Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
3fa3029776bae8ae94df962fe3af965d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3fa3029776bae8ae94df962fe3af965d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3fa3029776bae8ae94df962fe3af965d_JaffaCakes118.html
-
Size
3KB
-
MD5
3fa3029776bae8ae94df962fe3af965d
-
SHA1
eb4c3e822a6413772786fb5425988a9497ef03f2
-
SHA256
d2cd3367e31753aa0587301d53faffdf171b3a44d38ea84888e854911d681e7a
-
SHA512
760fc0b1eb98ba5dd7ec55cb2d1d159799edee39d9a43af2dca435ef7059de4a025b0d21c5781670f0109334ab4d9c9669e6cb76b2815bdd24b90dd6bdc5e126
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000074972988840d8cd7d1ca27d42e5e4fee3fd6318593cf54a07e17a980fa3978c6000000000e8000000002000020000000c53fec3e63aab81b720a8f55f8ec517b986aa5f7d128857322cc174c63f3c7bb200000006f48a278e0ccac625c7ab431b6c0ca635c9a15ca33cda2d17cb4448d81596857400000007a4e9e4c8b25b063e3b5b3780db2345df97f2bbc453f77d8e7399e98ed5afd239741b81a8487016bb347adf916fa84f9da8f79319532836bcf017b4dc35b1918 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608a45ef36a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421767667" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A857821-112A-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3052 1280 iexplore.exe 28 PID 1280 wrote to memory of 3052 1280 iexplore.exe 28 PID 1280 wrote to memory of 3052 1280 iexplore.exe 28 PID 1280 wrote to memory of 3052 1280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fa3029776bae8ae94df962fe3af965d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c546d96dd938bbf33899177da2f3900
SHA171530a25fd07464f66a12aa2bd1aa814fb89bf35
SHA2565e334faa896a4a7b44ea089bc9b097a75de5d81eb11c60843f1623239a9e3046
SHA5126fe8508e111cda58b3f6b3bdb5b6ee88873a2984caacf0e3f35436d1e55e3ff42dddf6961f43272d8a4ade6f4c9adccd09e597da75c194e483dbdd8ddb88cd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a89e605046e186b130cb2926611418
SHA1763a7210e2190deb531766308ba963df738f9036
SHA2563108fd925d8494d3deb548f51000dfcbef3cdaa9e17a40b45d6b828b1eeb52aa
SHA512c892d5d0ec2169371fcdbb1e0f7cea5dbd546431fdf10521deaca6c1bb4be2e45d53ec4e99ae0f1d06441ba4a3575a28f5dc2f263714488f489b1a1ec6097bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5804eba77a4767f4ef6473819d73c3a4c
SHA19ab83f2503e69ff0b73846aba84a607cfa301793
SHA2563b29e37ddf2f6d1eaf08ad49db6c46edd8af1d84d00b5daf51406991d8edf095
SHA51285d349a61b3e7e11daff66205ee020b13a59c67b223df9f671f7ca9ff3b7702fcb75b8dc7daba7eb5fe9bab66dedc63fcd24f311fcfb73406912ee5285802e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d10701a39bf217efd50826f8052d7d
SHA19bbec58cfac8fb0220d1430caf5eea8eee3cfae0
SHA256925c0b1334260a5a274f53eaeb8b7d5c60d6d461e7b17ed70249832039b9b189
SHA512ad6ad26c1e99480608254d9b22f4cb6e5a46eaa420bb4d2504e1303f9ed037c010787ccc0711ba35a5e95add241ee9c9bf8c9e6619b0a5779a3a59e63130b20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5574290cc3c2ac292294661f47434e4ba
SHA11369f97bb547f8251bf44c08bc94413fa081207d
SHA256364a41b776a0e72d961f17eb7c097b0b6a39cf9dde26ee95171c9978bd70faaa
SHA51227b0790640d0b779597322be5956581f830e11c0e42b77764079d2408806f0e3709599ade61b5bbe0fc2815bb2cc59f6019756453465834662bcd0c999d22820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712299b977dd72cab03747ee9ca60e6f
SHA112faf219f75ab77e6994ab7030f004f7d49fe632
SHA2564ee7adb204a5020898c4c9a4956f597d27e2e46c6a7e06630c127415ab62bfbd
SHA5123fe7279585001c33cc4fd0e190a26d73623de637853667d84f72984bf4a7e94494ba007bfaccb617780fe24938788b4856733cc53373687698d420d235e6b21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518fc5414ebc8d8376d6e9f42d3a4efd1
SHA1988ec885969fb6c4ca9b608f1005ce426b4524d9
SHA25690146bbfcee5515150136a4ab9c476ba79815ddd288726d26a64851dbacf333b
SHA51278f3ddadad22307f1bafa1f5d2e0b7bae2f298c46e6689f82154a04a484a351336f3bdbe623813d72f0203985e6df7a1155c51eb5e71f00083cab14a579c14d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3933fa118d70ffc09f544e951a8c331
SHA1811b770d5ae1fd7d97e4ab02c2d6d572687138da
SHA256af4e236b3ee4ee4e6f2487a5e22ff9c8148b2c755160def1431661f5d707d584
SHA512e21b26f67ce9a08ce593d5e6f224bd8eb30c8f4a933edb0b595c2503de698cd80fed1822bd1e82bdb9e3a0f51a8e66cb640da233dd4a5f427b198c52fe1b4b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234c36b2acb5911e4344f9f05c822af4
SHA13b4684093cfac79860060c448d2061a00b5eb82a
SHA256e97bf29861e14a750fa195703232145e1b086c7aa2d5951e8ce72d46cf3732c1
SHA5127b7c465f255c3f7f0ff422f84f23b88860f2f50fac0cb92248c84d9f49edc89b7c44df4f3a922d8fa7a1698d90eba8ff238c7a8e6f95e6272f3fc470a4e7f99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3011ed48a34fa470e381ecf5006551
SHA14f3a7d5f81f1a1f8c630fcfabbc40c16faae3896
SHA25668390affb525667cb3ceb43f06cf15f0797fc1944b624ffe480e915d22133fc6
SHA512d0851a6c69f3bca9db9d59d24cc2adc688f56ba041dbb824aeafe561d6a30583e3dd72897bd8699dddb2dcec3450f3550d9800a7404bb32dab819840188bf1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1877caf24ba6e18905f79655b5fabc
SHA182eb989276b28234c0c0ad9974d7d65266c947ac
SHA2569bf2b7d3eb09ff5ffd024dc7d94d17cfa8ee5bc60daf627eded9dbdc2681f85a
SHA5125803ac82863af268ea9118c06e8a6e53c1233d3563264b0e513d8834d584110d268fc23176650449f51b22ac26a0dd2d5e74a242ca8b9346c3c3f75f9c4a7a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d5d18f7218e268a4db49b6fe71abdf
SHA1b4cdd8d4e19609064c47635269fe55c36ff7cd3a
SHA25688d0f9a7cc4d6bbccb955e628adc99e6590d2902f7360a25550f6cba938d9be3
SHA512a1fe96665e34f077006ab678df3c3fc7917fea379318288945de2df6a6386cc5e570cfbe8d24f67bc4d5867412f75eb889fc8975a7dcc0b33aa1268643b28754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217c375195e4c3027aff5226162822ec
SHA1505ae2e3dceaed031b387bb58052e72345034514
SHA25670f3405310e824f8aa8235e19fbc50291b5618bfa1c558f60df69f0c02d9923a
SHA512f8aa9ea09b866a4b2abb219506489369777859e53c7bf70600e627cb59c2d945ec11966f5c21aa61a0c27663977fb00edfc505247a21e5cab32bf2779b8a3ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe78db26064cc8fcfd225dc921e6f9d
SHA1463712306bf7a2bf3a82f0eac88a86dd9e0a4320
SHA256c165555c8a934fde765fd7fed1ed6724e1c0c7cebe1fc54fbb72a5666d820a2e
SHA512194aad15d97528ee75ebfa16138004a325431ca1b760ca64f35a7f553a321cae56c30ccd5f65b01643a54da5a290157e3350f0925029e8f14ac656c69273b4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c94c08e43a610884f737b6c07c6812a
SHA11cc09bcefb352563dc12e4c1534b2710bad79027
SHA25628c19737f6d8f15c73f5c22e674cd68f5569cabff2897e93c3af0d53203ecc69
SHA512600d38307d7dbedc5c67796f4e7d9d377ee6b34b334680fb812bfc34cc7a80cc6a08062c9995fd1066ed3b88f760979e0037414a67e474a506d4580615a4b8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50000dfc9e337a445a416d4fb76bb292f
SHA1529a71abce4bd1ff5eafaa140193ea2f2d7f600a
SHA256a76874c8ac5238336c4c989aadfcba472b54cfe7a38e4c13078d51b13558a7ed
SHA512d0cf7ec2e48fe3f8db937529937308db5ae2a5d9762594cbe2cf0e332b53b7579574becae9ba8d4b0621087d5514e5c0d17e8e3dedeb4bf80eda84ed95ab416f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9dd8313ca3e9973077288728675ca7
SHA1f3f84b244ef65691bddb23571259732d11e4d746
SHA256c1c60e704328ed471fed83826d190aeb56f12210848c2d47ec81b47d10e357d3
SHA5128ef48d59c34dbbdfaa79ecf065fa0a651dd4592d8803aaf058567672cf5882e9ca56f57c8501c2fd32bc1a77d7a1e2e64d47b13eb0c5c399755af6d455b50bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a1f25493784ff42e6f30edd56702bf
SHA175f93f232e554ecb1cb4724d44739b2c0f25d29a
SHA256c66e9853234bff378c0673e635cba2e2f7b9a2c6ed1c35ddeb0b9e3ca9c1b2bd
SHA512e05c10aad976d14a3c00dfd1411bfd697c9f762c555a0aa1a62a2653fd83cc2f30aa1fafc3ace697487e4bac03c99c009cba18440b3cd62ce8000be24062db84
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a