Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
3c482058a2f26ead84965ac294ed07e9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3c482058a2f26ead84965ac294ed07e9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c482058a2f26ead84965ac294ed07e9_JaffaCakes118.html
-
Size
213KB
-
MD5
3c482058a2f26ead84965ac294ed07e9
-
SHA1
5fc009298d322730c2c90ace49cf5ac4cb4e5cef
-
SHA256
9f8a31f3da0fec61a65cce3d4ce5cd51edf183d5c86e4de0eef62e2faa96548e
-
SHA512
9878d37b74b999d06f28b31a4e53455a5f200d5a5732b23046cc8e17087eedd9bbbf7623efd5b89ba5720f6f5a613e0d3e5a022c42d7f755a5702766c5034a81
-
SSDEEP
3072:C2Y0q2s4yL0ja2OFABNl236R6Zoc74yuesZ1/v17SIbtvSa8Wthna96ODh2LLSxu:C2Yo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421788295" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000012a03cf8c21c1f58416f40a607cffeca0a3a55342968a75c94c055ce7aafe9e0000000000e8000000002000020000000e70bf7e4567922abad65eefe653166277c7a6aea4d410b355fdda0fdbe5a7bb320000000aed696a9548ac478971ab5e8ab6c8ff43050b67b14ec40f2f087bcdac35248d340000000ac357a955d1273ee593a4f8fa843a03cfc19da86df82aedfa660c9522cd42bb55a9707337f69134d3e8ea6e7d9ad64d0ef2ced93c65367c8f49acd30a9b395ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a0042767a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21353271-115A-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2316 2060 iexplore.exe 28 PID 2060 wrote to memory of 2316 2060 iexplore.exe 28 PID 2060 wrote to memory of 2316 2060 iexplore.exe 28 PID 2060 wrote to memory of 2316 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c482058a2f26ead84965ac294ed07e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ca554ccd10aa5ace49cce700731fe25
SHA185b39e43b0667e752d023afd6daeb667cf373dee
SHA25677915320000524096824ab48e7a3349aa9cc33d6ebce60ba8386523ec08110ef
SHA51250389b9968d1df3527970dc81e8dfe32a2f7a9326e6d25fa92ee4e47a71dab0ed2fb4934e04cf9f16c16d96184d4535506301ae3d5ab325572217dfc4dc23daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511fe233b9a8010ad09548195a4c7597e
SHA12df4b1c6667b71a53f0e48bf5d8cdcce05521567
SHA25611dc35978ad2ef2ad4f66b6e9443fdd6b51b5ecc0b66e4ee0657def4fde3f7ae
SHA51239a8b5815c39aa6837de822cec57cd722e4aa370ffd92f2e093396fd01d7ea0a2fada52dbea7cd52a6dc43a4e136c52c3883b86bc72535ac03d25ed9397ce5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a047a225b1616088e98e67ba98d60a
SHA13fae4e67c5659835a5ff6cbd83a1089020464eb5
SHA256abef52a635a632bd03eedbdc9acbcad7a45b51f89c6fcaff5a9c3835a63aa612
SHA512f988c12c28182e819df451189b72fbc72c1dd0cd71f3670698f9f0d5f7390a71d5d7df9425a959030037823e7c83f4a549880d2ffe661642a0385d70adae5207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766281f7ad5f1f552b30adc0fdc72ebd
SHA19b15247bcacc286155488165fef9b2f172983b5f
SHA256711fc51c115de3de0c6b15380bac380c5ed3c3b952d57b306e7890635fd9daaf
SHA512bb6aa333fd6d77a20ca9ce14276b4525137155e8b469a7882ab2479a13df2a42bc7af854898047cf203d39e1b07d50b8440e63db7b4c543e560f823d0ebce78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef30466f245a06d4f39f56fc7f767f4
SHA1d66554fff36a453de30cd079aec05009260a103c
SHA256a03aa2c923abf8309ec996c57de948202de4de041c13f1caf4b7fd01a8be94b4
SHA51285c8321fbdbdb4817d6f6f325efaffbb40329922ef6dcc3852ec4d6ac82a3c9e54c12653c9d276d9bbd3b33ee665bfa570a78b549024ee4e97a2a4fe89d2fec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a695d9df470ec6852c9bec7cb36cd6e4
SHA1cb36fd11be4398e9b687d872442676f8b340626f
SHA25617ff62800df03cd4658d29351129026b9d158dab6006080ff21bef11a007af4d
SHA512339e8725a62b2b382ae4e83917764a9f356eac2cecbbea15a33c01d10be9eafa2a178d80c6c332e0c156c5f131f5d745c15682cf0757c5cdc5fbcc7309dba778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc1756815344ab54d3ae4e7e32a3640
SHA13564b793bda613f6beda0aa5c782cc3d1c47342d
SHA256d4a578b1013b931ce783a02f817f2b045e0d6c04544b663a1dbccdc5ee30c30f
SHA512b9fe354f3d8963e26901ae2f642f498a25271ea059662b763d0aa7da0b432b57bf7ead1e26e0c6d8926eaa8be1038df9180772507cd09239a9304dfd1db26cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd67460eb2917b6eaedf925c8010395b
SHA10be6936383a37374ef469df31f67d716791680a1
SHA256fc8c1f3fb0a96d7e5359c289869fc02aa098950709702d2ac60ff8582b00c45b
SHA51274b2a259084d24a85dc4472d1263e932b5f7071671f93338fb4f84f722aa68dc1bfe87eedaa454392cc6d457c557e615cef4cb9b81d31fd583b0d0b17aef39ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a19fd668d7f44bde9f824c144535209
SHA135425c7cfd4ca920789bad4a7286bdacf2242bd1
SHA256200f419e70fb35aab632957a2f1ce42931047af1d8a3507ce0fa95de54b76941
SHA512e88ac3b3ee315bd2a85eec336dd7dce6cf7074153ac53862e6c31f442531a611aa333f599b8244ee93f997819442bda4b05df2c02fdf4d7aae55291be2b0d0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ab9d3ab845edc46ece984a7da0f10c
SHA1f2721708d0970cd1e500723e4a9058a6fe5741de
SHA25672f806045aff777da4666d19ddb04b2efdb7676fd27843a6aff04a8ef94a480b
SHA512651781678a46d7a2ee05df3fef39b13c291b9415309d6864268772a20f11913c441ee5f6c59e6db930c1b65b40f7151aa6f8ddc7c2842757e619c18c83245612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d631c47e1503ae9709996defdeda5bab
SHA1608c251426ddbf5b23c62ce582398251005ef502
SHA256f8b50fdf39c11bdc16a0ba9f13a9708f30d6f97e4fa1f29d91eb152b42ae2862
SHA5124c93f4ebc02059c19d945cc38fa3f8f112475faf410386bea3627cc99b487bef75c9d4913e90f16997a078901c030bd11c323c1a1159f96c91ef5276218158a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9db2ed9a41c2349b0e6dd1905e630f1
SHA16870b3d1111fbf2a2f56922daf4d1c088b532bc0
SHA2566a6f454bd8b714e9bc31217a1caebe81182980431f661c6a581c782976542d34
SHA5125a282df502582d352271277f805cdf1d7be9ac3283b877c395d443e41365aa957e21932a5543674c07aff573a77061f0f322b6e1ad21f34763cb3c112db141ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e2af2ae8982e4f4c5a50b9a02477ae
SHA1f3b1ea15099233cebf8770f1910aeff05b887680
SHA256a42bbeec589225e74c78d2d511b04a78d1c8b312b18ddaf77c896c211c511c8a
SHA51278283a49891cef361be4c29c18a410e637403131ac24dcb3224c3943e71f90965a2c6c1f013b0133bfd394452855d17cccc4f79fa8f34259d7b35d567ef68922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591ef53487663db8a57a25fa519ae5f7d
SHA1d1fb531094093d96be19ec2a0cbdfa0fe5f2908a
SHA25673b9d9be5a52c26d9452eab9f1f0149a156e8938d8bd4a5064064a9e99605376
SHA512b1e3063908cbf7116c478cb06f72b6ce462b5f06935cba46330a5e6e3d0b095bc96cf6423692dd12318b3b1aee20044018f34f6de47d01a75a710eee89962a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec666d885bf29a47a5147d4150b23905
SHA1a6d177ca2e24f4651368c9d9f9b4f4eed90c89e8
SHA2560fcfb986c8c6e56afe503268a3dd69e787917c92f90b8d51112efad9ff5a252e
SHA512cb1fc1abd81e923fa55a5eb3397812429f2b0bbd3f78e5a402bc5a10b80316b966801fafa28ad111ba506f38ff6fb5c6c19eca21b8d34b8476998919d583237d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d63794fb026272f8ff8ef5588ca5562
SHA16b60e395659715e7139330e0b90c8084f6025ca8
SHA256810f188bcad4740bdf563ad2a7a3b86c03ab0bdd5af3cf400c9dd756228a2720
SHA512125d5e6dbec782b757ba018adf62d05b158e87d51c566128372f247c5e02ededb7206b70e01147d8220db088ca3da1e5f0608dd41f5877fe2d4fe36561a8887a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862dedda311d326f0ff938d46e629d4c
SHA171e47dc7ec88f454af04b51ef9a8a7a0124ce484
SHA256239a0173a8c3781b0d0770d255c7491316e50596cf2d6549c025197ca244022c
SHA512387c36dfffd5f5f757626aecc8086305f3fdd98650882819155344a6ba6ce6aed8800402cb0abab7cf3b79aecb5f558953eb3b8a7fb90673692c7be088aa9e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad73086d268f3bb4fc0d97aabb7e251
SHA14cbf4b85442165cc2b32fb87bf3f33a170c515af
SHA2564dd9edf227e834e9a6e174a7c69201d6990abeefb0be2dbb3609dc658015dae3
SHA51231ee9f39535688799fed9c614da01944d4bd933b9d05d0a53463ca48a4b3dd1cfa42dc13def013ee79cb22d351ff4153e2194c259ef89b67b67261d7b2bd7fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f9d959be1f969538655973b5156e17f
SHA1e7519ecbdefa6134da18ba05b259329ac17466d7
SHA256824c6a78cde6eaee774b9abbbd0582397c755075bafab73aa06dd29ec94dc11b
SHA512ff9137f032898c3cbaf06bad5e03f7d9f08aec586b1d42c56b8fb054e9169c115408732e394928261ea1aff6bd5a632e0108c298b144010c47b2205f36397d54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a