Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
3fd1cde52d6888a401854755a18c0fa5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3fd1cde52d6888a401854755a18c0fa5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3fd1cde52d6888a401854755a18c0fa5_JaffaCakes118.html
-
Size
4KB
-
MD5
3fd1cde52d6888a401854755a18c0fa5
-
SHA1
fd054fc634395d257dac2693212917762dd857ac
-
SHA256
3fb2374ad13ecdd3c332cc75bb65c6cd0028c7a42c58a3cc5fc6b818da63eccf
-
SHA512
64a84509a2971bd67a22c85ed6bc8d4c0e9f466e86e9272cd0a73304b6322cfad449041fc7b332cb4ae290b2dabec0056841980613bb9ab6efe0eaab3658518e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8odSQ5nd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDW
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9074e5053ea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f91d3fe0fece162dec9804b67552e175b824d53cd589e7ac30bee3de250fd2a8000000000e800000000200002000000012cc9d0988da17c73c803a339cc55d1fb57b7ad5c5751ce99192e24919501d87200000003c86208c2cac16a26a011d1a11fb4f976abe2da1259d90c01b1486f57ea7f7e4400000000d921f4f4ffba710d4ea8ca36f4624bcf62dbea7f4d8a69c6f39324ca2eb72b54836d54b82ba1f71d686d80f859895fc589b92f3da2888653be29bfebc09c864 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421770713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3183BE91-1131-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2500 2848 iexplore.exe 28 PID 2848 wrote to memory of 2500 2848 iexplore.exe 28 PID 2848 wrote to memory of 2500 2848 iexplore.exe 28 PID 2848 wrote to memory of 2500 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fd1cde52d6888a401854755a18c0fa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd7bc3fbbace954a9bd6812f1b534994
SHA183455fddd37e5ba7004700760ce5e63853c1fb59
SHA256bdebe4a79bbbaa17e21eeca93a6dbeb82dbcb0ad8ad8a0e68d178d5199df1c4e
SHA5120f925635f022968b935403fa570753a0e7836ec878a6325d38d761517356a6c94008bccb5c99a55e5b65704d1584352dd37a9ec7a579dd38e7844a52e8592d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902a0d386c43d7b4f9f1abc81831ec7e
SHA1f89f9e967bb1b83866a0ec2788144924c0ab68e6
SHA2568bd7899d2ba21b8f9a8387fb71aa1f7f898fefe768ecb6eec33d83a34954b580
SHA512b8b92891b1b3db133a5fb73aa58259454e2bd4e5cf5db86c061fa3f7f03c9d541290fc4e1d1235891a40e8acbf1ffaaf8861c3eac5b50ed87517f98cf5d487b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13097865286271125d1c9124ca46c48
SHA10e41b5a15ea42dd95a6895e6218969e980d5c379
SHA25667e2586834d3db3a72463f8d5933d59ab53648e25ad4ff60976a17255879038c
SHA512b602bf158a407f38ad0198bf29daf7ff0f8068e528e79cb5b8295e45a1b3710e57b3f5afc22762671b76ad566f831a9a4b7fa8306eecbe297ff0096574a95a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506627aa2ba8d808bd8cdc3635240aa9
SHA1e7ee01540d0c2c549b13fce07cf577f681595282
SHA25609441841ac5b34a5030a5552bcbd2804eba6780f64ef0683af3b289f77fe228f
SHA512754612dffe8ec7462adb95343c5771ecfaa3a1a49cd78b0b78a8a8075addb0b169bd4c85158e6b1e384302f9f14568500b2ac4f99e76dd1f962c54a6c8ea28f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3c245f70663106597f651a98e3676c
SHA1d2153ab02cb1c1d12d91e15fcee092cdf778fac5
SHA25649201d5fe05a56dcd6e6a38704feecb05e12be13067b5f72d2b19710a93c120d
SHA5128fbf309c2790473aa14a4d059c0498c23f6aa9e67045451f3b53fd58133096b33b2440039e2aa2b59582fd1b73d3e3ac6c05d3631e294998a10f8a7acb2cbe91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cbf32ad4db78b2dde086329a78c8b12
SHA17027e8a5ed11bc474ffca1a098db4f529237a7a9
SHA25621e42977b5243258e33fb2b39b3dff5958e5b6d7f774c264620a4c0a2c678e1f
SHA512f33acea8144b5435fa3775d1e3e6573d9a33daa8596f2b39ebdff9f7e067fd4e72757c1bbb4900e1f91e045010223656416671726291fb53bc01a4bc062138b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5560f6cb57aeee26b489aa49dec9357b3
SHA1198d19fdd36c208f300f110e3d4178762b9f59db
SHA256804052f0904b17ca6b97f15c3eea55bd69ab09ed48ba7d2a72c33d70e638a217
SHA5123e550c987c0bc2435db095301739e47e7a10b4d8eae4d739d237f75b41957904e040c1b614f5e6b4751fd41b501247f7af3bf4c848dde2dfd03a773c5ef8fdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0829c152a13c22d3d45db9f3b8ffaa9
SHA13a60121645c9f51793c35864fb54ca378b2dda79
SHA256488b710d86ec4cb1e322fda3208a200a1ce94a8615f53ae8d2773c8263ef2329
SHA512ab38d089624919ab04b5ff11d022118b8e35fbcf80a83cce5103a12df83a92a898c5b82cbe2d653e83c8766e24a606eafa5adf2b70ac7a960d3f829a83f8e8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e43bfcb9ec5eb58ab79a433af0679c
SHA1bfe97807e3f9d334aa9b7d11158e1e09dbf50cfb
SHA25641592c3d838a9d022aa8b008570ca5a3a9c77f7de0c3212e93f1d8338fca3470
SHA512a3b194640a7f2dfc12b0f797c5bc2eb9c845569bc61878201e64affe3d224eeb948faaddd001e308d5eb1b2685d4c781de7b737eff958e49b70b6f9191af4995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5756626e80e328eac4c277fda51541f9d
SHA1ebf20b656adc3984f24b5f4e4d883500c533a785
SHA256936e4c2ae6c533f9e9fd319cea08fe89ea28674af8d031419e41205c22690adb
SHA512bb39c1f81ea43fd58a15773de7990a0d7bbb744a73280a7a7d7953c83b94412df263eae1a72509868c8d0d1aa9b2dec7ea29755714353b40d3fd1fb39057ad8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a25ddd975ed49a33d3b59fa30342888
SHA1ccab588310f670b73f0b9a653a264a879c77438f
SHA256008f88e1e2650868e97d626800a7e4a9c8e1015e095bc43b5ef73c9906eac603
SHA51224dca1d559ea162640830a43f7e17b209488648d7a2699e45df8da4fc19adb3e7407e8ea88d7978635dddd7df98154109ba695a8ace382daf127ee15b75ab77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc09ef9e57154d1b7a6b433a5411fccf
SHA12298f23d3872d103b2850588b72b785f28f85514
SHA256a81dad1f9bccd4a9b3880842de262cda61e96723d5bddd411a5ce0377c0406d1
SHA5122fedbff6c4e9de8a8b637bf721974de2e5d0264afe1e975e29406b7f21e9566c602570f6eca4e28ca7b9e32a0256680ca91abc5685cbfd58758faa43afeb82fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58099cd2a7e97e76e58650266ebfe8aed
SHA14c479df2c259f0c2f1ca0502f4a24976795f0007
SHA2564655455e182ef204f606842a80f9c297a7c974367ea818b31b449f37a371a7b7
SHA5126a536abc0675ea29b8688c6484dca19088131fb606a5c2be15b694ef7c584da47b989fcc80f959b884a2e60e7236e0677ad65ce629ddb44bdeb6825bbafac01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a53b949537089b8c833605abc8c56fc
SHA1b5250250e0a2640e453330310c65ccb73599b4b1
SHA256c77b10f4cdc99fe6047dd98a3e829ecad040fb11f0d5bc6ec333f04c3412db29
SHA512773a2e686c85043aca79b3c18671947cef5c60233fb768d11bdce53d6c3139f0a9747f747a601639ea6910670728727dea94fbcfc18fb397fc9a946cfb09efd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56327e2faf2f209ab1cb0ca6982a50bea
SHA123bfe93920a09e699ae7e4e6b9d981f30b457a6b
SHA256205dbad967cf637af9479ee40a2c325a4b6c11a37d13f44476b7a5cd14202dd2
SHA512cb4206e1783653172e07b89a27d64745c8a3f9fc185fb7a55aa32f631c99b2cd9bb130a09adc2efc91fdb52ef4c377ff1a9a1fa49982aedf31778159cca9d37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada175b04df0bf8d6664d76f09c055b5
SHA1def30ed6dd376f4e544557f3f3ba634968bf73af
SHA256bc88f5876f6ae6eeec1f0889ae675f622a31cf29a1ee224fa101b128353806d0
SHA512ba387117d2d956d3dc05d6720268d0e4ca51a1c8da6fc662b7f08f1cbb1f2cd61285bf3bac4625e7bd7bf70b97849502d1eed36e55f17e2a51e9e74be32f2c83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a