Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
a3947d19888b28efa6872134e506ec49_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3947d19888b28efa6872134e506ec49_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3947d19888b28efa6872134e506ec49_JaffaCakes118.html
-
Size
67KB
-
MD5
a3947d19888b28efa6872134e506ec49
-
SHA1
a98df7cdf468a9c180e7022cc3c7671934cbe6aa
-
SHA256
50faf8657fcbb461a4eeeed4e6654b0275d63bf46697c6d0f32b854ff3fd58ff
-
SHA512
0af531def735f0049f88ce6be396cdf266458d6841931feb33638f0ea0d95735228e0968103c43b7ca1fcd6c96cc20620a074d280c289f0c5425938c586e2975
-
SSDEEP
768:JihDgcMiR3sI2PDDnX0g6yP5koTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JXfTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bdb2c3af970bf24e80b626bde91327d200000000020000000000106600000001000020000000929f29d2725497a88abdca9934cae3a83f68f6e5099e1b600529b98cd591fb0b000000000e800000000200002000000024c59ddfd46a90e0ddaa95597a0b01c7d7e66bf8373f353826328194d0d6007d2000000044d0276fee065f51205dbb07ce0e865f5ff171bdc982b3397e9f65b94cf0d0c840000000afc6cdd850a18bba776c7067772ff05cff8c4f8a1ee72fa77b4876cf3cab273937911339da67535bf018831e2d2545aa3312b580ab3302e7508f075782abff4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707ca4df3bbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424408617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ADE8E31-292F-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3947d19888b28efa6872134e506ec49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62b26119fa4ab00936110010e1ee1d1
SHA16682c205d2eeb3ef38c61b2b89394f94e3eda0cf
SHA256c1706f4d67728790f05d5abf6fb460a7f365fc708c33069b8d717a9035be67e9
SHA512a645df088c5a163c7c8b9ad6b715f16d6f3f57004e04ffe4b30f41f0158ea88cabf869861fc5bd1e02c1fde59857a171724e974d148e58ff3372916c27486bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8600780923c07bd93c910617bd7f2a0
SHA1afed310ae89b156c35eb4d301a649bf6ef762e2b
SHA2565450c58c163a9b84b64e6323a8bc127dd78734525b095e0c20df4667236201c6
SHA5120bb0fb80162d237a526cde0303c0a79be9efcdb38b54edd0d9331179b95af787403d6a0967b533f12405063ce8fe2af5c817dbec5f2e991a3416de8ec7753581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fdf40a5ad80d370c7d78efd1a51bb65
SHA18d7e1469019ec1602dedd3c5cec3c8f3ccaf1e41
SHA256473802c94da2c91d3e7372f9b9df098ffffa2a7ef14937b7b9f530c8d9cfc522
SHA512a2abb9c1af481b1d2a815ab8d89cd0432040b27b5cd1ce29186a4ff802a168bcb8bdffc4ad66d6c19c612e593f4386523204755456e1ec289dc2cda01ef85101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0b557549a5914e8f9aa57b00bebbe1
SHA1949ea6892841f4e860f6e2a369027aab544ebac0
SHA256067c409af00b3909934d8c8b838158df32fd3817160504427f99bce6fa9642f0
SHA512d75123a864f32e66e8e1548aeccd693e17f4173007995bd36a8ac8324ca1412ab4ea181fb53ba5c4cdae1674491ee3d56b0331e0d291d095b1fab32ad3701c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adec996ea6b7d28171fe883297d56552
SHA10fa0022234ec84e53c88dab50a3cbd656f63ba18
SHA256b4666488ff27ee78efbff5eb4de84e76b269379aa845ed19dd524c2e04cd45ab
SHA512c20fba4b66102669f241585879d2195a39765d3ae67eb6b0a7305f24739f4de93de125105f9443f18cdf28e6ccb9702958d9280cba2c950b1f2931b13a2424be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1abd6c16f5a77ac87e531343ba63048
SHA102e6a80674aad2a593259c03750c8ff556673905
SHA25614977b43f3414f28fd9e978f83e61b23427c65408f41fec1d0b2eeb3ace9d83b
SHA512d77dc87162d2bcda411715e9e855b76c6c8d8e2c06d32eb5945ce743ba21d9de0295a0d24aa9679928349449bdf6bdb354ff7f4e8b5395728d4a6f2c94c408a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59001726791efedded91b57fc9c175d3a
SHA1fdc2a361831e7a14f9e84d44cb29110cba9805c5
SHA256b1f721d6e2abfc4e398c4c3dbd6748da8a1d74a00c74657db4af98e88b7ccb65
SHA51231015c5845957096f6d2e8ac7808a8a82619bfd57906fc5e4b1453098e79905afcb9aa3ef270830dfeace6785b1a63858ece1515c201ae965df0279eacec4a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575981becc263eabab892f87bf2020230
SHA1ff8e95f010deae1673f0a61c6bb6c2fe3ded115c
SHA256816e91324363a62385b540226fa1146fe97087d9bb46e213afb950eefad5d406
SHA512a03a7db641b634b1cdc180d92bb11364e3f31dee6b598ab756859ab72267a9afefb6afb8a88ad904dc3db8606570ab34162de4d5d3c21f5e31306b7b653e1b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1d232c448926f43196a8cf003a58d0
SHA138c3841529cf52bbb814b11989e8d26df0a605e4
SHA256bbbb6c8fb9d841be9e2147aa18da20c4a572127631031b69ba341aea8a990828
SHA512325b67212bbff481580bef958a5cbd4178bb9b8427beb2e4dcb9fa1b0c32f998a22143915a6aa431df7bd94e8e2fe50d06b40f02f15c60434f895d4d297125ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9ab7c54f09ca21469abc0d94911849
SHA1eaae9511dfcb5fb6d8405fad010e010b94f4da63
SHA2565c95952d7784b71c5fea6e4a653e24f143d0b04888a1a0437ceb3a0aa185e527
SHA512fe4707b3051b6e5dac11b8da1aa9e19d9312fa23ee98b8b654c4e765a6ad6867586f3f7bda24fd7810996cc6aa6aaa5a4f7b776410a93e944e5fe3c242c4a886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3df3e96febe2782afd40e7db9156fc5
SHA1a6a954d3b63faae8b649680ef39cb929dd1bd0bd
SHA256858e2dd7533d0c9aa3633be58c3c51976d60c0a45627f0b37802d94b3126464c
SHA512013602f44d689a7ff2a1fc574dc3d72322df11a0883a3d9789d4ddd2b812a76da10ab333940fe1a3b9d2306ad7d492a2c73bdf90453223c96f59684bc0304a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656ae170bf21558e33bb0fcfe17fab41
SHA1dfc927c195c8cd1e2cb17e6a71cac1359aad1cf4
SHA2565effb07f3130c2f58a480cf2267152a6d816d166539fb3703c2e15fd3e0e2aa9
SHA5121be3ab2f0b8d0fa2980b48ec2d70fcc70dbab79667134be56c862b86634dc056a5148361ee1a25ec320b98d327fae356961099b4f8e44ecdfa1401ee4948b59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262d5b0bd3cfc0739b0a66a153e8277d
SHA11e370a09e1d9d3c03ec132c2ca80b5a64dea737f
SHA256d538d2cf75a92184fa6171eafdc5d22ac6c7806b65d017e24da8f829e4eef77b
SHA51286123928318c7616f203a29a1da9bee9be5b10606e6b3681bd9ddf1567f85a4a83fc77063adaf6081870996251eea84fd3f9efcbdbd66b2535c45bc99e69c158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a60a8ddf66c1561af7af40edd121fc
SHA1a886672de6196b6668b918e51bf3d6c296ec1294
SHA256875f7445ac5fd9a994627e6203fec9487730ca9c3645a96a292d17d55c0454e2
SHA5129233df111488cfc4bea20bdbf9d0210f97b41abd9f3fc4b448c2e161f4c2475db2345ace70675e062d5401eb8b4d7adcd2698d00f896a27b67e5db6ab09b0f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cdc8a0d0e829f61dae8e05c17e4799
SHA1ab18702a2f02b63b0395ad156b7448a9294c0fd3
SHA256df0b3a51c9425a56f2ea3504788c3eaa5bde700ca3ef3171db14b57c3c1fdbf9
SHA5129ddda1fc1cd5c5f0101022fb8f77bed87981ac2c172a676f6c07688ae20bd38596a77f7a621792cbca6e176730a9f02b0054de8c949255db752086d24bc284c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b161a7850524151570507ff73acccd36
SHA1122e36757001ef9c8ef717a272fce053a01db443
SHA256dcb049b0a70a9991e1df41246748ed48f1f4976455ee57fb2dd9c592673f0a3f
SHA5124d3ecc97bf01b692e28acd913b30594eb34f0ac7e258e521b99b60e66ad818ea2893ca102954bf5c62d50aa4070228366225c8fda752d3051d6f85910fa7a4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541da1f53c1534f36880b1632920ec2bd
SHA1a5d8057a6b793e9d8a273c0cf410b41d2d939f9a
SHA25658b7cd18f6f549e025d274e9a551187c1abc106f763008db0c69af34bcf0f7e1
SHA512b747a646969d94bbf3289f3ed7cfa0a6befc539c258ffb6c78eca0033f0b098ee5727ba8ab9300c6e05cf08956d6d5054e352d1db7c4c22b9198d6a94eb5e9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694395c0e2a80456fdffb82ed26bc7c8
SHA1d0f00bfbf033e8639cbfedd985cd524cbdcf229b
SHA25634c28639b3f83cb321ee3de1f7f65e01ff74f7f1a01cc6774ac112159a8ef9c4
SHA5124798d5b524defff1ce945093837a28ac6e56d173de3926f3d593dc7397caff1ea22b52c57bafe53a6f795ed5539d629656a3ec6f0735a0697e8513117b6f4219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6417e281048a54715dcd6b7b33be00
SHA14e3311967748f683c45bc008c97a769b2bfc0ab4
SHA256d824bf1ade985451b5d1a0b973c0939e449a3e2cb2403b0de31d55482a0e3c43
SHA512559bbb36ecc4a40dd1614c7d4c9a595aa8c193cf51659eabad904908201c00de349d3c919ecc6c811dbcfd847ac423a84b1e15d6baf1bee0445bfe8bf068b150
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b