Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
638735f2ecde0cbea674441a88a0f0fa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
638735f2ecde0cbea674441a88a0f0fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
638735f2ecde0cbea674441a88a0f0fa_JaffaCakes118.html
-
Size
44KB
-
MD5
638735f2ecde0cbea674441a88a0f0fa
-
SHA1
93134d4e9da82919d9cd8d679e8b85a6017a683d
-
SHA256
2a841ffa825d24ad30cf01c96e9efe51a5765620803ae25611ae8cddc3f19800
-
SHA512
383a19910e678c8b1f55aa8bea7158c5da6aadc76b3fbad45eb81e007490e6c24c83e72b2e2201872af25c7a73783dff6a75e92828e2ccb4862a71d62a113189
-
SSDEEP
768:sTB0r2GM/8eLYBkPE0OpDYBRo/P8PbeqzY1ez4kKV:3eg0OpDYDo/OeqcezpKV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9206FB1-1779-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c2a2bbd0af9a471024b86c9100801d560ba6d73f963f7cfdecb375fd4ff35759000000000e80000000020000200000008480f527a2704f9e71a622776fc49d8161b355ce9732ece3a22e81dc8fe462da90000000c0d597fb7b7761e118aeb61b6fffd140133c06af746507e234992dc523f98cd08db8ff4dfdff50927a2c2d7d9bad2879fcee0d6c4505aa1ed12391ab68e342a663da45a3ead5826dabbc49d5969014e68392cf585218340f161fbbc88ba2795c64bb833bf21e5ee1c7f9eba33f0d703033c56648cec55d4c0256a1c3b5bf298ca36a039a541230dcbbe71f09e44c4a9040000000c15a23c0cdacd8e78a21e25ef26e9daabb7fdeccca679fd4a7fcdf781733cde93473861d517809a69744077029bfb520b3cff7d8067755a794bbe486b2ac5525 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000020eb9f142d243c4589414e6910fc77816679fb61626ed877c4c1afea20e89581000000000e800000000200002000000042183d73370e256973363df435e027d3e0b869c7cc1e45e2f8a4ddf66eabc56720000000453335604f8aa5c0a3070ea4467f50b4411e118aaeab2f02876a22e4466a2e12400000005ba5c022c39c6fd6fac5bf9f7e1236725d7fd2ec3c53c3ff924eee972654bf40b189aa1dfc2334e6a3da85e334486a80eee416c293d63eae2b80f5ab9521a3f9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d9afb186abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422461626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2192 iexplore.exe 2192 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2192 wrote to memory of 1672 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 1672 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 1672 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 1672 2192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\638735f2ecde0cbea674441a88a0f0fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
503B
MD59cd0f51b684baf3aac814eb80f31e832
SHA1d748cca9e49efd7f0feae74d704dc6b8f647ba85
SHA2565bdfc0d024e7e63aca53eef32e09e4edf3578b1375dcdcf22f9d3d1e51e78e89
SHA5124ffa40b4f89a07ccb2012d331b408216ebf31240b0cb4265710651062ee00244ae84bda0ee1aa1ec33ff3f4995bbfaaea1db148cc67c8a3914fb00a25423df7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fe71f38982df76d90f0c98ae607ee4c2
SHA1fc012e9d04480f5e87403a6fea61f872fcf6927f
SHA2565dfa81a14e91bbc8aa3266f777092bdf4f332a4e83e2532c783f5d8092e23575
SHA5129bfa6631c75d19d4e4770773bacd49ea3baf00ef87390e8006d0a8086503b25330ebcf75bef5425c1072aa7dc30583d4bc2274104a7f5057fbd0245f733b427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594756d616b9cebf1ee932a3818e5af2d
SHA1915c700c7ac97cbdcfd5e2f493c85362eea40334
SHA25640814e0be9490df4b4325c40798d43883224ebec0c8df90ec7509db63d0d8e7c
SHA512ea7337b61abf950ce8ea765a84851d078528a57420ac72b52f5b09e2b57ba37dd84cae76769c6b1ce067f70e7372c39c3c707fb32d8c96d2b6a1f027ce94ea79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cc7193267be455f496b73267edfe93c
SHA11d532f60e682ffa833b64f7fca2ab13d2cb766a9
SHA256854300f79ec3da10f4d0d3d490eb8387ff56b17f813b6a3aadbcb76ba42d2a47
SHA512903dcf43bc55272bbbde55731bd77a64efbdc469e0381338c034f5940505040fb538488c4a2fb989a7af56d9ce1ed1e8afe6a3fc8b19668546dfd37545cb24b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288acde44ba9fac19c8c078ce1be20fe
SHA1b250949f3389ab7b8d5161d8eff3b6bc6bf71f02
SHA256fc6c666c6a7b457b8169f65d55125a8cad6995a12ba4c493febdf92d7a301ac6
SHA5125af618da5e0fb58cca3702393bfd9f5f5e490604a432674bd5fa5ab5655031dd83314e3108678679339e21e0e154893cecc42c83cfb82cbddb77073a14f372cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6ab28f5ef6b20d13c6310e3365b0c5
SHA16a60c587f7b44fcd2696b53ebab3dcf4232c3154
SHA2561ae8651b43da91d6b6ae177b4749394d779136c5d9ccddf930c2bf3ef3cafe23
SHA5122799889299e87dd17dfbbfe1918a48762dd6e19108d1923d9fac23406d17dd66faefadd4289f6da3267076c91a52c2679c179ca69ed78c705673b1c98a0f1930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba9df8367a9f5ea14c5d1e6b49604e6e
SHA1bdb334a20307bc793843723126285ed1bfcd5a4e
SHA2564bdddbbdc87bd731bebe216a0c3a14c3dc54e663b79d9578ed34bef5757d28d5
SHA51220909f8abc7dcf7f81543312fe4dcde1f8778a1ca9c1bd03e3a8a80025588176882d76afd157038ff0b86b0d1b298e00027930640181036d56036a92b8fc86c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e517581b0f6b9eb9956b2ba098ee47
SHA106b4df273395239c347622cc59d52e2005870d95
SHA256e3350f95ac9da6f04e5e6e53d5ab47b0cdcd7484ac510cc58e6131f0aad10a4b
SHA512dedcfcca9515858373adc774c5f8cad3149fe6fd99b82efc51b9112a6e41be5c2befff0f792b070492997c54b06801516e98890498952ed3b5d3208176d49c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5c10b740dd8c74dd058052cc147f75
SHA188849e2992870e366d252c3c28794a9e21de6737
SHA2562647f7a4819ed2004f31d62bdda15d0003b72a132885d65a62a80defa02bd4d4
SHA5122ce06e6cbf4235ebdd5af7afcdc81896f6321398fe7b56c715c648339a54f2a420e136d51ef69ab198fe9c97fb9d66bbf1e2fe3d8ba3250c3dc03a798466aa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9d97018b3ff53bed78193cba6caaa3
SHA1b2f4df4bde787b874ebda54ae4d79df8566bc52c
SHA256df2e7fd6015899bf11b0e664f14d0c013a0042bb18218e96c9edfdc9ce0502ce
SHA512f45407f30e74ffee5220b8ff47e8a49d13f130fb142ed62ee784f1bfed41840e6812310b5801fdc8c20770d4683ef88000fa2c46a35f387154439501d1a13974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f042fd828702424946cf46fcbea72bb3
SHA12ffc970c708af6152ccdf03e898036eb09c7318c
SHA25614da363b5bf35eb41b2ca9cfe34d8d65ad3dd998f9e3a16241d749e9f7b8715a
SHA5121550a884de78a3bef9e971e71f064426fb5afcbb6ff32e0711dacfa7297074df8dfe2826d80d856c898a470d4374bc892db88dcbea3cbccdfb5c1f1d8feaa295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50fa7d213426b437d2dfa05e15b670b
SHA1f46dd8a583043b30abd1a1f34229279197beea17
SHA25621ac9acd3a1a51e325188badf66d5f66bd945cea18609d4e7cf38261ccc5ed0f
SHA512beba3315220f3166b7045a15607ca05af93ace910a16ccf97372a7733cda507d1502637c765b9987b0da8560d392ad1cc987f14cbb068752b9901c8457c66c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54954ef5805948b640bc3ccd2ca4426b3
SHA1e15f51526a7811e89c8b66d1a9bdebacf3b5513c
SHA256082ddbb07ece13610d12807cff171211df4bc6c6b9e29f8c0511474a60633fc6
SHA512ea2eb902b3530cd03955756bc48e79a3865d6e93c9f6eee85f7b1cfa9b8befb9a9c5b6f3ed9d3fa71cbcd2ed7852b9181a6827139f31079894821a71514223f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5af0ec1d6d920ba59f078dc09730593ed
SHA1e5e5d133140095e4bbb3d35b6e7445163d1cdcb9
SHA256d4d674bacb0e6482348a40df94bb6a2e95829f1f4508a76f586a83d308b59f6d
SHA5122cc3da7831f1962a60e739e1a349faa0d6e6b86657e8551bfa87b545fd36df80009530e2980ab939d415bcf8a20abc00427c456c1a8bbc5ff7da8f613455512c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5651397eb162cf4089308f34c469ad335
SHA1f7615f8a8912662fb5a8248be723aabcae05b4a3
SHA25667780d28cf3014b36457614ccef052d6c3d5083b6b883e4c8377455d9f386d7e
SHA51262e4d44f48e153add717214b3125dbbb4e2b1af09a506d016bd5f4e4a3fe9995b3ab54547969acff5bbb5fa3766ca455e9a6b7a43c3d76acd71d14b72d02a97b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a