Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
64042de116212b5f1d78374cac8eb102_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64042de116212b5f1d78374cac8eb102_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64042de116212b5f1d78374cac8eb102_JaffaCakes118.html
-
Size
460KB
-
MD5
64042de116212b5f1d78374cac8eb102
-
SHA1
206ddaa7fa01dfd8dd0e3382c9ea674b2319b2fb
-
SHA256
27d26d1b1fefb9d8c82299201c73b38982640bdfd054eaa6e083d8a53e3c39e4
-
SHA512
21d76a10f5fbf8e761b83512d5d4376f28ca9885f8df3a8f33b8419c643d47cfa2b1e50516f2f066163692be0681c78ad242b56a614c8918967b4cd0a4a7db97
-
SSDEEP
6144:STsMYod+X3oI+YtJQ/QVsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3Xj5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509b5a899eabda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000036367b6721d6d64fa72204e830b5c5b900000000020000000000106600000001000020000000ab1b57c2d1c23c91dbe95e8f182312a57bb8fb9785be93e7a4bbfb4d073028c0000000000e8000000002000020000000b78d12d914b5397e236ffdcf6f0c73542ef832bfe2d9dc6bd599e1d86fa157fe2000000025ba9c44eb0ad9564c520ebc71bb55701be9046f6b4f34868388d54d0796d4fa400000005e5b75718823b7a702008cfdc25e254052c6fcfda4c7e51b0fc1e580ec4026b8c0adc0a0581b394eb123f6037f0fd76fcfedf7561d8441a9b085af3757a84a2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0844551-1791-11EF-9667-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2724 iexplore.exe 2724 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2724 wrote to memory of 1636 2724 iexplore.exe IEXPLORE.EXE PID 2724 wrote to memory of 1636 2724 iexplore.exe IEXPLORE.EXE PID 2724 wrote to memory of 1636 2724 iexplore.exe IEXPLORE.EXE PID 2724 wrote to memory of 1636 2724 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64042de116212b5f1d78374cac8eb102_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da036a6cb6faa65ab1ec9e5a5eef1763
SHA18978a1577d641ade9322253e3cfc093cf64b6808
SHA2569907d9546d880b0892701930471750cbabfb6ab6906f757625e4260b67c3a511
SHA5124df8887eb351e434d04d2ebc6fd95c6da88494e705e3f6de51c860ed79068d74695913a672766931046123d15ab6c9f6614fa103e2cd02e1f0da75cbfe128eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD522d40595e15f17fad8a401543351c230
SHA1f397cd0b54e56a8c2477f391f75043c8550b82d7
SHA2567a9c208efdd5af4c27ac02b0e9d647d18cf58e1586b9b73fc83723930a439aec
SHA512cbd87d7cca0371da5e818639f8ac61995fb5afe6911816789e11abf4d37141330749c117091f3c555dbb4fb73a520d6d89b232216ebfbfabc1f9c72d3bcefdbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570549b58398c8a91362c2b9585f2b25a
SHA164d9b3f3f0d4b220045ebca81d8cd69f8f316e4d
SHA2568f895fde688674fbb560b5465bfd83f37670d32e3d1f63590f8fd613f2f016f5
SHA512b40488b8563326d2846580b9ebd5652e52b7da0c7ef6c3f25abbeaa20561218681c03aa841ba7657a33fe975d4b6609b00ec34233808265c07b0d8581e861a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a3aedd6ca3b40640595c8fc483d68745
SHA1af57165f0886439442264bd4bdbc33d8f8d53bec
SHA2568e001fd4a3987abcebd8ba2920f285bba0cf03527c7b706996da407b04a1a40b
SHA512358f9f05f6d5ba76b3d906436869c4df629b13ba026d18ed605f6e1c923ebb9dd8841baafbd925b8079c5e68d4f7b83b4070e796ca533f8d2a6c0710c1f77dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52d7dade77c5aa55fc1b40c911df8adbe
SHA1dfa83b17a43095d96a64831adabd48866d7344c2
SHA256433624d6b63b61133d6308226877aa672831726d98ebe991b0492f10e4c4dae5
SHA512f86ace6e64f4549c109550fc0704206dde256504fd3bc1c7587bb1a04699befdd9bc4957215c7beb79cdf74e9994f303fda362d03cf42ab69b969337359c0107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53b73b737b63f467fc9398311e5fb004e
SHA130d6b422946aba223020991526a189f17a5825f9
SHA2569971f9fa3c18bed9359fc097f42cbc99e8b3104f29d5b7fa448fb1efb1ebb04c
SHA512290a2b52d46813fa5650b843820b691cee7a38046c77f7adbbfcdf8b6db182a296bbd46c83ba8e2e1f1097b509c48d583aea6834d974a7742447e72bd68e21d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58b33298e6d8d32af1f9c953adae477d7
SHA16989881e8ef4faebb392f5d7d42f03ea10e460b9
SHA2561d91109e2a13349fd3c7643a9c91d602e953dec34fa26081542c2ac86e0d79e2
SHA5127cebd49f58329534b835bf65c0aa257f028ca1a6153516b1ff6b33eeaf820c49e9b774aed2ee08527c663925713861a3555b0d06a60c87a7dd68f19340c65993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58d3d83388d8d04c10b2a7fb496553543
SHA18a6524571d48e6de5d0e9d93ba1b3807f54d157c
SHA25653a70c63b3089517a620c7fe9aae2278160fd1368b402facc536694942ddf753
SHA51232a515051af7a618c32f9efaae74953fbb01ae015070350ae93fe64b1ed9a52a60e0310085dd6bc1040b07ce22d6cd5deff11bfc78a5685adb76483a764a60d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54ca586f9a7fce3eb09cceda251e5bdde
SHA15d31d0fd19f18033678dafb7bf3a4ed37eaeb140
SHA256e3dd47b3d770439a964c613723d831827381d888573cdded3c992ec48bbb941b
SHA512532d846fc9c213224d8e45d10fd9cd7a52b8799e0d25e82ba9305c670de2ba3baca6061c06beda294aa8e8cc208074826ace5f9d8973e9a7d9ce470184be7c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573922747668d2854649eeb08915a9dd6
SHA10ad3aa3c6121e9fcbd0f52512f70d5ef5b53cc38
SHA2569792590a517fe6a275e2328b1a6fabfb22d9f28232c1f79aeed687dc80f23e7b
SHA51235b048ed286fb9923c5aea5a02ecad47d6dbcbb283d06c9d73ac8a42cfd1acde174e4344b7cb477a6ad645b6c3a8e7932bb050770b97647cabe3f5ff0651c2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fa5d7d7bb9a69609d418d42f90075732
SHA1590e73d11b997c02f4d1fc1fc2e38f22310df4fc
SHA256efdd3c43ae9ce17674e41ac1b0a598196927eb705ac6f986e6697d4a825d21c1
SHA512fbb776d0d63b06ca2537a5e1f0b578b87cdb3e14457f7067630fd8ed0792465f8d18e082edf3d05ec2734b2c254f16fbe8f54d005ba33c541f93ddd0ceb598b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54dccc29b498660a7b104006e11227185
SHA1d78229e8225ebfb7f37988c2c9e23e6b4467d867
SHA256c79e1341612bc65abdda4b6229c5b430569f9c0282a4921bf2c4e6ced410c752
SHA51250c26043fa46e04698fa72f18ef26eec2335b861e5a05114c79c0ebd2e9922883fdb6ea018d493b0c491ba8bb09c57bc068bd8429649adca24904fe36b890a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54b77f78e5f5bd0cc984de7298e653207
SHA1a4571b0cf4e68ab98d7146b15517e500adcedc33
SHA256d45821ff7947728893162013572411c13942194380a2fdc7b58fb7ef7a567263
SHA5129f5f9080687e816b8577131d0c9593e89284d0c8d965f355c6537fe1bebc561c8633557097325a4ec7d3647a351c2cbcab91fc9ede822928d219b003ec766ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5afd6059c7a3530a81eb084192d6d90e2
SHA1943b5af4b8d442688773b400d45db6598e2d303f
SHA25601c151a217520a3d4e6f3e68cd2e34ccb6a39a59178ef831d252b20e3560d8c8
SHA512ba77bdc12e88559dd76971b6d9d6a248b854a07962b9963ec5c82ed168dea4f3b1e1613aed733f36da506381ee67b7a6f13d37e99530d371eb864f352b038622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51a1ee79806ff1c58bcd735a9cba84cc5
SHA1de46c8b3642e5ddf09a306e168344966d09d29d1
SHA256ea3228c3ba9363bc93780a4cce311e3b185ae2c60f8630a127e833cd70b1de40
SHA51264a5ed08a0df9eb9b6c5436616b852c9ad5b77600eea18a6f42744856e3632aa6c730501de22a2c0c39169aa02059aaf1fdb0aa052680071a39cf5564d9035dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fe96c6c409c394cb3fd4b81e9d70b082
SHA170b8d4539349ff796dc69b6db6a73b80ed60be35
SHA256ffb7eb2449ab318a3865fd14bb44cdb361d804978272db35db947a6aacab156a
SHA5129e2515065367d785435c8028edca4e71d5da50fced9a5bc086cfda0585e2ba589d3d2676b312b938bd1f27ecc99e0cc2dfe43deba5bf483d205a8fdcb4b597ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51376091bd8ae1c0c12c0319648bf3389
SHA114b79d37c8adea1feb70704f5fae035cf6d44363
SHA2563c78997f71dd2a498f351357139bc03db3e77ed7a9e16d0ab371128b48c7b93d
SHA512e17cc653f7f31b926a1274042967938bcf767413eb32d00bdafd1dd4ace426e05672660b2b4124e7c3ee3be575a4da8606327e4525e52ca4786bf516f8bec0ed
-
C:\Users\Admin\AppData\Local\Temp\CabBCCD.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\CabBD9A.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\TarBDBE.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a