Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
639f044c29c95f7d5694c2f1c1cf6e03_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
639f044c29c95f7d5694c2f1c1cf6e03_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639f044c29c95f7d5694c2f1c1cf6e03_JaffaCakes118.html
-
Size
125KB
-
MD5
639f044c29c95f7d5694c2f1c1cf6e03
-
SHA1
335bbf8d13b0e9085316df53251123bfb5172161
-
SHA256
55aba7d2d6b51aa2f8caa1733d29e78179f756e2f7f8dc66300e7f0249ac48b3
-
SHA512
af0ded5ba11fbd6e1ad8bfa946992c4baec31f9107376e54cb4972c04d211d4165c88534e9f46f13d58653138cae8ce8b85365e87f8951831415a1a806daae7b
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9de:Sv+yfkMY+BES09JXAnyrZalI+YV+X
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463696" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c56da98d793fe2796b7210a3f9fd680d386243d765ef5e8631bd005998e94799000000000e80000000020000200000002384e472bcc5e20edab457f7f63f0d1eb50b83fb1df3d396800d73bb5228fbb42000000032bcf2cf68715c8f57cb442c9923718cc0d1fc9f5852ce8ab33e8fef40d5efd640000000ca1df1703a221301b529483284c585869eee1e4b3d297e39622e4cbc8d66db490afacc203c3c82c737ba791ff384ed66db85645dd0ddfe2cecbaa65b3e5c2b2b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f3ed818babda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC2477E1-177E-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1960 iexplore.exe 1960 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1960 wrote to memory of 2192 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2192 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2192 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2192 1960 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639f044c29c95f7d5694c2f1c1cf6e03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553182916343d829a6ea0d18482fec060
SHA17c26b13d2ef6192b6be5ad017d39d53173bfc010
SHA25692500a87f6057f016365e89b17668cabaed389ef3339c5f365ff00b0cdad9815
SHA51281baf3a67fbcea7ff767d56868cb2ef58822b5721a728b062df7c6bdc630d4bb41aef9e6c699d55bc998530d9ac72ccf7cfd1ea304d6f61b14eab13770cdff29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f75d65c77501df603032e5ac526d0c6
SHA13019d2035d44c223f2665c1a2f4763daf4ad7e17
SHA256905a89d7aad8e56863d7d0a56be599b0e2e771cd2e4ad7d456b09092bd610ae8
SHA5120a2348cba2a10e55e04b7c87c83daa19fc395906214ede8e747e509a8eabec024d0ed075a889f5c349915056165eda77a6b062666294a4f6a5b25c6f413f7d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566f6976015b76bd8436d72cc6e07735
SHA18bd5fc5d3f4758a84610c996d6d661995c06c2dc
SHA2567554293dd24ee9dfcc1ac5408f3b8c332c987eb7c4b12f72517ba747f3a9d323
SHA512a4a9cc5ee8e971b9fae89807dbaecaf23496983ef82e89179c44013ae7981eebe9056943afb3e550b76ce1b4c1619130bc121715d0fb7cc118ef2ecf8640dc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aafcdb8cc9656b1aa68a9c7db347576d
SHA1f7b0f2132669ed277fb5bfa3259cb69f54746d04
SHA256ef540c11dce9f487c5c0a62626e7a5797efbb12dd78ba69e1c0b061a2849b3ca
SHA512e3319f0a6c2048b0c30c740934399eb90139009461213de31ece6fb4510254c1d60679924a11a3514a5f65e8f50c1a0c24b4f5f1566574dbb9a07fb7b82c3cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b005fec3ccde3429b8e5443b672e998a
SHA1aad7c895bc749b4f86e0ac0d44162bfea1d6aff1
SHA2566b87fd9d789c98147376e214255347baae5d83c96560a3868ef23439d6dd3523
SHA5125efe7bf5e626fc6784cb15dd15c3955a200fdd41e2f2fb9a49044b05c15bd0c2db47d66a12dca1db921daf4db2be545c78a16e4ba16ced7e9234e2eaaaa187ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062259b474ad7e7e83740357348c6e8c
SHA1a719f8fa4437a132783074549914ab30f300fad1
SHA256002439dce301b1d72e0e5d63a0facce4a39fc8e37d321bae412778cddc7061d8
SHA51273306918f07a383ab9daca0a2b2e264fa7ff7fe5d0abb29b032aeca9eb9f9762af0d6846bdf6de3e6897377016c6500fd55e117b593f5bb9246a5f9e329ed625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c4571b864837a86f11da2993e7e3f16
SHA10f59b3cdbaff18e55ab3a022b068363458db521c
SHA2569494f90e88b803a44d272cd6b3a0515ee42a1480ff8df18cc5a86b1c8ec2cb1e
SHA512a3096f9db8d17c8dc3eb59fa9389da3f8ff8625b752d000f0496a2cd3ea9f3622d9ddf786e86f2d9b9a04551e471e1006a1d7dad46ae88043b0bea7cc830eabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f14a0f3e602018c3ac2a567aa62a974a
SHA177ecb0a96ccb4829dbd8026fa568952e2cb4bb66
SHA256c5bafe3fd96042d35ff07d4fba875b9f0e2ed6b107bdb2ef92a6ec01e8ddb82b
SHA51273572c67315ed732429fbac8540d2783f77ac6d1325c7ee1b6c4fae6b0cdede58493f7cc18bc52fd331068116d0d4584c3dee89ce4840032285cf6a1cecf9708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55220804d9a1ac99fb41759f10018dc25
SHA150a61fcf9bc91bad0743a9e63c92e8a52e46d5a1
SHA256eedd188624450119452130b45b1d42f320e657f9c4f4d0280e9505154e646895
SHA5121fc0469ef74b91fbe1adda825ecad7c699ff9484a304ea4aa6e2f4a7517f72f973f0fbcd3f47ad7bfd617c4ef5728d228c4729084fa212c9cecda38d3f3a4726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586c43e9c50c609f09607ff9d03fa2792
SHA15de2a8b6beaef97c350a5ebec8ab2a2130fad064
SHA256b4c2c7311bbdca359d7eb3e2d241cb0a6a50094b8295d6f6ded8e565417cfc8b
SHA512af9aa6cf300d0cb898e166bb1548b4feee250d2380bd9781a23fa1563e243fcbcceb35eaefa2457154fd6b23e7bfa1fd8a4402b0e570cf7e45355d26e5a26efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6e27cb2caf0c0592f1c9a49d2f43c3
SHA1f81d660a433e0b7d0e3e10e4c56d289193eaceed
SHA25607db5a7b48d3fbfe097bd7a200515fd1c29f6a86f8487dd589de7b8b68e9ec5f
SHA51296c0e658d5a0d38fb95a74471278bb102ff316433920651dab1a4530bd8109c2b2bfcc1e8095b0ed1d0bca056f01785a6cd10f0ca99cc6dc77c1880643efeb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59434b0f2d10d1880fb15abd3d5f41a6d
SHA1123af3ce4bb0210fcbbdbce8af55fdbe0b505ec7
SHA256ced57fb3517a6f42ff803f7c36d6fbd05e86e5a15f5711b399f54831fbe7103a
SHA51241a385c18249d4282f867cdd4c250342d0bc6e3669415e2f2222b7411ced0e8385e038b0e91cf65a812febfa0e2c4b132d77947406461a9569ad061af72364d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5738bb5d50350491a54b6099b8c7ce52d
SHA1edbdf6f5b03eb90c4e39425fa1a843b38849715d
SHA2560ae9732ffb7675f06293620844ca52bfd892f2e5f2d93a4dfeaa8b6aee23d9c2
SHA512f492aa382bf016d0997c13baae79648cec72db67827c1fd5450d6d783e8598298f3b5ca14b1f8ca79a9af22137d51282908ff7572ead6394d992fd2884772885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f316c63189e5cef578c961004c300861
SHA128ef2f278725bf16a5356b6b6d931dc8adafa6e4
SHA256820374ba4a7714eb088677f32327276218d78c08427694daf2dc45e13813a2c5
SHA5125841766e1fa5c18a5cec3f82a2b2011861b9d89b973d32fa4383a62358a4ab2b9248aaae9ae3db71b98a0d76536f7d67e15119ab1cafe1bbbc8f30bcd77f0d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566c704293a368ab495121c390b7e184f
SHA174411be0cc028ee15d23278decfc82aabdaf6a11
SHA256bd29afb12a471b0becd0ad85992333aee6f8f04b8af42250be25005ab6c977ec
SHA512210cbcc05920f8cf5adc4fc3e9839c88e42baafaa4582c60ecd011a411f8c747df16cf4aa14b4bbada19eda27800d952bc450c935ca0bf713cd001dad5fe85d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e63cf3743d1cb89b115afbb9863728
SHA1875a69c1f9b48a795a3cf6d23ee504acebcaff98
SHA256bfff38e4fda0b765558930559806011d665cdb3460f6a4a9d4b7e00fe9cdf956
SHA512924e2449ca4c25f98f8a1ac6f6c75349cb47cb31020f17c643aaba103592d47fb6f5282ae3239dd58e819f825b5ebdc5646a359061769efdc45a36381dab9504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972cb7dc1983f9922e9dee57261e0787
SHA15be0048b908396c49b142b8c4768cd904278e116
SHA256e0758ec9bfe52ea727369dadb330b19b7bebaceccde19c5206ee7a1ce0904b7b
SHA512d1110612cbedcb27001c8b2a5ffca84393f0588588a22d448a4e17a6a9a0c2c8fe8eebe516c408e2f33aa6672a285c6464e8aebbd43e780341e2a1a0d102f580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a373c0e7c8e0c43828c4683012f7274
SHA1189cc1e2bb26fb259f55fa2162cd26c91ee0f01c
SHA25601515eb71cc2b69fd0a4dd9728f2b073d73e40face664231a5837528b4b6db31
SHA5122900600f4b81c425f27da54d1655860603c5cd3260922fc3577e3a466651e112151960222ede0bb94fdf880552548ff8439b7c2b78c02ea04150b9fb9f71c6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f58dac759a001e553cb18b9de8ea1648
SHA16a437e7cb2d50f0b67f52bcf3c3329caaee6e356
SHA2560bb77f1d73a8b0216bf59ae55ec013ddc9ddf2c953720ae9941d8500ce2083d1
SHA5120dafdd0b919d5dd3ea754ab5db11e9e0aecb4ab1da378127adcbdddefffca59f06ec76fe6d0e7ff5417e758c7c944d7b451f7ef25fb01971410697d0505796b6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a