Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
639adc7f092c0fca69dd2acc03874f50_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
639adc7f092c0fca69dd2acc03874f50_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639adc7f092c0fca69dd2acc03874f50_JaffaCakes118.html
-
Size
3KB
-
MD5
639adc7f092c0fca69dd2acc03874f50
-
SHA1
f61a9368833909d0533950815b101c7f2cca8216
-
SHA256
b81e76d43b84fc4cd2a1b14b40e60b3a4678e794907949786a19c1631abc36a4
-
SHA512
20c9b35d9e8449efafc9dfd3803cbbf0eb1708bcc2a1817474dffd366d827f844f1014df45078e2654034e064cfeea9dcc1bcdb62acadd5784698a14b02e588d
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463361" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015371c472e90c34e89daa711018c29ca00000000020000000000106600000001000020000000a832a252b83adffcf81d07bb035276fe40c52c16bb942f0819c5e070b9a6ac99000000000e8000000002000020000000b7371b0a8962905c3b011f0aaa38fc60055911de7db50192c2fab8f8928d151c2000000043d567e922c6b6457c8befbe6acab6e175d09b8ecfce25f5dd1be1bd5aa06afa400000009325afd20ceec2617212ea7f3920fdc21fba05a60308d23fc210e4ab16d2da035dfc51697361a22984ecbc792ee16b7dee42cc7ec5e31089b437892aced52a8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d38db88aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3E187F1-177D-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2872 iexplore.exe 2872 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2872 wrote to memory of 2080 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2080 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2080 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2080 2872 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639adc7f092c0fca69dd2acc03874f50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5808fd8d0af195470091f9e23c205f1d2
SHA1c7f8ee0043eb19e55ff9ee37ce7aee2404f62418
SHA256299d48edd8913bfd69c903262bf2f6d84436c52c7cf450c43805e6bd17f4c101
SHA512c6e6b02324e4a7815ed03a0757beb9dfa99ebc4b140ec8d1c9baa715e705c60bcced1681ff1b9776906760f9955f7cdea530028d1763e213168b169ee57ab35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368a8263b57b5a373a07cec38cc23f42
SHA1332c40ec4925a2a6376a7339d1989bc7130acc29
SHA256fa8d5680192467b386e35a4a3ee6439b47597ecb8c2312e91fadfe9d629aae15
SHA5120e84e1e9e91897eff7ef22d194cc293dfe4e644652d6bb8189b6f1c10aafe752e0cf3854b6f0d4ab3e8f668dc8823ce108d31eb1330c6191fa65bfc7d1bfce58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53fb20f7dcab448abb6217e7727bace
SHA17cb4cffa990216cb98b36d931bad9d00364abbf7
SHA256bac64e5a444ca60944726e1f8297f52e41942b46a7e083bc51bc07165a465ffd
SHA51265827e0ea58834e4413579c3f8b02cdb3035d70348c0edacf0e83ccb1958143ef938f153bb46fbe179f1c57971c8631405d391c9ad5101015faaa88b93db8f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1fb513df4c3840adf6b44c23516fa7
SHA19f4cc970bde1e58f6330560e291067358edc7165
SHA256612d5ff8296e74ed8ae52df828c5e56f3a4779c1593daa2980655384f8c29443
SHA512083c0eda289264d4f8cd7dae264b2c2d0ee209de0b6930e85c2503d43cb6c231be2b144b04967b2eea07e083cbee57ea84670bc3913c4310040ed626ba678686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563f86819104d3aa9f2e032abcfe0f547
SHA1736a11521fee787ae11f7962b4b0647492916d1e
SHA25680cca9b273677772712d8615f9a8291368c4a5992107ff0dee7ec108961c4814
SHA51221724825692b7d8067d42ad7c3aa399a9ed808a824bf5ba6f7c184d7da950407ba89f17b2835e34cc200d4335bcbc22d78670d55017c5ee09545d69f019ba3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65d95e8a8e228e8bb48bd638b477714
SHA1d86ecd84563db75903e294014246297780693eb7
SHA256f02ad70fb84da47d4e87943010697be599a8b2a081c2bfe5a463daca38737e97
SHA5127ff3005ccf32b97a3d4f338cc56ed0c2cb7adbb5f627fd4b20f5b3929ef7d865ec532f063f30cf9cbd66518971da20e2d9496e17492610061924f44711f443a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be385d566e73303db8768a5af78fd92
SHA1d6b78310394ee4ffeb17c251b53eb8e7220e2e48
SHA2567f02b273ec38253469ab621a4e262ff6df343883339652c60feffd4e4cefa5a9
SHA51202e341596b0de88593a8bf7cceab5c15e51143e4ff9b810dc8f413680923ccbb0bc8021427270753a6e921b9b017ed7b7eee9e57de736605ee88fa2b5a4e329d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96f4af5fbb8127b1a4c5e04ba169bcb
SHA13cdcaea734dfc1cf840fef7d4868a2b774017f19
SHA256cdd8f8a8f8f2da80869593721dfbe25267fe77b29a93415ef139bcddff840b00
SHA512b24a6f68d9ccee8821ed4044d0321db07f9e50f9ce329765d6e9e61d3b4580126167e91778984927550ffe1ec357bdb89d0cff84af3e822221f55f57de6cb25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f402c9e5a5736004cf1b33a72628fc79
SHA197fee368a0846ff32c9dfe954f22ab49f8a0f9f2
SHA256bdaa317539b54ac1c22b6a94c95ecd33dc017892a7a39a6e751eede1dccb6c16
SHA5120861481f0eb9235338d1444cba49ecf5611d1b175c2e22f67d50935f9834fad96f7da19b8c79ed8abfd3d28031459a373fe9487b1418c8981fa887bb1862bc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd2091d7d36df0c5280ffcbf8eca41d
SHA175d6da2c6b61ff0f9c5c5fb74afa74a15185ab87
SHA256760ab6507c92c97009d92726bfeb05300608d652f2455f3568f1a95353559db5
SHA51238c5d93751955a38379fc31b78d16fe33b9386bd1b33c79b75f6f0f51c525acbc2c229b7fd82cb5390f5d434c7afbb0200d5e982fbae0a40349ef31e946da591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5596f63e1e4c3adacfe6d0fd60bc28134
SHA1c9e63c89f2b35fcfa5b25199e892f825fd3c2c55
SHA256d8a8a06e7d18f982da79e4af5c60249b05e33b7fa450aca74928d21d939cdf18
SHA512971b6fab821ec18f13110f93a7d2f770edf87fa6ccf4d9d497156bc062b4c786eb759f9911b40f46ebc31299057962ea75daf37f50a96fe50b7fda3035eb2b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f19086213bbfce46b0ecc6913989f3a
SHA1c8df2299b16ce11d9a7f677eb80ae1b09a3396dc
SHA2567b036e9dfd28194310cedb8f9f27ceb3fc7d36cae2712f6a988cf1f491a99ff6
SHA5121a70ee71acfe429d37dd6421fe8f972a16812ac9fcca29c9898c97ef9e829dc65aa5c6e909e517a9361ee635feca290c3c7fc660c8910763303e4be263305c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b48677b77e04704aae316e83e36718d
SHA16ace9e7a521f09a081cdd8c0ae6dd0807df84b7e
SHA256ac7dc3a735fc393d4cfdd9d582d9eaff2c2323c7c04e9253ec3e19d06f528fb1
SHA51291a1a432c74636c34aef296ae03c5106eb317bbbc8f452cc2ff88212a6b50b2f4c507744344072d4835eb86dff29fdc5965f1347364cc575365496c09dea51f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558594ca54d408fc6f80c39ef6e6b7b1f
SHA1adf761abceced29146b09403b77c0ded7d5e6c2b
SHA2560799eb8ee49d6a558b2e9ffaae1b7726d428558fd319c50b4161fce1a66d607c
SHA5129ac4709c129fa11f159c9e895f51300dd2536e54333c784728748c652ff377838fd5a2497dd0d1af67f8672d04f329e83a9f80f89952761f045f26cd8548eddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55466b8aca7a4261b5ac2fe39468cb242
SHA1b13481ab49079878308106aa818709fc7e3bd038
SHA2562b3a577ba4e583350e586b00e480484e4b4885497fbe99cdf972c5f953425b97
SHA5126160f26a8ff6f2d45e9d4ce6137db27517bc4711ea252185571dca7367cee36b7ffe05d02677d1a08d460e23759bc1083a1813a8e128c5774072e2581fa61814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501bf5a6618e9da0e459f6c14cca05b14
SHA1797c829f0af40cc1958321154426af77a576aacd
SHA2565698dec6d5c101580a806db7365dac94fa10034bf02961797493c994abe94eb3
SHA512ddef80e8295751ec98496f367e7aa218b7bdd09f37e86259f24ac8dcb6e82ec189119e2992bc48286aff429c23f40b3768072d42039c367e75e00edd68451ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e0dc4ac32bfa8cbf794bbf3752c2e2
SHA1819d5252a9c6763958e4341b2532b72b1fc83bff
SHA256a9191a5f61b8eb8fb2176fb76f1c1f46257e058964e15d24d272b6885c6166b6
SHA51294463d440dbe0edff89c1e10c51af4c019e66b7ea06d366a992d7c814bfbf8e03637cc4ffd64c9c32fa4f7377f1de1fbf607540756ac55a61cd0921d8b0180d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d2352a33be556f5a8ef5ea6efac770
SHA1c1fddd8b2ce5fe9481168aa2e56959f15a031b70
SHA256efd1ba67df4d2603aeb83553fd985d506ce744dc464363df22f889a69dcf9356
SHA512b23821a02f35ed3f5357ff2ea94ba8ba727fedf21da3fd0cdd17c4ca2f2441685adbdd24930c3245f7067f05e73fc87317c61801e1da4437af1be8c61929dc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a48ad2becf139706a4855d3c8110b88
SHA107f7ecd22e54249299f1b6180cc41677ff2359ba
SHA25622f0b6e7f6dde5e65fc5470a41c4e4c3347271081070f235b15955d5d05276bc
SHA512d1b57dee098ee70278250554c36b0d8072ec73a71c15ed1b2e5a09bfaeccaeebcfe67e98375b6b75076fb64e4c3d271b54c5a866f188407356e176aa263755d7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a