Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
a3d693479e5a8a7f5ca695168887e2cd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3d693479e5a8a7f5ca695168887e2cd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3d693479e5a8a7f5ca695168887e2cd_JaffaCakes118.html
-
Size
15KB
-
MD5
a3d693479e5a8a7f5ca695168887e2cd
-
SHA1
53bb195ebf078147edb07ad7920bc2ff0056fc8d
-
SHA256
ac2a044bbad359187a165715103b227df9a43b1ce645f945b860f1de08ca0c8a
-
SHA512
a0dbc31237cb8247b9c8cacffb4cbdce2f186416095335ae81f2a3a2d12cfa2e2176e95d59389414d594a1538ef9035baa68adbfb312a18b19d5b7d604067187
-
SSDEEP
384:TtYn6cx1Rh8/jIBO7c0/exyiwdB5JgL/MCOg:sNPh8jIA7c02k5DUL/MCF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424415246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{790591B1-293E-11EF-AC4C-424EC277AA72} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000004b9a7276d3da601204807dcafb54a713d2b62560e1a95915ff92a924687773b1000000000e8000000002000020000000e58b9a746382dbd444186518ef08ba7cb4fc94392baadb2c22cf109d997799ee200000001695692f716775f2c3ddef857bef08fe234e7853a31d07162a2a30d45769798b40000000a33800145d3f41ed325182c0c479ec62d2984d9c45def1ebf6ea6d441b5b891b91282b0883db886648c01cd60ed6432eb0e1ade9ffbc436e16008166fd762a40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30111e524bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001c8cfa0c15d43604a7734762a2748f06d1254e57f1f066e0157919a5b9edd9cb000000000e80000000020000200000008b6ccdf73624566a21b9008e75ccf1a0d20636dada9d713c3c79477a6025051e9000000082c69a96a66b92c5d8f1733102922947ea6cb71e2d54f7371af1894c75c1291154e9d1d2bfae999a1ffc060a5a9a2c5d8591e681320358e35049a721b324d044a850ade11a86636e54cc0ce9c9775ffa51961debefc133eb3967ff6a9225f773799376e1d83843115338b2242da07a5ede50c729e5b1e2a71bb7d918803ebcbe3485d1bc0a8cdc244a85e73b9d895c8c40000000363f497171040f1104a7a00ec2dbaecdb0493331f780068094907a8a20256966c0d9180aee1aa4d02ab334ee4e59a0960adda47a9cbb0d7324482faa747dd5c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2304 2436 iexplore.exe 28 PID 2436 wrote to memory of 2304 2436 iexplore.exe 28 PID 2436 wrote to memory of 2304 2436 iexplore.exe 28 PID 2436 wrote to memory of 2304 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3d693479e5a8a7f5ca695168887e2cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d36f73b6eed049c8eccaf3c6cb85862
SHA1ed2f1e87645c1c6493e24be4b134cf882a98f89b
SHA25668c93c70e1367564d1b17095afd02dd0f025a876745525c37be8825bc77f07c5
SHA512a5e309a32b471bce6ab416bb59cdb734cc08249c7c404bca3c5c7d6609e14123624bc4b6efb99ecd51a09fc036df971a7f82f07d24a3079adad5924b790b4318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053d0f9bdb9b2f57cc5bcc5159985cc6
SHA17abec9817394ff60fa3c6102e2790bec58a0306e
SHA2561a72f3971b4c96d52f8b558743c9bb396ef608c15552624b64cf8c5f0234c12e
SHA512ef45adc0b88b0c2fab229014a563c8b99190508b937aad25f3cbd58bbca3545d143aee446a0c698fbbc22c6597b984879d85225cc06867da5cf67388283b8b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797b8cea8fe969f4f2b743fe58f43129
SHA103cf39b8e6942e4ca7970a76cffe678f41df6494
SHA256272ceac7807d87f1544394a5348208e1bc39aad77ae1d14bd94ef8387a22d400
SHA5123d2a9fa255c4b5b2b3c5a1725d01255068105f1fb261a0081aa1eb7d4be9b4a2484eb5411ee37a31ffd4451bd5c877c30bdf1aa5ee2305bdbdb527a7be765a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d053d5f34f1bd2909eb12c730c5743
SHA1079194308d7cf4d246c6714e50705a3b19d40bd3
SHA256d72d0e7bdf80e1f0cff36f9ba4f110a9873ff928f36f45a4aaac3df37fe2ce94
SHA512a139a1aa3e472bd3e47ebbdc5f69ebe68d37abd51a8b8e2eb325e866b02ff90bcd33a2180a85aed47856a3627e6ad0a2dcac12a7682532ecafac02cbd59b0124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16dd9eff5e68a7ab12752e1f7dd6d40
SHA1fafdf6c6dc3fec5b8d498636c5eb8ad9a52bb1c6
SHA256221858e4dc98f430a56c4301bdb96f66efa8abe9ceb77196fa40ecbdb1acdc8c
SHA51201860c2a814ea28907a357027fc3a39b9e87a5427291cfc032a2cfb5f2f681788589f4c4d14029bcb7af0cdc98ae5aec310215dfd8df4c418b72c9d41345a01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01fef8ec32f2f2cbf127236c4f062a7
SHA1e7f76eeb1cd726d3ec0e3d03d335159fceb0db44
SHA256c65e7d96093b0c1409dda8ea692de579e200f83df9857602b30f3477b35aa3d8
SHA512baac36ee84bc52eb86793d63838ef2473f34814b728fa64b66aed85d57d190355fc64907b6028da9be377155a5654c25dae993ca97d3888d91ecc8718d3cb182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b7509dfe0a38e22cca6321b2bcb138
SHA182ebd3e42f3bff1365a48796c00987760611cd35
SHA25615896ce645649e24f0f6fbb1ffa65c40b96f26006d5d7429ef2f9ffd191e739b
SHA512eeddbb928a1366788d6eceff2220b3a8370486e1585ff18b70a284a5a7607545c602b5678dec98f2abb1b6476f73807a89c59868de8854b17faeed1f23853d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f8c71218ec42ab656cb9dad13af55b
SHA1375751fd81780b3ea26aa759c5695f177e3a5396
SHA2569476fca58dd391386c9813f45cde8974cf2afed8dbc33bdaed15c05dbb08f848
SHA51239dcff9abc3c26769c8ebad2ac5d763ea610360b1a0846da2cbf028fa9de540d1fbce280f77fb7e48fabc9cdb1a29eca62e66d82366a927856725f0d22efb07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57627ae0eef25677ed4d042169b675c3f
SHA1a6a518f6f79d4d6fd412cc04e784b7d68d091bb5
SHA256540a4b9ea0a6ccad4a8df07e75236511eb8b6851a241f9f4506464bc1dbed947
SHA512c0980374ecd9d85b9e87bfd67d9da9e4d11f8f20dd112da3de598c28c08bbcccfa8425897e99cf5ff255d42ff26415eb52bdc31d2f154a13144f26b58604bab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e4110d299c30c00c9f109f0acdaf8d
SHA1b73cd687dfd99bb604de427f1863cb0593829bc9
SHA256e0e97da026ac9fbf2aaad55b47be4809d69ad00a7f229729a8a0b3d90f3ed906
SHA512de41dab50f19070bef87a72a2adc83be8a96d02ce7a2c32e06fdf032a5c9560a797b7e96a699dcb23516c08e0c8322f76a3dd1a6794bc2805e0aece5999ca6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f8a17797d01024ea25ca34130cf8ec
SHA10240a3d0a6160be906c11b8169b674b1dd599612
SHA256402fccc983ecddbf52df512c0f58c8dbed580cccabc365f293ba10b9035a0e0a
SHA51201d57ace1587b9d05815923975f60ecfc8f7544ce10b849888a7c28f88d2bae3f2f9f1476442f43f1c8f95f473c7019c29eac4abdfe4f325f786bdba668d93c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e533383a794b3593bd4506a72660cddd
SHA1b1a9e8dcab019d829de9f7f5feb0e966c87fde68
SHA256bd067503eef3245cccf96e355c6260df94acde91a998822f62c22457a576732c
SHA5121b91758ee520bb013ce1ee3c94c95e0f4138667e8bdd92ab477d3718caf11d79194d6528f28f4c9dbb0e763dc29d06c54aa487a4a2d7660b833d519b61ff1438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac4fb94dec309375313b7b490b43528
SHA1f402a5d54b73db8ddeac60ffd156974016f89d96
SHA2565fd92e6087f410fe0f711df4bba167ba2e8508d6a1f2bfa1abbb4a8f103e13cc
SHA5125debb05f6476c538410d4ba602dc9c5e680e336c2485dd9e2c492dbe66a28f634690df0737b0bad6249e700597790fffb9fab1d1bc34363981bb883b86f41eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279cc5488a9b5f695fae56137ab002c0
SHA19bed4946ada4b6d417976854126200d29f5f9a4d
SHA256622aacc3754df06ad53e242e7eb8e56a65c4c18f4457f441b87b3bbd72364415
SHA5126608a4399aa7f8053bee97f87ae8965f13afdc66a49ac82562883bb67cd5b41a96b17fbc1bb352884beb7e786deff2464cff18d9f766424d541c6901ad4ac4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562add5dc4ae542f8faed34772e8327ba
SHA107e4d995613d821b8f99d5c06db1c3a7f59d8252
SHA2562fb0875fd8147555a88bf864adf830ff55d49b740b0d3a82e5c7f10b3c867232
SHA512d61b5a559ac00ad6dba2be25ab7d3a3590a67f3f3c9b897f3509e505e197d64d7d7e04bbaecd678d6cb28d635a7037b3f4936cc943a6b61bcd0147bc26cdc4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d9ae0a177836bef0ee0d5b96fef179
SHA149c466028304c6c160d557bfbe635536535d44b8
SHA256077d3f3c8969ccfcd219002468cd4edf8d33ce4f2b4b4662ac332d0bc939475b
SHA512faeded5eb94ac0a144f54e52509be8f9bdf0f413d9388336f32ffa921c57089c130aebd5df26ea9a53c15c9f52dc6eee4d0ace1b1d35797fcf28f5881da04e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c50923e0fe0aa6c4fc6562f5006d6a
SHA1e230299aeb8bf2ffa787b3770698641254f90bef
SHA256925e1e5f8c81e16499d6adfa8c757ee0056f98d83c7bb88a2fe5d966d4a9f790
SHA512c0ca4eea48e5045c246c7acab3852955bd7450afc9535d08fcf44180677e2b278bcea5355421d4d033d9df926f49b729e925370ce4d17a1db7607583d24aa206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fcf0ed73d81599733d0bc0c77584ac
SHA1afc161af13659a9262ca34379af951f87f499c54
SHA2568851878ec68ddc3abfe6e259137e51f6adb8aecf93ee4357e7883a58175b24d0
SHA5125e6a1e8c15f6956b9dd8ea12b549f2043f01dbbcd29d5490f505ecfba8f4b900288afe2c8207f4cb894e12ca22335ac3e8bb90b7a351d9a278626bacc00d33f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b