Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
a3a67c5d3524dc346f8fc8e3b1569f5d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a3a67c5d3524dc346f8fc8e3b1569f5d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a3a67c5d3524dc346f8fc8e3b1569f5d_JaffaCakes118.html
-
Size
890B
-
MD5
a3a67c5d3524dc346f8fc8e3b1569f5d
-
SHA1
eef8774a7d4f385ecf413cc6969b660cf190af50
-
SHA256
6f994ab410102213649fe4bc7919ea829b32991ea5d7a7f53ed255c4b9f7b2de
-
SHA512
17f34e81f4ac51ce84b4ab08e8a5fbcaff764da3be01097fbe5c858881b895bab71d2368b142b08f6761883e6871e96e25e28126e0364a2aef28621a57e2f8d6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424410612" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B07F8201-2933-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003b274350ee5106488027e5bbf74527da00000000020000000000106600000001000020000000db3b627979bf6452a0138318cbb46133bfc6f1e265a10a96972415d4690a4216000000000e800000000200002000000081527cfda991734c04f2745e012b336b35c81a781ed3a4859ad99dff1d0df11a20000000be60d74d5a513224cc5990d9441592462f712adc669967f556200af760ebe87d4000000084a8735d7f70b7749c54ac16f77f95c9169acc5fd91eab398249cd838f35bd3220eb6ce654a82b241d9fe9dcdafe5a3c838d71358c071f0882f51a2ffe1be096 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e017ec7340bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2944 2004 iexplore.exe 28 PID 2004 wrote to memory of 2944 2004 iexplore.exe 28 PID 2004 wrote to memory of 2944 2004 iexplore.exe 28 PID 2004 wrote to memory of 2944 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3a67c5d3524dc346f8fc8e3b1569f5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8ab24f52144f8a9ab43d0107a066e0
SHA174825ed056383869510c3ccad697a8b80115fa42
SHA256448612e1e0b4eba86b20333cc91af05e2c32b22e89e3b78718cecfe80e538677
SHA51213b927b1fa01003b5ded9477ce2deb436752b6aa03a1b4fdd9548a0275f041027fe56e9ae79a3be11c7d755a6296b30aeb65ee7ce122d2f9c613fb5f00887335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fba72b265e0c57f414ed297c891e166
SHA11d00778fdceaeae2e4603972e10799e6bf480dae
SHA2561437416be5f32eef116dd70e1e12b1243d8671ee84cd5bda6268b50f652557cb
SHA5123be6e43f9ae5cfe0f50bf252250067b2d891dd1a6bbc9a68cfea82ea588e411a3de4def8e328e36958bc1e8650fe0df78a40623202576526b50e89d5b85a9d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55427c086e1069b2dd7f1cfe03486041c
SHA17394bd815ad70350fe592fcb5c177d1b462455e3
SHA2568a2b9b2265c0931d944288338c1b35bba65cd5e802dd35752dfc4ff6208bc071
SHA512bc8117e662909e114eddee4ee6622413a18d4c8237e45243ad21d90080fb3e1609a91c4d1d34c60657862470be41d06c7b8fc810debd06c864908cf933d4f9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ca26b221b2857a1cfc0093fbd1fc79
SHA1e726a76b372fc3198230be71f4c9f24473053568
SHA256c72be099e9efbb6cba669640f92b687fcc2b1a5a3396dd64ee2d0e5eca26a232
SHA512b4d37961f42f3e0bd749cf7de58586d0caaaf2acbd95b2d50df6d2457be514cab6b2f08170e73c5353459b01ea24b03907114916d8cf78aa70e7fe555572f5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b771263d22d68b5825455b927c16b8
SHA1fc944977f1771b0588a94794e61401a804a69c95
SHA256ebbace9732fc71994de240157241a2ecae99a385ca2b3f8ea206d0e274b87429
SHA512dbaac8e6614aa69e6ea5caa8e684852af605116fd0d87ee54aaec48877ddf3e763e1b739c5ea79652798bf3c075320d87fcfd1def1ca6ef73c34996455d3ac9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6e66b332764270f41da4c4d335c1ae
SHA17adb68511941afa35d08f6ed7a5efe9567b30760
SHA256cdf830927fb114b30247ebf448995eeaec66cacfe848c6762a74b66942767a23
SHA51233f1e909d90b69faf63a60624fae8c6a1139ccdc47c691f57ab3cca1a4d0198d530473a0a6faa11501b1aac86d50ed4503d339df4c51e99666106ebc0d5ac8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6ca3061a8b9aa9e6aeff8f015e5252
SHA1888126dc44fc7228aa3ff50159da48f820cda79d
SHA256695e3767ee3591d02d00ab92f96e8a3cb83b6e3f2b6bb695042ddf9279f74ab5
SHA5120a04f8f4097f5230a945ef769b8c7a5ccc5620b0605c8f7e9e1fc15168723e57828791500b7b0b0c0eae9b50798015661451c6131d72547536979b0e6c0ed872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0c674e66a4460cce51327343f10924
SHA102d5ceb3db790ca05e8e1a3efc0d08ec2db5219e
SHA25638e9dcea34ecc9b3f3993bda14ab9cbd3a3c5e6b041c3bb0108c4a8c9059fa4e
SHA512d9aef9eb81f7da34baa6370df64339e9f0a8d5266866bb1af6b20e72204216c235312e0bf1efcf5b1a411295e449ea83cc3d704535b4903b4f6f7ab9cfc929b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa78994e905be849b023d54488a4a25
SHA1c6f8432a60f3533f72914048e686b00e628e77d2
SHA2560693391746d0339c576109014c367b92c442bb7368675637de56da13c2c18907
SHA512780461e6ca373f5b280a8a520f3101257c2d39acccf4d5f74bfbd6a9cf1acae5fcd2e8923aaa0d6c09b1f3ae3597d35523d505d7272d70216d51688994c3c10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe58bf04468ef806f4602fc60d2b3f3
SHA121b997dff360c7e27f6314904b3ee5e6946adc3f
SHA2567733c244fa074f3ed70923e6358ee3b10481bf699dedcb730e07ab9f4c394afe
SHA512f59449537ec900f00ebc685d372e1b4a890e2aab77aca54e2914163bbe0c38fa760b9b1200742b802c70902d7cebd8c9701fa85598c7dfba01d337b4bbb2ea6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd458bb81bdeae81c7c3683e92e4435
SHA1fa11609fcce5f6c13127e9b9cda1261e03a8c345
SHA2567da2b06ea0d69939a55ccbb05c799153b76b51ad03b4533276c9cac64ae15108
SHA512ee5a5702c809be15861d00b7e0aaa216f63b6220c387862da045341e41b50be47ffa0eedcf472257fa2b2f496e2b69a01da92632e8e10f5fb96d206871956437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227884797fef4032cf1f46b32def0f74
SHA105102d88117760d8595c74f0a17669ee59e48d5f
SHA2563b4d609580252cde1eb12a4716e954c94acb5b5e6027074e000e9fd11d3722ed
SHA5128e08d973c4b292cd0fb9ac18fa2d4686f04aa3bed9c7bcc2078042663a14244ad0b0587a9692657aa8fd05351f317b46ae12de1c0ca8d4086c62b443d116dcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770f0b4ac71f195b50236ce7d23f06b8
SHA1c4b6e9b032915cf51425580d76f002bb0afa17a9
SHA256643604855af90fa6160a5e44bc43c73cf3a104b3d18384ad0e1e4beba3253ee8
SHA512b42d4c7c9806493df7191648abb97eb13ec7b00b955690766425f1732c7143456bef7f2250a2ce28922617bb1054c8b15530afb075dc8ce69f90cf5780eb0810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201c9e84fb42fc7844f156762cd81ad4
SHA1b030d307f5de7afb4df218b6eefffbfa795c7240
SHA256808ae65b65730a574db3c2851585e2c9fcc185959b310835a5ac0948bea8d23e
SHA512daeb6509edb8f56a3be840a8db5cb45fbaae5e0412286638ff2b78b6b6452004c651c4e4873b6b126b65757bbaf0b450ec9aaffb4c6a4450bfd5880fe6331ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581d1f00e30fb8e2db1a43a7787f5458
SHA1e41a04d8f211318815616b1762c279e25f510c38
SHA25641d3e3c27b699b6cd8a67a54f434a72e529e54bbceda2c5163e1dd41b10302b7
SHA512a401f3f56e36f11bea0065dba65dc508c7f489db71851dc0ccc747259f43d67ad73e9ccc4c73d84d7a36a9a0aed4db56869afc1855d79cdcf79125f6632c4d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cebd1720f6ac7e3b2cd9e91486ffaac
SHA186355cab1bbc3d465a6203c7218f76b2d0bbcbb8
SHA2564ff1a6453678d016945f84fffa01e53b205a8c9d35538e860cc584ae0a7ae957
SHA512e2df124d8d255fc846b877d765672de6c6c1b98aa8f0d89681032c9b8aca8b533e9382e0d8d46026b7747675806a8dbd9d62e3c35dbf6b60855cd7f3be8a9470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057c774a21385ff29a606507b04d275d
SHA103b8250cf86a4fcc193d1c189b6fdaec4406a9fb
SHA256a192efa65c26cc0ee57a1bfbacbd16875ce6b8e966aa8d26eaf1a528d9b90022
SHA512e272c410fb724298b86de348af96cf4ca90b87a373016fa417c31e8b55d4c61284abac01cdea7c23d8828b1e0c9b35efaa665cb0e822f9c4155dc0ab6f1d265c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e83a535499065a5bc9225ddfc2d8bac
SHA1ad9c419925a177b38d11da42ce07a6f5116c55df
SHA25684d64328d90939122ec929b791333304551e77866df49de54fbf86b5f2fe2c8c
SHA512d5ea73552ac23e9dc96ccec8c4dafcb6f9fa274a0b54ee8e962c6762d8fbda27fcdc417967d181fa2d4f51bcb003142068812211ccdcc7ba8c71048d27d1e1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219f32730447434629884f7026ec9e0d
SHA1d21dd5cd25c5f41647099e9ad9007ce6a4b5c61f
SHA256ba8694da87e0b25f7422e82dd00fe2894c231a940b91c087a40adcd71a5eee5a
SHA512326331acc84eb729927f203d123bbed71e9d0cd7a797e021a357fe34b5293b97cdda643f5ad0bba8ad270f75456526ff22957e9c77cc29f77ed690b775fd1a0d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b