Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
3e0a6cb1a371a08e88d998154b5bf466_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e0a6cb1a371a08e88d998154b5bf466_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e0a6cb1a371a08e88d998154b5bf466_JaffaCakes118.html
-
Size
339KB
-
MD5
3e0a6cb1a371a08e88d998154b5bf466
-
SHA1
0be2440302692cb91d159f421467f772dc84c044
-
SHA256
30a8c43b8854f12917da3385a169aa4b2618af60d9a94fee31d05502f6a09e11
-
SHA512
73fd3f3921a24c63863a48f9daecb2711156a9d19b0c7c04c119bea84c2992f5547616c2f041953e14b702397940aa0f6628b4c6b66eb4a1f896860d9a2ee9d2
-
SSDEEP
6144:csMYod+X3oI+YE4sMYod+X3oI+YJsMYod+X3oI+YQ:K5d+X3WG5d+X3L5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421826387" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D13E7161-11B2-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e16aa6bfa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000493dc197d38fe58922ba1ecf05104a1b2130db6e2304eb6369b97bb64872bbe7000000000e80000000020000200000007d47b1c6318e3088442d822135f35397f50d48fb367c2f29c10291af0cb6b1022000000089412c8750e0ace5344517d77c37e295cd09b36b04e0fe25761ac95ef180f9f340000000db3e162e6025bb2b6edf90287b30bdcc83218cf26ae8399c5c40970a08371ec167b426b4d185de49a4b6a6e1a05041d1842ef374b8a90be9faddd0affbfdf952 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e0a6cb1a371a08e88d998154b5bf466_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11addffeeca1288d5f844d85da8f222
SHA101dd25aa72976389a8f778f63de026bdbadd9128
SHA2560578e615c3e0395e70862a449ce70d2f4f69a117812a9c0eade1671c3724e9dd
SHA512c19a91d23f79d158d8660047aa1f26bada6147e97929527236d4b0465bd4baa1edf8faadd5491aa52000a109f50999c5cd4a95e20b27e78eae454bc9ec0ab0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537471b6b0b3cc30e40b34101c3eddea8
SHA10a41205582baeea002bdf4e63ab82ce716acfce6
SHA25627a7e02f8a11fced24aa9a9e3022992009c689b5026f0f4880df8f9d1cb3afc7
SHA5127eed1c35e0c08fc21b71065055da55061026b2d3b659adb14127bc6f743a1280c99b1a3a992cfeb8c74ac70fb2b57056efc57d64464901d2fdd23cf1fd78524c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d59d03dedd4bb7aed8a3cd691751451a
SHA12a9d703d333a0cbb2ff13654b906f18fd570e415
SHA2560348241e8ce3afe158ffc71214bc8ea1b85d479c1e90b9e5b27c18b8d5e02f16
SHA512666342a658254d373e7d1168284aec8f5ca22f61451eeae2ca6c64cb28c7a65f57c0e4f02c2ada5e33d3f90e91d154b0fd2ff25fdd94c27f3995e43c2279953d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541cf22f99c1f5d56edb13ef65ccb8c55
SHA1acc52c866f3758471dbd5dbb171d081bcb3195df
SHA2569bc70937d89952842a0977e28caa35064b1dceb40282535a23d3e104c6493761
SHA512cffc9332e061a253862845c9c398da6cf3022e1d2615c60f2ee4222393d38d380a841867b63d21305b4064fcc60538733e57749f2296e40614c0ad8306f5b17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa37400ab896719c0ee16fcc98de98cd
SHA19090df0192e3383f8c6656151159c2e66afbe458
SHA256b59318728b7284733560b01cf9de38462fce4b4f1641678fcb708c599c4d18af
SHA51248b112c35288032ab10b82cbb7eacd1cb88c81b69722f8d0a5b33ec8ca18866c7ad3244fc011063458894f2524edee393f6175dc2381abd6fef06c54a1f6f8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952a09646016935b8e8da7b6a40e4237
SHA10771c1ab1818dc08869b71dda2a8a90de2bd7b46
SHA256722ce67e8b2eb3debca354c3e696e32d0690817ca1b301d46eb6a2c05169e136
SHA51232bc7b5a7eeee5cebc49e0207a2e6276702135b791d6179734cb04d62125661d0404c3f2f265ba8f1669468b8f820d476fa0eb14bf5eaf6e89c938905f830740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59cc5cf5eebb3600e644d347ff148aa
SHA12c3940405ab78b23401facf3dfc9b4db64835794
SHA256cefd2d4ce1b522e062f86d277d5c8d9086cb3fee2554a7156f9ca92a36aabe60
SHA5126a834d30d4ff60240637b9ddd7d585bb7fbaed8a5599a94946d10fcc5f2f6d976cc52716aeedca9c73466755bca08fe508c4c41d7048d43370ea32f85c0f218b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504e63c20b8e401732dd4231a06de53d0
SHA1827aaf0d43b5899bde028b6d9e83fe054ce7da16
SHA2563f74a51060ecb534a079c2e58c98104bd94e3fb8aa7d25b7afb0a8d99bd36fe0
SHA51200fb384dee993ce0ef7911b20d6c1f614f41d12b56f5f49b9ee68a10a7023772b1f0408e5b1cd493951ae67191cde0b6236654e1803f94dfaadd6322b5ad99fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546dadd1129cfe1d3d08d07fa06757e85
SHA10fd38ba2f79c0f2b02ce3436ed817492a6138cc4
SHA256cb7009caf863fd4c0122847b9c511bf637e3becf200ef6085da209086016cb73
SHA512e1dbcb7eb113023499b84dbc3cac0f924ae59bf4bf4470bf0fc3378af0b31353d40a48615073b0b575b9e2810b1e83cec3df5318b972945d2482f0192e902962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd83c56685c893291c1f437c73965a3e
SHA138ed76ce2aba16416e2e76e15597456639994951
SHA256b6c1e8d9af27fd36d488e35da889e2e6c0c5709f733cca03065b6ee57b0406fe
SHA512fcef93001de026fa444dbe13dcfcb9230495111f122b3c934e300689d82563f78841bbaa4a24e41bdb457ffd3681e9b387b1c09282fcfa876d58b95e635e6046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1783fdefdac012c7ad92b082fb7d085
SHA1678a1554bbb0386f8980f891e69e48fdd2148673
SHA256a1e487c98cf72cb49ca1ed3d63b8e37307d2b0c27d02a3823000d6b020b5f458
SHA5125c49fd7b21bcb10ac17b776f5f3f16a70a380d91fc3a8da7968af34f320ff75decb6d29541dd12080cf70a5ae8eb7e9bc1d4dd6f0267a0464979b5b9ab0abb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d0f48bfb2f8523f87fec9b1a98f657c
SHA1c91e78446e6083cd62c824a3eb2581ff122c7373
SHA256c24751c223c978c67c2bd3199b607bde4cb359cf3583314561ac51167bb98b99
SHA512086959aea947147a0d3da9177cb2aedf9af6aee457653ed9b3f410196fe74c876afc42abbc99084305cfecf3987d0a6c081dfb995d476221b903a52b4bdc31a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72fe14bdc5b45d0215f119d9db6bdce
SHA1ba0bfbff69cc2ceb53c773dd3898c451ab4dafc3
SHA256a507c08ed32edf6387cf7f5319a4a7fac833d27d7d31df1ec22bfb7ba2bca9fd
SHA512a12acadfd0d6aae2db11aeeb87e5d7db429d10e9f1df6d9d12965f9809f620ff7287899c067bd2b856e62ab0145f13b4ab47dcd366c45d60877cc040de2904c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd609974021211853d431f296d99cf64
SHA11c1e291d19588d28e5a4e82692f85a05129378fb
SHA256fa4032a8a7a75330c33c1a73d4547dc3df45899d872410bb25fbc209495ec8a2
SHA512e4c0ec4a9ad8a516a9707fd743244b65856a0253cf2e4bb89340f65051e3ced8d7f925410e49b91e21ace30e7de68eb8d5fbbbd3478814049371226e3af92120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5810f7cc292e89b3fad4686c3fb5734b7
SHA19148a320c1b4753da70f448864e9cf0a92483271
SHA25683e1d0916acd203cb2ee1294189b5bb8db8a7e025cdfe73d2fd17e9ffd31be7e
SHA512ecdeffc0c3b3a60130cb456653d989578811e5edbaec170d2c415d4869c66cfdf00b169c8a38be53d3c02413e3e5a60dee4c1d129f918566b5c477f644d44b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80c30ef2cd002f215dbdce394111194
SHA17cf868ee556d6853e67ad6b5bb31cdd00b83e2cb
SHA2563f81dddec7543b62b46040211d32d2bd35adb6231b96806d24e785801ce1ae35
SHA51254b0c93e00e980742e8a5004eb22e988b176176e11d73edb2392e0c01e0706159ede86c1f7a68c7979d48eacb73b1eb20d89458908a7167368a0f67689137fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514926dd988d38ed1c90dc4a05b26a1d9
SHA1072b3e56acafd75df2d2cbd460eaf1be3bba703e
SHA256fbf3ea67b825da2a203d4d12da05bff26a24bbdca462f9746a5d71aadd944898
SHA5122834d439ab02bdeee870dc79eabdf2883759f784b8ca0d243348def60f03727029eb2cbb4648cd71406c342e3306a70c7e995857ccdeb330caa5d8f11d60edc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddaa75340b7362f551d9797d458ad516
SHA1f24d23d03730c43b5956a9e1874e5ced0fc29429
SHA256d8d8bf34dceb5732998c79922678bbbdd79c0d7b46c8248c19ed202dd6d31b42
SHA5124bcbbe6ee2faf44c9e54c3ca4136d1354bedd67ffcb467328def99d93efa7c244d53bb8093fe1a8be14a312ae080e9637f42fcc7e3ccd6e5ad5411af9676a5af
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a