Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
a3b47bfcb87900fbaebe53f67eeba100_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3b47bfcb87900fbaebe53f67eeba100_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3b47bfcb87900fbaebe53f67eeba100_JaffaCakes118.html
-
Size
2KB
-
MD5
a3b47bfcb87900fbaebe53f67eeba100
-
SHA1
26b3894d4b9c4f1d8e0a14ba08386fe130d0a6a1
-
SHA256
7355373fd644e7ef9ed338c83ad3b1458a2bf383700375673b91915490fd8a96
-
SHA512
343d9fed866d2c111a95ae15819157fc1c738d66f6fd75c7c4dd58bf8e3009215d02713f7fbcf5f212f59138e23a9ed9dc3bd5b027430d046144502f822250e8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d6c0af43bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424411972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB1EBBE1-2936-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a90e2f6f55cf7b43b1b0e6c004d2208b000000000200000000001066000000010000200000003a1ee153c6a0580ef97e522feccf3ebfdd3b8415268b04db278284b178a7acae000000000e80000000020000200000004b0484594b753dc86c7ba6b7cfbfe652a7a898ca359000ccd661bca35d8b898320000000fd456505239d5b16fd2b6c5c3a07bc7c6865f6536f81a5ee893315dd4a490d7140000000e9bf3120820606150aef17b270d3cf9bc40074dd564124480f738d42769e444f1206f05d7026dcb54eedacc4b34527b1ba44a787cfa422e59ed04c895c62964c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3b47bfcb87900fbaebe53f67eeba100_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d86adaebb8e03f5cf58c241792d53a
SHA13aaa0d52904de088c44391d59f7136dae5f25a2d
SHA25608f0b81daa04c30c150a506a77498e02017cb45545795d1e34008bc62d2a91ba
SHA5121ddbf489ceed00002f1f24f3f7d05b7ef1fd6493b6747fba4a6211b68fcc4b852edbe77ce53bc3e54109ba48ee2535389ba68934d6be80f8e829c0b849599726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14545f4faf8d895de56b121dd8fbb94
SHA17ed7bb31b27cfacf2f19629d8707a150fa6248fc
SHA2561a55ca36c338bacaf1d4c681d3e82b3183badc8047eb5c97fea060de81dff393
SHA5127ca447e01c21462898afb5ca6891296106eb26cccf822f6a12c6f2ee4ba7f74f6be8bc840bce1b4f7b4aa943aabb4c362d12e4069aa107c83c06d4635f800352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751605139d04cb6c1f0d486fbc595793
SHA1fdbe2d81f352986de44b95d8022591725906abf7
SHA256bb2f47642c17a87162744f7cbf530bbaaf9d57bd68715af7f74078b448805581
SHA51271a4373b9881b9dc83336174d2fea18ff9781ff1cf68b839b38a1b07de809a8122a3a3715395abded297326d4b948ee00e051b217dba1d3745873d4e881be6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f27e816cb81440a87be8c804d95a32
SHA1ab95967208a7112bfefa0fbc6cbbfeac2f10e36c
SHA256704b0d8cb4108c24a6ae8b2b1d724bdd7f741321e2f9af071c70ff61dfb9b4ff
SHA512d0bb11cd533ab33362bef58758c4cc723a005ee6e90476dd3901c46df19a02ea52a6ad8e9a8624f3b02600fc001656c6c6279f47e040c4c4fc8afde1fca3366b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fece3fb85270b677f3dc841f751bae76
SHA192cc889c5f145788f7469bdaeb532366a7090c0e
SHA2568478d2f9182a72d8e988754d1110e01652a2ff58aae09cafd894698b38fd7b73
SHA5126de2ed3333256d8d2714ce20b5f1ff60258fa97e82501a3cfca7e2c9ec7997cf6707bd666fee89bb6b1a7d433e3f6371cdd33fd1d9af1be308df191ca4cec018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f73a17e98e39dc4948f8bba93aa0e2b9
SHA1089124a13aeaee7db252f9feb001b1fe6c296c74
SHA25637af9a84efdf8396801c6d1da005c7b04825d13fd77dc5cc0fb9c4a87a80206c
SHA512eaddeb93e2c8df9803c82b46d39c5412d4782225e5c46804ae78d450b46489b279746c8993e1ce8fba71acd6f862a91609f0075963f1554b4ccdd9900157ec68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d00a50af1ed28a298f5ce9708caf3c
SHA1680080f74a8a38520f774ddf5e5d3eacdd7aefa7
SHA25650f761903000be80a219585498d5769a9f98ce146c9a00ff4d8fda1e15ca5f50
SHA512c6e342d3b7e17eae0acfd0992b9e1b2035522a9d3f5a469d2524f316611998b2acd314598ca5ad7df60bda0595b17e609539ed00d66de36a8f5a1c45db47a8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c2727f1d7d17561d3dd538fe3feba9
SHA19b463ca2561e40697328d0f94b4309913732ec28
SHA2569831797ad28e2f41cca674371d12991c81a3ebfd71c356ac4aa51f6960010644
SHA5127b6718b5715ec655de253c77f3212b1ef4ff0eb70aaf4fcc3e85a3c322da54bc100c486050520193f4272a9810f9614ddf66e47981b413a05e23bb2ca8396ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583945ebbb698922c0095fd2980d8243c
SHA11b7ad3a7e5dfc00ec6c244ab59213ecf35edb9a1
SHA256a0b85ad60da5082de84b9fe5a3a2870d69ffa5005117f56f1653222794672f13
SHA51272ce3e03cbfcb11df61c513b7dd07d0851410b5f5244f299e66ca3c789fcd324c6582e347217a84b690a2d5081eace659c5db907e638c8104be40c4aa7812852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52909e2911510c5663e7f50fa43660dcb
SHA10381b1bbc9ec54d84342df5395762c104dde5b9b
SHA25638ee98d538311cc611793005dfd265e29dc5b008c52f3a6848ddbf56759f5c56
SHA51214e3db46fdd0e829a3a62e51d6eddf72d1f1e3a2a7a65f8ba835e0c4ba309d8cc414c47db6950085d09a64067224f983ed3b485813e5618112dcb0a165c6ae75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b57cd15f996c438b393d22d603902d3
SHA17663737293a5d760a334786554b9edf3fdd3d371
SHA2567873ef5b7874df4c8f4e2e2e1892cc74b12860a26c3062edae252edc38022e37
SHA51298d688b7b2983133293b770d53a9ba4fc06de5cd5cec7311f121cd6bc32e76e3eb32ac141c0e8935406564f2214d0313c5d4083efde0553b58861773afe3a527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a61abb6bfe52bc56eb327c2dddc4439
SHA1e1487049350f14e3d6bc260d16cab8d70e41021d
SHA2561a115c35b85f3f37a8ec5a044dea6ad666ea6fd0d534ba7b019bcbfb1a75def3
SHA512283f94ed26ae3876b9e0f45b33e2e97932a44ddc58de3baa9c50f10927fc2542af8a9ffc244059c67f94b9e1d656404ab0aa0d989abdb97ad701cd015b6ee599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b632dfe4587c74c069c87576392a8e
SHA1ce06aad7c1cd39e45eceb737b1c541e304ed043b
SHA25648bb7fa88dd8589907f3b7f857b083e04466101253fadfed9310a5901fd038ce
SHA5128a1498d7007da2846db835e863752344bbc6c51985af37e47ea4542739e39ed1ccd243fdd2a38df91c259174efd9b4742744ee45e12df5b05dadb9500caebdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64934320e9801e2c63d6cd686267981
SHA1e01a4d3e35d9afde1afcc60ccfb82944ce10a6e8
SHA2566690a5266d2110465e72d86f509f8555c905051c794c2139864a0e75da078266
SHA5127dc840f1df4332502bc653c918a59c5adeb9f88b47e5812ca72d899e8c038e00aa9ecc94bf136690637303ca36480e0cf3e00be128e1f8f9d832336f3294b5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab4d84d4bf9710873501fa80f11d342
SHA17199ed2764cb0718b86f8643a34121ee8c2dc9c5
SHA256680d0d8a8e54ca90c400effdd3b3bc04f2881a206db4d2b1af4bc361632fbe93
SHA512cad4c62c1ab8ddb0472d7f3a6843e959b3c95bddb6376a03157d096297a1da51f6da6dc135f93a52690afa9822f829760c0c4b459015422196bd6aeaf506cf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514882cc01a283fc610a852a1b11dc40d
SHA134de2c9938c36b52d3dd3c7700c4afa322dd91f1
SHA25655e83db63f41f085b2d057944eeba879433af242c22cf7a8d4b3ca0c360e56cd
SHA51214d687ac241f38375dd81dab064c513e74229fd56ebd6cc467ff632134074acbe6b5db3771681a64f3567f98c6d40c7fc09277c5979078f029c06c1860a1bb89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c23084552418add16d5f147810c521
SHA192fc372e1caf0f6c8f3373b049de66f1f07890b2
SHA2564ab38810682c25d3dd713868e003b373e9d81f8c4940d4b370ad09494ddb1d14
SHA5126ac591c5ad0ee5e16b75e237dbcabbb2d9ecf7ff982e52bf1ac523abb01065ef992be3f4913544eef6916dc08f5b2a98d70598ac4507ac73276435d85b924398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339e76cf67753d6b19216fdb937032d9
SHA187cbcaaf7fc2662147de39d693988a37512edf41
SHA2562bf155be58a7f65ead3912430dbaa4463098bdd30b7ddfc44fcf157d9507ad1c
SHA51248890bf79f4a4cb83e57aebb628d6be273a228eba7406445c25f8cf63a1aea7cd82aa51234c10eb39b1930f5a4c45c8179161d43bced60a345e437e8cd869fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717acb1c166ccd4296d73f34ec51635d
SHA14259e01d19dddec5b026e0f275d7552e9e8b6bdc
SHA25668cce1db21ec96b04db60fc9ca8c8e26362a92deab31bba5f5447289c2ee75f1
SHA5129a042afd2d014b1ca1801ec904cebf3396d86945328cabb9b1ae5c5c8ac9a0c99f325cf5546390ef25019d289c3dfacc3502cb1f32c4cb2647eb55a6d9a1be58
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b