Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
3f29247fe36a44bf8361b8af68fb6e38_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f29247fe36a44bf8361b8af68fb6e38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f29247fe36a44bf8361b8af68fb6e38_JaffaCakes118.html
-
Size
460KB
-
MD5
3f29247fe36a44bf8361b8af68fb6e38
-
SHA1
406ddc728387361bd85b2523a4c5c07275e554d7
-
SHA256
95a70542326deaf1cfcc5a7db72e16848e32733a345b385b3019bddc30175ec8
-
SHA512
472f52927d0808be5bc3164f28712b8924caf448ef3de8a25ac1fbb6e5e76b95b7826160ce104c7da1d1469b8dbe58ef710c92875a74350a03659f13d04c18d7
-
SSDEEP
6144:SAsMYod+X3oI+Y1BsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3l5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a5d116bec4935222268e8deda1919de66bf9787d52d3992e0e817ba5ac697221000000000e8000000002000020000000445e8be4bab336c7cef9bab92bb375d365273d2db83c5fcf0ede8bf7fb1cb6d2200000008c4b02de4feece0ad570f8205a55dd9f1a397c216bc9808cb4df4c91e79376de40000000e289c99c6bccab84d410fc815d7ba009e99d258161526a93de8dadd85b856e99570767ff45be204b384f94bf44af0fe5ed8ec4836a8ddeb658a0067258212a57 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421760013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b86c2025a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47D88C21-1118-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f29247fe36a44bf8361b8af68fb6e38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500d0d2211355ec0fc504c666f2cb844d
SHA1dd50a9e92123a18b94df5ddbca31ab7a12d70f82
SHA256108abad78123ca570afa9e41fd3fc62cdef723355aec459718e213e8a1aad8d8
SHA512f68b55d06a59ec6b448fbe4e21228b93173f16688955e73c28e51363dd864031488ff7ec19cd7bea8c961b9daf36e1014c514aa0d91698deb78ee5aab063e9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b5b96a57b2070ffab600416a882a4e
SHA1c0917f685d5a1acfe5ae06c402e7b655b3a6970f
SHA256ee9aa6bac8dec729382aac7967bd530b88123bc27f28a18419cd2e5457d86223
SHA512ac7182922e0c1833088daf149ce167c0790ec9b270ad0a5253db62a835ad8396d156de92c155e7ada4ae2dba7bf032085a139a2abd435735233b9329a9e7fc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef53d9762f1e381a5b9c66232f19e36d
SHA1f1ae996cd5a223796b2fdec47932f291a005a4f8
SHA256652484da7920c59f07ae040dcfc6ea963bbfc7337e51ce175cc556cb03102126
SHA5123c9fb08650f90be6df2369e8196dc9d32aace9c7a4f05c935da6bbb860b93861f2ab5b103aca1fdab7f9575a8bba982efcb0fe6d420794773f1c170dcd7012dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769bfc1017394f16ca2909e4894bfea7
SHA12fe6abe12f50028cd414f691932982fefe9bc995
SHA256209c4fb5c242599f26a0e894065e9b319d98fbe2bfe23314aa9fb27139e48c5a
SHA512b6d34ad362e9c192cfa63ef38348f93d6c7911cf0fb5f01e4616abf8c1f197ff5f9b034cf3c94a44ab0a54258eefac9b193e5905e95cc4388ff61fdcddb8f187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51da6194b18426b0c5ae9b8fd13bbb7ae
SHA19b99db38c2a0109077326cb3683a98a91ae68d8a
SHA256c090637da00e3fe49f79735fc15d33475bbe4be0a992172bc1bbab3cdeef8313
SHA5129830249c534196e91edfe2ec84b0b5890a879c84704d2c392fb739829edac2fbd58115d6bc83646ee18e073e2ff76e9ff86f813d1a9c7b4578e81e4d85c68d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec5b9985346dd562613e43419204a186
SHA15fbb58ec84505bca198bba395b5fc956e6a3dc90
SHA256554af2fb38b540865007646bc8d8b5bf63eff2c48519a823fd0a7fda71d4b856
SHA51292b2e921b81f0b58ca8d056e729809486655cebaba5e985f4409760e7242c7051f1f1d40aea98bf1eaecd0bc731653a6b1ef2a3422b9249464a97b3313588071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5663ba48d3fea7efb468eed2a59a564d2
SHA11b93707ba764d9f9a7ade05e9580211eceb58932
SHA2568e1a45da7d715da653d5841d70f49c961e46e2ab9ff5e2c55c75c95efe0754bc
SHA512f3ebe1f8c6471d993c13628de1d63876b6752a878f937d77102687c2bc70a4ac8ba1e9040fef004a9bd144bc3e2ece2d330b026be51d201b3ca80317911699e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54784a5ea9e9d114e52ebf25230e4478d
SHA1290ec5a1a4e7e4b9f4263873def1ea9ef33fa3e3
SHA256ba39c1ecd212b926b92dee3fc002f48c3345d54fa8c058255c595347508a33a8
SHA51269cd1a223df4dc13ac03069f119fee63a03d5ba6fb774b57cbc42d724f17027cc4155c074dd94e4e78b092e71084a4bc3f0f5060da82e001c6de33d62f5351d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576aa7b2f609bb2fbc4ce49af1e546cb3
SHA1014e2988e013d28a2fcbfe7702fb988cd829a595
SHA2563cd08418b7dd56fd33a7e3bd82b55bb6408e461af4aefa81e4766bf007766074
SHA5123067d3a2be4b80fce38cb1782891c37bcec290f3cabbac1ef864d2869d581a849f33b91d712fdbbc0f69edfbd7b2c823320d1c34598513b78991e7e8ea6b7786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94d78e96480779eaa08c0caa456939a
SHA11f583db0edf8d446a4c57005f3ab086be1d5ab86
SHA256925a84f04bf8132896754b27d3ff5dfe71aae4219796ad1ebabf6e9f4d013d3e
SHA512e0d3c560488b2390a22391300f11cd1112cfecaed2b88d71e1a452ec1cb803c22bf6e7b82d7b7723ce18ec3aaa84c4d8e66395e88ade1b44f8b17a33d5b207a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57145949753298a055e584737b35bba8d
SHA10b92aae079e43604a19601796173675fe6e64b7d
SHA2566ada2432268be65a8a71a938fd4600be0285cc0f32b323fe9dd4fd41604ac924
SHA5128ae6128d883aaacff1d24ab3336f27d569aefe50021ac03e6d60a4e3621be0f952e494e1e7714d12655c8b1c6a8020d8fb51cff3b65a7cce1723a7a9df011e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512d6414ddab69d78c70070c390cac3d3
SHA1ecd92186538be208c62d6aa631f392a004748e33
SHA25664045c83c73453613e36686724c737718e2ffe787cdcb55609bf34b083e673a8
SHA512210bb8cd09de3f9ca724b17569bbc6d852a62572c2995fd84add3d87c623b4bd2eaf3b48a84c9ccf8db53e707d4cfa7c80afa8dc0d78c38a4e44b96c840748a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c7df33c48a75ae08857c67238101d9
SHA13aaf513d403138a25205c22ec8dda675a318be77
SHA2564379b046acd964c62f6b1f133e455fe43781a6a9a3a959dca8e4ace90336072d
SHA512e900f3e6e20482bf2e8f263a432b383cc62923360b02534b8b29952993b4d7fd818a959f0950e910057479a6f6bd423064936dd5d13496e3a843e3ab6c8ccba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58846b9c5c4ec34782a9c8d69cc4a9c47
SHA13e3877cc3f7baa86f72efcefb9bde51a6e73ead0
SHA2565aa30fa1b8c1ed6f9a5cff13e1d60f5d05756a41173eac4fc33d85a3a2f55715
SHA51228d0ae23685575c9b3fe1ca3939dd33516880071f01a034fb035f0aab7507c0fa5bad121315c556848aad9f9e0e9b5397c9cd42afae661eac51268c159995c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f40f0af8167112c399cccdef9c6aee
SHA131e67e050e3ac64163898c8fafa2aa53f2705c6d
SHA256ff2ce3f53cf4e68065e3f008dabb80cc9ee524284da2cd90b3eda0e08bbc159c
SHA5123c2bef2edcddda56ab373b97a44dfe87409393da7318c1d2adfbe2337abffb8013ab374d94f063e0a454244ef580c68f2c3ff761ffdf616b7e6c3e962f51ddc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e243382c250a67c562ff72b9b764453
SHA12e2fa96dd8f95fc8e91e02fd41658a345f6c7cca
SHA256d29392eb3d886d82d28b6e40375172d6297fa7034fd9144eaa441d030606dc16
SHA5124d01fbe9ee55fdc9ad1b119cb895c30b0fd3c427e0824430fdcadf46825fb751f08960f7e5741784ef35d4e88de96aef34f230a9209ff9ef9dcc1f988b05d898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd964d952c30c6c8450fa4c7f22b1bf3
SHA10d58b906e4e3a3adf3cbc25c65e0a425d4b91b2d
SHA256214bb0c0aa30d01f03176de7777f2cd4fd04ba555fa20111b5c959ed309ee163
SHA5127a4789fdfc5ef2dfdac2d5e49da9bf9fad65d872f798d83c3d7c2514b199f1697ec4b77401ea0297a2f7cf953fab621005da63820212937c2fde24baa06ae75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c3520c5c9145354b1fdb47bfb718e25
SHA18df57534db2815ba13926c69216df8e45038a3eb
SHA256a8bab37f2c8f3fb54db3d5350e880db64dd76403bdda62d5b7a41923949a2ce0
SHA51206a3f0aba591f89df80ed5a7bf4cec5b9123608a4d139c18d5b040698104ac8b3df16c519a25a17534341507f7184197f718fc9cb2dc9ca331d38e102ac7255e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8e1ab69cbddc8c40da174eeef7b199
SHA16cfc00cbc21ff2b85c915233576d29289b4235ba
SHA25687a9e188944e33c988ff00b196baddb8cb16658caa0573fc4a3871a3810c9d44
SHA51286d294dd3aa84be31e0e9404e4f359323eb3746e68f8971a8fe5c5521f01617a1ea2a5cb094bcba3c969b81b195f57aec0a4e2aced9ac8530cdd87a95979440d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a