Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
a3b1010b667923a06e1b3725aae76ff5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3b1010b667923a06e1b3725aae76ff5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3b1010b667923a06e1b3725aae76ff5_JaffaCakes118.html
-
Size
17KB
-
MD5
a3b1010b667923a06e1b3725aae76ff5
-
SHA1
ca9e90283dae9124c9b388fa19cfc6ff18ffdcb7
-
SHA256
9e5811510fd21ac9d3355da31f5eecb014b06b957b4d94c290ea690a46fdefe5
-
SHA512
51c89571219e4b11215a81caf1547ebd4c5b270d926aca7053abcbdf6564188629993d13efc1cfc3b86ee9dfd2ddcc84adb3dcf74da6b9ba6c5d22401321f316
-
SSDEEP
384:xAFTw5gcCm3tIBBiSlyNVfltzhrZMndfyEB:xAFTw5gcCKaHiSl+x7Mh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005d3e1abbac9c7395f0d3a4c4308e96c0bbc325644c284b7d71c896924b10ddde000000000e8000000002000020000000b07191262bfc20b850642d93b8a4fde7fbebac364a387ecd78a1cd924656540420000000c29bc9a42d7d916c411494345cfa8ab7c6afec56a5bbe3d54f92a3a02d211b184000000028e2f7d4b419b3218a902879766627e76a195480afd686e3a8371da62daceaee1104dd3da033fd3372295703ad9e466f8d8771ab8ebe0445e0f7c9fa86682756 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424411589" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08eeccb42bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F607BB11-2935-11EF-968C-FEBBC6272832} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2652 1724 iexplore.exe 28 PID 1724 wrote to memory of 2652 1724 iexplore.exe 28 PID 1724 wrote to memory of 2652 1724 iexplore.exe 28 PID 1724 wrote to memory of 2652 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b1010b667923a06e1b3725aae76ff5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555beb9934a70c33c959f2caae54647f6
SHA1abb816497236ff4fbf3f52986d25b756f9e75d07
SHA2567e34050257d17669c1fd82513c45b67fc304ffba3fde1dccfdccc3776a508118
SHA5128b32fb3ac23c447e6c03a2b38fb7daab029d3cbb86507f1486aae2deda6c225243c0810264bd0af83f3c809b74d40297b1c64240b05a0e080234830f539dec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076d5b47a6082128277703744001a716
SHA1b2ad5011f8b7526bdcac7c579397a027c39e413b
SHA2565857de3d4398ee136de7592de1a2fcf4d4f870f63f37bf853ffe77e2533989e6
SHA5126e4e9712b7f0c70400867cf0dc30c869315549df2448a739e41f7057a72845f073dd967b13c051ce092a016fffe70668ab3a45a13e73ddbcae4902abb047c3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5f2dbdfe677b060e8574bcda163504
SHA102d31843b048fed5ba6be6c8e88a9e6e53cc7719
SHA256c8583290e48db5708d64b4c3a5d017401e18ebff88824eaaac17a5f5295716d3
SHA5128f114a91fb0603da490f4867b63a4f13cfdad759c43e789c95c3f93b00db2afd8b76c7295b8dab9636e74bf3292497aa93956d3171e5686ffba892689695524b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b93df476b3c21be5aad9dc5c6ce2297
SHA1ba4d71586a1e820f49f68d1e4df5949b8852e2fa
SHA25653138b5cc91b4fd5561b3dbbdb6e7730279dd5aba30f5bfb71d7f42bc935bd16
SHA5124fd9d92d0390e95661b6b983237c51188dbb17c7407c9a2459ef88d62e7a683db0e2ebcfd595b4bdfea922a7e7b26856e5d23fcea0444b08065518d3a7cddef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d61ff6e178d52a243a0e51e47682d3
SHA13b99e1f54806c82fceadb856705c9a3da217cda0
SHA256ff114c3467502abee1c2fc99c11f6c3af314791e0945ebd1b7334a884934d445
SHA512a02c366362ee340b57e5e59f4e96ab8c858358e5c8e52da1ae34810ea0056982772889b54cf5252adc169b6027a4abadb026456846eece7364b1e19fd2ad3b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e2b6338120ba0d616f6f4fc84a3a5e
SHA1318fd9e4dba820fe601d12f2fd7272983667546b
SHA256c0b31fe0b48edb8507b23cbae6e2bf9bbc684891befa7fa89d675acb57d5ed84
SHA512091187358ea8cad029335282b3c67d236361ac94568ae5925ac79f5126aabcddd82a21452bbc6ff31359d0641b405ddfce4ccf0d920c6b0e338abff43563de99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebc073df9ecf0f5ebfb3813f867ee2f
SHA1a4f203e19af06ad16b8685c174de5badf3b67c99
SHA25617d257105ae6ea18ef859083dce0c7e0f49f9684a43628f9b0aa78503e14070f
SHA5126a209aadcbada3ded4647cc87f0657c8e5e7e11ccd9f1f2d17b2c49390cd80883b18c9d5410613327536dd42ba8344a4a52db54ef939eccce131a70135a83c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ab5d3321ee8c824d435de3bf137593
SHA13cde35ddb5ab2bd6b170661ce1cb75c409b2bd3c
SHA256d96e737c7dc70ec04c88df76beffc8a257249296733d773fdd6947655645b182
SHA5127c6bd96079defe3b07f9ab2df9f4b1823c2dcad5678ac9005d5f0abbc6137e7dba6b688401f4acf02fc4a1b5fe05656d8e0e021912b1591b7569dbf95bee1d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35df35a21f4e70fe769e75a83e8c4a8
SHA179e6dfa30315173fa3f688b241fdf76e073a65c2
SHA256dee7afcc9166fdf048c735cef6b702c16c8d897b36c973c4eed247c082766c8b
SHA512f6d71a6cb0c8bd9f50e6f2842c4e5f77b45b7ca2b3f731438599f16b0f723ad6d06a6768bc618d2fb27fd2d06482619ab7efe189343078269fc49fb48c112640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee41d77fe7030af996e77527e2e407b
SHA1ab8d89df63e1c3f3161cda5f7dee625613548b15
SHA256a9e63efb378b27185bd9738131394929a4035ed7028b8a49c985838d86f5d5e5
SHA51289954e8b35793c89415c2dfc6482d790f667b51a73efda3d2ba0af749264aba5adf4f6be5020a9adcab6ce6e6b34063ef7f382ccd6d55d927908cfa876777e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9207d523110bd3e4626f67a0ca1d707
SHA12f1f72dc0475dd72b9f8a59d9d307bedd46e8f63
SHA256117ad90b645e74ee4a657ffef5b4b02ae23fe212132082e93e5f499f65fd8fb0
SHA5122542df8c5ab4c57482b7dab1cdb5a2565bbf0570b6b8577ada206a098667b8413d5a62c93badbda4562a733a3e2e601cffefbc4cfb0bca48faabf15e65ef3d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0312fd388f37a2f46f6c294880f7d3
SHA1c51ba5ae8b47b21a2f57afed59936a222bbf7780
SHA2568c348198943b10e3888bd74d23bbf79da7a6d28423a6a1beb09526dc59082db6
SHA51291cacdd8a623a044329dfce85659ec036f00b9d0203552afd914a3c76e305f0566cfbf433f768edf8418ab32f3ba144b085c6c9ba9405043c91f743ed591f4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3214eb2fd804a63df919ac6a6bee58
SHA164dafa99fb2de14831c4ed71cdc3b1349bd08b8b
SHA25675dd6753405f2d41222b26a543f37b6bfd8117ce52628b69b8be2ab97ba888b0
SHA51216e80a0b8650dfcc59b5a995395848d3bef7935acea1ece63996729078ff392733aee6784913df13204013b8898e9ece4d826caadd05b86f383ab796f87d0718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8f02d3f803db9c25d2c431bc0779b5
SHA1a79984aaef5c6647ca1feecbdfc160180f6c9353
SHA2568ada9434b2945176c4450d1036257f3031f9cbb7d70affe98d5b2af34e6c83f3
SHA5120b9f8d3027d55d7d1deef284293eca50c6726562cf1adf9e73610c1a21992712996be851373c39f41331e98956bd447ceb3194bbbe06ef78a4e1e0b26688c074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7bb88a62cabca83220d5282011a381
SHA180015a3a3aafae2469bd7b62bf0696a8dd689c52
SHA256692ef25d03351f2be9cc51d49fdca8579e0707e7a512c5de2f82b209a6a28d17
SHA5128a4309162f0b2d90325af1320ac718df34cf2f6bf2443a4590b52f53bb67293c98563ad35ae8130917ff468143c0450b54eafd54b53882c4493da7b77e84bbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9709dfbaba85b483f15ef6c2385a8c4
SHA159a029fe7b1ea09934b3c11489490c09df0e7bb1
SHA2567e35db7d8ebe7041ed0c518bf3d637d1309f8eb2695f4ad0bbb0ac437634b33d
SHA512de2ee14df9a714af8b810941f539330ce9987c9fa013c65b1c4c42235b1e1bc524bf195ffa54b5a7398103266733793bf4caff640d2d3f767956188b93465c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162eba768c60a878ffe250f374f74a14
SHA1ad8788b789b07d7a0086eb3ea309bbe018f43fec
SHA2566208ba498b8ce067af31bd85dc6c5a46f5889af8c3ff8a68e88cac23f1ba1e07
SHA512d28f51657d51d9762a613ebbfa9b67537d47913d782b5e2613c0bcd093eade449937ad2683c0ae4038dd4338f0352478e4c3f933d6d80d911e0b7de37d08684b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f0319c48d662631db630bde583ae39
SHA11c538e69bf38a8ca9bc2e6070667fd904e8e95dd
SHA256543dcd97f471ae7e0579a9147cc45d0b7d692af69a8e3fee6a18d5bd24c83a22
SHA51294d5207ef9a7e3da08645718826ec433447c36f8b53d5acc073f6ef636017e28de7cd82c01fe80647711c502cffb4668dbc988edbcd5087dccc6d7f2324b4616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54821ba46170bc275481f69a24b4c9e5a
SHA143513439cc430eaabf10998933089f83fdada87f
SHA256298403f39175ffbfc7360d470284ebd7257b5811d582e5b361152fbcb8391df1
SHA512a2795f23c69af551af5c7c7b1b7e64d952a8277fc04ce24aeb7acd7c39747699878c202e56be93ea012a33f7e2562158d2e680143e8f396dcf2966f325d432f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505417794218ae5cc1115b212cd64ef88
SHA147382f29a536eaac1320a4c602b9fc1a93a23e51
SHA256c5531165429a5988d3785931ebb148987c6e3574a5d3b6f09755aa16fec580e0
SHA512a415f8d27b155a68b799b05251232e8f31b85b875beecc7d3f190549abe3dc9122750c4ba161351324c802fb22c0420a6d912203d427f6641af7fd31c4785022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881f0ce38d811e2c46b92a674c27e23f
SHA13be7db75513dc19c17d9e942621bd7815ead0090
SHA2568ad1a94263815c34e6bfc484e77b5fe3ff1258bdfa3e871b7d82323532c344f2
SHA5124501d78c6989681b63d7a44410849ca4130e1aecb674b7bda85cbaeea4eb7c56ea6ee5828540b4c1fe6803786f67f61d61c39fe2c39ca4e05e8f6427af6b5f57
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b