Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
64021eafe669f4179fd0b4d3dd213691_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
64021eafe669f4179fd0b4d3dd213691_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64021eafe669f4179fd0b4d3dd213691_JaffaCakes118.html
-
Size
4KB
-
MD5
64021eafe669f4179fd0b4d3dd213691
-
SHA1
6ab319b7b4e68950ef23d8d1d9c271e9f81730fd
-
SHA256
48865564e7f022aa7ef13ff7b9917414162b6d997bc6c7973b1797d5abd8b818
-
SHA512
18f8cc8b44a89164f2483e45597155f0ec371ff6d7303999fb4082105da6939ec21c41004246a96f67d87ce1c0156866c65021b18de9fdb58fd552afd3ccf70f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o3AEqljd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48E6F0F1-1791-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000027ac9dbb2b99804bbfbdf1d1086e5d65000000000200000000001066000000010000200000009741366bf7e91d6854e8e3c258ae8982d0e8ade473ac354a6e0227cadcdbb952000000000e80000000020000200000003889b67293967b3eca5af6ff12f9646a3c3e3d5ac0b164a238721b71828ff5e8200000001443f6b56e8b2812324bd0366f456d8528793c78af5f6cc4cddf9280e75d08fd40000000ec59625e806f41bd6cd5c69dcd6daf439088d34e4cf2f4c6cf5853ab288824ea611f35a6ce240061fe27f473608880a9cd9fd605e4b944fb84823855a2f60f65 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40695e1d9eabda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471690" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2924 iexplore.exe 2924 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2924 wrote to memory of 2956 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2956 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2956 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2956 2924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64021eafe669f4179fd0b4d3dd213691_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b964ef78a11a069aea3d8e2486ddb64
SHA1a569eed0c0401d9f22239a3355c6d3f58c417059
SHA256e2927121d3bf3335137d6c1450d36914dc62d74826581aae49b1bc3754ea550d
SHA512d2c256648c70e8009169103ac605cf97f7273ee05eceebb61e9f3bf43762ee7074bd0391096bddb830d7a89e6255dc168e30726a27f4a64142a5219933dfd292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fe0aaf6997c0b3ed406dbaf42594e45
SHA1916a895429b6ec7e4b526ba7283e756d08db5e6c
SHA256f06de2b5051a354466f1bd61586660cee3dd4c4a3007bb04cebeb52a1a6b6707
SHA51292947f18f80bbec88ad29ebe8dc537f0a09a5344655718ebaea2b445585bfa9c959e5150d9aa39672c473e689573ec1d50e7925b8531b59a5cc4dbb1f818a473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f4932d0c73d09921bb9c73bb6832394
SHA1c660a579e848bb230c0c5b98cf7324f0f628d08f
SHA2564ca7e975dffae531939d5adf4d65142b49f1c8902842f8f06384f02b953644f6
SHA51227f240d63322aea95a25e8edd11588ca8f77f62ac3fc9cb9f5deb23ffd11747e6899e244543313679a0ea1c0657c805c68ad3fc9ed6cebd63f050d0b37ea52b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b35aa30fff20e566780389914ab93bd2
SHA179db4d354a6a7570e20f5c45d078b32aea81d46d
SHA256f3870e59cdb7f4bce5336a13dabe1a0517b3230280bb7608703d7b27df3d5c11
SHA51294f35dc72dce2b67ec650844f990ec3650c6dddaa493e89d4e6e7b8f7dba4692b8aed6c58d37fa934373e9d9005ef347b4775c623be369e664d98e28155a8e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6f733164098739fa74025c31db958be
SHA197bb6ea66e1f7150d5694ee578db54de5e3a5fdb
SHA2566158496f03d5408389bcdd469231f9c9a9f789ba18a909d8f3c42435a3f7103b
SHA512ea89185f3070408976f6905e8dcdbb2a828bfda34dc34e7a73f3154712ce5ba34511b9d504e3fa304b29c45563d99bdc80fe6defea7d62f6ee8c1fd6ad0b5b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c20eef5f37b8e5f2343f7be9c724346
SHA183d4326488cf192e3a0064aa97eef5c6b80d26fa
SHA256ada4903dfd26beb335ddaf0bcf97a4b4ef349b46f105fa1a8922203abb236eaf
SHA51216f25e20a916190a1dacc950346ddda33a7964e6ea348c813d55b9c82fdcc943475ccc9d89fe3af81deba165fae996378134caf4321fc554ad996a0ea6dffe5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544f3bcd81c82d1ed6c2096d89b497284
SHA1a7de5b4296bbfa7cb8089f73b3e8fb2dcddc84f6
SHA256f0cb492fae5b7ba86af816a38296c720afc360edba027666aaf127e991c891e4
SHA512b5ce24b936f3167e6f1d92f5fe59a2f5d65c2dc7acc1aa334b3d30d99d3b4757bc8b7cb219dc56b74b89abce2782add928e456bac3342942bed9efa8ff5efcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD517f2915fcf15cb8ec4eec5cdac83c58d
SHA1580c5b94fa9f1bc478a5e85e8f11b33513253ac4
SHA256408f2524c59beda1e89e7fc3790eb658bf6987c2b1693094847cf1c6fc183da5
SHA51271ee5ca0dd200edb27fa75fed924905c7d16c901a1a5727be49f6bdae35cac73a6fbe5cff545c333db1bcba39b5514319578d1db3da0ba236359d4b9b89b394f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b43286e4a5c64e69aca6d5e1b091f9e9
SHA19d06a90dc1ebd30a839956b9c1a24402e9adbe66
SHA256a0751b16a30f35f1c49a58df545485e674e976b6f8482c230bf9769b259b77d2
SHA512e65f13f812023e283ce40375b741f993c6657384c888b806938532e6f62a9038ca1232f195ecb414d91e3d25648b579abb454ceb6fb0c2dad2624cca344bbac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54458920127a9ea914432849967f452ea
SHA1ee75974b64dcbf15fec862ebfb11693689fa377b
SHA25610c430004f920ec22540734794a1ccda7add9290af0b3e738e0e507ba9fb2952
SHA512ad13a33dd8ce51d5194b98232b461643099723a0481b886517608fd9e375388deb68fd8a9c37b11c49da7884fa7e8cef3c2281af7b5a8238c47c71dacd6cc625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b2d3af8e0114d5283832a22c43c189c
SHA14ca733d50a14b330217141c1082a84fdfa7e84e4
SHA25611658e69250731bcbe7654d6cc6fe23bddbcaa1314d9a7470ffda4ecf01e654a
SHA5128f3295886b0397047b227a207d7711e8de5b380ba06b980514beeee1b7388883cebdeafb8007cd1003c3eee31c1822d913ca1bc27650229044601440fb92c025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54bc98a3617654c2c90f3eb6504b38958
SHA183a3ff6adc0bc928c8d720f4ffa4769bec920f1d
SHA256722292b581258926aaa88937e13b7d43d7a30defcbcb21acd469b87bf2c1b327
SHA512d5159f7519a635e3345d93ed40178ec2dda7eeb2ada88e8d541e3683d616bf336733863baa71d74604646c53b85bebe202efbe5ac7c1b038de567283b2a77387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfc93f68b0994c47937e1da7d57e0a33
SHA18f0417aa6a0bfb9dab72777fd85fbf13bf75892a
SHA256970cf75a788705891538bb2a73de7bfb907b471be456c716151343e679482892
SHA5128b1bbfb321d58366f9105164219c5542db8b0e76bab05be8d388819b7f3ae2b1bc855bacc5e473175218aecde773ddf9a8222286fbda36cb1ae2e73ffa3eef82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d774a2a08972f5515eb59484b0d8db49
SHA1806593a3f7d1a09f9ed709d8aa3d21b105093c0b
SHA2560bc4e990e6c8f7afa43f867292da1f6e2d23e32f14ab3f832dd1483177a8fc6e
SHA5120c869be9072844db4610c2a471a14310c7eeb187cc8a6bdc06ecff30778ef4b6d4001d36d138e7fedc50d707d531ca672387aec0f18cf8296bcc8da1c4c9138f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd3440d2584f53892ff1412a90be0365
SHA12cfecd90c9dedf9396edc9343db19692089163d7
SHA256b7ebff744a1fb015c00da8f20675e62e4a239ab1d2a481fa7707be7ca76661e9
SHA5126a0ccae7d7a12cc8a25aabb6efe027eacc03707ebbd35a0a22b6c03941bc1b26bb4a48a22d3769e0b709d09e649786430d9fe0eec18c1a7808420769859291f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d101dbdb805187b01e448de2b4018716
SHA17c937acbf36ff05cb9dbf63aa374213c0f72cd3f
SHA2564a19354899606c771c5b35612749f96242d57f610108944225ba6126b639978a
SHA5125f7abd1d125ecaf0f658a03fc7a0dd7c828abce52e93a9fc09c8f932c0cb0aa3799ba5e57718b1adf76e1d5d8430850d3a19907eec768ec484320a60436ff6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5788316259d2e0eecc95cf562dd241c90
SHA1de0b1214316261608836b79ab23b18058cdb5761
SHA256db81a92fa79bbb35e65f1434cf519e6b4aa57346a70b4aa9e828d25bb542e6f3
SHA512a6144132bf948a3d20369b714c7b689fb866327dc7676bf46383f8383d6e223b877d7bd7d1d872eb83ae31370cc8f852b26c61d04689d5c22d7eca01ca94ea39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d42543f553d4c2a1cd1b3b8db08490e4
SHA140ef965dc1f84465038292609553e938f25942b5
SHA256c94026d301d55657679c437d507fd726dc33ba28fad24601551f9aecf2fbb6cc
SHA5128090eb5bc6fd3ee0a289b392a125502e3e295a29afc80969123f964fdc8c945be7586fa2645c6dd8d437848cbb0100f146a7143ab4fa19c58c14e9aff3b1a20e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a