Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
638ec2d2401c0da44a6b5290fb7ec9b0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
638ec2d2401c0da44a6b5290fb7ec9b0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
638ec2d2401c0da44a6b5290fb7ec9b0_JaffaCakes118.html
-
Size
9KB
-
MD5
638ec2d2401c0da44a6b5290fb7ec9b0
-
SHA1
b9ab01967ecc2f24e61799e0cc97d7d9fbd8dfd7
-
SHA256
a428f71a34a2470a4392ffe3d89b4d4e609dbd8985e9fddff8fbb50ab85e2ded
-
SHA512
8f49979a205b6b8ad4e82f17a452ff5a8db3831a57fc17582977b4ef63f76dabf54994ff6b8aad421bc3e0d74742f89fe39da66ada006e0a819c870d02028486
-
SSDEEP
192:aHst3Oefcfdma1CycFL397NdcAGRoOQiP8G:3fclma1CtFL397TcAmoOnh
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67D281C1-177B-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108e553d88abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000c6b5495322ef659ff0fce42070c684bc2f3e34637cb2878ec6ac0924221a0c67000000000e8000000002000020000000fbcbfa4e92828d69feb08e2d45a9b0c07aa21d273d55715d5999b784309e41e520000000dec22abd9ed07bde63e0f8f96f55b8b6a44fb29fb9b2d8cb07a6b198af087be54000000002920c9c13c1437b6d4f0e4fe23d51f79c4eb3c45e5e076193e7c95bb4c5fd63785a1942ad42b337a472a991dca669c976aba72228e6f9b0d349615dc6d50ddd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1808 iexplore.exe 1808 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1808 wrote to memory of 3016 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 3016 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 3016 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 3016 1808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\638ec2d2401c0da44a6b5290fb7ec9b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588d915d031110913bea32dd5012fd75
SHA187a4a42bc25e7d54800c1bdcafb70f6b8232ee24
SHA2568edddf5008dfc4efe679be3cc8956bd1c1970772e8b8a907d2318bd5cb1e4faa
SHA512189bb3524da0e329f3ffeae7a664977b18526f350961f69e3f91eda9f03d74d10cd2db7422a1ac88a386d981d304d2c1597e186bdffb39aea02a14c16e740497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8a71fa508749cee36ae34697e69863
SHA184b7f34d636c6d8419cd8c6945faac674b3c169f
SHA256b892855f8b216854e4c3db9889e0efba5f33d6949d72c60cf748b2e602a94d38
SHA51227a1417e8417261e95beec708f50c571c1c9b147d66a91142696b0ffdce3c5578c28bc2e7cfee73166f81f721f6bed261a0686ded62d464a85cfa6bc98198be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55509178725477b9ad1ca248715f3bddb
SHA1938f485601326d304fb7cde377d7e4dde8193484
SHA256d5b78eb66eb2b31818c3d173dfc5f6311649bd1f8935d912f0bfc2a089aae6bd
SHA51282da02603fde8c7dc3b4198299d07008cd42d0d546e733f21b339ea6608ab3a3b819759ea786ebbeecd3031a23cbb5bd27303b20315fd0c6a6efcde6917984ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b90afe925affd1fb02acac2b21e4c3
SHA1533f6e68a02f9e2499148744fb3c743fc214a469
SHA2568b8f5611fef5a0338109ab8af8114b8312daeda0a0f68861edf5ee15bebf42e9
SHA51219d746fbcdb30ebd25901438e655a28d7c6fc64782287cabcdd7256e6107d1186fce212ff25fe5091e186ebf8f8b9106a2cb395f7c41cf74551be1279ab3ba32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e54b522bef4ae031c4e734514e86a5
SHA1a45964fec7cfb9261312b42984793fc6f00ad367
SHA2566c9259d53e5443559894264bc353ad0587752b5cffc3bccecdc956431881135c
SHA512c91a68b0511ce6b2d73f63888a339e7422c3b5c5beb41901ed6aed0efcfeed9bfab4e9a7d61d3069baee19e977c53af9f89e3be6d26698ddd3ff0507284c4731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52006b0d3bd3273cdf393e7a89be44be7
SHA18b9c32ed81cf000feeab265aea88cee8dca6548e
SHA256062f06da5b90b97315214ce0b36b74732775c55f0dd06fcd285d6c8a956b82f1
SHA512b33995a71ee071fce7c8b6b65f1bc46dc07a521689c4c6f49d6204ce23070db1dd28f66d28b59cb0c6136dad8e230215b48b9738dd9d1aa9dec37bad0119e40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3b8384c0ac7a42b890df371efff3e7
SHA1bb43cb9159c3c57336896e77e42ea208db547cd1
SHA256029f028628be9a0fe3442d9e56ce3abf12645e9079d7b47e42eeb9f922b3321d
SHA5125dda1fd89ca381f44bb856f70ee62151346d7a44afc3ac09f9a6d5d1a393f4191cd6c98716e12daf47a02d4f427a0012ff58d31724ba839e9bad4b4a32f4d270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454659fb5db1c94a1ab31169cca9c0f3
SHA1bacd5f37f8b11e586f298027932c423df9444cce
SHA2560f9027f5d0efbda858cb4d9ab4bbb67d6c48cf53f38da0e783e243c3431dbeb7
SHA51297e92650f3cfa4621627a1fd8db42f7249dc1d8be26be41ea501592e62d7f08e143f99635b67bff6a8dccc032ca068e854997833e4ec9e5ca924e7e2683d9c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d378bdf2af6d98dd6485b8bf5c09159
SHA146532c109b782e2fe8c50d9ef5be2a537049a9ef
SHA2566826d028a07187f109f2f006c9bd7d8fe53fddbfe698b4c2d56701d211b6079a
SHA51230f8a9e05917abf2b349b96a4aa71411377395ea103fc2c60b46ef25ab45b1010fa30e647b06815479cd7389996eeea84965b8292897c30d4cf47b9ba6a9455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a392a4b295c5b2764b497d58f2700a
SHA1c3fdfc929a8085de511a3601af2f4fc1d4c2baf3
SHA256956eca6ca595755a922c121a70cfd5e31ed4f52db849d00ebb06997847a4e10f
SHA512892b61075eeb436ea203370da6eae1310bb794b6b3d2a3600cc881bcb618a1354f2a58e00a5dae46e25f310513f960168d85b2a5f8f4bb1be8ed501f36e8dc2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b50e570562f3f27e5bc9718ba8f6631
SHA1788ab531a41286dbc7c3fab47ffda41a7b37cbfd
SHA256b8a619fb3a3d0eacf67c05344c9c1ff8900cf57ae46c48d04f47c3e7052f4466
SHA5128a9c3205ccbe0ba080370b2d0ee661002161973ea3d80914532e03ddfe58821ea57eac2aaf93507e66c0bc26121fe48efc357a1decb244c6061bcd636847bac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593f164a942b1341cb175651100c1ee2b
SHA1c3d399ecb4fd701de0eb9dcdb42949aace8e78f6
SHA25616c82288024844c65b04df84136fd9eaec07a1fe84a7d1b689d818a2c4305e27
SHA5121e3cefe31e875086f04ea64fa7d3545351bf44a18b09a8fc0fb34ad65264cfcd438ae57bd3ec4ee66dc68799ca2fcafcdde7a643656702fd688026dba88b0d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152ff61e514e268009db31c7f8a24dc0
SHA119f22292597d86c9f69a9445a9120488764ae07d
SHA256920de42b6b411b4f527edf24c381e9a6a720780c92c0e236d8f836d7e98f175a
SHA5124af0164d2c3fba34a32b8ae2af2a2eab238f4e8bf4fc6eb823fdf76fe43ae0756c577b1b5ed39a88c948ced30d472fa2c447adf30fbe9c77edcfadb9c4340df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cec7a655c7c97403383665cfe3bcab4
SHA1fb4b613694a067bcb0e906884e2ca647a398106a
SHA25611e660cf82e3f04e65b6d9daa303279893b0ed8002d15af0127a1e9e97f65a32
SHA51212eaeab5764f2f1f2ccc9dc7c27142eb470e6213ef0aa500af6d298ca2af96f82eabdc971cd0157fc02ba8385cc06fffaa4565c40da13cc6b32d3a2e63ccabe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b6863f7a4225977ce36c80d015cf9a
SHA155f32243d2231adcf385975e2363cdcb2c7a7725
SHA2565d868dc922c73652a50f085e584839f1ccbe6d6627860c80435413e01cc7fed0
SHA512fb99da337085eb9ded69001b0fd508aee29bb27fbb45258a316d43c7b1174cbdc40a9c9b1d1437005441a44f87353a8a58d513e8e23aaa3e82180c73273fd797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b44d22efca39d4b5e1c2dcfea4e10f
SHA184e593aa6bd6287f14134a5b4275270b7327d00f
SHA256c96cf32ebabcbf68c17a10c440dbd62bc4cb6c4e6270903f70150259f52270f6
SHA51257fa9316ca98f41daf5add5935f27fde6dc5cd9e834d631c7e396959e4d96e7a6764d28dfc492bc528aa252a03c2c8c43106898454cade7472e41c6c6100899f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436293bbfa46118333e68181a6fec0b5
SHA1e23efb9e8a0156316eace769e80af5ed023adc7f
SHA256f9b7586418622dd3a31a4ae0204d60c062ad9a26e42e851a22d86128f7ac932b
SHA512ac3420402c3cbc4b68870e88b7f1d78d6678bdfdae90f5c97ecc099b2e9683c13b96b8de54451cd9bc749467666f38ce7d17e14210b455dfb1dc12d0c7ee26c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a