Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a3712ea2f6fa02a54d687c91715eefc4_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a3712ea2f6fa02a54d687c91715eefc4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3712ea2f6fa02a54d687c91715eefc4_JaffaCakes118.html
-
Size
144KB
-
MD5
a3712ea2f6fa02a54d687c91715eefc4
-
SHA1
d4170335553f09b60444649864641798f08f1b31
-
SHA256
44e7819855e10115fdc1a2fd91aa1eddd61be90aa592757f1e3af6cacf7b2f84
-
SHA512
2db57879ea78903e0d2f391901faf4082137f4061e4c74f134d968f18dc49b000639266878d1aa1604d7b7bf06f8c575145f0b23f36985c3a8f9cf12c1f1067d
-
SSDEEP
3072:32AzJiFihiFiBiuR7NdKKrysAkM32Q4XS+lIu97ejGJH5dMpibMRbKeW+D4j4KP1:32AzJiFihiFiBiuR7NdKKrysAkM32Q4n
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081b37a6b6ba590489c96330bba3cab1900000000020000000000106600000001000020000000823e5ba4236e8c38195ff029b54a50fbfe206b046440fcbe6300d66d0845f7e4000000000e8000000002000020000000f6f59dc595d77bd0349c687a20500024d760fc36fbcb4d92d3f5dea81f91ccb22000000029f4b10aadcd93e0e69c6b3147878af10bcf6ae2a3c340e73b405433ecb4cab040000000f187862b88f4f3c128b49b909e11830397f388b6770b3b75a9030cd9d14b6d0a030022ab294dd351adca888dfe0013b9e1c3396a54df2b907982d105026e3a30 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7616A691-2927-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200ca24f34bdda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3712ea2f6fa02a54d687c91715eefc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d3049f1a4b143f13261e38abab901109
SHA11810917619ef7b98f40697c12f35a75575665f8f
SHA25669df6863aa24aedecf107a7e2e0353d592c52a5905cc2833d824c2298733e9d6
SHA5126af844057e960d6f4165f297891b676492281fc4abdd7346a220b1972124fabe2a9e0f7b3825c9f67c1ed885262cf6fb994c4dcd607c1981005291a240b6e958
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_5E390E1CA50E646B1021D6CAA485D322
Filesize406B
MD5df3af9d348e2856445942f03949218ce
SHA19af15198f1d93b188e0cb6b5df3712763d67c79c
SHA2568fe62752279f2d145c381c2432a1e28336617b05a77e85ce9e1c03ebf32baf38
SHA5124d1d3b2fb80581393efeefd2c2a5118a6b8495b3308cda31a63276d675ccdbe89f81db218fde1ed69d3dfb2601371be944d36b0c6d0ef76efaea3f527ad0c151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d895545befb40c4ccada9fe0ae3f7ccb
SHA1fd8099007597d448e3e59f9df3c270551f9f8509
SHA256c4f6d1ddefa8dc92b0702a0f3f55a464a9ef6ae63a76b96c5e47cde463da4de4
SHA512acbd742de0d0a0151f00486649bf9d9f8615927b7c225d6d73c1bf363299fc5f490f5f9c66114f058f61dd7290b47c0a72393a6cb339d29c49a231aa35ddf289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4A9377E7E528F7E56B69A81C500ABC24
Filesize176B
MD5e85186b07e26b0123dd4e6aa1b596e83
SHA18826bc00ba3d9d77d9d644f8d83943ffac68ecfb
SHA256cb9af69a8e5a93eff625bbcae74a92ec678d514a2200dd1c9e556c793d73cfb1
SHA512b8cdd062228dee3afdc22db14c89c07f513b2513b8e99703fd841dd05aad4caa48372e1ddf91356cb1d925bef7a21e728ce9543028c95183a8c61f87f501f1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3eb29bdfda2f39cf4ccef89b6f0914
SHA17b83b944a31663c5049f0980db82685cef729298
SHA2561ccc0af13021334bb3fde4771b6c6975c12bd2553070802e4b15bb44c1941c34
SHA5126dad19c2184530274c43bc37b45ef23e516ca0bfb528dc8d7d368484461b94f0f83fd1902b95d4052a844070092bbeed36c8e126d0635522ecb59ecff758ef64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569637f954316b9ec4d4c5d8895ac9fc2
SHA19e015a93c0e9d47a3602ca9eb43836d21c1623c2
SHA256010bbf0ef48f45084f6628ad4f78f0b4551983c788ead3662b5d28717a2c1923
SHA512f3b7ea3569314810c7372f13aad21884a7adaa684b25c2d5d475440baa75b1d49eb68dae465f9360f922130ac4772d5ab87cc003d2349f9ec1fb8dcbb7ff8640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3bada92ba39298becd725c8c344d94
SHA1cf44c23a829ef986c4812cec532b947a82420268
SHA25688aa10e5e5c206b9229dd6f00df1495c2eed192c05bc287ed4edb7721df68f10
SHA512535e167b7b19083596e6efd8ab8629e64d713590332cbacdea2c3a431df30c7bd81b3ed0a4f683b2051aba0496820873c3dfb6f7f21df31164b63361c0f1db26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931fc0587703fc30eb232e5a44a80f32
SHA1749636bbf2e42f10b4cc9e1e9f03c5661acc62c8
SHA2565388382520fa53a51f40c57aa5cdb2c35890a42eb32c267fc40af7b4ee7f919a
SHA5125276e146a9c7e933631367e4acfa922ff969f2148301720417bb74549ddc40b5a4795ca058c550ff989e38ae949f3594a03b96e0f005e60b5ec5808258531b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50aca4012994f2092de6ed93465cf8a42
SHA1344b489a0687e2cbbba4a2cf45808a192c14a3ea
SHA256ae061580dde4e718436b3febb1f87af29c683bc15ea56e2b71cd8503a19bb63c
SHA512760662d2f53bfa21c7e7ec44f9149e6757f442a3b65e2fd94986c1dde4af02367c4a37bf1f520d2e5731a3e028593786bf78f9ce7b096fafcf9969eb76dc3895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a5dd5d001dc9aeb7edd0a9423a651890
SHA180cab9d76a8b1aeee32fa33484e559ed00e32510
SHA256ffc1d3bae92698916c81a4ece6dc2fbac2a97c4881e087b048139221e8c9e6a2
SHA512e660e636be6881662a606af09ee998e94bf5ee066b489f5262930a4b7e3a4be37e2b96e11d040239835ff1adb40ddd574231474b9d9fb0216e6551c692160e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5724b9aff60be43eb6264cfea1c3cdcb4
SHA110b1ab2b9e8e5432b895bf5f7fc636e4fb2e4333
SHA2562be0c33d556b67298cc251c2b4f82c487a28799875dc463c97e776df0c9975e2
SHA512b26b3f516950e616cf8875a5f60528a12b0477fa46ed30636c76ced9e0a2f6a46cfef68e48133f72b47449dbfb32549148409bc433b0654954dc8f409898eaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4C4T5JRU\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b