Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
639041ecd4e51bb75f202453dab6bac5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
639041ecd4e51bb75f202453dab6bac5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639041ecd4e51bb75f202453dab6bac5_JaffaCakes118.html
-
Size
3KB
-
MD5
639041ecd4e51bb75f202453dab6bac5
-
SHA1
dd07db85ee3cef16557450133cba64b1faff3d85
-
SHA256
58d23452d71be773a8c09c83f0d557a0e60c72a74ec88f88fbf5ac385354c44b
-
SHA512
34dea3d2e34843ac75e077f9fb3c6e4cf27a99883649447c171e0c9e16fd5a4d5ed2b7162184823f21d323d4a41a0ae2e9519da9d7476b0802e75264858f52b2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462424" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e0e28988abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4AB8AA1-177B-11EF-8C47-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007ce952ed67a1a12968c2d1a7a21870c5a8a418b5ec185768eeb14322cbc2f2b6000000000e80000000020000200000006670c8d71500da53d84a3ddda46502664f48aa8dec0de5644b4aebc132f64a8b90000000a9ee7c85433f13185e0d3c79abe2fa8a8057b02e363cc7eb08456d50a596024d9a1c7808493c0c40f7b8b81a0dc92b63771d1d55a3ddac752ba090acfe7a2f01fa565452489354ff2f3ca8edfcea1f17acd3b4e168e3f862b7ddb133fb92feb996cceb46370c37592c726cd34ea8953f6bcfe5f3505939eaf6879aa352cc9e0ff3a96d3e32cbbb5a9a744c7cdbd609ab400000009ae69d5527c146efd931cc81c558ec58488df759c4ee07872473ee486130c5c5926a119058461615e9c81811e0416fe91227e39eba76af121353bf2baae5e34a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b9bd13cabe1d293913bc19474ecebd68fb251b08e83bca6094989ac547a1e8b2000000000e800000000200002000000088b190bf9064e7743839956651a411619f851b2002857c17182a1ce881fe56132000000022661c8e8e88b0bc2e55a48d1105238df99925045e637ad26f0f6c151fcc09c9400000000462b8a51c5c4f6d0cd9165b7448bb404001f7774799f1ae4640254ca2e12126197afa741f69247e401e2c431c4772527d31feb8f0444cca6763e61b6905a250 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1300 iexplore.exe 1300 iexplore.exe 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1300 wrote to memory of 1760 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 1760 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 1760 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 1760 1300 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639041ecd4e51bb75f202453dab6bac5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea1dd1e1df4eb9d4ae370d65509bcc1
SHA19bf57bfbf306fae89ed3ecf87d3732d5d75e022e
SHA25644f42c4640815eaba316deb1c1a8843b81253a19d2b7ac37d047bc914cefb1d3
SHA512305ffd2c62988fd023a77abe575fb6460537dc25907455bb0697e9007559510d1514e3bc77aba5ac9463d516f22448f856fbf6a523bfa753feec8778d4d51e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534efdee65cae53ae06b8f808d97be99d
SHA1eb0597ae1acc2bdb75013eeeefa78cca71398aa1
SHA25600111d9bf3aa1746f6719dd334f60f59b208fd9131328bc1ac18088f692e030e
SHA512653f19c0a559cca77d41e8d02535e67e6348f1c30792ddbc8a55e13e7360bcedd7b957d456bf044e220f5d256210e85745fa7bf0addf934b999fe8ebffcf68a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6591bdc48be289cae532fb2b095727
SHA145d87acfc7841829bdda78a77b4d5b7863a59b15
SHA256ae66bad6d39c677326ecb164e3f38b3557dd7ce0c6f2cd92242d881e9e4eea08
SHA512ae104ee41ec80b0fd99940e9ecac6eb346cf7bd2ddffa0ba3dd26ec89570d3ef944d9afa1fcf2b8dc0f2cfc2bcae47f59ad58b17eb53e8af16f94d84f19cf27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578deb87597ea6c5977b20d8cbe61c2f6
SHA146f7ea4dcc72adc07746146fb02317a03b7b85a3
SHA25676b7c8eff7a09ed064b24f9553e22f1508b1c0d7bfa02ca582e13246c343ab25
SHA5126055bad52e959d51383d4aa2a6c16e91b769dd69f5693cd059f9c48df8801bb09d3eeeda1e93c1327d298a16201f69ffba9616ccb7f413574efcdb0ce268e1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c38313ce5debbc8be61db7ca81a84acc
SHA19a0376fc6813abe6a5009293afc0b706054e4ae2
SHA25669f9156d632ffb9f5a5a73f7c3948807f46df70a678cfe4d6d59820d32b592ad
SHA51247e3bd6e3ae75090aef69a76ddee1a0328246dbf5f47fa354e75a2be76831d64e9cffcaae0bb25588144ec5a514cd47fc6ba81b3838521829d745f372b8a0748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48ad9875b2dd09e9fbea48bc71a4d05
SHA1ae506ab6989812e6d372208c23e1ef3ad1ea9b61
SHA256cdd3da2765927e2fe9b19b148c8084f30896e28a43982ae4a1f952ebb680abe4
SHA512af659c3e3432151d7b49fce9f158df780214b5f6a36f7c870d12ca9f5a592d708ad0c63a8bf34de7530661d1e2ba5aa054c615aa1a1b729c2cd6dda56af7f6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f058270be7482ea54edd48a7391b29
SHA176e82bac4dfa12ff24d662297088972e59dafa62
SHA25675ca85f3fe0b229fcadef61bcc66aebf1d797cb55379cfe2ee0c21cbcebec0aa
SHA5129abfd154d2751c92e166b4228ed02440afa37c2ca7a67fc6d6459093cb049d87f2434b713f3459b3d9c281a3d7523ebf6e281d29add4b97fb6712f447e1a5066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b3e11e38922dbde908a304cc6400554
SHA13b39193016ebfe26c722e33ab65f3e7739114f98
SHA256eb97159aae6c0bf809d61c21b26bb486423635e7b0586c06cfa3b684980e1a32
SHA512843905695437fc1b83d549cad5d92d363ac2f6af12aefc97c49de5c3ec77e827fde5f41b0895eff5b5c178393814b15e05bc383ec7ace993ba144e1871d683fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625d8f7bb5c8f94fcb4475278ca9de94
SHA140f5310af211d866579656715ce4b9bd52fa9b07
SHA2565784de0a277a3ad7645d91975ef8eff3ccb65546ad89b5d5ad2703b91ddeff92
SHA512578e8493256dcd0abf56da9001eb50de364826d97eb21426e2d87390749ce6980c88bac7001a60c0f319d39fbeca0de58ea953ab7f66ed10ba0bf748963a42a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab420c670e1d3ce4572fb776db834c46
SHA1d33b827e492347ed191f9c47d244cd722ed9c500
SHA256b34e70d5c6704e9e7314681e1f6cd3eccb4200dc04c53d455230d914ea10045f
SHA512c90dfd963c719c56ee0230725e8d5f9ca36a990cbc80d9f7c2cf85ceeabdfba389b16dd4499c69197d5c0bd500babf66dc082a7a1b0a252685e58f29452a9d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7db400080cfe469e43dd988e49d6035
SHA1b042b2ca64890bb21109c046a02112459d2e08ae
SHA25653f77a0cb935378af3a607e3020a4cb0cf6998226c7240254941d9ea1e2d7477
SHA5123caa0c6797b5002a442282781d0aef3c1cb0bf55916d1c69dc2838b77bae8af2202fcf2100b153f7881b155f33182868e8cab9f7013031d6da22a23dd5743a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e8b2a0b971e831c40edd7deaffd0c9
SHA1efa6dbc15197d1e7ea1e55feb41978cd8bf135c6
SHA2567ccaba2f12399b098f642a90baffc35246509c2d0173e42c77a427d8d647c20c
SHA512d7304348186bf206a2721ae940a1a8d9268a9c5caa04d08adb831a7a4567d53feab85b076874a6a3d2e1846013aa0aead07d32a1cd98a8237b11395be89412d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529167040ca296cb1ad5c82cfe30b6378
SHA1ce356347239bf28dafdddf45718ff7ddb494a2a9
SHA256d1eab6e33cb344ecc33480f5b406a3b18b7bf58f66b1f47c2457d3e4b126d1db
SHA512f89f378bd86f21e2dc20c93259877e677574bd0e015ee9e6cb059360230d6f58a4089defb2ad0defc04b53ce43cd13e2c0511ad53e2ea6522846005a0f30fce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5487643d1169abaf651cc1aa1d4b1ed2e
SHA144b833111d4e9235af9df20a438b3d8904a2e0e9
SHA25676d66d855e5c4d7d86b9cfb3ad7df2da88c72d07116489b7c2505450bf0a2634
SHA512b57fd8a9d8325001a8d59c6e451bfb774ed456c3e992543905f5a29c20b6560e94479c1adf7f19720c370221ae9084e94734a8d07a23a420d0c5caf025634cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50806a3d65177f2afb056b528ea7cc279
SHA1a4fe0fb09204eb9b03f2b88f505b9eed68003665
SHA2562a8a874896fb98262600edc1acb67059243ac1db97aeac701d6e004de8b6dd3e
SHA51211f8584dae983ff3a016d338ff49ca2333084a18b145063489bd47e30d67e6648f9a7c235a31f999bb00c83e3e3c91c1a374bbbaf41b548c944a910455e353fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c2385db5a17d8bf85204fb9011a1ea
SHA16bb8f372546a365fced5ecba44fef026d3af7fec
SHA256c6c3757310b6937fddcb63c777bde445606de1df4ad8e47f2da139067e903dcd
SHA51235e9c71a364422267a71d1c498749b6430209af426aece9269b062b4c54c3a786ca9bc4ed782e357acb44e7b84d3b4197984c344ed8784e22d992034f5747606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8d842565a40168d3828871a5dfc543
SHA1c550082599d7e1ab17060c0b1d7649776fd5af08
SHA256bf6c9a280f4b7e3c045e82eb5ae456a43b27e1383a68105203fbbfb3c1cf23c2
SHA512ee286994fb2f9b3dc2e2d9cb6c53c499c5cdabdfce65a94d4a9809923859c40da275506bdbaedb8c7874663b92685b74d91718fd4696c9fe9735b709b3b8eb57
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a