Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
612dd4f0f1374ec96e9b46aa993891a9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
612dd4f0f1374ec96e9b46aa993891a9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
612dd4f0f1374ec96e9b46aa993891a9_JaffaCakes118.html
-
Size
13KB
-
MD5
612dd4f0f1374ec96e9b46aa993891a9
-
SHA1
022bb63c7a2255901f8ddc5ce2e2cbedf8f8dc9b
-
SHA256
1a04fab539ca3c7ffaf019c6a3d6f42051c878cb1affc772af6598444dea6624
-
SHA512
38e57809734c6593d4887238fca2e3a1ef4d945e620163dc663c56ce817456cfe7190e7bd48b64b6cf00c80bfe22ed524b95b8ac34a4a0bbc8853359f9059c55
-
SSDEEP
384:ngic84xeD+lSec9kDY2eeeQa/hehyLEuUMzC:ngicSD7eOwY2eeeQUehyLEhMzC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e3cb5407abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a2a8e6870a70a03628223e8bec7107f56309c1b8c40e5054a6e1d195957ea5e3000000000e800000000200002000000025dc58bc9b67fb899bbc522fb729d16b85388a79a84adc762030d8c66b382af5200000002d129a459aa0bc9f615267cc9c84889b364709f0b792c7f89f4f191365fa586c400000004caa0fc60d06d06de195cea9c99cb9327e62cb46331ca9571590142bee0f29598a7f8014c90ca80cab508bf3862ac27150db318450214a21bf7e7854eea3514a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D639501-16FA-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1952 iexplore.exe 1952 iexplore.exe 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1952 wrote to memory of 1260 1952 iexplore.exe IEXPLORE.EXE PID 1952 wrote to memory of 1260 1952 iexplore.exe IEXPLORE.EXE PID 1952 wrote to memory of 1260 1952 iexplore.exe IEXPLORE.EXE PID 1952 wrote to memory of 1260 1952 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\612dd4f0f1374ec96e9b46aa993891a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5255d303ed7d552e414953634984aa56d
SHA1976fb3744287e0cbb22c06351d7e7f3edc839781
SHA256e4bc4a8a1b8e4514a04d45ce7b213848f639d5f066d1753cf8b418cbad13ce89
SHA512b5bcfd43ff87f4c701da21b6bc313ee9bb2db5f0768d85a1e982e97d97c73563f6286acc2127bdccf174d7188475072fe5d0622b578ef74f5edc50349ea932bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754eddeeee2e47f75d19813bcbc449f3
SHA17b8b7fa47893e95606b957791c6f75273d30eb24
SHA256c7d2effbe917d3a7ad50110715b8c344c5529652ae3314e7b850d537eceb2685
SHA512a8bfae1d9d27ffa72ec4197e515f34177ec20f661e6c4c8de6cd38fef39afd1f1b647cefbea5e934148e9435fff17d336896b36dd1c375f8523191731aeb095d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45b000e2799ee8636b9b6c2a675540b
SHA1ab45da9a894221c7ce68a4eb748ffb2476c21f3d
SHA2563cb760d4e4ab2b290020b6231ffcad57371c9608ef3aa1a2aecfacd7af100127
SHA5126b8a12de33897d6ee77d4a73821e98e25bdbaa8c84a691468a16ff999d1e5078f821d69d0076af38980aade689c3f431934f54d8f6ac1a216b46d515b459a39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad904070500eae136f2f8a3b7bd3254
SHA115a71865c517c4005f34a87999039150b1a1684c
SHA25640f308a50a666fbc56756d3fe5cd960da2aedc2b9c9826ba54275824a3b94031
SHA5121ff31ba8ef3aeff1890e81a2d93d4b015ebf841d76f0163af389d97da3fb2f62c24df475bb2d887411a0e6cab6ce4223234e5f88d3c7f9ebcf888b43170b5e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54691d8708e7f56bd6f7a1742aeb23aa9
SHA1673eeb81ded6ca2375adb60b2102ceec09280205
SHA256aef2b51dd0528e8a8e7ae1f6e664ef896122c87aabf66ec663967c7d004daf68
SHA5128d023d64d1e1f23cb0cf58a69267d0cf3496b73b7317528a70898835efb640f901e00e6d3652d976da9c54885a4b581023286897e8b5e9e80d75e1d082fb0f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fcf8735ee41f1047205660455b0b070
SHA1765168b82524e78942d75ec267b3f1b0f2c2f333
SHA256a60b2459c4f0ccf3f41c54acacf4dd4cf3e1678f5b68b01e463045fd6c0b22bc
SHA512c9540331802a790cdc11fe3ac27257c609931a1b4ec0787b135658dfa0391c9eba56a5c6bc0c9f216f820ceaf7ec81905e21ee8bd01b995470b23d49b56d1af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee7aa22552c299f6f2f7b3d92b39df5
SHA10f5a6781d66629af083559bca7c37ee03101d93d
SHA2564f6a3642b6745cfa9dc61a6fa2770923bdb8e0e71b0580e3c4e6059877ec7435
SHA512d5f30f37fed4edaf68c527fb434bd9a7481b2897186b164dcaa3ffe0d450c4a9c1143bd2cbc5ad2da85c005ccf27b968e3b7dbab70f85a2d546ec8bd865866ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5326287ed8b725eea5529e589366bf9fd
SHA12060e877073679b9e35bb591cfb76eb3a6f0d038
SHA2566eeddf947a126b003baf71cb63523c5b8c14c5d4d55e2d1aa40f5e11a273c945
SHA512af6f3113baf7351cb5aa27eaa823488a7d0253c520cdc63cf2f5df679dfc0645154bc5ed4845e38dabf325023621a87a91161a013f7b2019cab1d2fb1b1ebb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54013591714eb28dcc472a38372cd1635
SHA1712e433318fe1a7cc42e0e983069aeb1fa140f79
SHA256e304cc2866cfd07f289647ad285417becea18b123134300e4e51ddb399acd12f
SHA512bfc766b3659eb241b572f313920eee149f414d477391a634aebf7cbee14598702901690ac5bfc420aeae63fa35bb4ec84179fe14b04a1ec6aa01001d8341de38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a49988bb01ff8a7292ec49d32fb6cd
SHA14fa6c4b229c0a9f64e75808dd50318f0a2b71697
SHA2567d8b8069be3a6060c802503c44dcdaf90f32800c6c2f6a3baa86f0aeb79712cc
SHA512dadc64d59307598c2f3690600d68f83c459b1bc3de0871b8f420b3368b94a34bd239a3796bbcef0c41cd877773393bc014a678f63d34f52c2259ae06dbbf365f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a0075b0baea4968feeffecc65b5edc6
SHA19ee069158cf50ebfb5b5feb940e7767db4bbeaf6
SHA256a850958634a4ba27b3ec86e3d56a90df81bbdda69e1729f0cdb2b10006ad0f5b
SHA5128bd17f73805f06d3c948a99b2b21c072455e83656049655053d39f65582b14384b6f0406d2452925ae5e1f1bc6dbdff2729a64f3ffc1d770ea3a60624f0468d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e0529b04779c1c5f598d724d17f8d85
SHA1d7b6ceb20082ca5e5f130c1d18856c299f51f13f
SHA25659fb3dc5e98c468e150d3a3c11b70e68383553b7805ff42f781019f5354c804d
SHA5123664703d6aa6aa907cf90709c3ef9c29f6d2658cbb2970116b20e246ba7bd41f6372ff0723fbfd441ad649bd598adf143aab6fe569b17e49db4790d209642d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8e84c120e577d092052c99ea54f19e
SHA193ba15ff0a3b35ebc8cb45223bc3a8cbd1b7c364
SHA25687f96347dc96da170bd0da71cf8c48ffd9ccaeb74c44a228b2f3e4a029492375
SHA51268838d1630fe1acd6888989563fa78648470af33152b5bf3089b905d01b79fd39b3ef11ddd1460ca7465ecdbafeb4808a96bfee713dacaeb142cac009e0a2cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a435bf3174d00c7b6a0c56791d2ca0a5
SHA1ec98f240c272069c9cafd1dd34fdae8b8371921d
SHA25624b38edeba5727fc4ae927c2826861f114aaf82b68018abe5436cf7ba01101a8
SHA512ba7420ff4242861bec8b52491fb9b70e70d98c6785ef2bd529f51f903f1e4ed5e4935f8565e9b26b614c3fed957b2576aee15f9b7da0eb34af29d76794caf9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5060a57a353dd8f17342b3e0d83bdfcac
SHA14d8b6498d69326b9e24148d65c39f99e52a5bab2
SHA256bd03ce370c59c7e9f8a4cbb50eb4ab90b4467b0e50fc3e6148ff42764dc15c07
SHA512d25428d337155df237f927de9e1e8217e5b17cea38ea8b74182a611b67729dec41055f932614019de58201a1fe0f2fe897e37115537603e4df0cc818551932b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af3db92d33f6c87801f1050802accd0
SHA10d243a4c0d1e23b2691883749d93a141d26c8f39
SHA256a6a70db9eddcd81a684b41e826cf3125e9ad9f877c8c15cb9e0ddc0662f386d1
SHA512a725fc6cdbc6c6f449e556ce01b94dd700dc968884ba0d8dd2ecea71dccf96309c5c4fe776ef9ed636e476ebc38ebe384841c1aac59377850a460ac8c8edbe8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553466258f23c53539b55c7f0f7255715
SHA1588b4e684b13868019a51d7bea34a8206c966d2b
SHA2560fc4b62f5ab60ba9e8943d8d1eaf198048393103bc434968ec045bce1cd07b02
SHA512135197f10b7b25f2b26832674c3a906aee12293bba002bd6d40abd977b560dd48f75aeaccb200ac7399e12304dfa2c4d67d08c2772c717faeedc3270c4bd3d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91ac625e069bc30797dffd0bf1e30ab
SHA14bcf68c406d51c7c0734493de7f901c73dc29fa8
SHA256f42298ec72992f2cceb6860556303415721fc5ee77e23363842fee6128497a42
SHA51221fd8988649fc5f09c2d27e54b2461b551d932b0001e94f8208e7deb233afe1c5d6bd10e776361b6b120f15da4cbddce63b914b281eb406c20331f3d6dbfbe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f490efea227a4f7ec458d229f15aa80
SHA1e4c7172dd227ae9809d0eabac883fb520a7d9d8e
SHA256acbd1c28a23fcd864f35146e153c03b7d2f0d8bfb0bddc0a2080387eb1871a68
SHA51278e99ed5b596011ec3162ba7703b1069d11672153f996dfd1ee7f952cb83ee1146fea23adfded090eecd1747e0e30c6f863e53c1c1dc37a0728b783dfe07b82d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a