Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
a3924ded4d137f602897c8badc9ce148_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3924ded4d137f602897c8badc9ce148_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3924ded4d137f602897c8badc9ce148_JaffaCakes118.html
-
Size
69KB
-
MD5
a3924ded4d137f602897c8badc9ce148
-
SHA1
96015beebeccf08f9c8ff64012331ac9fa5c7304
-
SHA256
bfdb133f2376c8f120a0d7e5b2836162c17308672d42548d25a204ec73e2b996
-
SHA512
300bace5e7ade6fd08968825775650334b6a8757f26cdb924305a3664c489f2447c7930c5f4fcb1a98ad13448a7e2ca339bf8a9505e05453acab2abed55dee89
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sT6I1a7oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3VTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e1eef87b701e0d4ba378ccc30ea0fb1700000000020000000000106600000001000020000000aff5a014546db87bcdafbe950dd0b2dc519a4490ee77d1b559e15b8d73343693000000000e800000000200002000000093a0a60ba975ca40e366d6ed5d038e92b72cc446e3d1e5512edc9adb579fd9dd200000007c8c4ce288cccc72369da4213f1c440fe50e31847e6269e73ff877455dbe31f440000000f6feb973ad44edbe76289f6709d00ea18609e890299c582a2314faf8dc590d55c3949bc4f08473e39e44ca3af14b4a73b71fc48cb581160df77c1c5500109368 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424408446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4E53D41-292E-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e4c8793bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1680 2512 iexplore.exe 28 PID 2512 wrote to memory of 1680 2512 iexplore.exe 28 PID 2512 wrote to memory of 1680 2512 iexplore.exe 28 PID 2512 wrote to memory of 1680 2512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3924ded4d137f602897c8badc9ce148_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2b631941de11c24884c421e6438da9c
SHA138e0bd95b010e401eb1a485c3b08712de83ba9b1
SHA25637813bf531bb0c20784844a9863bf7e2d5bc0fe5928b3e41cf2776dbb4a6374b
SHA5125167a26877278c758b09ef6a24ff15264acd57c0aebf161eed6856c96c0f14e7c1616886631e54bccd7eb5cfaa6bda50473018a9ae546659bc4138778b83aa9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523e054191cef014416b5db3ad314814c
SHA198c457f0a02ada2a121ca2622759608d4a5e5600
SHA2567f5dd1cfbeeec88d1c5b35519e2d192f01e22f9de7a44966acab2f58a6f99a75
SHA5124bb675214b790744bad30e4a1b5f09213e79ac9fd35bd48a268982d5baa42793724fe912fbb103e9a4fa0d81abf9d36472d155a29b50ff5278e94a1f9ad0f982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f10f3078561738d199e58951f0b6428a
SHA1ab45155bf66635ba8c78353927ce7c31504e2817
SHA2563f5bec0b5b47cad8876d7165a0907e11ed39aaaf7533db20a757d0782fc14970
SHA512c4277e6f2219355504cff4726e609472b577af768b170b0c5258dc11e0d046bdf4e2de81e767b33db1939b4b6b1ba46e26f5801095b4dbc47fcb35eb116615f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54efdf8de2331288980be1171284c52e4
SHA1aba6f2f35b4fcc092101b950b2926c2fe42c23fe
SHA256abe58a3f45ea7b4944a3524c3c1722dd7dc895ef623f8d2169d1edb474cf608f
SHA5121297547fbacd9b3a7e3134be817cb904d4ae1ad1b741647ddb7ead9920fe38179c9df1ecbe3bbe9d330698f604dd51051595385dc0c549f084c0a1ed527e1baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c8d7974cefb85c6862aa1f3caac0b57
SHA18899d4f31d2e9eb2c2311f81124be72383fa798b
SHA256303ad33acadccb858a49ed246e3b2b9f489552a49a9be8ee49dcdfb62f3ad515
SHA512bc569517ec5f7521d957bdaac53bfb6f7e2527e89f6023a4a7e1f9bc1ebaf292b9b088740fbddf090a2053a6c0b1a6667db6e952a57a837a93937dc81edb33f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5ac677db603c858c54b6e79b9384279
SHA1df355620b1a9f58f3684f63a8e80962e8c8d5572
SHA256d3427e239a8217e9671b8d67e15911a2ceac3959105b8179a25c64946e1011dd
SHA5121bf651638282e06abc1635f1d2826635018589f8e4e1b5adc303aa7f3cd1aaaa1cf8b7c702d44a0f9b9fe61fe15addec918e7d2ad41dce173f1e90170f1b838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bc4d56f10c6c6c0368c047ff06aec3a
SHA1e6d494e4b84390c55c12fb5977dbc441be164314
SHA256f7b68506abaa79c9d4595eb5d37ca142ca9e638575687a8c91a896afaae90f5c
SHA5129b807c30695f0f7d40a86ee08c41097cd46fcccdaaed30b0cee77b49a3cd7536e4f5155360c04ca41a57265bed72f9f08418ac9f8300e63b8c35f6a7de3d4cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58dbc0263f3dc4f10fa27a0f01dc2c0ed
SHA13cc9329ff966077f92801283df04153149868f2c
SHA256102d3447eb82b910712466a811335cc69e75b7105b19f0c919d7e98994f8fb05
SHA512dab4d5c88e8c4aea89a5fd67beace1d7ff2aab7ae5be49ebec29c947ac598a9f9b9352ac67a83189022f9ace74b839ec0accf416f757c46d4adf577b12d84276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ec29c22c079ea53b1c492e0f325890f
SHA1ec7f00efefc93147903d32e6940e2cac960df5f8
SHA256613952c3fcb9eab62926db21fd8f1ac803d92dfaa03e7c2c8e5f6088227060d3
SHA51294638acc9dfaec58f7b31c91fbcd1d29f790f629685545b380e06daebfbe15661c1bb684bfd5a29a7c7b6bda150daeb66bbd9b2b254492c080473af5e4819f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5740f80cb24522100844dff19e45f9d88
SHA15194f07a3eceebab7317c0b6ca51eb955b814c8f
SHA256982f422e882a5447ffaf90608304f7bc2fee1f568cc1357ee2024bdb7d3db2a4
SHA51206375aa1cc57ae98e454e15c9ab800489f5c6547ecfeb092fe09542a9666312af8d4d0af0684c7ca51c365e8f1f76bac346debaa0d563f7e513419c6214dbd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595ca57c6a994f4d6fc53ce549844e7b6
SHA1e5a817fc096995e133c9b29268bc6bcb76b4193b
SHA256018f91b7b2b21e1a479b11a914beb51223604b7cf50f055ae3cc27ca4d1e4213
SHA512b8c3e0d8a4f94860ab733b17496fb06ac2db515d19a8077707c91575f600d120f0f8db66b75285834602cf839da2f7a0cbf9209728d0562475fc910770e7e011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ed7f3c113c124ef0ad614bbeba1b803
SHA17e77f93c19c3ad6134e5442697a89015ee8c9ace
SHA256b1868acf4bdf60d1d02f9589a4e8f5af9b8ce878ba233b9524a4e3313e2dfc6c
SHA512724869a343c3c78ddf1a901e0dbba7be3fd910e3461a524bc9de13272bccedac9fe0b848151cfe3a6c90341c9cb11e8b6a96ba11b90d24e3b4a9daa891099142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa429dd187b0bce41d9981a065bb1073
SHA169fa1b703bff7af8338fee2b35fc58fa7e1c4d67
SHA256b05799598b200b37e8463e9e5db5f6857dc3c7507aa700e2038f9473f7d2fd60
SHA512859baec9f71bb39017c44add03e28fee7b2e64ad8c287daa9e3953d054ead2cabdc4cbf7a57986e25d59ac675331981995d604e3ad6e619542205449fe1c5d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fbdb5945da0b0a1925443a51882897cf
SHA14e938ed4ef31608867314fa21e7adc338462c0d5
SHA256b1a5644716587d2602cc2cb602978cb6d0e2a025c185a38fbe540fbd3c71827c
SHA5121cf07960a0b3662e25563be4b66dd51ea584ecbc6c08626a6598c9fcb5054c958d637deb8a0cb4180f6d58357f5fd053f95701d6fc109b9f9d44f448d4231f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb6162f9d9a44e44b696f825d50cccdb
SHA14fd2b97a66fd85076ab76cec5c9bb4ce8027bccb
SHA2565408281633c1ee1eefc54269c00baae713523d4c80de8eb3cdb64058c63c678f
SHA5124a1d135fe3f2cbc4f854ff281a4a8972a9649e131eca68a9fcfe8f1e7d4cdd5e6b598a44cdb869335a66a03adea9f09b90be6efaed0fcd6dcbe529266ec9849d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562beae2d8288810ec657b34af86fda49
SHA1de66e50c33474568e84fb6ee32e400bb9754d9e8
SHA256a68839ad9c318378e70728fa9f6108552c392a92e4c52776b77b60b0a69507d8
SHA51220002eb190f596093abc37b2b82ec3efbfb72c0f44856392b2a00e499dbdbf6b0eb34d522dafa8ab2714125d5fc1f99a88839cbd08f53aebf724f6ec668e2fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5913e974dd4934240058b975204004b06
SHA1ac12bc5f98a10277bc41404d4beb48e047b5bc99
SHA256afc45c25d02e55af72cd1930b287be0f0cced7c344cd8dbbaf643edc4ed7cffc
SHA5124cb25c2f96f0dfd7aee3f383d600307afaa19b2ff1e75c5ee11a96ebba6adb0d850b0ea93a3a05e376368e7b5b8c3bfc29bbd26046702394639ea22a02ff741b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525581e7388d3810b8d3d9d7a142a37e3
SHA102c930a19180e6534f26fc2b1d733bec6e549c44
SHA25610cdf7f3a50a5583589c6d3eea2421a245e5a9780f4330f28a63a546debbcc46
SHA5124e3c392053fce8c3d302e3d31318d99bf66077cb4535967554b98b43fc2e873a0d561fb4facedde28e2122c92a52dd8eefffa7a0c111944b67b81591d814227b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f19759e154bdab71eed4b9f28276ab1
SHA18abcfc3464042890afa059098e1cfcf43dedb9b2
SHA25642f3959c29894961c6502a2b3c1f282ca6f00f57829aaca1fe4308a120ee75cf
SHA512d6b0d5f762e1650bab4f85c8c2878abc03116b8085457aedec1e82d05f2a8e66b70654c5c717cd7163477e462b727b30c0268b1cff0778f604503b17e093602b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b