Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
3dfdbe61a1d0585be30155f473a1284b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3dfdbe61a1d0585be30155f473a1284b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3dfdbe61a1d0585be30155f473a1284b_JaffaCakes118.html
-
Size
110KB
-
MD5
3dfdbe61a1d0585be30155f473a1284b
-
SHA1
ce092221d63238ee283e2ff8e6be4c1ba52664ea
-
SHA256
7dac5de3e9cf813d43cfd43c5b633230202d9adbed5be6cd246f2eba61cd836c
-
SHA512
86bc2f838d2b2bc85d6983bed1b28116ca1f73af7e63162d1591ff1385fb4cc099018c7cf5343b80c65ac12bdcd8903a757894aab126ae271a5cd3e6c05093c0
-
SSDEEP
1536:dyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10011d42bda5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DA47F21-11B0-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000169eca5049c3e48eed8a649f3f8d3ac9703c30dbacc40dc8603aa37bb720ce85000000000e8000000002000020000000ab3d8cb7dfc16f62f721675e072f667fae20d9622ebb23adb2c2164e7fc161e120000000c55579e6e01b022fa6d118e209394ae889aabd52303a480165480223103bcf5540000000bfc0c586c55a46082b3b25ff484dd2dd5128154e75399e721f22296818ef6785cf9f6242503e2bf431bc359e6baa3e7542f8a780cd195f2cb530ea85d1257dbe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421825359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1340 iexplore.exe 1340 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2096 1340 iexplore.exe 28 PID 1340 wrote to memory of 2096 1340 iexplore.exe 28 PID 1340 wrote to memory of 2096 1340 iexplore.exe 28 PID 1340 wrote to memory of 2096 1340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dfdbe61a1d0585be30155f473a1284b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b34d4509f92e26fe205a72017273d5
SHA1bda4a0b9f0f7318732490a4cf3a9124070bc160c
SHA2568c3e3f98dcaca64e0df840b4ddf45f9086e65810a9fbfc5176d1cf3d4f3bc76c
SHA5125f3464165872d160dcadce17ff704e38684c7e8da95c7b85525813d57a453eec4f88b0b22d54bc9f0bdeda5e10a9afd4070e9729904b2a4dd443f0d0ff5a2689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e0b12577c98d569490814a868c3f46
SHA18e1e04c0f7e27c81c4f73214afa0b3af5a036a80
SHA256530605d23900d5eca4b8346026ab9e39a54517c831568eca9ffa2fb838c43aea
SHA512486566bf229d18763f292fc355e20b69a5c5998efb95bafcb4c5a24df26aad3cb6537432f54bb5b1d1ca82998a984f820721eea3a89c3e8eccf968bedf2417c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8135842d1a45650699c5fc3809835a5
SHA169e3cf394461aee59b808b3e69d6e6a713c3c98a
SHA256fb594f419250e873c45901d16ac60d7b289be66888d73cca67ff518ec84d1609
SHA51218437f571d55f91263161e61b87b6cdce5a433b9efcdf062e6ce6c9745e887467f07af131c7df015c859c8026aef3aebe0c8f4b5a472ea5738e67315055c0bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8654713fa2f326506a33c2a581372e
SHA11a8e7ba23fa874f5f88b1a92f4c1ed8091405de7
SHA25604ed7f7f314c0a20adb6ee5c5043967ca8d665dbc35b3f5e691690c42d1f40f1
SHA512dfbb68c898342e48ab46c67c48c86cc48e6950ddb2d6763229e4d705eed531ed14989b99a566e9fbf7c3db70845c899ffe0670e5166d05d294d6bf1b7bf83971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a8a3c81afc0ec6ec8d3e7c216c4538
SHA19f024b66d49593934bf488146054335e4b15da75
SHA256b3e21a5c792d2db3a71edaa9cdb76c81e7b2e45984a37d515661bfc83a2107b0
SHA512718bab693924b20bc9dfffe0719d11626487cf68696905500f10720cd282bdfbc0b406b3544a7117fb8f739c5179db6e2dfc77f078103702dea5423e73632468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db683e3a766f7333cc14e894022db3f
SHA198fcd459cf41c7e00e7a5cdd9b56eef3d239befe
SHA256ee326a814c00c3a165376d524ef8b6a761eef4a47e7a6453840d728b99ea4004
SHA5123fc6221ae111320f1217e6fe305ffd5cc17c602f90887e998b6d5762eae79829fa0b31bcc58453aabfb5358aa604b90b24694c3cc294a89239f27c17da5d2adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343151f0437b6e75fa6f03a7beeba45e
SHA18c9ec88c038c675973923aec2da5d070b574f2b5
SHA25693643243d1f4395b559b81e1249089a7499e0b57e079047208462193c5170c04
SHA51264cea7fd67ec14e27dcb30e7a15f4aac73b13466307dfa360e368b2766d659fa7e0faa8a84087f7ddef0fd5fcfa29c295a3ac7c0e81bb7838dce36b1f3b16cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eaea18a439abd35662ebd19c253d0b3
SHA184642007364796b8879da046bb2d0dff2377dd5c
SHA2566249cea4dccd917cf7dea5fea051ec748a669ed66fc0ef5d37bb70e51b78a20e
SHA5127b95acd0243e542885c5caa1454b0ce5d0b7685301bbd892457d2b51d2bdb998b74fa12f1a069761915bf7074286862ac440260769544a62ca34074972820c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59781cdb27976a6c718f0ec22f4314c55
SHA1c50afe7c001f24293d1c9d6fed452cc4db9a087e
SHA25637bc7867c0a37f29404f29a816e86e4348b2395919c3c87e2f4e7baf4f7d6b59
SHA51293c964eb24d268f9a2c5beff9f367302b52d9bbcc9d34e67f30181c6b1405f47b00a4d74e4fb271dc01913cf62dd46ab2ad0003b98d741dfec910c6cc8cd081d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c08ce3cef1bcc4c9e4657300ea35d0
SHA1b950a7d6ab8087a7026e77f25703dfbfd3b659d5
SHA256eb722c5e7f85d446a6b76bdd5ad4f5b34452d7669b48821e254b768a0dc3d62e
SHA5126f31c9fc85899348e8514018e7ccb09ae35d1893620dcf47b263cc1b0725e6e4c7a292b1888e25fd1b46e2ab5c3841f1a278697574b6529854c42df7d9b73ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1828790e425e8279eabb90f2c398621
SHA1ee96df628a9ecbfcc484456678a9c53bcff45225
SHA2566aa9d82de7ed7526d5e8e90ef2ab40ee2954b17e30a641c480a9d87ee10a727a
SHA512e173435a20c1b40a4b0cb547e52d85dc15a921fe758f7f576dcac27cab94394b3f34c77b4bf1278193a42242c0ab1f3ba5c64c630e0b8feb354226486f4221a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57278caee5d3a76129ce55622ce736a45
SHA1076af9f3df988b9a25590489694aef4a8a7d4b69
SHA2566987738488c6692732845989ddf5f2ed298838f47af02e3f61803d89fb7ecedc
SHA51289a47ff0342dc1772b0d0df56a57957af05898fcd4fb70cd30a3d851d05353b8d04c6ef0e07c92af2d76ee7a26fb776b5d5f66e949cbbc2477199c6ddfa56c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d32fd40bca27ca3bc64cecc1f92d7b
SHA11e3d2bf8e89133a454d93d3b74a4b4c96f23fdd8
SHA2562370f7a20f788e9aa9324dc25b68fdc478c456db29159e0fdad8a6dde78bc68c
SHA512db821e59f2629797e05c7f644841dfd16515a8a9f568ca605ba04156b8e012675952e6c4dfb6ac0c99d5f7fc7bebf61e082ca05148c080f19f9a6b434f27ed97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591df42212c6c8f6464f4eef69f053318
SHA1a0fcd4308c4a70a2fc6e296980c6b9f1fee30c39
SHA2566dd73802394e0412755a508fc628e935f6c1e3047005638f3836ca78fa4c8d6c
SHA512d0a0ea7594404256069cdf27d018d0380bddedee5624a87f658cb5cd18d6618836d82a138d5a71743370bec8877d8991a27052858363e2d8033a22dbf563ddd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d6bbb93340fee8a57349f23f7257e1
SHA1f34a456bc627ec63038e05fcbd700163654870d0
SHA256581b23fecf4c3a1fbf4e75493f0e4bf9b02333899c59cc3d8bb461ef7327f047
SHA512f429e61b497c73d7c37327ae7d98d2ee2b4276a782ea440aabd739eabd02e92ceafb08686f516bb9ec4d81c270f598e615aace4cb57809d769e8817da43f4039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d24c8206d377ed088d27ca05abf7d4a
SHA1094c6fe3a3f3b769c2e83059de2a067257cc0a57
SHA2560b2e00ed76525023b73fcb3dc115d083ea1dc6ff2053c5791419da12f85e4e54
SHA512ec33a6183b843c8c0021dec243b89fdb538d0d9d2b2e834b8e49610380d1a26358f328624e8438044da8b9cde3365c4bf97861391bee8e17fbc7b336cfda1af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a003b10156abeed40cbc2eb2689d898
SHA184f7f102e84af2b6608409675751f4720db37405
SHA2561a55cb1051fa10d29686e3d0d1a6af4903504e53d366165716d5d60a613a6206
SHA512585ace4137cf198e1228679234daec63df769830b46929744d2e6c35abb5dce98e0321f26b1679dab5d7c5e5e25d5d04ffc42320877840545f4b351ab8c15cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819770a2194a141ce97c966c483fa5cc
SHA1ddb75f4a0d06629f07bdbb51a2cdab3b2901fca6
SHA256421a051d73e45e142ed56baecdfde9bdcf988c358eac7b4ddf8004f4711ea287
SHA51278cc811c28b0e14c059225252237c699ccf9939145a6fa6e05fbacdc3bbb0d7347cf3bbf43a4fe0ad9c888d4573ede886ace87343545c8cff3a3e834365268f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7ac2c9e51cd46ba6be1c1d245129bf
SHA16c66b1d2855db9141182723eb47032f6eba0cfdc
SHA256bcd2438f06a79202d2fce7794c26cf691ddcf6e3a34d0aa01f283559293da9cb
SHA51219b7f26c8f1e780304c474260a41c09455fc5202f01845dba1b604b759c1ff28a05a4f621c0ef4c94cf80b03791f74c3c891a9cdf644576e886483b3359c1664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c724b7b84e1d18dc225ab1208f8c3573
SHA17c95868bcde1e67f167f581b43264b6036fa9cc4
SHA2568c8e901c59f08b8b12750c105f6ad150d183655fdff4918294104389c5b7982c
SHA512e740c5345732b86788e636302f4c4492d2d36ad965d64f68367138ef82b9336dbb869301c2e9e244b7f00ad3b3fca982811aec6ac5931800a70fa59d8600ac6f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a