Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
639c921266d77c0db22505cce0f0418d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
639c921266d77c0db22505cce0f0418d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639c921266d77c0db22505cce0f0418d_JaffaCakes118.html
-
Size
25KB
-
MD5
639c921266d77c0db22505cce0f0418d
-
SHA1
6a9d5026590bde4ee08181d04d81fd85497ec2e4
-
SHA256
f7610d3a8a4982554f284f2a41278f12076e4e3ce39dc11f402773b3ae843135
-
SHA512
4d130810cd9f69cc811af33932fe04911849d041c06d559f76e69a6a3062c2e343f80feb25a594dd44295e88fa1dc9edec5392eee983986f91feba809fd98e49
-
SSDEEP
384:LNfonqlCd7hWnPdPPZReDx+DuZD9+9JgysyLyjfyo+:xfoqltnJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a946028babda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b72dbc6983dd14eae521553795f701e000000000200000000001066000000010000200000009a91b1340f9e086e9cca563d8e04f386e49174c99f30e09725572fcd905c089f000000000e8000000002000020000000badf99248990a44206d594383b30a92d46f71549f08ec756b1a74bdb573dd49c20000000fa5fa89b60e09d555c401a0c741421176f3528d2c00728557c13cd1352f29b5840000000cc6b5abf1c829238d00822fa83c67926ce1d05ea5d77a86d4860568f4145489f1c6b3118b2190882ce92f171daab95107ec0e169eebf435595cac8bf3bace2b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DC2EC11-177E-11EF-9034-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463484" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2032 iexplore.exe 2032 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2032 wrote to memory of 1788 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1788 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1788 2032 iexplore.exe IEXPLORE.EXE PID 2032 wrote to memory of 1788 2032 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639c921266d77c0db22505cce0f0418d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598cd83bbf86690cae086628f879dace3
SHA1b44c51efab7a03d2cae8846ce5c7372ba861aadb
SHA256feb4e9c681f2e8127939d9f015ac40ebcc72bdf89a09e66ff75373fe006a5a9c
SHA512d5e1366946af571c8e85b8ba352124fef941b0a0a45877c7fd55f66b687041b30ce853e1fb6c70c52db4a0be5238706d758fc0d834422a360d4bf636ba45c713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df4f666d12932fc8e684a9dc4a00745
SHA12f6c646e59deadb5d69fb475fad908f02ff95106
SHA2562daaac6c697e7526cabd501d5c41fe325d8dbbf27f3b799de449472616c47f14
SHA51287d89751c35a596ee467eb123a9da412b4f43f4e74001db5e53dfbffe85cfd8b0977bc2e330ec29bf61f0f81ed8ada0bead8b8a98874e9d027ab12290d438045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a106712a5448d82d2da4e734a191b5
SHA1e0388f2155c787d180962651006772234ba2522c
SHA25620b5e0b9dadda38ef5b4db2a725db95e625feb4d7ab76812bb259456fccf3c66
SHA51274407f50a67f2b017a7d4fb8954dc5c3a6fd9d68bafb70e1896c1b90f13078b39c562e67b742b556a3fe29ebc91002d80ab86083cdf5b8abe97c1d205e265be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b0285b8ec8f90bebf993ebde55aaf8
SHA178b5a889dfcc29bcc565eadd84f1b355ce08b380
SHA25662affaa3ff052c987cd67029cb1035b2a17c6107246b03aaa70796a3537f05c2
SHA512e7e4dc52541981a4d11b60b98aa3fe2c5fcb17e2e0afe2ade29b16fa8f175e5ded7da86ebefa0c31e44bb6f30f342c8ca38641705f41d3d247b09e37ae761646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf26cbcb9743b0ae1e59e58ca726c939
SHA1669ec4c31dabdd30376f0e4b8fd728ac64c5a1db
SHA256b838d4700ec001e00f4a9efd83c6a871ca15f64168245a8e594f530ba71142cf
SHA5121cbd7b5b4391f9eb962453d80aad10756f337be9f5670d7041e396eb12c5db4e4ba5b8fc65e691a0037d757700aeeed2eb15ad8046477ac8809608c47ee1efb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd13f2b617b7f9542938d6cd9a4c2f0
SHA19b283be0c108c381fc0dc7076f5b0a67fca864e6
SHA256d92ac180a96dabae3c74f90f9f7edb1709010d088c77d0e7f5d38deeaa35f0dc
SHA51255283f7328060d49b071fde4745bebd74bd6bbb1a1dadc1217b5571ed65953c5de523299a4c1f3f18d3d57c829b3589d27a848b3939e16ed80e3b337abce27c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c4c4660b091070f300697fa141ea0e6
SHA19bada40fda75208c52f9a7e5b148c775fd1bae4d
SHA256fe3a5e19c9bc9334eb7cd2d4195c9a86383eb540eaaa041e86bd9acb9fb1a581
SHA5121b5c81bf49793c798c014cd68876038c64379f3a3f9135c878a245784f6a8906f9a70d15078c7726d408b3e5d955efab4a25a99986d390ccc7912dd272071d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de1a0b772d1d3f4197882ee798ea69a
SHA140beee261591a00c385ccfe6a31e88cae6ac7e88
SHA256e1bc7ca2129f55ef9f328b094e31c3f342dd0c0c8a9a9875d55f7fb1d6b31678
SHA512dcc19ae2d13a7e31f04eab548a30399106fb7138d033496227dee388fae5c8fc2d0f4e4bae54f0303a4d3b9968ef2d8c81593f2d9efa1822afd11a04f0ce3443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee823fb3c8d67c6deae62e40e7bda352
SHA19e784aaea2ddaf0f0b19954ca97632fcf79bab59
SHA256271bf06d94920cc2665f453ab79322b1d7bca48f1c335d5b309cae49932622b9
SHA512f68bcc402c9513d66f90df64e6ed3f819638ba4a99e0a9cc8b44cedd176120c1f4f2b6d241a6cfe6bbd3b3f14a64662e2a19260d5a22ccf8efc165e8583e407e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba33da60ab2f4fdf9e95100d049da2f8
SHA1694cd55bdc8a33a6d478efb317b74b122d8d73d7
SHA2569bd72027bbd376f071bb549c61fbb2afb250d292f53cb48cfb4e61381e4b810d
SHA512d3f7a4403745b929d496d534717bbf74f981b6c530d4f575b1862fe078bca48fc7dca2c8fcdf0970a833940bab4d7cd1a856fd42f4998f1078649d320bcce423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8233ee4421da3abd39a362b641c4f6
SHA163175e7dd24e2ef0f3e089a3917e2e7a3d2bf2fa
SHA25671b830e7d6af47cd26d8a81e482302e96bc38e205aeb6011523dc733ec3aec5f
SHA512c681715af961afeb379ed43fa3b3a0c5defbc297621a11d7d94a44b6eb3b0282e5eaa54073e7466257b9b562f8467a6d55443cd3ae67ebd92e5f499ba9627f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836da0b5dbc66992eaa94deee29acc39
SHA1148990236401d9ff7085afac653683a8d050061b
SHA25685825c3f1c59c4737d139d2467b87b35e525c55889d8a0a208c01a6e70146f98
SHA5129d9e2acf360e801659f6e1a1a403aa199f9f4b4dfe4480486714b0b529c0918455668cb8de8eb8dbb64a7d92516592c633fd105a89f2d4117f47d96cb17018d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a32ebbdd4d505f78f32a2067f3ce6292
SHA1cf773448313f9a9b7171b646ed17714134347b3e
SHA256cab0e06adaaa5fbdaab7c0dbf04b0105853b86047757ff9766c689ce5199e173
SHA5122b201da5fb3d207fac23f6b01af70c9a426407bc4058829173b3c1a915ee77fae703cc8a40c0cca0a05403067fc4713970bb1803c7b7df642a764993d66558f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591feb4f22e33b72cf7307891d9685717
SHA1b105b4c97418f474ea19752cb663e04e34809c03
SHA256e47ad8c15de417b99502b5849cdcfdb282868ef85f7aa032b3dc06cad59effd9
SHA51217b22f85b0906ccedd81e553e21bd3aa8c1e108744c20b9073cf68ed49444409e8042fa307f71bdce4c659e456a890ecf016ee332b9c523fc8a4b08bddf1094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54609eadcd7dcd8536f8fb6ffe4d20a2b
SHA1b950cf85cea19a78b57b6692093d57ccbe91d5dc
SHA256b9dd20dff94ef05d15d6f3ac6e8cfbb048836d67b7856f32463504d89f740247
SHA5123a4c28bc88df69401c423d4276b183619117e4ba98a27c7f466fe81ddab9c3662f306b4270011d6a223a9e6582eb69741b3d3e29e86fccd02b200b22fa8e52c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc1923ad79d90bebbc0db72e64b5c9b0
SHA19ee846941d498cb2ecb4acc48ce1820b2c3a8e76
SHA25680bc2af088827f68afbeace36a6db069cfe990a1658fbaa22522b34b19bedfe9
SHA512f7f1c3f492d396fbf2616e40703d345f03f208786ed4fdbb6a920d4993cf1eb45fa47096386153aeb363764a5243488502a279369ee61bb9a9b32c1c3c3bd95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ee51009c4a82094ef374da5867e377
SHA1688d2e8c2b78c7109506490cafa1fb18baf76251
SHA2560707f8b1dc92b28db800673623c85576095cbd69c74d44e837b12d77082ff406
SHA51254c426a65c3a8cd76ede4a62ea1c6cfd9a18bffbd23c51a1ba5cf35a2c831b9ea64a1141dfe833183f9033d6de499945eae90bf857ca77cdace884aa60d4dd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb6bd1471169532abe5d9ea5123daa83
SHA19f256936ad85a2c42dd5dbd784bb26f5852536e7
SHA256170bcf74a288c5dd0a47ed1da13d3fcc8dcb08cd7a4a432241f1a313dd965a53
SHA5122b669e89e14fb6cdfb70b803d69502b5f4c8fcb842de553e5ef6665e0d031499cf3a5e7fe062e5fa69a4d7a7c2ce60f67657109664bb39c3a5fbe60d6ebbc4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a2ea0bde0f97223cac7a897966a2f62
SHA18f434f79bcf8ea76824e01777af5f780428aeb38
SHA256ac56aec894218af1092cdd713729c1365ad0e212cdef3ccfbbb3f9848c2813ff
SHA512b368330220dec5731f6b14740be66ba15452508c19480d2e2f87c35c740334a1c55749bfade63e89b9ded7556c9e43a185d7036f0969a90515c2668c5c18bc30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a