Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
639bd1cc439f4dec806ff8aa087142a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
639bd1cc439f4dec806ff8aa087142a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
639bd1cc439f4dec806ff8aa087142a5_JaffaCakes118.html
-
Size
461KB
-
MD5
639bd1cc439f4dec806ff8aa087142a5
-
SHA1
47a27d7a6a41d9a9f453be4a0c168474377cd821
-
SHA256
fe3da98db444c57a946ed04981d90d83a08720bdd156f300c99f0eb09322e23c
-
SHA512
441db302a52dd27079c798fc320c9eebd304de11138023225c29c20b7fea71b9731d4384f314579bc971a38069ba89b24da1040608ee169aca02f3400bfe4492
-
SSDEEP
6144:S/sMYod+X3oI+YhQysMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X3j5d+X345d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000253cc1a8ef9c4242aaf7c684c52c46ea00000000020000000000106600000001000020000000a519c83292c344b88142bf705a2601f607b62fe345a7057265e720fa4f2f8c10000000000e80000000020000200000003d54e5492a4a528155096e2ea6fcf6b414c5e358b03836cf75145072c6e4bb5e20000000f4b30ed6fd7a9309592c89ff201a8f3d4003f32fcfa63e1c00bee83ca33906eb4000000014d36ffa7d6cc03c2269f941987268ad80d96fc401b52bc7b76513353026a1f32cc92ce2c55a36e3d2519ecee91136ff15cb34683335becc335fa23b4227c6d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C65A991-177E-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a4f3e48aabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2964 iexplore.exe 2964 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2964 wrote to memory of 3016 2964 iexplore.exe IEXPLORE.EXE PID 2964 wrote to memory of 3016 2964 iexplore.exe IEXPLORE.EXE PID 2964 wrote to memory of 3016 2964 iexplore.exe IEXPLORE.EXE PID 2964 wrote to memory of 3016 2964 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639bd1cc439f4dec806ff8aa087142a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9399e55aea86dcd065523a7872707b6
SHA1108ad81ed06b02fa32c6aa0cc004624fa2838f9b
SHA2568d3d0b4c5689dee1c46485926278a42290c6c88c0204f8a7d309e8c723822bde
SHA5120df8d9ec42cf437b69916a19e8c20aff0e0fc98faddb8d8066abd1a4d218dc29930ae98510f5ec98184fc715057804e8b27bc547a5c5f7366968586cbb25f264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57317bc77144b736a16089aa5982313ac
SHA1701dee8097e990df04bf91e6761bc4e2384df092
SHA25631d08cd97c9562ca06599cac4395c35e5a807cc279305b999010d8c175dd79e9
SHA512186fd239d25ada952f421c2b22ef2ef822a9c7f8fae907ebdef5fafc80305ea4ebf5056164e00123be82647b157df49809d0f6ef716a9f9125f123c8b3ea38c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585235ce3e8eb996be3a6a0812c526323
SHA1987bb36169a38d5471eeb252e65ff8dc3c702c25
SHA256a844129106344b6f8870cf89fe487c149df0f9cd48543c5ba7390116b020069d
SHA5124fbec5629ce7d6dc8ac451a430f07f57c2c2e4e3fc543c54d1eafee96fe1290674424d6e0c0997bbad74732b1073707ef4af96ef170de465110449f441fa7e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2b9ad4f891a51334ce67204452329e
SHA122d87acb313eedb34d066fc1ef1ce1419a278d49
SHA25645b7ba666296dd43c9afe768ac0a4219b916a4eec7327a127018550454cc529b
SHA5120ffde0efc89dcdeb88b0e0fc8c995f7d77d035c329b5d0541220eb26a9f9648e19ecb330b8c50f3eaadabec35c8557f8ec446f64d29c11084157ae2c9bdd4d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503861ea58532ec37b8a141db8832a125
SHA1f623ea542cba151129ce1c85efe49512b2e53275
SHA256f78c994f372d0dd09c4df6f98ae49bb782b639587a8103421cf84bc1dd4cc4c3
SHA512156a5f1902481d494e8484663297de1a3fd8ec0e5ba8e2bef4a1c0b2d05efd97f5ce580188c2ad7e468b95b40ce760e62bafd6b1fc882df57d3374778bcecadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e4e433e1d3aa6c98de4340428a7c12
SHA1219063ca7a564639a6014eb42553b81b514d0026
SHA25607985839992ff312c601fa0b0441c3a6cf6039f01e8f6d97d0ad71abd0009d94
SHA512ac8f9367e4ff9fd6d9883cf814d13cae89a1fbe7fe1aa50c2924e4122ca3b259027e0ac557ec7f7795e52ea9a759cec47e98d89f3e6e242e2120fcf187ccae2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50c4df4cbcf5a596091ebb6de3b4dab
SHA1d093c2940fc7258dc56405472975a5e79efcafb8
SHA2568ddade5a881e42e37c55de78f92f566fc9d996ee91938d79e0cd5bc8ba07b052
SHA512e5a9828e1d6d51c2ee63f3e71e609b61b103443bee1dfa41fdc07ebe87f42ba34d8ec8848fe3ec5ef26d01898b564f13e7feca39a30126de1660d49cf054c0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528593677dffafc4b4d605459955ff109
SHA13d639fdbb0895897ebbabd8290e0715bd327b1fa
SHA25652dcaa96df9b32aad42776f566fc269f824434245fcf0d9e39a8326ab4beacac
SHA51218605875aa570bfca94b8767ddf82a620376bf675c70fb5334142ba8c8e922e0920ede597748183c8b53bcf11164d7f45b1da01f40f5c993c17d8406d60240c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e2c13bc6a26c76967cdd43587203828
SHA1cb93a7c70d4b06d96e0e4b97afdf7184087a4a08
SHA2565a62c25460142e08328aaf05db1680d300ebbed098996454e7c3f6c8fd60640b
SHA5121d21af941fc12e79882afd13c0d8721d8e28c2d81c20c5ee1f2ebc4dad736adab9a188914d9db8aa0bad666eba567cca9f654466eaf31fa6100fcc05bac46d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b4ca30b7a00fb182164b98590016f6
SHA16330228dfe89d69613def2aa91ae478ac7da0a17
SHA25625aea921bcc491981d1059fa817dc78bafa902c9af1fce8b73b9c669935b3892
SHA5120090e983b8723166478e0ea3da4f7f90e96f59e09cd2e08d1b4ef355100a21d7b8b3e1b16824079d02a31bba16e5bffd02b771229564a73ea4366d3e54283b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55608eb1d777f45f6d3b34c4de0c8b289
SHA18fb732921ab6525f1d99a8d56bebccbdfa6bfe87
SHA25616529004585c9daeba385fbf60f48bcf568d15bb4fa391891eedfb79066a2939
SHA512b158a44d80d6f81de5e404f6de9bd20470785ff0be09414077660fb76992e22d6e001f175ec361b7879e13097b9bd4c727e7ba6259bc913420b929db4ecc9759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf3ef76948ddd1ac0cd2ce25b0a9eaa
SHA171cd269518c23d3fe6df750e93ed1407db0efba4
SHA256cacbaa24d4a25160f835db83429d4dfb8804ae5e517bd10dc69337cdc17ae74b
SHA51227f39995a70ca9de6230a35a97068b448badc1255c893a92dce68fd9fe549487214017a511287454b339717d934fed7f3d41aff1b0ab72bd314ffaf0aa0d4420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c112fc4df48860ed472fabefcc0944d
SHA1f0ffa499a1d79c5fb5c3f22f71cbd3f61a031cf4
SHA25686dc9e58d1e3261146af1d85ab542ae1aa84248bd6d1c77f10a4c2c522874e47
SHA5121f57a54359dd7646450dd52d58e12444e99c95ca42be1e87fbfbfe4f4d63c25bbb95d53d315320a4ff188030ea33eaaf76019fe059ac04fdf7738fe7df0a35fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511693bf8da05644ae8c02b1592fd3437
SHA1d9decef645fc90a6dc70cf59e855b0d6fbd9fe43
SHA25697450df26d37df32d5b822861503a195d74b29b021d5086e9b90876365850310
SHA512b77ef731a8eae1156f94437c04f77c3eac2a862fa056928baec7b2aae2c651e8566182b5d53e27fc69b64119f2a6eb00930d5112cac24c584b04a13947d6466c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94eea6f3891896e63a48bbe6fb0a741
SHA19d0bf0ebedeb11c10b49077f3c16c49da240cafd
SHA256f2c89b15fea68f48be35e3fa2b626ba8730186b969174101e84c08b0a5c030a5
SHA512e9a485db0019feb5c0b804ded26d816103af36780222bb3b96eeda3db0fa70a4a64e304fe8a0c12e2f603cebeaf58fe3fe8c2cb8240bb39b96449f918e8fe1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2a6575574351abac135b1be3997190
SHA1ab03cd87a8e0662a737c1dac771c1c96af76d756
SHA256311c17ffb2802c427a89d23bbcffeeb506fa96f20d9299393790decdcf355fab
SHA51273f012560a2363aaed5ab5f623fd3c2418046f0bb2a00fe0d08dd67897ad0a8e607016d4dcf2550d82ed69f8512ca5c5466cb77406dfbe66afef1af13cd9bf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae386f4aeacd2738f9d25de8e0866c7
SHA1ea197daa70166a373aed0139088710708743caa9
SHA256fdfd86b6a5d4f65549546a4317aa3a7b5dbabc41883b29cf77997485964f5f85
SHA512959370933c9c83b01e89a434dc14943ad7cf957d9e44d5fd8a2bd82457eff4cb98ce8ba11560a4837c1fba0d4ef83d4cd05b29aedcc72dd0a4a03d15d62fe4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543c48e8fe2a65c2d3051263ef0f27404
SHA19ab9dd31a0323302db27e3d00ec5cf737495d42f
SHA2568bad7e119b373ef5c4c575df6ddf935246232e72d51e9f3b33b86c1663a32c2f
SHA512657dbc75450a5f29dcdac50cafb9cb6f28352a8305a2fbf0b22f0cce934f37f02a0fb9f3ef61697e26a5942108413b89a89e09e87290d483c35209bab550288d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a