Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
3d362a05982e0301458fedc9db544f03_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d362a05982e0301458fedc9db544f03_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d362a05982e0301458fedc9db544f03_JaffaCakes118.html
-
Size
73KB
-
MD5
3d362a05982e0301458fedc9db544f03
-
SHA1
a351ae79825fea346a4f2d242ace1bdaa22ccf84
-
SHA256
173cd6a75146efccb896ee207891894ca9c31697eb260e86341567d76d23828e
-
SHA512
31fd05082e4e1c32124dccd62955af47f1c66c40cb74bb15a45283e344bb323e9759babee1b9603db44431ebe6ce271e93dfa8d74c97924d91dda3898ac8e59c
-
SSDEEP
1536:oY8/D2Pu/jMIkYJUdF84GwQ9p5uw205JOGO/OUIx96tbtbFElcXJsijJ6hwCfPlA:oh/D2PSYIfwQ9p5uw205vhwOlSB58flU
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BACAE7B1-118F-11EF-8D50-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421811317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2356 2044 iexplore.exe 30 PID 2044 wrote to memory of 2356 2044 iexplore.exe 30 PID 2044 wrote to memory of 2356 2044 iexplore.exe 30 PID 2044 wrote to memory of 2356 2044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d362a05982e0301458fedc9db544f03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fff2fd33bf35427853bf7be09bc73bdf
SHA1ffd3c64a0057c07a817ac3aa475d37b9372d28d6
SHA256cf303c541174c13fbed1cde4bb3f456e765caa20874028fe04558473231926c6
SHA5122eb1ab9d83f977a0d3d3bf91086ac3c6c3ef4098133c912fa85bb50e01d9cdaff07acb9692b1786abea91cf652beb7a0d82dead3db25887a91f24c7bf9123d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777660c36e10d047fafa0a5cb708b472
SHA1f8e4da081482bfb963130081d579a3596a80bba5
SHA2567548711a3400e80f68ca3d9433241546b34f285cc20c11802946e9ffeb116f64
SHA51224acb4bb970763e2df704e40be7644eb718764f91382135ff9e8f9bd54a6e048270c264619d37c7e5a3e942dad11aaeba09081f52fc510f70211ed8eafad0c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a629f0d86216da24a35542305c4589a
SHA170b29e41aaa9ecf848bb68d7d8c52d5e00672c84
SHA2561a9f55c68acf38cb63a59abed9c7b4e25ec84a213840ec58eef3bdf43e4f1b0b
SHA512a4969e026da8685b228724ebec318c1784a85c66abe7e6525f7f3e908929c0af41a2f8495cb72d3ea5fc2efd2905d65cd9d497209111db88a540b21cde4854ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5a5babcda32bf312f630774df3a746
SHA16157b1f41a0fc03ddcf490f3d930da83af9005c9
SHA256ab4a040890ac8a9d833e128e47527598566a22523bbad298e633c5866d8cb35a
SHA512e4a01acda4aedc8916f6bbc63dcea5bc1f2d2b12435d2bfd6cd8ad2e26997541d0c46b4f2bb49a7ac4ee26d9d0f120bfa0fef8c7be74d236c96d77545eeec4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5d3aa8ce86b1be63e8780cf1bfe72c
SHA11265fb1612dd763754b5efc07bd4ac58bb6c5ea6
SHA2568fd532ddc6c3fbb2969613dcf081ad1beb4aee1e0ee396d93dadf456b1500e5d
SHA512275942a4e74ec3ea520e61d7d7fc22d833979fc9dca966ef2a37d4617dcfb36e7cc54e9c503a9b3fc8d056266470ed3adb0e82a46dad40f34913465948875ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548991184372865cb29e68f9efbeb41b0
SHA169761b3db59f351feb35a24f8779cd2830beae8d
SHA256b7b18d184a5c400b243801e200517b71d179b45538022c0450df36441fcf23ef
SHA5121860210da50ef5ea7207d464b3b80af74057eeb2c3eb61b67c52f0ae551edc3b550778234fb5f4890912dab7e4b2dcd4c62b8f341a1953148b5c0bc96a947cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930ec40cef1fd3a3a011ca356fc11094
SHA1deb795c6b76c6036df008330a21f40e12683fe73
SHA2563fc3b012013d896b074632bd8eca21b51917b10db5f20925e9290be6eaade7e1
SHA512bb6e8cb0c9826fa8e5bff0a7468ebe6e77f6dd1e504e97467b7f59d3ae4169c24f96e5e2a3a49d9ac616054321a814c2e3ed425f892486f40ba3b564f2367224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552513284ac3ca95f9b2605b1856cb70e
SHA14cb7d517804d7eb8993721d6a854a53e158c0198
SHA2566e7b928811c2ea91163740da7745ef188375ce922da45b0da7d44cb8d1b5725c
SHA5121dee92c372b7d3d4ce2cc17e792eae9c28009759b585b552500ff44698f8c8ae44ee0da3ecbbf63de03247703e4de9b2c996b086b9c3e4edbd798872f2f745e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0341eaf9cd99f11f652d182ab0600d
SHA1f7b6470f3ca7cfb5dc10b4b3669fe4c77f622880
SHA2563cf7628143525b8166fa742acd4612a0ded753e04affe7811c1d84b20a5e9940
SHA512a56fbeecd60b3a2d257deaabea506a3e7c67b98c56e04c19ddf24a1e5ce68465fac0aa45c4ba8490d87bf486892d5eeb5d3f64b06490edf1b204c01be1f163f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cbc042aeacc0581475151e95dea2ef2
SHA14e5e5c74aaab86d6a43b1e24ac9a3f378b1b00c3
SHA256bb692d51b5f0a241ad680a4da674a4eafe9b3453cfc52833845e6a1a9f541d4b
SHA512eaa6691ff836dabec2161e4bcde45561ca0cbc692b5cf7a3231f0b4bc8e79fe39b89ca7a97495922820879733adcca96742602a8c4d20841c947861c365fd22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058f84e567f55c981e30c35ff5a93c98
SHA115c0f263f10ee68248c369afaf1687b9d157ccf3
SHA2561cd58033792c68c8b4d5da7863b1394a176fba2a3a011181074a8db13627e36d
SHA512bbc13cdf415f9cdb930a85831f61fb309cc2d17ca68d042f8b5b0e3bde150780225f4fdfc2cf5ea64f32db6fa02e081cbe32ccdf5cdc8c4d95b3a86e33604290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5026b2b9acf9a1b1a80f7254e7a10f497
SHA1c12af0408e13fa262f05c11cddc9b43f46d180ae
SHA256f6812081988f49094219fd8c2634ba020f5edd0e350aa2356f7e02418320c281
SHA5129c29941fec75baec8191a8e88f97ef97fd4c98501fb402254251a196e01c5f184114a1becdc402dc148595640c4dd7ca7a37807a9984f9110616fe7746841751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531c4b157d3756ae999f591ac023a355
SHA1baf433568979e9a2d8d4605346afa16cf3a828f7
SHA256fce594b15f8763474c4eae26ce8c1aa00c0468310f4b6ced41f7ea7533bfb776
SHA51295b902aa03e35e5cc5b8990a83c18978a9418157d928142aef81b621aec843f928c1eb3e5f2fbe7523b2deb5efcb2ac249fa29b606f7c1b8f6400d2dea06674e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56c98e14a0a92626b764addeb0ee689f2
SHA1a2f408eb7fc33099ab8d72dbcae33f37266e5a86
SHA2562e79629699da527e031e205e9413559c4b2d8f5327ffc5e9585d07192bafb92d
SHA51266c1d165fd2070b16ab3f95e28b216b96d6d5694401c05c0f799ba37e456be00d01361662d9ed8bee9e81ecb2b91959778b59ecdfb88744ba5f57be7a44441fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a