Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
a3b15937a40f5bd18cdc9fb83af66222_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3b15937a40f5bd18cdc9fb83af66222_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3b15937a40f5bd18cdc9fb83af66222_JaffaCakes118.html
-
Size
139KB
-
MD5
a3b15937a40f5bd18cdc9fb83af66222
-
SHA1
59ed54c9ca8726038f80da456299378b9f4f2f4a
-
SHA256
8bad938d8231d333b2db4c7b3c686c6ae21b6ce8db395bdb756e72830bd1d1db
-
SHA512
e1e4fead1e847260c9478f91fb15a562656eace3edd417c3b0b71030709549291a26a182f15842ee7a471e103a84bd837ee41173e9f7b965520b683bed2ae264
-
SSDEEP
3072:S3n6wIPwgyfkMY+BES09JXAnyrZalI+YQ:S3nXjsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCDFE5C1-2935-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301e301343bdda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424411600" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ef3edcf0d96da7439477104b553e3431000000000200000000001066000000010000200000001f3afddc15a1e3b6a2747e8565ec8725438dd265ddd4d44bd86713bc45847e52000000000e800000000200002000000089291f083776e1577b09fde141b8210404758fc811c3f4fbdf0b8088a996961420000000f841cb8a41c2a2f98c877ef5e0730089837a0eaa2e53b8fd43602cafc9ce1ec240000000629d3a07bc5e040e6bd4c47669bdab5f3590a9180517c59987e6473cac523ee2bda2032bb8cdf9bc96351811d311cdd76a1ad62001a2987f1091fafb966d01c3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b15937a40f5bd18cdc9fb83af66222_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc8481bd1e16f1fb500126efc01907ee
SHA11e6b980435be31f85eb278e1883e3a70270ab3c2
SHA25648486f91b5910936db9033360dfe9670c4056f1cf74737971aadb490f50bbe43
SHA51297c194ba1dafea57808aa0e109e0684431192c684650e157abc63c3a662df8b829416711a170d37096b4a3c813f1edb0419db4adc5c3885965652d3db094a02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ac719c936b10c0335e97bbbb34a7fc
SHA107a06722c541ad389e93f0411de1dd68a3625dfe
SHA256e2393c9c4615c289e3b8f9774d90684570c64da9dc9973b1eb0526303fe5e584
SHA512bc5801af7e2e8ef3f2c5dafec204a4bfa8909abbb7bf00fcdbcca879e765740a6246573c05714ff44f75acb05797c2c58ea789fe7a0a544089c896623b499124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50053d6d0978512453d1119f94b9958e4
SHA15e2ffbd85c3818bb478f3d1afcdf3dbe1d5c9ea6
SHA25610ffe83a646955a53e946403d3f9a2f0de5f4fe9b96d794c80e87b1484533c5f
SHA5129c2e611b84a98643279ce8dabc46ab35c8b5fe9b0431bd629f80c50e6c876d824a5afade8a85f0534a795618ee0de8f59a72d3a04a89c83ee5fd0e9244c87d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187f9b7fdec734178e19414192a07f5f
SHA12cbf71c911f05d2f517313b029921845ca95a492
SHA256d720cd0d31a432c433d871261c9eff4b69ea267fb99aed61b7065d32f100de37
SHA5123f6f386578523ef830b0fed8c0d8a59a4cd7f22ba4ec205459ff09fb7f460d5ae4ae72347b7aed6b28b3108a2f70232d5c5b5fc4bc83749750f8fd59517cc1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5a0431d0354ae22cb28afeb49a3446
SHA10dd342a1615c7841e6cac72ded50fbf2353a7d63
SHA2563eaa836fcd875faa6423ff3e74a94ab35f9df2622d425f8eb4b5c31555ccab6b
SHA512c84520ca2796fc9fa33f0515be0451fca8a0c765cba182da97dfcaef346650d281ab5778ec38ccd3220cf283e7afd7c2c7b735b566152b476b7d1afcf4b8a64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac5eee58652f444aea6b733976a6651
SHA18563de32b7532da40c5963f764249fcc42fed590
SHA2566e9ef5a0ddebb316e405088e65760231ebb2ba9dd0d9870a6f84df38fc20b879
SHA512962c1241a3fcd608880b216ed6183904dafaf188fc590f9a40c334fc152b52992abcb814b26d2be50f7641c94cb649529e20602ea627bf0e57c0f4dac30f40a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74b9d91cde274b170d756079bcd49dc
SHA185a44b4baa7f7938ac53853bad3fcf17b6177f4f
SHA256d371315889215bed0a502e5305223259523203be4baea5b37e1c1f6eca39b097
SHA512eb4f08964c375130e75f5380c1c2de2f4bacf67fd09aa34366ca68268048f74c710325259dc3a52534152e5f7f6f2f9f7497ee62d78aaae055a4c1b87332defd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4bfcecdfb254832a4d99f5fd29de5e
SHA18b5154661a11791be8fac29e98e71892d1a36fdd
SHA256d612c68078735d70064b37cddb5e470cfecef877b5a7dec333b2c2ac7aba9fb1
SHA5124e80cf6765c01b80711234e1c2629fff5e2bd0f5000fa3088d447341a630dd2cf3dc3e7c94be03630bedea4828d0ebff0e3e014116c82d6f7722e36a6989a0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ea7d5919ba002b6feb6f60bbd6a0c9
SHA1c916f4d2b76ce0054c7940c278a3688b0d066b7d
SHA2562b44192ba4ddfa362cd168b26c665872aa2f7eb3d738a95566ca458e0c2947e2
SHA5128f406eda30933214c161341ac39d4b894de75561c1e75e481130091da90b71f6878372c5197f9797870fde3a65f07cd85465b53f2cd4baa74ccb4d788d0a4935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a7e7a2bbb09ec557d45c8ceb275753
SHA1281c4a85fb6d067a627fde50450ae7e51e8fd5ed
SHA25653ca978e59a571aa5c9d6c7aa110a5161cdf64f6939eb8468795466fcae93703
SHA5127f4b6a6ef3be223bdf90150102a6ba3ab16123168559b88ee114952a52249eea50941dfd7f5c33b8860af88d463d50f1e769464922144260156d9d35a263e14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af5f2e3493d6fbfd9c7a541ee7c1b36
SHA18fdbc5a0373dca01728c9f849bdf104ac04f690e
SHA2566ee460e559add39789a8a2eaa8be3d334c8f70d1811d1f34a4718e9db87f1e35
SHA51268405ffa1cd69e324ebbc025c9553e464850d25de943cc54f1efa82e21fb75e9a361c94442e1923498c0ad56e33ab06021810812157b74decbc1c5c6b2874456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab88cefbbfc3d5609a05ab4b6b2b9dc6
SHA17977e27e88c78e508e55ff7c634a1fc44e5d4e49
SHA256cc04c9104a8a048c139cc4d99dfc86f94dcee3026285c40bc9f99f6354b80c95
SHA512d0d01c1c4914dbd3cffe0e4353a28bd94bc985119ca209ebc9cab4f7a4194822f1b1e340f70ab58ca33f1c4c4ad12c73461e6604bee0ea13d8882970f7d46f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8128bd0cd9bef82c921f5b84df64f47
SHA1b429f89a4d70163a8d395cf6b6cf481883599078
SHA25601b98419266867cc317140efd6869e661657d3ad24a9a2635ed1ee7d54f99491
SHA512832036363b829638d2b3e2b3b2aba7e9cdb1a73952b45118dbc1b638344a74085ddea82b193977cb851eb6a22b75218f49998d9883fe03539e50c2f1e8754608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b92865745defdc76a082b0a8b1b601
SHA15c994975c9535318411cc0f2fea2fdfb5e48c6e4
SHA256ad572ec599ae66c03367f2a7819d7462da437090eeeaef4cdcaeaed79a0e00e6
SHA51285a81c3774b03431577d3a165200503647bc4eb470cff3e01a5657a5841dd7288bc0bc54eec5e2b78f54e1ad99307f24367a11917f820a4e5cf7dd22a00fa990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e446c4ccf381d2049cc17f750d94da
SHA1d78cebc3893fcd96043fd70af3ef970bda942304
SHA25606dc528e74b5caf02d720ff6fab81d35ea38f4539c1a4ac38b2f884e3835ed03
SHA5127cb21422463a74b68aa4795a2a7d5a2e9d84db105d2c92ddda8044eb44e0e24fab3a489f176970c65ad125f17c18fea2125b442ba8c4a2235ad6dfe2e2e4da03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57637cb3743bc0a90177956489d3115c3
SHA1cc3e133a5ac35aa3603d266385c5dcc4fdcb69ab
SHA256b40b0a584891782ee8e475628c0ee0e0d90fcdfa8859d0be615a23a691f475d3
SHA512118684845ce8ba61a34b802021ceeeb98803e8253e3c3ddb41acc21eeceb0fdd42c24f4bc1cc1cc4b7a6aa565bf9dfd7721f9cbf57aa162054cbe0b12c941689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528b675c316cf0f43ddc1395d73a957e
SHA1bf9656710e5350a97aeacc1a90203d9d7aeb7782
SHA256dcd8cb0b67ff335fc0a3a2b7c1d766d6587ad73ea9ca43ad23b0949c8bca6b13
SHA51296e1187db9ebbaa0c7f7cc702a4595c106880961886497db7d15b66e6f7da66a3920613be786dbead05ce304e2e227d8c37ee59ddd90b03e03234cf24802796f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d98002eb50bc7642b94e57d10b41bd5
SHA1fb6c11682b2f07bfa7bba00a0164cccaa30b5d58
SHA256642945abe6cc06a67f3fe49cff03b718c3ae2399c3d8310077a7eadb7b710d03
SHA5126fd59dfb5d1dea13eec508d3f580870682eea31ede24b72ac988345b794eebcbd7ef813c5ec50b629379083c85e9b77c37052b0dc47b9b47a7798eebee4a5881
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b