Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
639945dca6931716d67c71f4d72a5c40_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
639945dca6931716d67c71f4d72a5c40_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639945dca6931716d67c71f4d72a5c40_JaffaCakes118.html
-
Size
36KB
-
MD5
639945dca6931716d67c71f4d72a5c40
-
SHA1
d842f35730e8c60305c7ff4bb559f808775f0cf9
-
SHA256
4abd7495be42fa6a3c5dcce1972e15e6ad8a7ffbe26039152442ede4491d523f
-
SHA512
b9a835a782952a3f99b5c73975fbfe780df01397156633ae3692fd42e202bf16fda3c327e67c4db54a1a7dc298f201d753973523cd071e10ffe256f25d6bbfe9
-
SSDEEP
768:zwx/MDTHM288hARFZPXEE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TuZO/6cLu6OxJy2:Q/XbJxNVqu6Sl/u8GK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a6f6394430bee637281790f4eeb3b1145301707f9ceecf30f4e4c0cf0222ea4b000000000e80000000020000200000008f467d8640ad8b8aae1a02668e5ecb21b6f8d7f01ca14232723bda8973be4d682000000032ca43b2e6d2c674a4c25fd958c95fce3c45ac2c04ba690fc96641044d2a4b7e40000000f6d6b2c9d4554c3c06fb19e10574afc4ff93986f46af679d41a929d9cf6ba2ea157f093224045b3c2b91ea884262b08f520d48682101bc758416954934fb87bb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605a196f8aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C3CD311-177D-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2236 iexplore.exe 2236 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2236 wrote to memory of 3032 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3032 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3032 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3032 2236 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639945dca6931716d67c71f4d72a5c40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b7170354096d7f99ad5421283243b817
SHA107e4d96191d9e9dcc547bcc33b1ea22d333cff72
SHA256e194d5aa899ca352b008b421fd30b36749f1c1143449f6795e4270ab03a9bbac
SHA51259e622c88a3719697e50cdf77fab1247eb23193241d1f2f04c3008d9c43849847c565e6bf96405892f4b70f3ab0a4d013b9007c847603813c3cc2ea6df8a053c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f67996738d17987583a3300836698920
SHA1b675fd3f0de8255fa8b64e15882cfca0dee92975
SHA256b05f5cb246fcf57f2880b3de4ef2beae5343dca5281246fac29e849940e84094
SHA51244f6362054d33a92b95c9e2a37bdf420befa4fc106bf034ba72f07c974686ee330922f3de2b54830a21af09915c097af343a1bc30fb4775243107ff871598db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55465881d7fa6661e451847c0c245d640
SHA162d441473a127f3a9a9114f4bc91e49d2e2efea6
SHA256beebc998c1f696bc8fd4260ca1bfe128e14c74ed447d8a50394857ee136b66c3
SHA51251175f8223c574b9709bfb7a0008eb618a003e2071f30c6e027be1f585609c0c3274e691255139a55b303bcfe07f2efc2d1377f2cf72f2f82010efc10b36b576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595c856d9136348ec3abacaaf2633393c
SHA126cd5db826c5b0aa0192f4ed9c9598ac9a7412f0
SHA25654cc9e22a0574f47f3d24baa5a2f2387d22c7448e9f9f30e01250ece8c7683b7
SHA512e53e174e0543eda818396e9a84cdb01ba2abe2c6e42ef5f6b6ea690442fa5b8d1505acb5830785a70a17cbb36ad4f0332ae49300fb8a0abc968347c20b0c4a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d4144020c10d6b3af90980b9314e4a
SHA1d1941db2cd1f984b6d2bf043007f894e34bfde15
SHA256d57649d0d844274883dca27b9f3d16aff237a9cf86c1feaacd7b9f0914d205bb
SHA5120557a661831c8475556a72f0bc0c91288b441e0c3182d81ec7321e7230402ed77d8f8c50a39c60bc7f1471c6739329f7d7bb9d528e1e2795047eed05e663b237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6a1f1db4deb5ff836f1cf157679926
SHA1097ec935f3e9c61fd24c5581bfa5d67796a387fe
SHA256738ff22140e4eb43de7096e800de9becf6baf5dc7aa0e10e1b80ff636823df30
SHA512e995f5102b2adcb52b7f782c1e6a56f52edc14f2641061c806d94c598e6c41dbb1c9bb89fd74acf5f55feaa2ff18e6b9cd47ad4469709ec8f9623ce5f6f4d27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1cb5093544b2d523982ed2e1120963
SHA1ce6625769e28059badf966f89fed5e4c251a159e
SHA256e3c4721469b1b3bea31cecd77843bdd8fc3700546a31c9e09ba5781b3031be87
SHA512b6e2d0b828b8bc78d893d58591ba99082a87c68439b3a5ee1c276dfda9a5bff8c138a612e8152f87861ea0351b365c20ce123a9c1d1cd21e21ef55418044a1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfa103105f15d556f4a7114f9e1ba7c
SHA183e9d2c8f6651def1bf3971895c884a2de94932f
SHA2565ed6ea2525925c351aa508c310027cc217a665feff7892cf5d49f7b69828c058
SHA512f4cdb0e712cc0baeefc23776623d95dcce596d42d0582a43659723e078404f65142dada900fb00896ecc6603a7761889c7ba7f96d83850cc290b8030d664c550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506bd7946ee0ef0c49829015c45c461c1
SHA16d256c59c6bd66e949f379810daa6cf57b63eaf4
SHA256ab3ebab131c714b292780ee75136514565286ce1c0c375f1bbea17e976f7e5a5
SHA512d441b049dc11bdd3b4f2880bdac2d79d9dc72ff13fee16a4a894edb1ab2301219dad624630e3b23d945efe64fe119a72292a644deeb96a1c1496ee75fa551b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e32b0733c81122d2c7ae58ed026700a1
SHA13042afe7617642aa06e3a5ea9f11b781b325a8a7
SHA25684155dd5b66d9db14f1a979e7cbc79fa10f7d8b120b65966e29972ef0a868a8f
SHA512aef36b33699e220bc689f6ae611baf2a8e74e33c1bfd77774eb098260083e9dd975829a21ad3e4dd69707f1ae3bc8e72653b948fb3f00014994b76428a746b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe15793d211c81dda52c19c4cd59710
SHA15c1575a36e4725e5ebdaa95462bdce19fc17c243
SHA2562f2590cb7a159ea1bdf7f9796d60709f0bef81ddeb6bd74879e89e4e8d1e6ad9
SHA512c611a028951bcba1b5ceb28e043ae075ce7598dc19a12ca49bed1f48ba82ae11cc0e33952a4d3332bd1e4140ec9266346714470a234792e25d14a9b6ff6fdf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb483dba361bccd4cb47b44f87c7e24d
SHA172bf1b9d7769518ce5b2901820209ecc09d640b8
SHA256d49cfcfac03d9639899e8a0e2681ba63dc32dbe70e31f88141f13b5e3371307c
SHA512ebdac3ecfd56efa54d6a6817f6999396e3f3735b35ecc045da2ab26fc368dcbca1d990886a54de3c1a679374d76d955977de1e3f3cebebcabc8137f3464153b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a674a65d6a95aaf82bc12013543477a3
SHA13fa15ae8e8c63da605632c5fef79230a56b60d8d
SHA2564d18871a98c28c9211b546cb121077df0f71e01f8a9adead9a9ef51576aba7f1
SHA512f8f6a7fe1d7705227f5fe70f8ce904151a4e1618de3cbadcacef9fbd8f350f319a2e6b7991532a2ab7d647743d1bee604b63c02f087684a32649da02676b969e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52554949a52ae305a0590576ef5a5db2b
SHA12d74de4aeaf7a2d6590372e62f9838c9795bc426
SHA256ed109ef5393204187e4c574efbeec0052899dce403411e27621517e3d192423a
SHA512f88188496d9b998f449a568f6eae617ec6cf7eeeb47f585ea34bda189a759b27c9b78cddbba9660a3472dd48dca41d104d91248ac832bc43dc32b2d4d8de7df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a619a50b090f5f30c5ff63e8485edd70
SHA101c4ce64914b4635a42dd4456304e9c372718a2c
SHA25602c0634785c3abee1fe48dad3b67fa8de4aaf4be9c4695fed3e1e2019190521a
SHA5123157135bb2aebc9d653c2fad247384e3e1050470e231be796b4b075a0341e1575d46daa1698c986b3e0437979269dcd699277494fff7445966b979fc9f2f4b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3fe7882be90ef36448ab4ee624e41c8
SHA1dfd9b591c7149b46b06383db8fad8ee13cef2e6f
SHA25682b7570bcf9401a98384c673202919b6ec401b336ef00d836f2b75e5d441da01
SHA5123080b2f6b59669b17900faa9cb22d376aa79118a2bb26012c5450ee75c7db9567ca431a659a394d247996a7af4c57988a009a1f630410f0f3c4477e1e2101e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c22c2c803c9b7494151b82ec82fd0597
SHA146ce8bd1b4d5d995b669c835d04b4c57178b8dd4
SHA2560005a580175e68c187bf21988a0be4aa8fc37bafff8bd7765ba3cb6e33324996
SHA512e5646d4c032c8978b251acbe24c589981e1e04e2a4dbad98c6736dc33541e033a0e5f1bcfbeaf624524622f85d7eb0f4e0b24f1de29f3a1a4e52238a67f6c9b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\b71d23686a2b9fd830dc8796151752bd[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a