Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
3d62991b4da47950541013b2a300acd3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3d62991b4da47950541013b2a300acd3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3d62991b4da47950541013b2a300acd3_JaffaCakes118.html
-
Size
40KB
-
MD5
3d62991b4da47950541013b2a300acd3
-
SHA1
de61f1d94c796537e06f872c09546b102b06fba4
-
SHA256
00145e3f6949747506416f996ed29e5f5239cd698442ca8c8cc6efc108326389
-
SHA512
641156705d17ad64560c9d73739a3270bfe8c5943e4dffee0bc853cb1615663733ce6acde22a3a98095c8abd7c8f68f22d4f4e5548dfee95195aaee1edde6ba0
-
SSDEEP
768:Zy0H10CmCECECnCnChChC/C/CwCwCsmbXd6PAyopsyxA1nqbLIEaqbpE9qbGEkfu:Zy0V0jppGGEE66vvWXd6PApDAMbLnbtl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70B48F01-1194-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421813339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000bf04798fcc3e8365f1e140a4d8cfb65a26281ddcaf4852c44545a31742cc3b0b000000000e8000000002000020000000675eff17b205584888e00af8deb387ffbbf77bd6ccb3b8968192679d20a1e26a200000000a2a58c39174f07fde4682e9128a40e1e551d4ee0d17567379662293071950fc400000003c3de38038e59feebd0842abf95ba364da24aedf031cceba1c3fd9eed7c3a8f90d54f6ddf2e0285cfc385f3f087cb153ace7151138eadec68063fe841c22a020 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fc1b62a1a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d62991b4da47950541013b2a300acd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab00b24edd7d28f0f32c61d1138f2d9
SHA1650adf2ba9f285d205b546ee917e6a31ec5b3957
SHA256fe8b885fc4eb341dc96736ce1d091a0c4f814566486c68f1e7aba9c2087ce633
SHA512dc8c8f388c8d63bcedccfcf1b0f0abf7e79fac2c8e0d629e374b3e83ae3e0b7714f195ca17a75ec9197ac0d20b4d824d7edc69f4f46225e652f0886b7d1bb495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04d455fbade5662a309b0e1b41c6d9a
SHA1e196de5d90e1f4080507137439a1471e0b70bd03
SHA256c93e8f508f7b2abb5ede654b72bb604ae959220dd4714b479a9167b76312ae4c
SHA512be1351ebf986f859234017d06d4b4c811bb2807c830e04aebe6eee67c111650cedc450031f2bd4dd28835e344bccbeb73faefe2e4d288348971c08ac03253be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c2a2dbc9e339a0ddc0a52dfad734c54
SHA126241418d390ecfbfdd09305a4ece48c4ce3137d
SHA2565f5027aea32c704b41353eaca0596f9a6fbe6a9757a7a3d65db8297241d700a2
SHA5125282786a2e6dc18d650e07bcebb9513611ec129bee4d675260139cfb2cfbc85f38ea6234328456aa98a5a5a9600b2d2720180e5150fcbb0a47e4bef91e4b4473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b762723c66d44084fb95879fcfccdd2
SHA13d7a78e19023eab8590bec117cc69ec8c18904a0
SHA256d81a88c512672ccb35b81b4cfc06eb947bbd61b787fdb1b579a97c0aee907158
SHA5129766ec30fb64f4be92b5e7826264622a96158261973dcb59fa3cc2c998070bf83d70985ac866618cebe7d450a5918cae2f161b2e00da2c87f5dbda69087e5006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55060de0b107c201e2864298f72d8fc02
SHA1f13cebd5d3071f89cb9e8069cd26fbbe2b8ef70b
SHA256c4222eef8da04e399325aa8dc12e58cf446fb53871eb029c797076e99c90c938
SHA51212f833b4407a6255897e0f8f37317ef692a395db93ebc0dc5b272a4130cc0718d2fe4f7e3ff2adaa56bff08df00f885b1f36c61894aca4c3674a22a41e91b5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde0c46d774a68d392d54d8e28768afe
SHA1d3cf808d26f3ef0dc5c3674484a2683fdfd70637
SHA256bff6bc6b85884c8fbe9f702513e82daf06db814467ebc32c031119918a6d3dca
SHA51299851eaff83f70a52d12c0eb651c5951fb0362f454750e2951c2985e651562beb33af062130d2bde93782e8bb23f3f390110184cbefbc752b85ed3d1f52e5dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd82c5a609faa2045be4726bcadf5879
SHA189cc31388860d0db4f177368c11f2106bab6051e
SHA256a2d89690cf9cac35b31db082236a6e40fcb4817bd5828f554c68c022d45a3af6
SHA512e3a5d9c0ae904128d2da1c8ef433cddac60d389f049f5e6310d33903a1a79827135ddbe7d88a26a1a129967e30ed565d80052d551c6ceafd1f136ec0f5a01ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc4bca2d700707d5ec0cea9a2876e8d
SHA1da96542558523f794a275cd85262282be017cfde
SHA25696d0b92ecfe31e1823e2f00eccd2b80fa1deddd208f70b2cc9616c31988fb6bd
SHA5127baea3726c1af6b697e764f25e9350767d73000320e07f49c889d7da82cf8fa45644b15a56ac31f44235d9223c305a7f1dd854ed9330432e3a549beb28eeda95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b71bab1232cfb50b509f90dfd3b8f6a9
SHA112c14ac2484c5a00f6c715953013c0c627de606b
SHA256425e068144452273bffbd6abee33c93b3de45b4ac64eb670a51374fb658d6623
SHA512af73195ec6c8a401c1c5582cdc1bf41c7c546e69e1d0db5c197204f76eca2cdc09dbb63f0dd7b35b6b086a31085672f9e0172795f084e7c4f38c31e387d7992b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5740f0f474a034c78852fbc4794d02
SHA1ef22eb7432216c43c91f745dd549b2504e34bcb0
SHA256a4f1d68ec40e567ead0110f90b4a6f576008b2ac08b02172a3e5e47e2fefecdd
SHA512076fe709939e68dfb9e31a1c2f8d024fe66118ae4985feae837b81c434a49e0052978756bbea36c331b7a02832b642c079638cbb55983e59e91d02db13bd2552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c3e61e395f2c7167734857e914bae4
SHA159d3edc78f575925eaeddaad72e8efc5e4631d86
SHA256b20520b589c95364ebdcdb32169807e187fb4e6961c7b6126ea24daf3eed19a5
SHA512a5a3a37372e01eaa8a1ba0fc1ee0d3f27806f2561416d7dc06124eb29007ed9f5e18a9ceba062c6df3bc4ab93f59d97dcf3b261cbd5b640247a20ffeca158e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58840bfbbdfc3d6e8030424bebe7020f6
SHA1f999f17692f1cb51a36268ee11d4bfc94572697c
SHA25681960c562930a18f7480496daf68575c5f77bb88b4d4587039a50132ca9a2363
SHA51266ba0eda91c4919c7af9af25b05735bc3576ae0f0c47fcc0caa48a774b90c09b3a8b342f32c5fab5144ac891e121224328b7cb4e33d133612650f23a70636d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57969901ba1f13ff99c2f3ce1908ef7bd
SHA1c7f2cf7956860e9f2bdfd32545cb3703352bd106
SHA256fea019d197811e1fc1f53287222f37132ebeaf6ccf8415d922c5da4dc3c3f30e
SHA51277333e8309babfe7aa0cd47233627aed4b141820478baddea7859773a89995b4ac2bceab7a8c3988ae73e9de0dd8334f9c0ac851735f2100010f9aa6ed58c23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316b34c95ed346fd85738b9e0dc53ddb
SHA12e0f2964f220ab9f6ecb153a8a46d626588140d0
SHA256fce7864793e5351e0fa101ab8b7f9f3e516fe25550337ed9b3ba628126523b16
SHA512d2b1d6b5a5b2ae38a1605f0d09c9adaa0fc267636d2013c83d0ced8d1c777a7a999aefc5063845fbf6bbb1397b4c18865b0258aa56407dddd3c525415e7d60e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae40e5a2cf6f44e5fb887569356d07a3
SHA19739557539ae5205529f5677cc0715bfc9ed4f1b
SHA25659a5781ebfda33868e7ab17eee853380d1d90ec7aa6f34feeb095e546f5bc440
SHA5128b709a0c0fd5a783fbe4a5222b3b6d1519f8b46df1d6aa0568f1b36ddaca8d41ddd9b1ae1ef6b9187d03f5ce24eec27229bed933407f4b80a800d7a655596d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c2e40baa34564e08602d2f89bbbcac
SHA1a4f1c64537d6ce0921d8c2f675c50df9fec29108
SHA2561f2564261ca77971528e86daa12c4cd37d1e1964db73a9e7330f4f3ccd5ceae4
SHA5122f2954cc4f8b97921b529d78ab1904dd9d83fed8e607ccf13602f57a6b2f35b4c5b325de0c4c940dc39be4c4f5b2100d0b55cf0ff8bd01f348923224c8046cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0a4c6a679f73cc82af8665d38a48a7
SHA1505f6eb8dc42c71c2e33fb22db415d3334d03697
SHA256bb4e1e7c761439672af416523e9dfaaa7a91b44508a10ba05a13c6e741f17dba
SHA512afd0b4d7b053894fe43cc2d250c5541a8b8dba5dca24e0706cc923a7294a7e49fc8cae1e90a3fed2fce5f33ae500338c2d0eeb9c53c8c7e374088a9f8f209798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59acb04018bb59aeb90b248dadfe1b8
SHA16697dabcbdb42e86a1ba4919c947dd8a7a94ee78
SHA256d0471cf75948d8212b6a51fbbaa4950b20e2e8b06cabf3130089b1d0738a80c0
SHA512aacf11c7bc81b8ce144483a2fd8ab13e3d24223bf7a41fc9580cc1c1155e05684b1a23144ced7ac83edfb557599804f963f9cdfbf926ae91bfdef5a8be43aa65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11d7172c3a28ba7132e1661ae60c849
SHA1e8ab5e5475e6ba14770b4c1858cd8528fa408908
SHA25688bc84fe2c394fd9bbe3763f95847d2a28b45bd1bb5b55973309496006972b11
SHA512dcf815ebc5337b773a1c761731d4ebb5a0482ec7bf2f44a8e5a3b72b0f35504710cdfa8f327cc4515d75392d651c1277df1e239a979fa2e60b23fb266e4a7a75
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a