Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
639498b4fec21b1d742087d64f318b42_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
639498b4fec21b1d742087d64f318b42_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
639498b4fec21b1d742087d64f318b42_JaffaCakes118.html
-
Size
23KB
-
MD5
639498b4fec21b1d742087d64f318b42
-
SHA1
e8082178e5e7aa4b1434f1ecc26658b2ca4c0506
-
SHA256
d64576dfb5f66385d0a0358846762350663901876068f469e9d00799bdaa20f1
-
SHA512
d4658c6c02a412f14dffb433a4edb8b7d02dd525c3907c2f9698e74a2fba5464ddd1d3fcf23fdb70de6c4d1ab5b0f232080add3bcd6043b89cac5e7546b6991e
-
SSDEEP
384:JfYLVipBS9eH5y4lpiV2r+Owqf7FdNla8f5Q6QeQQ7w8UCUJy:JfYLVipBUMy4lpiV2qOZ7FdNhlNnU0
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{991CB651-177C-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a1f66d89abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c79b2f721cdda261f37ce4f0c07c2ccd5cc17a3e17a161a6ef61b277a3ef5f89000000000e800000000200002000000067d7e801b02822938bc3cf5fc8f6a3c2d34674e522cbcad9d9148d43dbd0da3820000000ea567b9e7d3d73864810b0896cba271a44f2133e12533392d933ab4f064f173940000000290552715ac20f7a8f5d49143aa91817669ef1e1dc80bfecf687e70f0ffadafd5715c9d12ac76847a12191a2081936b638ddf18e60d1a2a28087c857e5bba608 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462806" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2184 iexplore.exe 2184 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2184 wrote to memory of 1632 2184 iexplore.exe IEXPLORE.EXE PID 2184 wrote to memory of 1632 2184 iexplore.exe IEXPLORE.EXE PID 2184 wrote to memory of 1632 2184 iexplore.exe IEXPLORE.EXE PID 2184 wrote to memory of 1632 2184 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639498b4fec21b1d742087d64f318b42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8b9439998bdb0decb4455aae630e36
SHA1fc741de702e7eb577494f86bd06d9f515da23333
SHA2563e50d23a82394600413d7839a2b8dbd5f68782b9cd22a9044984a73efaadda4b
SHA51226b9110e58ec52b3b63932b1123e3f755bf4cff45018817d775d79068e6f73e0871d591c7801a6cc88ea3c36d56954163947605190d36b8dfbdea08ce62eee72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5e6ec001613561de5b77944f474793
SHA18c0e54e44c15c20502a65ce07367dd20e39dac11
SHA256c46ed335083aa18721f3f7c562dde1a58afb5740995ae69a54dc83149f7f1f60
SHA5121bf81295c420f0e587eb7e6d427d86ce0b1f22c2e8e26501463327a7ed7ff0e1875660e2ef7f8fab473f9db54ceb8032052baf95ac61c06c2f801ba0f85e29eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966ea2c1bcf63af561f90de036dd3cfc
SHA1070a93695e87689a1311b349c94f5be4f3172296
SHA2564398b90d8baba8dc9bea58cf6be972047a6194bb87b343af8bf55bd019fcf6e0
SHA512d2d88b81a4b30b179bd3234c709234d7439fa9ac4ab96850dc16fabfde7c98bb33a9183401a88bb35e2463c548eb2d0e1f30057934006573388852f1e478b4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9682d277fe94bed64af3074a0ca8d46
SHA125224fd719f15bfd408f39584c4516d773748993
SHA256a67d3e110eb1b5e76454cf36842c406f2716dec8c5d379f42661cd15685b4d88
SHA512ed4b520bbd4288d11c498fc35bfa584b6b5fa89828460419147812d830eb420edaa25aa79247b212c043d3f8733b5d89d7dbe1dc59244e97456f49d817e70906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a447853374a8225ff4389ff46382449b
SHA1f0bc7d729d43740e183151f6f698471d6d2d9312
SHA2562f0a0625cd7e2deb5763dedaeb3a1d93047efd81937a8cc67647b94421b55de6
SHA5123e7587c6803ef5eb86cb9250d1b85b803f0b20494300e673569e6516fcea0d089f5cfc5a52282c10c2f120154eef2bd0f585700abfd22efbda6354954fe7406a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8bf81a7f89b52bef9efb7feec87c597
SHA12dc1d13a1bca3046e7c74441d9092773511f5be0
SHA2566076852ad50c50fa5b10d99d62d9c4b9e5e69c22f6e5924d8a2b07da5b2e1112
SHA512019710659eedc85695a0532edc9d6469d8722a99d116332702b82a2fca001c3d8b369fabf4bd8f1f45ba4b4819aa35b025bddd1c04fe7c1ae116fd4943c8ef80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c707c90e75f3be68254d65e3b5e1a08
SHA1c83d1643c44674c9209583b7dea3d4f9da95c7a9
SHA2567a4ad475c8d8e1d2ed944b314d9d987cf6453bd30c7cbe713e86242cd0d8c323
SHA51201a3329b6de0c79789b6166dc83d2fba23a90ba3f96bbc359e80591dbfd37cbb04d899459c2f278d6025b7978192bf0423684a2bc7971e813874f44ec3daca66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1496946cd7391a61b548d24091788aa
SHA1dfbb2629f476637a2ee01f53d36c4a2bc8bff88f
SHA256d5a64c448c0d99258c0bd95cacd6ca50e15dcf4721fd140b6000290569186db1
SHA51239199b452c06cbfa303bc91fefeb2c2bdf09fa16490c5b6a71bdec2ebfe3717f221a74eae1ba336fc359524725f33880ce4d6e259d58a1bc26f797c7503893e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349ac9fbcf950b60fc8f6d07811cc0fb
SHA1ae0e2b391bde061c6fd28b884e8d3eefa61dd37a
SHA2561a8107c57ce67a851fa88e58a7f159b12022094afcedf5b4e563f9543d423b86
SHA512d57635a73a3dd57bb7b08bf40de78f0eee050ba01137263a52f316d724e29ea7f85eb843c024ea9857f0ac7ff6dfc584a49f37014af9e15b323fefa826b790ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e00b2b9773f380e849d923112e78ca
SHA1b5fdc7f33c62025c3ef90fcb97b9532e82c501ef
SHA256936b52af22ae67ca68d6d91401812e5e75fea6d9499addc57d897734c8cae52a
SHA5124fa92abd9420ba3523627e12ef7cab0800ddc3efc4aedbf346d7d471ae98c6bf031b6d5e8d1d495eddadb3ce29e932c9e86f1ab139b27f52e8523611e2a4590c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5598d6f901169eeeb2d800db92f84300e
SHA1692ffe8216370c800f498eaf58337de31818f2bc
SHA256cfdf96b77dac1fd91fa752f123d4b3a9190042c9bbcdea47992f6a9287bf9d6b
SHA5129112ebf98b7890fcde83723b6112dc7159861b702e001b012bf13368992f32bdfcf3043c54d95b17eef0020600cd7b2c79731f583137d39e53f449993ac4d251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230b6f60a5f5faf90fc1fadf61cd3089
SHA103d8ef071e7a16cd661282f2dd5b77265a7cb5aa
SHA256f9c5bdbefe054f5683df862c758552e43886aa27b1e23b5f22d0ab42a7bc8727
SHA51278b9936dbd56e83128a5574cbc0c4f08a244df2511a2ad80cf4102a9d7d95ad7b26a73bdea5294e00c6817597d71e577fb1883a8980fb3a0f90b18f1d66c96b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df7090355e712253a0687789030cad03
SHA10678806ff0145c3ab01b1c18daaae9382f5a7d45
SHA2569e36e87544e5844111b5fa53d4ad758886b20f61cfa8a31f9daa9f6bd2e67416
SHA512026055c7a00a8334c1888b23aab95843765e79ea0efd526a8abaf715a4fd8f15986ccab1b320d8bc14b11c1361009cb902c0fd8c0d34ec7b5d5a74bcb4a70e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af4e8b3d0f50d19553a089ff6cd902bd
SHA1bf46996f58c793cc26fcb3d51d6836511ad0817b
SHA25628d74f851a76bc27528ae35a8da842a7d6d0c1070c603ea076852b3083c1f37b
SHA5122c6b3ecf52f089d1c447dd13b74ce164a87184a772cf43d3482ca597dcc16eff8c205efe6981b996f37fbcdb0ce37879f8b23b7731c28119beb01e56065b472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8aa2cebfaa44c4b4a122b74efdb90bb
SHA1970ded770562846db3ef6e69fabd3643a0dd3fdb
SHA256ea61192f7b7700f6ff632962e8df2dea614e8fac1d89d2269f6376098e9d257c
SHA5129504c6a6757b775b1a4895d7717c84a9128c78db117eb8c355ddb2cc85c477f406b1f02a8e73f4ab32ed70a7fcae4bf526e740048461784b684476d04f48aa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6507facb6fbff9ded009bfe1fcb4043
SHA1f5a4d1f3e5edd0b88f11be21cb4d1ae3f66689e7
SHA25627d1ddbad1bff9c0b80880ba63fd04b99e636a53f1e18bb495388dd5cc89396a
SHA512926410fd5b31ad6ed2eee8203329be2fbc477e7780330cbfa5a85ab84fc05a3cd8e6bcbe9d74c50eeabe3b11b53bbbdfe03cd234913b6aef32ee4406e04091dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3347c7ac769ea47da3ad61e60a9cc6
SHA157567d3ee0636692a8517adcf6b78d6c5ae79366
SHA2560050f6d05202b65ae5fc8217f2049c5ff55c0cb575e7b9920e40592ad0c14be6
SHA512be6cf8dcb62de558f3145adf8eb43b84e518f3fd0943ba942b1a64d4ebcb73c1406391853d435ed2a7a8fead5c56086fc5d8ad30b64d39901ce2a276240357b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10ad3d70d0e1930341fd355fcb963c7
SHA1e120a67a7563628dd2be522b69133954ae7a1b8b
SHA256d78b71651dda7a58f0f72ac26b7b1a139d26dccdb93c9663cdba14e70c0250ec
SHA5120063cf851b5285eaa1dfa1a944f15f525ee2a41934aebd208958b69a34ed1acf68165f99574befe375936961bb4614afc29cd005828dd84a5ae5c0125eb1b2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d784af84c88df85ff4f31a53c157e7a
SHA1f520d83362006db59e9ed9c1e04492c2f43a6a57
SHA2566730c90c5632a545c8ba571797b2f7b8aac641049be01389cf63d53670faf26d
SHA5126b5a3e70baf0cc02224c60037d5d85e56c4ea8f4cf7e3fb399af763b702e898fc7f58b2d9fc9c76757aa9ed70f68f0a182d736a68363cb991e1ec721b7be9305
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a