Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
3f855335096fb519b95a98bd1d5097c6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f855335096fb519b95a98bd1d5097c6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3f855335096fb519b95a98bd1d5097c6_JaffaCakes118.html
-
Size
67KB
-
MD5
3f855335096fb519b95a98bd1d5097c6
-
SHA1
18a60c6e5715224f44376eb9898a314faed2bd80
-
SHA256
2fe0aa6c4de0cba7de074b8523b6e94502e5ce23ae85a7c922e3424e38480f72
-
SHA512
70b8c50d09a8ca7602cf9c7c7db78e9d69f74d434d6ddade2d0453ab1a6adb56dbb407b5646d7500d213041b1d8378548796a1d2f51efd488ac494d4a9c90afc
-
SSDEEP
768:Ji6gcMiR3sI2PDDnX0g6iaUjtCj1oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JsHjkjyTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000036e59971ee4601051471d1e8c44d837170bb32b3cc85c51cef1c95cf615a7c2c000000000e800000000200002000000063e8d886e21435e44e12ad2642ed1fd581927e02a0682bc636eb8ac6217167aa200000008177a33091fac698f93ccc751eea8f41903e1ed3e8935b67b02fb8159609393f40000000d00a8752e54045cca4a689a17ce23b0bce9d438640b71f18921f0dae3e2ca24dbf9bfb094fceb737e7b959450403ca3a311e4bee20efb94d5a2b2b5c1db348ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0757d9032a5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421765790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBD1F501-1125-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f855335096fb519b95a98bd1d5097c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de3415a276a63c8d79e5ebaaff46ac8
SHA1e18dbda41a61b1a27a058bea1eebde56e037ba89
SHA256764a362e75d40241e0a53a120697a54fdcb9825a7e7ca4e0acf3f396c9b7ca31
SHA512b9f226b16a0bc9eab1438ee1044f441e079972a80341e19eb457cd055f34e1c76151a410e24a8cb514d9e045e9f1b75278d8a9f47fa8e3481b639eea65c61184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e6db4abe49eaeed851380c8ff10508
SHA10f59e76ec88095757e3f17183b42846418dc8bfc
SHA2563ff2e3422f2fa1018b9e6ae1d072b76e9fc2f5d8aaa4df0eddfc1586115f6c32
SHA512ce235816e49854bd65e46316cab185c5086f342ee7ccc648fc9ad61387a77a0e63906ef0ab2350a11c648bb7088333a1cc655c4cf2c8f059dc834b0f7d285482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52debb1a922186677f516283c743d7007
SHA19a0d35b589bf7c4012836306f6cbfc2f021374dd
SHA2560b88e3bc3402a3724b1ef9d63d3184ead090aef0fedd24ff413be2e503f9b5eb
SHA5126f7d917b2c60b0202f15c3de314c8225b9cb98899a9bed49dcc06aee610eaa33590ff80d71e49b438bd41ce71707e1429cf9bb697cde7e70d2c35819e6f57d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e947b8537a563056b0226be73c24ce38
SHA11fa1e6ff13643568732d72597fae64416a7f4700
SHA25653335d4f24df6040e3f68d7ef1427c65136acd3980b9265b2560b2671a6b8a31
SHA5128144d4ad3dd79eaa931cda8bc4495273c67238eb04853fff0c406261b0da77b675e63d116ca7bc6868d76e2f523c87458f0b07cf7e5d0eb18462c3b78ae862c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3ab99ec89af4be90a97cca9586dc17
SHA1372ffd30fc50ccd5575a7521f9cbaa94479b0cb0
SHA256083b9bd554b5145993eec87c25d42843b62a6abe34fd8a2e4bcfdcbc64a4ad7b
SHA512e22a710cbda9876c381f5706520313f6b17bbb8dc6fe623af77929f4001c7a32477b05e11e69eb9db0eff4494dfc798030e53dcbc80e534b61d1356a7a300089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b4b8bfb3fcc5458570f7c06f3ca7ef
SHA190478eb5f53f83940d95de9bee53c0d302a489ee
SHA256d30d22a4376b2203d5c34a9f3cb50cb23971f604bf74936b86292f7f6e7c4a8c
SHA512045de5a7bd61288a033300d67f2ac02536033afa486d1c493afb20b291a819f3243c6b7d3533afc567f48b5c0ed1896e3995b285031c1f44f9018535bd94e365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594079647acee19b95de5a114c0145cfe
SHA18df09087878d344c905037edc1e531a9c052d340
SHA25696dcce9f078aca38b755f0f6d434674f1f4cf91e9a898226b816f20b54459cc0
SHA51291f719bc4befca2a72c00629802c2072186fb21fe1a1c67e0026c11f56b197b86165dc7b50e67af9eeec929ee455f6f7398bb3dd2178d8a55c760b418b6e247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fafa2e9f0a45580b01f83af016f256
SHA1ec82530146a50a8e4bf1d07ae03abb1e95b988bd
SHA2560fcb71fbf1205ae66f68f76d41c9bc40a9131443ee975cee20e719824104474f
SHA512e20f24b1b8568da09c12db6421d01cabb9cfcc1a3caf64d2f8d08eb107b60bb78a726bce7739ea90907c127592749e9935ee7e47b23e18bba6d5d087036eb48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f470b7e997456ab80ca9a117135c313
SHA1fe34c69f0aa830faeabe56503252f5be65b2f6d9
SHA256f4289e3c54b27448accf1df4d5fd624954a5a76b163a73fbbd3114a1b52073e5
SHA512d59cbe8f9b4f272fb23c77de500dc5fa3f3b5950df26b2d7e221ff3ba69a531d3eb0cee8799596f3a00eed37778421572025130081108e9f76e6175c05386af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411fd5152c7da88802ec3004b986dfc2
SHA188162c0db1f441382ea699561df0676489ff59d2
SHA256a6e917a17177955d2b01fbc33bc80fd94c665ee2d0765760e7a8392869acbfd9
SHA512e2cfc1ce07083adea48be7ef8a69cb5690f587127d945d234e6f5d0e0d4a0300c78c8ce0786f6c60a7d3c0df5454b7577a843710167ae430cd320a6e0ec5fd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd82d1b7f069c2f2b2cdc7679707e236
SHA120b74d198a78beb7729df9eeb1a9005e8a500611
SHA25632b2413b2e5e877ddf50936c25d7a164e0970d556000ee58dbab8624e2360e15
SHA512972e6f14d4ea0b34687100c76c0d452794ad3a1b8256dbeeafaba7d80d79e1aa1edde69c4df0e9a8a8543cec418fa83f0292d3b269260623ba3ff910c4a8f020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc74b26ea1ca1cd642b3509bb221b856
SHA189f75e266fb67a8d5790faf0c539478e318ac847
SHA25691f34cf9727ebd0819b68e619159f7c8ae5e9144681faa5047defb756249dece
SHA5125fce1c6f4176bde77f3d5f4cb2f16b514815be266dee61fb2a7825ecb8b5dc47969c49e2530e40c465302ae2927bbfaf9a476c5013881c0bf44c01a101940428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b014d2b7aa3f3759ef26efeabf2758
SHA1311f5a46654ced0b325746dcf0c11c00470609fe
SHA256b60180963aaf7b5bd5b3df15f2beeb18af5af6f40756a67ea9f1875e81c88ebd
SHA512ce718bf966f9bb48e9f0706f1ef7a5f7a8640283654f429e92a424912c9eee4960c70eebc8c31586a55cee1c106f696c1bb151fc925d6e9c693489a13ad9987b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dccc3e7b2b278ec598b09518b730b1a5
SHA16858e80a37754b15d9dcd027261c2237ddfc5e53
SHA25622a69980bb22b3cc9d7243118e9a7b803f0fcb0e1b09b100663b2139d4db29e0
SHA5125ed8d24ee3b7b4aaf9ba81aad3183770682cbd6a4f8ffe34965a09bec63584cd169b46f2f48d5d72f41973acf46b06fd4b68520a0a481d64916346cf7b9745b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bebbf321c774b1b28d8be749cbf57f94
SHA1cc57bd4a517d2b8a2f87705c93f5ff7af0e0c139
SHA256c1740c8cb5dd0a8b249621773f1a23ece2c7945735e1735f5a1de5e7fd6ec742
SHA5126fe6de50e9c57d67308a97a4d4b199942b7eda0ba6808252cdd081c5fd58aff252115c8cffbf7974f8efcee152bf9a39996ed287ef90fb3f495d4b2e236b0924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c205b78f15e181787bc4d2262c562c61
SHA1e234fc47bd6441049af1ee07ceef1a7872d7892a
SHA2561d2946f4bfb66588777203af8ce95b4835859fbeda963ff29405641269db358f
SHA512aebc6bd37e4754288a7bb5c1d29c92166e7b87802c071b19296d494083d6f0e6263dd409004420d24024b33f9e7aa2006071bd32627b8798b8080183bfa8e14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52551306a810721adfefd5092e6cfb7c4
SHA14ced25d91ff5462875883e14ac8af5208853672d
SHA256e730a857ed23192ccf7783fbb665b776ae23d69bcf68faeed3ba5dbea132f363
SHA512f7a7154244d76100dbc47a404b8db529512a986846b60b167b1a8a60c2ad766d2e84a2cddfa637b22cf00b01d575402b4328446badc69b323ea39786f5dc215b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64ad9e02650c627658ab9b29e489063
SHA14c44e565ff666ca28a1a3fe9fedd0c479a041fd0
SHA256ad400f6a6605a680eca051d377f1888ad76e207de2927bed83e093728f8e3976
SHA5126bcc206fbc6ea7b6fcdb47d5965da851d46c6c80af4661131a9f32023112d8539506cbecbbd8dade1a26f31e5e449a6686bc20048fc8ac3699b101b855835ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c3fb07c93fe4887066a734a62f8f25
SHA12b2f3dedac3216010830f7eacfd2d562365722da
SHA2561af07a470be82873f1189daf8f58bcfb37e6181e95b36bc1997eaba2ab439ea7
SHA512a4acfa87863469d96c56858535c9d0c195ada804d482c50a21c8c75ebfc082b10d561a9baf155d3174c0fb1ae9057494d1a95dae872e5382bd58cecbcc6513b3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a