Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
a3540d622d89785071f0252df15a606e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3540d622d89785071f0252df15a606e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3540d622d89785071f0252df15a606e_JaffaCakes118.html
-
Size
51KB
-
MD5
a3540d622d89785071f0252df15a606e
-
SHA1
e1ea05592fcfee6b827884356aa07cef3d1e88d7
-
SHA256
735dea4a967ef0410d6675c98882455fe1e192078dc9f5b4e0115b6d581ad6c7
-
SHA512
f301e2a55fece7120ed71f5ee5bd41063da16c488cb73fb55e3972e21e1edd0d57def52c1d8ec499b2fcd6ac6e6546b8ae955cf667b3e25a9e10140625b93b6f
-
SSDEEP
1536:FnG0bUe+6+ORRKWjIYhJlF4UFfhd1fO3BdNRR6lBhtlRKRFJV5VGR1N+:5G0bUe+6+ORRKW9lF4UFfhd1fO3BdNRr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C77B05D1-2922-11EF-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424403350" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d037ec9c2fbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e3475937c558d64b8e38668f1f6a0f9e00000000020000000000106600000001000020000000766878e75024cd562f98b2f0ffed2b6d3fb584e5204b0bc0bebe1ed19c7367d5000000000e800000000200002000000030aa85aeceea3fed2d8a7a68bdee251fa43979425f01ec14dfbc92221f1b8b9d20000000995f13d69e76a9a1ed8f03d1db9346c04df0407e2fa091ed83f2e49972333b374000000044f2d8b5f698a83e6715e83cb7a186335973a963b775347239637277ce47ec5b7c4c3c52ab9183486b9de860d9ffbdb4da58e6d1cc1a2d6dd7813f8a23976049 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2908 2004 iexplore.exe 28 PID 2004 wrote to memory of 2908 2004 iexplore.exe 28 PID 2004 wrote to memory of 2908 2004 iexplore.exe 28 PID 2004 wrote to memory of 2908 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3540d622d89785071f0252df15a606e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a51402d4e8b1ef0f347036549bb36b7
SHA17ba3026256818277ccb382efa82d3bfce7f7730a
SHA256746a463e02ddf108a8f696e784777fc8f196507f089735bd7d047eb09040cddb
SHA51252ed880f7b4060fd621be5b6bfaae0d0696759238ef6be2ac6333ed3a6c8d3131e91f9195256e4be5a7cbe6a69a78612d3fec2bbdab15a22c05fa2f5b50c5e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86b1ab58105bb0c40392aa8aa489e85
SHA18901cca4b69c2ff30f72e67afd17951d1824dfa4
SHA256831b3cf1916bdfc8133eeaa5d97eee01b1437d605c00995706839b1917f16164
SHA51225ebae94a87aaa7bbf281ad823d64dd1160745d99c445619138e80e133998e54f8906b8fca4818a11ee1e9da092ccba5b6a6c2df9d66d274879ad4f82623ed5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4cbbbb96df34cc6803415b609594262
SHA1407c3b07bdf826471c6af127d26167cc7af524ad
SHA256ac23e51453a80564c2c0ddea5f74f53d3ef92748710bfd3c8cf0d81a25ca8305
SHA5129e837a2d7666c6f55739aab67cd4934386a8f79889808c3c2a0d65e67e3fb9aeaac1f1f23bb33e0a094675e20eb7797cdada2978ced5c1ebcf5b3080eecc7bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55982c2e48047b548462f63fef5d8d73d
SHA1f9b951d5c21e05d14e12501134fccd74ee3fe993
SHA2564c1838f63eecde2d1617f344abbb254797c0e0806630b52ad3c7cb6f3063f236
SHA512390d12fed0232766b13edb8c5afc3ff1a8598f6943aedd04aac88d41f8c9629c824ec7c11d17c9bb556d09c8766cf6981b3f6c279bd79d11e5ed83f8667cb945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7ccdb3865c31bcd3815c6147158c26
SHA1905c01fea4bf292e7ebadafd3859ef91e1e01d49
SHA256de0753fa7cf2d75a7d7c01432a622a15fc8f41d3532d70c13bd10975228bd0f2
SHA51281904cbb5e9ee7310fa0ef21f8bb17ccd6dd09ab05d9e7d2999c569985b58b4e5c13cc0afcb7eecdefffeadc237a6101782f03095d7150e7e8b4561ec277f0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984af8d3e259507094993c1d1065d568
SHA116f369419d9aa8e568770d2394a0c77c46c6b40c
SHA256b3734f2187e2ba255d71444fe8e27f24af538e45dad0f5c4dd6d379324e10079
SHA5123301ce475de8d166fceb4ac3cdf49b78be2424cd4e22127b58db873081df79aa1099e1529bd4259dabfbc3a5d9ce0c11fa70f0c3490dcdc315e246d159bc196d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049a42b5873d43d4b9f9daf2a7863292
SHA18e210ecb0b9d85b7d0f0663d0536e142a9000394
SHA256d0058e86f859be26ffa4ee61f276540314b5332858ba1d5760e360043def4f16
SHA512e28a33baca4848d95e495820a463e2353eb14430be0b4ae81955904a28b63b416a1c7953ab9a5952df302e9069a87ac4bca46cec2c6e91b84aee6329ada36cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a987b7767ff959cc8c37e901e41c6bcd
SHA1ad9c037d2add9469d35784b3c8d56d3765282bc4
SHA256fad92cdc2ec52d5d08f2f7fa21ef950b3d770407fa78e7bfc21d2a5725d5241a
SHA51236dea263171118ba599b2cfd5d51440669b73932245f52108f1d2d2ddafb0338c1003998a25d58b8ec61a264206abcc194ebea11b401f03ba6bc096bbbb15b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade818caaa84842440b09bc4c5a77e04
SHA18f3308afde1e8b2d61a8de8aebbd0e5663465378
SHA256a5f17edf36dd5596c6a29784f9848b4993353671096d559bc2fc427cc00f7a20
SHA512ff0218e10a969b208eec3c85c3c6d07c79d007e69fe4615979fbc81cdd383f934b8000a2233da573a34d9b786966d8de4aa40874eca208b588d375958d7bd4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158ff3da69c1447ae373244ab654842d
SHA128c64a026f90ced31e7dc3dc8a352fd623b9f664
SHA2560daa0d1ae0f0b4754c35ff4180872538308c1f2f3f248beb93104976b5e0077c
SHA512d06e81c1f7459da7af05566abda7268370af4aa82c48717014aeb10dcfb5eb3c688528c882b192297ac4127054b9e1545b5ecf50e14f37b88425dd5c81577ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c0af1b35891df7542cc8a5bad2a5d2
SHA176ff284700191aa08cd0db7d7209d0105262f1da
SHA256ee37912d3259fbf6a4b90a87d97ce260c314378e79984d5a3396ec36a091f38a
SHA512c1ad0273acf42060b89ec65e27f2cf461a630481f6ff69fda099a93c1a3418f6a87d40446e10f4649832965ee2c00f5272c6671ae5951f65ec67cef6e36f653f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d278fd8e6e6395aafce1ad41f571d1
SHA13616b832f9e0637e9edfdb2af97a6e7f770d7780
SHA256a38a917803de2bd4c066566819dca8765d68b09f3134f8b38ceb493f1de7753c
SHA5126fafb68f0f6d99d82948b439951f481f83220eb4d62dbbb7e1905dc962bb546b897afa09a323b28b1cdf45dc4f5f8132ff8ea4fe8d6342c20f1bdb386f9fae1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d225451fde464db6ce3be079284d0446
SHA155f0427522efa0682f5bea9d1941f6c9afa0638d
SHA256d9ed8a02a5a5e8a9f4acd9adbb9cb4d323aef9e04023ec2016e98a9832feb37b
SHA512a1a17367414630eaf26140913be26625186f75895cec3daa9b5c132ff4505f6044fdfc55779500b2c2a0fa02b56cddd13dd44267030f25383ed78436ca698d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517aea562d20dca44d7f7ef1ab7146ba0
SHA1dece160bde3915146c8d0f2742c87326d3cc289e
SHA25671887f2148d432c87b4cd933d1f4d28ae4321c667f1081fb3ce1215fdbc4f1ad
SHA5127f28e7dd1ff676a7c9be632cfef9d415f74bf754e33079a720a3de0e3d0ab42bd9f6ad3a43c5d54e8e49aa4551f60686b5453817c19cae3deab73febb983d8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c952144e183e2dc76f22871ec82d930
SHA1ecfcd3332b2636679e3f10813dcfbcb3549d507a
SHA256af386a4a959a08f397892bdff1445fb770e0a19f730c3932cf24b323208db25f
SHA5122b996986c488823b414fbab7bdf3f588e370a682343336c05a58f494ea6df11bbc76428e664e24822a87476106ae5346011ccaeda0c7fcb3c4816cbd023433dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e73636acd7010e61ae2e302ce27643a
SHA10fd158d845bd15d5426efb767cc5d0d96cb8816b
SHA2563c6d6b63bb9b5cb70bfde1568b84f29c0338f451bf016853bb5b958cc4b99780
SHA512c3c3f3c544353d24cad2bf63faa21839b30ee3801d9446a1d4e3a827456f56ceed67ac697e4cb198a744255ec1f7e0626fcbac54763b865b3c6c51e30e4e6a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576833ac5859ecb377f814b3c8fb812c2
SHA1f0df576de8023eaa67b120475c7e1fcdd9f9d9b4
SHA256bf6f5eb79416219b5a4ffdb76c971d9a8c5b58595a74e88ed8918e81582af31a
SHA51254693bb3de3b6bf46c59ee7f22d74170012943c8449b11201b07fc0815c14d49088c18c928cfdd8c88e20b0e9054a69de9aa0bc6b4663a9b140f6e5876236ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02a23c49086231f75dea7577cd95820
SHA1392501abe8d39a9b09a163c44d5642946f513226
SHA256aea920c6e880c6708a7c9c9ed4951a92d4ecc5169175e3a581cea6f58d3ae579
SHA512c3a123e598a37c05fa9464b84e4103e761b2bec0e1f576b494d303396692e70fdc2e98feca000940bdd7f45dbcb8757d5113b11eb3f28b1e918e3f62bf104fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ca05e3a0ccd703e37deab0acfda8a5
SHA1593e764d75bc307cdfe0766ac16ca78c46438722
SHA256810597c642f06c2780d6058573a16df4e8e4354b46bbbfcb9427ca08f3f419ac
SHA512de52e1d679c809aaddd69b7ef1d56e4792323c31b279ae49cfb9753c23591e62cdfc3a9ec1597480cca058248dd30af60bb1b79f10aa20bc88fb3952ea2db0d6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b