Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
639b762846a330d7b9abb3b5d79ccfcd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
639b762846a330d7b9abb3b5d79ccfcd_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
639b762846a330d7b9abb3b5d79ccfcd_JaffaCakes118.html
-
Size
45KB
-
MD5
639b762846a330d7b9abb3b5d79ccfcd
-
SHA1
f8798e312c6b1b7dd53a22cfb7f113d45b6a62a2
-
SHA256
cbfc021c0c4c6da2646b7e690e06eb360342114106215d24583cf1df6ed6a578
-
SHA512
c6752d07fcb7b5785796d06f8b294b5c85fc3bed9b14b9b3f844e43e00ac3ae794f0528167c53a2965e2f105e852eef422d23cf988a0edc1f4cc6b51f9ada4aa
-
SSDEEP
768:p/A97ElrsFnrHNhX9o02v9IiFF1A3N+eGBtWGbf+QZy66SjJ8VpVN8UxNZjpYuf2:p/A97ElrsA0wyiFF1AdzGB0Gb2QZy66o
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c358d28aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c54fc265a65166f571afd1b12ad8685f2d1dc0a7c980ef139e438fabf16c52af000000000e800000000200002000000032b079bccf9981aa49e78d5342d9f78c49d33f7d56a9c0e9707058f9ca110fee200000006e4cbabbc10335d018d5d39f776d21cd81d958238abc964ba26f3a277a9a63c6400000007b3a76e4030aaf0ae77d243bd6f09d57f0845f48929653fad5228a3553617b75ae5c20498e63a2e3d07b051840f62464619525646c1d33a17a7530874ecc21c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB357471-177D-11EF-8F47-7A4B76010719} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1688 iexplore.exe 1688 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1688 wrote to memory of 2616 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2616 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2616 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2616 1688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639b762846a330d7b9abb3b5d79ccfcd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee881330ff43bee23b2b5e3fe1a2e83
SHA1f6d8c7b1025ce1aeb9d605fd7c8dabf07ae70160
SHA25657b28cbdce1f0c147d3a52f0db0f2e192e6f9cd033e099335248583c5b39fa0f
SHA5127e72dddf9bbd11ee5ea72f559cfa959d02fdf318f30c918bfe7c8c82e36ac6b6c1bfd24e47af75db7df64881fac4663276c17fd5034122ff5ee0be9026fe9893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785395b24b4b104469d9ed3cbb77b661
SHA16c2ec9c99bc729abf2d5f8b7ba8fb07d6968f095
SHA2568fb5445e15df47bbe5cbad3fd91f98044977341f1b76308f072796c4c8fe409f
SHA5127dd59312dcdc26f88e51b38ee298c524676382961423f7014d42704b7c391dbb65da7c4aab66fa79376d484956e39f43d3e0438bb032cb713e746d6fa34ee64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932cc3ceca03bf7e176e939a2cd3c1c3
SHA1269b2ea3413102a29e58073d0d14e3bceb03a3c8
SHA256cef3c118b175471ef450ba0a604e981524b53766981d5ab86fe034def5b74eee
SHA512d9adc2b1b521b62916d7263aaac9dd2045943491aba49fc2eb11c5f3307f1109bc573e11c9b3bfb4b9e0ce8958422fcd8f4e45d10edddd2a50d4128f790731e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779b403657df309e3691082c7c1f68dd
SHA1c7aa3f24cf6742430180907aa02af7b444e82a69
SHA2568f63ae4c0fc2ef66e605eb15a8e09716db796db043d73c836b8a69bfcfb81092
SHA512c97b13805143d24bfc648fe7f2342c133b05ad8bd6dd8e8c1728ed015392d6ebefaf4ac1e1cd9528dd91d1833d05bd7632045abb193e9aa5eaff1ec0f7c47ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c8d5b46f7d978087b5e6775afb0e25a
SHA169a1361ec0a57c97f61e77a6f683aa72245c514b
SHA2562c6889920b06b9d760571f60056c3947658bf1efc86e3afdacb96900583048ac
SHA512a2b26b706256b1a4e7820a688051548d7ba3a879003627e7a219f4e68c156287bcbc1f1ba97baec3f814357ea9e034e326b10bb7305c5c00b77848013532d9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8f4273e3f6cd0b2530c359839acb68
SHA106e1f75607c159c38000e4db009f9d1b3c1efa22
SHA256d0e3eef27119ddc45b077a730604a9df2d366ad07a5b33a75baf9a27efd2e41f
SHA5125b263cf8613cdaca70d3cdc276dfb086408d70b4c0de6bb56f84ed55f1bb94cdf9ea484ef446ef43040143b234712fcc2069c9cf76ba5a1daa6eeff58d41b22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55a8d80752b71ac5aeca2a9fea81a1b
SHA12ff4d858b8106b889dffcdd1d2e52c890478f141
SHA25680ffd1de2fd52127d6cd4dc0af7fa86e3d93a0d017e60c9767e51803382517a2
SHA512d2a8c8818c1709f8a81540b680fa9e07060be46c0b47d40a3dbc77d58f0c3431b82d36aace4c91762f9cd27e6e99bdac8cc647d4e2162bce3a535113ebeea2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55086b2ca710473b89d85a2d3b2165c0f
SHA1fe7147586d23c1d601c2987ca8f37b99586534c4
SHA256a02480e0c326991633cd2ef46f0e07a156f4d3d14ee53a8aa4c458050095b96d
SHA5125f86f8f7dfd122b9e8666f519337fe3bbdf577130d1e22b084ed154eccc31f32de0b427821799047804cb26272ae0b8a7bf5c165ed8b44a60441e63261046961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ee93ec26b500538b106f0df592e6a7
SHA1b8c01d8e055b50a0be84a646187439dc34c8a04c
SHA256d2057c89fab1a473d2243c5c022fd6c77e6ca28ffad6e289e872742c842705a9
SHA512b76fa709e91d730b7b6d39bb65ccf40f46f8e150c1b71352b7026e88be14d74a682a3078c05bed9c31690f5953ded119e1f73f78ca5b337c973404b4820699f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd63e8dbdaf98138f5d0d017fb87c09e
SHA1a5a82ebd523547afdacb54acbe04f8cdb77d9526
SHA256bab1563bc442764f31c368162828fb969ccf84e554cae57314a30216560915bd
SHA5125fbcbcd5360ff79bc5876f713ab16e1f7caa6fa64c344eedf22b09da9f93312d19023aa91d06ad7a907059c9d969bd7a49d0447b59e68e71db2df3d7e11e0d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5114138e59e04b7b0e5d5f8d10df97de5
SHA1f343e64b2433bd0d3b8899aeec358422d906c4d0
SHA2566a098e857ebcc4047412382c60f4719dc2b917d745f0949b6853046f134af2ed
SHA512ce4e154bab8492eff817f58c5b6ee3e4faa4d561fdfb83dad581cf0ea3892bf0dbbafaaae5ea765db5bbd96db9a38dc0a3d24ad4aea8b2eac7e724da6ca85d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5664b8d4cb788c2e93cae326078944c4b
SHA1d0aa7b2de805764317ac8caef92018bf0cd59852
SHA256cd17309b4ad10729b698d1f30692544f4627f6fda581aa735dc1f42b1a90443b
SHA512a5fd62e40eb6191802698b3b694d70cc31328076d795208a57dcc921a92cdac32920b9a3a6456ca5a85042b096913e92a3c9f9a7a755e18b7e7f0ff6cc656fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563a7957b0275b65491a14bc57c28e5ae
SHA1bea1cc3ca55aadd7a369e61730d9b39310b115a3
SHA256985f0febb4aa656f001470fef6ba53a114ee1d019d813483d9b3a98490b5b949
SHA5123d9501aba1abb16897acc9824ecdd591e8d0466e964c1d95638d45a12abdff30f5ba43202376da18e348e9a813b987ef2ae1f02fee38c1668d0af9e4c241166b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57761454250e0468cbf9d4b20baf5ba36
SHA10860358bf75f1e936cd51231aef61e25f5fe62e1
SHA2560cec2efbb2a0a8c83412cb6bf23401821f70d47981c24556adc9605b7add8616
SHA512b3e6a9bc6c794d29c34b4d760e8b16ed8bb87cbb6a86da3eac6fba65fcbc56c58078845e4a3e93bb0b6872f503c538341be83759b23dcd695bda97870ea350bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c54bd133e3acc129ff4b174c74cdd63
SHA1b037e2f14e67677260634f6a270b9c122969a32d
SHA25668286116d363957cdaf98142f32e5703714f11df73cbae8555c62fb29775915a
SHA512e4eaf4bd2b0d42d8ac55027889e657cf2d27f92390266f2f58bcd1e3b7c4442035bf9bf9111653c0907967b0066ef41de516025c02d245dee39f526f9229dda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56692df0a16e91575e3265d9ae7afac3e
SHA10ed4d32212c90cd107adf8715ae736e1a5049b52
SHA256dd26bb25b93225f963936affa5b62af8a72ef69c1f10d66cc709ae5c7788d4f2
SHA5126624a5a86ab55bc0f6cd618b9990c4cb3d9519105dd8df4735bce72cea40f1a5e76d4fd01c365700e73735bab5a1c3f4d6975983eb50a7086e26d71002e0e3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b18afe58e5d5d758529bb5019e5bc30
SHA1fd3b3a8c13fffa34da42ca8d18ca9b72d8067c70
SHA256a493c490f63abf3455c80ab672dd4dc994ecd8ef9b6b996e7ee368e915fdb97b
SHA512d79db581ed22936c01d515bc76bd4fa06499cf4c596a5e536600e3cf8e91b57b5d3e1bbc6ee7aa263c45eeb9358aa2024f487cf787c6b628a96f77ce489efe1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c640c072232bee84a5f3074632d7bab
SHA14a2345f43576e9ab9da65d1d709088816b3a1a3c
SHA256630e448dd5aa156d287b254d6efd6e3ccbcfb4320225ce336848fcd32600d75e
SHA512468cabc387771eae4235510935bf19921eff9f1cf218e265d1e29f8fb50fdbab1f0ea5939aa8df537afbb096ae2b7e9297bc3b0518ebcbd5ee6017d31632889e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a