Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
3f1825f2075082046ea3c117645fe06d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f1825f2075082046ea3c117645fe06d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f1825f2075082046ea3c117645fe06d_JaffaCakes118.html
-
Size
118KB
-
MD5
3f1825f2075082046ea3c117645fe06d
-
SHA1
46c46416ee17393f8802b54c486822e9eeef0156
-
SHA256
6c3fc2792500ad810d0c842e266dbca8893342675df60f0795b0ceae5077baf5
-
SHA512
a6f9b7e2e010f3d52484153147defcc7fc251ce31cd18bf01eca610edfdca865c48559ef40b140740686c74153dc9122f8e853b2990b43934d3f8c7fcd39df40
-
SSDEEP
1536:SkTe0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003a0cb42ded24721f86694308329bed9fdc56ba5ba4cba1e7843ce5d740d38698000000000e80000000020000200000003a78652bf5625a939c3772b1360b28a20d4622d62d6483aeecabd9bf61b16de020000000305868ee5eba4eb795415a83f176bf20304b784d191f1b2721329960ab4639d04000000079ccc9e843f3e57f1d469661244ff9a73ccad9fb733602b36ddb8dae46b4a5fd2a5de936cab4761ca6934ff11fb74e95b2e65529a17f5d20c8bf679dc73779fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421758888" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0081f87d22a5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9430D81-1115-11EF-917C-6A2211F10352} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f1825f2075082046ea3c117645fe06d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53662c82c96c4b76887c9678dad531340
SHA17eb535a7625bd98b4d68f2edcdaa9c62c2c46b19
SHA2563614ba719322055ad05735a108aff0d0df3d9898f9c0ee4164a822faf788b2b4
SHA5129ca55bd281b6ad623e9eba6d6eb22bc588226ee51570a34f348ed39f68d66e5c44642808a1e50a1b68ce02b1cb000f95c6fb729c02ee0e3555b47dc40f5c2808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1562d6173bb6085a9cd4f54d4973f1
SHA156cb1e367de97dd78dc561373ed3351918c929dc
SHA2561e375d5a686fdff80260ec250e0b17e433e698435c36ad982f8abf5f1d806f7e
SHA51259846d9aacf2fb442d0af5bd831055cb87d40f9dbe1fc8f24c782baaecfbe4a24285e90ebcce8031c4099729867627f90d091a347fb4567550f7c82d27d1f759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6d4b76eb3e6f5273fee66626a32bba
SHA12081762d624c9ed86b00b47e9ea79eef7d89a644
SHA2565fbb5a7d2e1b03342e48f9d68f4fd82f09171efe88b08b14896cf659f5b44303
SHA512ad9b19c13bfd8b325caa257c488f637be79f615232e520ed0b48fc96ddfdaf2db70ecdb10bd4ca0fbd6144ab237c228885ff7e64079901fda052eeebaeac68fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fae72d3278fb5024c81bd8e534e344a2
SHA10c2d59e6ac0d2d4e3474473064c0fbb39742544d
SHA256b1aef9da9536b5da9fe8e626a81c4a7517c77f73cf88670a6777c898f0141db1
SHA512d65f7ecb43a6573b50bf2ba1e43c3ed836c7a949c67cdbf52c66d891b30b518adb7c4f7a4e3604850212ed74e0ed27c3330312b8537cde5bf6724eb0a7071097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a949c1ee5d7f334ce26a0bfab7aedd48
SHA105c57573d00692fde07c71df11cd474cba946b82
SHA2563ee109ad8be1c5e701a145c93b7b52ac0fc9e255e3afa30b0178998e04c8e0ea
SHA5122575f1297d0782ffdf3d3e8990d2ed53d230799acebe68518b488670b30abadd4f70a3794372fd4188be2a2b0cd39d8522df122c3bab7543869d86344adc68d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144f544720512aa3eac8ba959a2dcd7e
SHA19d08e5c4f341bd22ea519f5d044c17e292095980
SHA256c904a491e75f37680aabd253b850cb9dab8b4be3213a96e3d2914554c8a9c8f4
SHA512fb55a99b00d07e8fcb5d5240beb8c99338bc4c64c0949f1f9709e365b29588bb9955e66588434fecbfdbffbb99ecb2e56ea959aaf06fec2bdadba81281db71af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f94a618b108dd582a8ddd7f1ace113d
SHA14d94fe91fab44209fd8dcf29d51c2d81910c894a
SHA2560d0d8350c4e1cc1247ba03700caca2856f67cea25a2489b0b648e80ea2f439c3
SHA512d24e8c1c608815b66547b7e8c3c5aa86bf568d9b1e8fa78948881f9c099e4d589223a560f01311ed1509e05ccaac7523f766a4792a69644c23566d674176312f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824b895bdf6f15ae49dbe8150304dc91
SHA1a57924e0ef227c35f7e4ffec5a3cee6bb7af0b12
SHA256fd1909e71c30fa41a89e1d18dbd0b14bec6011f7a41a947c1b4747178905b628
SHA5125b6ae6c17dec99b981bbb64081973e9c3a7749ca7f9a77846eb56f4b10e1823848d92930f9c13322b96bb6857797ecfd09f4bc4eabf3bd51876cb77d07585317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56022c01c2a8f1e68ca46b8cb0b27019c
SHA1e86224bda52cdc4f46833255ed62981c5d12a700
SHA25620ca86820606169e6ab7e2355ac6894cedaf41cd0883bd4d4f09340ebf0e958f
SHA512f1356686153d798c0cdb3d598850ea1b45987bd1fee165db64077699495c49f961912907608b45c330b772aa248338dd1ce6a7ba49f2899b6dfe88b142afdf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b227bbfc34ea8237fa61b6fc344b821
SHA1ba39f2504f57f26a16ab4b3276f1a36f1bf72e17
SHA2565b2425a9d7bed490b3244fdb8f8263afdc896177a051cec81582b03e71d7351f
SHA51228cdc67efa032b78ed3cd4345a2e2b23f7b5e39e563512731a3ce8a7b4a4241070ba70c0e1190c0ccc6319bf85bae057c56afa532e2b4430b08f856a9dd82216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cc024819f4c3e07e52467a44f8ce24e
SHA18ccd70b33fcf0e2bea0adad768d6be2d9fbc069a
SHA2568ed8152b8685a70e1f5a7663bd22af7b6b25e6081a492bf14fac4b688e124f30
SHA5123f3a2abaa9f7702d987a3f17c5014cb9668b4d50602b8e8a66ce1ebb9baacba339db75a61b158ffe2c45c51914475ebe6b82bd7f8945bb6570d802d08541ea41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520cee1c3580750bb885ebbd4ae18114c
SHA171013dfa6ff3e717c4c1fddba9b41c8231d3be1b
SHA256a052f48364308308e54cf5060475bc938e196e37ae084f9f6d0b7b3d83ee3b06
SHA512f3513d21d1843b917f63f9a761f0aa508e417f7c285daefeff64a50321780f507d2c71d297f4f0eb9b7f5e70ef0eefb660c2d1b8f400ead7a8ef4c1dd368e3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee96ecf84939695d02df9600cc93d09
SHA147d1aa801a27cca0c4d2770f978ef7ba7c77d3ae
SHA256396ce5f07452f6c00432bb71129d095ee0419c5ae99e15f3e86d559f5eb55349
SHA512f533f300248d8e29c714c722a510d234ceaacc834b9ceb4f70ea49c9446846bdc9a99f0e12432ab4ce343b109b3866ed484e499f1757231f044995baccf0b748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576b584ecbd4b44bad720a2874678dac0
SHA1e53d6acb851ea9841a314d453d25ac2fd5e4719a
SHA256b044e7eba24758a87c5058276314a0a79d1d941838ac97e49de52cfcbb6f41e3
SHA512be5c6f8807a269b9b47d40aa067204dc3cb0ecc4531c7ab31fdc1359fbe067d701c9ab0067f0f5ea892aa53894cc4d1a3fc020198b1f8c3db4a879a72dd74f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507efb78f250127991b479964371bd111
SHA1fdc5eaa455052e3b15d4f8066c8b13aeeadcd5e1
SHA2568e1c7b104d663a635c34f0722fec888ac7bd2dc4dcf541fc385d3be201551083
SHA5127ffcf63bb995c1c6e8e25479e3fd219a5f6297ecedf073d8784bbd68bc08305de1ecb80f00669ca2f542d2929d3fbb521094007f5b39d0ffbaa61f39921b55b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d7fb554c99a1aa451bc958762938041
SHA1e619a3c915561bbc373f9949c547299bab1307e6
SHA256daabd0c8ff331f6482b305f14201633e5518037b3a025a4aa8622417a1e81789
SHA5124aa6f89eb9601ea99d6a94eb274b3a50dec797b6707ddf23db6a1d1f71cbfafba7c3244bda89d2507c08fe488651b046c5cc2886abb7d789e39db058a1232fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc81169c407713fea2c507cfd366eb2
SHA199e648374b35f3974d8808be667c3fd679f9f3b6
SHA25696f3cb3e945f00667dea5340b3ef89252e4d5d449fb86d4efdcdd4c434942047
SHA51258c69c230361d98891271a706dea39219b15fe0954a7c8a07a966e432359528f7bc551ffb05ff1ab510f203ef4752c82553a75960e38d8be6898250090227f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb85eb8738d7dc373a97cc858c700c50
SHA1b7608c38dc754b3f0683a1884ca5649ead1ab4ad
SHA25635d932941053caa72615fd650287722fa05dfda7d6bdfb710cff75090b72417c
SHA51219b051b5ee089238f1f124a614bcffb6e13b6ce147b9d25619275b35260b224df25e319ef58b89f87a0ebefc1ea9838f4f9ee06c0bc685a8ce2aa44dc45b4650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526ff2a0b5bd30394ac125b0a6903707e
SHA16efe7c56439151367b7373a494c7861f4cda4aad
SHA256f62430117753d16131ec0ba4781df211eb44819fd0ccb5f0ace927c21febd7d0
SHA512f4bde920733ea58a83ba208ba2fa7b324263b2d3ca046e60f4cae7512506f87a994a951e3f647f23705cc341cbc97127dd413e39132ed6f4179922d97e6e9841
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a