Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
64db5782c95eff7d193987683c5838fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64db5782c95eff7d193987683c5838fb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64db5782c95eff7d193987683c5838fb_JaffaCakes118.html
-
Size
16KB
-
MD5
64db5782c95eff7d193987683c5838fb
-
SHA1
a83a8b8ea69c1ae01592d1d72228cc8774dbc02f
-
SHA256
00602d6b6d2702dbb5537db56b45227b0e83df2bf601b5fbc32d166a2097b1b5
-
SHA512
c73ef2ee8fc6c7cac3f6699eb270197d0721b54cda2457f7e50295e9b2df66a3ee8aee19f1f1efa821cc1808de0c93b91c04ca4c5d2aeebd8c0b9678cd20a004
-
SSDEEP
384:bLpUeieBnr2CShx39v5ZusSKNtEZvOqqxMFhVkZG:bLpUknr2/hLv2sbtEZBqxMDV0G
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422489528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0B382E1-17BA-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300468a5c7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000090653a7fd789a44da7e27215eb243e19000000000200000000001066000000010000200000001df3a60448cbd98ff6b916850268db82ec205e7535bbb89e97f2bf68aec8a7e3000000000e8000000002000020000000a826e8049c16a6225435e490b33b176f5e49d8056f6f07957f51474b5c580b8a20000000f18965646715d05e9fcbb4113eb22332b7de1e312f438d4b4df4c4cfb83f3aed400000000e9e1a90910f5387629b6d2bd5d20ef1bcd8b0fae36cc6a8971940e05b33e16422d543f519fdc60ff9803eae3b59321c717bfc316e4a1d09efa0b7f981529c39 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28 PID 1032 wrote to memory of 1664 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64db5782c95eff7d193987683c5838fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7a20f4eee16844a78cdb113c0b706c
SHA106fbef4f6a57e783fc648f555d283732a5a0e1fc
SHA256a76b8f093a9ebbdd275fc01b67ef0b5438511e39d7c1f1ff4631bffb47c530ee
SHA51289bface2ffccc6f439cf8a09b0e1806406accac23f157c1e50c41c98418926b033e79863f582f3f51673111619cbcbeb0c972757b906feef4a48a9a63944d14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2076160b35b1bb3ba25d92e4ce26395
SHA1deb24b5c262c46e20211f199359bd0e7350c221d
SHA256767ca57f91f2e4936da9d13d4bd041d4de6ed371e314cb58caeaf3dc442cddfd
SHA5126541fe0122931ad8981154dfe11171b002689e4763242e9d61fa8b28ec003d5d36d9cf45f67b7d56aa4d92de403eab665ffc5530ca0ec4bc9b11c0d6877a6df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580445562d5fef93323dfd3a9164bdacd
SHA13ee10bc0cba85c0a306a89117185dcc69df51c83
SHA25630acb5fcdba3d5ad84726e3c6a757618d86cb2fbc6eb38485de16b35b7282722
SHA5128421638042ebb63ede413c5501f7a721131b6c7926f9d39abf2e7b877b6dee0b44eb13545723509dcb412f8f99727e6d1bb85d5e8b55a0944ea7171c31cd77b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f46551e94f8a1b87ea6bbf97e8f180d8
SHA12a3203d8732e9cb25f27d7ead482347cd0d74631
SHA2562aad76cdf7faec094f01d9b9255d57df3f94bcdb94df2a48fa759742a41d2e4a
SHA512cbb131926d35aa898b3190109634f9de77145fbf645ba62b038f3abfe2d50c3dfc6cd5d2506342238687718c05d6835ce47d432e5cb82fe85e8034386fdf8a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab221dc4ab6b0258147701bbb4cc5d5d
SHA1ae65212fb8599551c53faa5d80836174786a5fbc
SHA256bf73a970c4d1993441eb69089403d96c137d44aa05f42f1cadf3372197b199ef
SHA51252af65c93b9c44637d6c50d08246164912cf360a19dde7498335b90886bcba98e1317110d5e659f05d132ead41543f12f02a25d7a4eb77b8295514ba3b2da74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775d4717556f7f4e043402c94d5d970e
SHA1a6aeb33894e51f06ca26dafb1059fde59bd546cc
SHA2560cfdba17697053a5f671b97c80b882a01598470f70b896189a2a3e65205ae421
SHA512512e6e767220480d85d21c1aa420e160e95266c6b74a138757f2b743d57b1a6629b708b64e565ac37dcf258a5edfa7539cd3abea6605add046684b22357a6716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff064d6dd302b5ec272e2ce845b5fd3d
SHA1f8a7bd858b33fa71f0ccda127b70287ab458c43e
SHA256278c474b799d4555dc925bcdaa07e9c9614e556e19326be9b8d5783a5eb86d03
SHA512f685c3c779eba85f95f653abd7ba5c6dc581232370426a2ee79d1d1c0b6f2ec0c4222aa22bbd70e75020d374dc6de3cbdbfc532bd95ad70a023c314c09926952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8214d5ab71fbe4e290c8d8602d2224e
SHA129add1b45f187a4c0132af46d579726fb1a2b493
SHA2565b4067ec0f1bc8fd7a83044417d90bf1959aeda64d5ccc68afd416cd4197a18d
SHA51269d59e5e65f83299d1f35f06846509ba5613b8452c4ee4ac2372ee79fa5294f65ab54560df9002faa91fc913b1e1b55254c9d6b6230a42b909ac1bcecc6669b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aad1eb0950c5e1f1f20ef95ca626fd6e
SHA1917c76d98d99b183baf77a4bb491fd38e417a614
SHA25627060e7455c4a155eaa0430362f6e3e1993c4fbb1cbc3c2847294745a0207fb9
SHA512ff102f419ab9687c21473b5ead3f3661ff3772cb48f9a6889898153fbca516c46b96b59185ab3ed65364df42fe55a3322c986de23c0d8b201caaae8bf2a25e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d314a295237904398a6f90c658ce24
SHA1d98fe6ce543f026e9e6f5e130ad87e2ad85f580e
SHA256f640e6408c6ab2878aa046a32689504553749bbc8fa1a2cbfff9ef0569590913
SHA5120ff2c45aed28032743e5bf99e7b2ce380ae036c90ef85c2b9522326c5428098027474fc5457b7d5ca224859e20cbdaa370a893497af54ea67640e442a6d7f5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf460ba860938c8a3e7b1d0b122176c5
SHA153a92b92f25e17a05802d68baf21e235921495d2
SHA256c017281379a0ea705048e79769b0ba1595c29e58e6fe1604976e81b4a398b3d5
SHA512dbdec7620c93583d6a15c3463f52758e5edcfe8167972f89dac2bf659e0be05727bf337623c949ea682edf2f1a4c5e7703a092b90b2b3c9c58dc74dd7d051839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53facaecd0e4a6799407defa914c79df9
SHA12fc3b8a556a0101bc4563af94a066d09dccbbab4
SHA2565e2871a14c2b1f2c21a26fef8b738b3ecd365d767a125b67fa089ddab9b784a1
SHA512999636a4ebbb844a1845bf041bfbafcfcd71dd7e0904a694d6ed592c84e80add547eca3a89dacb9c0fd77eef26719ebd1323f594ba6732f152864818ff88ed16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1dc3d7bd82f46b9c78a86f00588d0d
SHA1888b85fecdc0d507493d231ef7ef93f08bdfa91e
SHA25689f18a63f4c144a0cf9c0c16199432de9ad37d6011283da339b6d9e67a5e148b
SHA5120576173edc1af1eabdbabc02ba72c465c69a5890520edc147270e66a91d2157797292ac3dc3f5a813f809a46ead18a74d7ff2a9fb52ef80fa4eb14f2293e3fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bfdc171df341a03f4279349bab23e3e
SHA1117d048f5eff54238a2af7ae52a41a55eb74b381
SHA2567193ed744c333725cee2019afad6343e39e4fb427531cb6e6ebad3d18bb7152f
SHA5125834a57c0e73261099eafebba759234a343378279e2b04db88c2a8a39f077a08839cc8082cc0c41a9edc6ec7a776f28cfce0894035650bba740116d1cc13f2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a3dbbe74f8e69c5e05eff0e1a2bdab
SHA1bfb9eb440cbc1507c3190fc4afb4213169b54112
SHA256dcf57a3f719010d91f42cb6689adad1ddf186908f0d8186fbf245e83468eefaf
SHA512bab6edea96ec3d8e675a999740f8a918ebcc1a6961024034d12da3007c1faf2038319dd28645958adf069e43a0ce505beee9a81ce6008bdcff8931abe5f7376a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563cd8c1ce8830ce221b881e77a781864
SHA1710ee5b4860c77e8b15e6e638e3e9b904210d656
SHA2562966ad61d9abcbaa41f042ce9f56e945dec269ac189da0bc56a32b89851e65ce
SHA512c2259fd8e624f8015ecb764d2f659e1ecb3eebeffb4a1c8de21f9fb79af402a2a6b84f2c189c937a5aa1fa6e4b587b8d9d251d6c67d64d62454d05af54c81b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b233d8e4348219f1dd27166ea65127b
SHA102a892d0e97ad43b7b9386b4eb099d57d19bc01e
SHA256de8fba4950ec08f51f44984b35e0082e101e64e80379b4f3b6fd3f2a5c6593ef
SHA51265ab8905f40a706406f8edfeb3f41ad3419799491b8f60503c8b3fdbb6e000196c657d61b77042143e8842c0f4053d1bdc795e7ccdf5c75e5ca7fdec52d45270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca11e1109475108d5d3a038ca6453b7d
SHA14cccfcf2006c039d8679812eb90c6b8170d5906b
SHA256edf9d75c97cedf7c43de8571e795602688afd539f7d5faf02b3f567a773e0a54
SHA5120b1bde2967f54072cc13b607ddf4a365ad2768e7dcf3907e5a5c14b668f7d9e5367e5e8b14cfca7bd34a4ce3158ce71ee806f0818a25fd7d8a780efeb1abcf68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a