468511c4c7122b9132c2c9f66cbba9adc2733b9d7875d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de96a9434a7eadf71b3aa6bbcad4ee33
SHA1f58fc75077a29eb1594a6c6506d658c8c37c7bf4
SHA256480e827d6d3daffd5709e838d08f62e3befc250cbe75a7aa6ff5d7c4b9d84026
SHA512e520a76cfd99c4b6f090e80ac4df81a179d5334328265c8cca89d23cb3ef1e42118ff284bc1f30f18f88492f2aa122182219407e7abe953eb188bd807d1009f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be16503ce3bd7166fb2e42eb0ddf3212
SHA148290f91a3ae766b7f186d492f3ccd1f73e92022
SHA2562a444a58d6728f9bf5001fa5ffb378fe718b0f4f5cc5d98f419880252251c730
SHA5122e9794a3359f129ba3ef9568da7faa02375d25f7cfe6cd8779724c6191ebe0c3df3a562288103e482c6aa65f17f1faf4af2f2727d10c1fceaec5cf940b74d38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b715c923109341b1741d0e89d30e53e2
SHA16206609a7b9726f44b8d86aef5f14f4cedaae78f
SHA2564e21a6e5bcbb6ae78efdd72be20847246ca9a34513061c35d4bec37e139696e5
SHA51232567f5970989840095a422c4d87e3cb8d3d35a02493780d756a18f256397a4882de0673423e708368ad7184420bb2e902df5d772b7f4bdb234cd7ca8e91b1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a42d7fef0bf6614c697b0aadbae903f
SHA1835c13ee45412ec64a704eab6f35961ceedbd16a
SHA256c3de2012088a2bd36c35df96eb0a46eba1caf490a95bd32602a8e5a045b5a039
SHA51267e988729164a781931c9c028213d57911d5d0fccf130262e11cf11839780b00454837d42419517d874be6d0f97ebe5d31e537a7edb8c5066968e7ec2b4adec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559b590252847f06110c3d53b31aafff2
SHA1795b7f36dd775a4da132e7f6f80a4d1978748972
SHA256e144cf7c98f204d4dd47b22ea15a46548904ac5a54d1f3f5de9c08e4e8811850
SHA51228f52d5034a29697808f12b522a89f749db4b1a752b2b4281f5f43684a1fed8498748dccfc1fd89e2f438332c867d94322f2670204caf8eadf326050ab5ecdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eed7023cbd5082135191b731520d2a68
SHA1b0f59f169902bca79b4c11680e4b490607f3b863
SHA256e2b2b6322ac1cec24f03d8d5dbdfd51deb9260b8afeddfdd8542c80e08d60550
SHA512f70b20ae1dea01ad3f2e19e3cc4d268a4f161915a81bc62cf2d6690759dd9772f166db2d8d99674cfd3a1248af027425ab47e6e4614fd2adee50692bf1819c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1550c5c3d5ef09f064c885df96e209
SHA194b09cb62103532e00eb501457c0fadd6df13d61
SHA25636a8b28c9576b3748b8d8a6660cb16808cb0472df5c8fd2b9dbc15e1f558b525
SHA51257f4b64576419118ce9f8c630b23ab54d0456a68f741c0db2f1b714a51d49ea3bd5569111c31166c779d7b64588ee3e97978f24aa25ab116a4058bb8088d521d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140de832c32ce6795dc704d77627d257
SHA15bbbf3ab37f2b536bfe9ea2a64efb42835a7f953
SHA25686fbe055a72b4fa7bdbdce64bfc9205285b333729380b4e55fe12ef52fbd207c
SHA51295b1e1c9acd826c2003cd6ee999c2a9c947054d15326c120e83d4e61f7cebee3248c677b1bec0c6bf3a9687c8ccb6a0ae730484957f8d859a9c390838606043a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843c52a64038866971128235e4a8477e
SHA178e4c993bf1c9288ee2b44162deb1ae9f4049da6
SHA256fbfc632770ac0e3b2b13996e5569423304aedbd6c9375e271032cd4a5c5fafdd
SHA51231c9686a5c71034ed84d08110b2204144b5097fba43329fa082cd36f5730e59debd85b29f41b4807109e14283f92a4c5a8f2dd0505de3c27835f324212720726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7b305629b30be5e6021fa00f28646f1
SHA1a349a5f225a13619dcfd2265cc5c7fa30e07b439
SHA25655dc4e56d839207489dc1a117c88de09ccbd64ec4536ac0d119a494c6935e17c
SHA5121cdc51c2b3beffb830b08ec5934a45910c60d20091d983b694cd436047e9738d73e66f79994a3291ddeecfd7b6d55aad9a1b50be836b11ae0e4501a03807bf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1f180d6db8663bb08c9ddf7758fe7d
SHA192ce73b1dc00bdd7743e083e29dc45232eb5852f
SHA2566bf7f20e77a7b7671e95734b2345764c205a9a8a3c0791631006a954f00819a2
SHA512038ce70e4a8cf67bedb37364ff149e758631b7854d26deb476ef800b359607e90662b1930ea585a6ec1369187c3b2892950bd8222d92c0f14013c4598cdbc7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f93b57041db9043a952c3251482f94e
SHA18f9807f3f500928b0ae92cb8ab4e441c47a9ba56
SHA256922d2da1a58d2d8485f8a9a933e67e6caf8c6ae269f5f879d9f00bacbb9621cd
SHA512cebe5aac096b069f78446822335fdbd4173b0ac01d773b5c8ac06f15f513e4cd8efdac10ae001529fc22dd35f9720ca6543dbd4261190fd976a855ec6542e57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476551b0ff01a8b8f1c5fa2c3e7c016c
SHA112912e1dda0f0ca220fb60986a4e4cd849cd597c
SHA256a61589898dc702cb67b89922c91f11b153fc75c19f57ac15510593f8bcf821dd
SHA5122a22bfa70a0ace65faefa382b05dba962321b93eae2013f24fc24bd5e4629af581a876b699a8fc59d616cde68bf499a497f27993b9699c5be32f2aef6b7b8015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7271f231524f88f91f9d822b366a550
SHA159e36cabdc89c9ba5ad2846b7c066dd5143b064b
SHA256073e842d3df6edb76ab77b1addd424b13e879949f952359e911531d916411a40
SHA512f26953b5a0c3eb1872076161437202c725508a5feb46ffe2b96128e5864c60af4812ec9dac6856a1fdc3b58fda47a7cbdc0a8913cb96dbd7d3d6900efa42ced7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524284818196fa5cd0a8e4e82cc0dac8c
SHA1d346b4a25056090db50217089d16c1a41d7c10cf
SHA256612aa62420849bfb637aca9571920fb0ee3e355c49345bfd15174ce2a759e583
SHA51299ae57390c0e7af79c47771ba01a8c704e03612c87055ae9ed0af9c8148a1b3a02d153eed9afdc5eb498147f245f88a7d0667f3824a8e70e13d9548bbca056f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548abd723ab8a2b961db8a0e3e39018cb
SHA15d83e15f360971541d7b7847852f85155d01bfec
SHA256f879e8977c5b05a1d093f4cb995a604319f8e57804663078efabc15ca4b23a63
SHA512b9582bab6f0f8983330b429ca70d0a7c58ba611e8a44d1b71104838f8c4b0efbeba68e11b629c44582ecdf3996e6b9daee45220db60ecbc5b7f82bbc440bcb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1e4901079ee516b381470249095b3d8
SHA15ce8375d241fcd09f17d6306f7248381b8473c18
SHA2562f5c4260cf9a9cae07a18a7221ad0d46b37cd8abb10724280b97ebc04608d7c5
SHA51232e319120b6e243b38fb54f66e9e3104ba0d74d723648d85cf708c3379ac4d49c34abe820f63815b550516ab3f16fd14c0095bd220894c7b5b2a8afa39be027f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b553b7f7892037b78414a8c31ace6291
SHA18d2d1d136dc8731e17efbec22a579ff17858bce9
SHA256ca165e1be3806c5f81ad4bda0766b9d5ff739441ad91aa69ae6cfa09ad2b9342
SHA5128b0b0d33fd74e6008251b3419d6df6cb9760b049e0f3212849eba062e7fd968e7fc559f14e80de21ed4aa1d3cc9b3059b2877b26e31dee37475d733d19914fb1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a