Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
3fc7465d2424bf32343a3d050cfd40b2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3fc7465d2424bf32343a3d050cfd40b2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3fc7465d2424bf32343a3d050cfd40b2_JaffaCakes118.html
-
Size
652KB
-
MD5
3fc7465d2424bf32343a3d050cfd40b2
-
SHA1
1dd04f6b5d9b00b1ef9eb81ce1bb941bf6731d87
-
SHA256
691b2093df4c4bc42c0736c9c3deea86974de7ffc6ff59e95e83fe4225b6b932
-
SHA512
7784624e07d4ffcfbb6977de2f9c1b32b7b5c689d2646d8aea311c1db1c8b88573e58bd93466ad12ac6ca0f9ec8bedf0e4e42fde4b9d0493571a4f7e962c9e96
-
SSDEEP
6144:dsMYod+X3oI+YpsMYod+X3oI+YisMYod+X3oI+YN3tQq3igNZKofD6wLPbpLQ5Gw:p5d+X335d+X3G5d+X3w5d+X3W5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8CACBC1-112F-11EF-BF93-66356D7B1278} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421770081" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ca3aa4cfe66089be2351e84c67b9b9acb0d38bbc315abdb38389a061bdb9858e000000000e80000000020000200000009bd3c036751d221c7281882829354e844d809968169bab2b5e30e0c52b702a552000000015b4f7cca5121e0314281c6c675caa7d15ab61bf3a9adee1134af0b4573e085b400000004601fc7c53e1ad9c07599313086de42af9267a38ad070f6f564f3c7d255dc2f6ed478f70c20c9ea561ee5b967e943045c5a423a925dac06d1c8fe747d323cc6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07e5bcc3ca5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2520 2040 iexplore.exe 28 PID 2040 wrote to memory of 2520 2040 iexplore.exe 28 PID 2040 wrote to memory of 2520 2040 iexplore.exe 28 PID 2040 wrote to memory of 2520 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fc7465d2424bf32343a3d050cfd40b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f834dab9fb14151110e87fad196c67ff
SHA14a235b39c2bec8c6cd808518a75bd9f71582b39d
SHA256640113b6c21a6b6c2b7a660ea645513a454e4045a8c1b608ba4017587dab08fb
SHA5125d4e6a8a2fb96115561bde2cd81cdea9ab47cbe677c3b6052cc52799deea36cac4fa03a9def1facef01c221e39eb53944c688d481092917d44be0f41fba50c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b1581aa88b776e8043b7b7b6906dbd
SHA1fb909e23565817ea81c7b2c59622a26e17fdcd75
SHA256148316c244d16374a8c534fb8be72368515daccc675bed3476cef3f102db1218
SHA51209ce41be3552d58aae5b520e559b41de79fa21042e07d50f83101c5414b9f271d965ef251d84b434e21323092ddc49bb0707a46dba083e069866056bf49d2211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a29dd0e58e756929012da352bad591a
SHA1a72b45824d11636ff2a46c5b77bec15efe75ca04
SHA256c80e1f15e6e3f7110048b68056a5c08d32103d5c05f7cd203fb4440b53c66ea8
SHA5121243ffca0ad9681d946f6b30c9a20660e9c036d9e07eb622815cb491636af5389d783c221e34afb8b7087eebed10352439750c19b7f5dfb31d4f37fdaefccb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d745c259d8d4963245487748f1d96191
SHA1d7af6f794d09976c03d5a2f8aa67b80a662e6642
SHA256f16c7115a0e70855251d24f9ae63f2f883a5a772c91c078a27007b66e6bdbfcb
SHA5122543c329c9bf7539fef4d4259a6b849b42cff6b74d0295a33c7314512e129ff15fd80dabf37e5a3c04df06d677abebc0b8bb518737554439139b664452e44d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f40bfa5025971f5da50d4575077aca1
SHA1d045c5db681da6e75ca4237388c881e1c159d020
SHA256950184daeaec047e1473439911ae6f62ec2df5d8e3f00a14158c5213d144dec5
SHA512239b3fdc557bc1c3127bb12df6d750b650dec71321f60bf69310d1f67f0d42d67d0206295ebdd8a98be74199d3e50327240b1fd455b03fab8c5400dcb1130108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bef53a4a32c1f5faec33dbe3a684322
SHA1fb5f7b7bff60a3c23433df8619d798add425e441
SHA25620276ed0c31f204e3911fb8b01f019d5a9c4b9de3c352f7d9ee1deef775a12bd
SHA512da18c0bc9b5cc989a6e4768b4d24368125be9c96335b9011cc0e54dacd6aab29f2403a8505b7f84b6b39deeb3448a882d2a51d4738ce083455c65ab1792bdacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14801a83904dc6264a17adddc46654f
SHA1d97bb89ffb971d9324ae4af1215692d3c5c6d45b
SHA256ee8ec6dc5e9c41700a455c8b0139d0bd2008b7ee62b7dd8767fbfd8efca05a73
SHA512d8785b98509e6d807c54212ed7e4f04f2f273e37660cdb5c64913007b3baa878cd71ad84f7ecaf9bce50c721d9bf98220a945503ac9206f483a6982e7fc3901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a58d55056ba63d2cbe2fd82e5d3d17
SHA195c5437f09014c732dd5b2bd8f83786706312d0a
SHA25655939fb6d24ec6f4c174b74fcbe872c25b3a74a6718eb04c5aad4e8c1592f371
SHA51216ee852f41dd3536aa09ed5559f6636ee1dd00aecaeb9d0f24b797c753b01bbf1cbf045aabc53ea473e9fd0b0eb1069089224f0a780b61b9c55654a17bc9c7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e6d05f07f2d7af15386628f1d1bc884
SHA1f54fa6271962ec894e04e19b9a4a0b4b1d09a78d
SHA25674f6c3d5ebb19775b782147413850724e8270a7e15afc4cea56435552f4f74b9
SHA5125325d6fe1f6908cf199e59a763820648644608bafd1ece77283cad94e5d1dd48dea2b86d14bd354ea49feee6eb5d65fff7f5ed7b5ad0b4907212372ba9f7fb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ce3caa4b45c1d747e1c53629a827ac6
SHA1348b710074afa6c70f7a5ca3a70a30ebbd299b33
SHA256486aede0a7133e7155d4f473537352054355bb01cf0455f6125b975256eda8a4
SHA5127f80b1df5516ad95ae60a61ccdba8cc19921dbe8a2fe1591b3eed4072ad6fbeb31f63f4c665a4e7689845e09d57bd2b00f26267c4836f61edc3200d6c861c1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563af6db6f718e393dc87aadfd33447a0
SHA19269bcbbae0acc730fd6dff2bb9287223dc50412
SHA256d694f460272259014cbfee39855a80ba103aadc365a07561d0435cebcf5d4a09
SHA512c311240ff36de186d16af74f2e4b852f17e81f004a4922462487d95753bb5de07a1cff863851737d2cc79439ac0635af40ff4c170e25f2bf909072199ae16bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd1d518093ce84875b1df00fe91b9fc
SHA1783df2d828f7c60ceed868f23614903f2abf90bf
SHA25670600d747cb8ca9a1abda5730133a713cd90678504885e0ec82ff63864c0e8e0
SHA512938870533ed4b9d3b0832cf0759a7899a6b06f2041396c019b0c4bd5113d7d6da4a2c4d8708407ce8a1e7dc2be9af6319b2be21b68178c2fee379bdb2a928dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7de71e52c02d4aecb984a7d2454c9fc
SHA13a570deb0eda09a99764fb70257e0fbbcc2379d9
SHA256edb9f31d134f82b9d84c9925f320077b36700bcda0e0dee484d27be0eeceb0f7
SHA51272d098924632e25327335710b4896a921cbcd893965d2e478efb56463b1b6920fcfb7325d4cc834f9b4a274d26322e9f541ee80e34a319655436d30648cdf8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a427c00b8579917cb90e4cfd0665efeb
SHA1874a1bd83c9a86537f460d673569a9995bd8614a
SHA256312e78628dd278ef96f359714a35146785b84bb134f09354742f47308f7c0778
SHA51287b9d30861536b7b253fb2df5e2968730a0d01caec345a52e1a6de301b2fb3199bd3f8881d6086b648390e0f477c9885da2736b5a3e8b592a574757e46d697a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c59b12b1bc9667e739ce6e28b955e80
SHA16d21ebf0ef43153af368c2dcd5aee68d516e66f3
SHA256daafbf913f057b87129c9e7eee700dc613d11bdef23a9d004351314ef9c4502c
SHA51279004fc710e880cf79d826c22c5ae361c1183835a346a0861ca3450ccd618d6b4c197baaba43213ce1a33d91424205b828e120f24da3a875288c6c6884f1867d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2812edca1c7b263692b79b1dbabf404
SHA18a40cde9d719323799ddd41622342bdcdd060eaf
SHA25641df0ff0e41945b583e05e722f4b3dad8e6807daea19583b63235bd9f9c05f54
SHA512b22727a5e12e3a74fea4f772b02926f8e217fdcc8285abfead7cc7464e3896e3e18d63fafd0c612fd2c6a32e514a4e938a9c9098ed6ec0c92513bf9bccc09492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f22ddc5b41218972d70a44b44d78ded
SHA1c7a580658e3aae7a0bacec906e48e6a5cdc9d65e
SHA2569fa928cf5b67c0d193ef210234f445a0d435936540e47f91fc865a3c608ae678
SHA512f2492037d42e450e023d874122f4bdf1f43d703d6c97a540dbf1328a369e0509984686054ad2406e9e55341f28372bb3cb63143f39a4fa6dea8043454bdd9f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d911d670e3783334a60a69532a69d9b9
SHA12a405f972098a8f4f3932c12f816e76384485fb0
SHA2563e017b2799c50bf37a2f2493cdf3a223ec023d8ba5880cd385a1708a40002056
SHA512ee39e32a5c9b706ddbeca6a254a60e285b0759e0af187c57598840e498d45954f589ab88d0c7e05f38adf5650b27e820dfd8a462676a0db62783bdd66cab010d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e529b3175bcf639208a63c41e20e1487
SHA1d688f578ac635450418c91dc43023f2de9e302f3
SHA256cd655f300255e6ae5c57cb88cb964e87999c5c24c803983b2637c2530134d5b8
SHA51271da152f912248067f9a8972e27722fda1224e5fe8964813a9d25d6391803c91b373027efa0a39cf91dad8040214ad729b82dbb626639a734eaf2804f8a795f9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a