Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html
-
Size
85KB
-
MD5
647820b8342ac8e803e9f8429c090b12
-
SHA1
89a635b18224e8ea45b22684b72a4af7175efb8b
-
SHA256
f7fbd329e0515e179ef0e8cb937211c7a9ee8d1d75eab64bc13997413a2752b2
-
SHA512
57afe5479690c818edbfcd0aa2dd789e60f66ebf396f8a2ee33097cba930ae0426067e87563c3c634077888a93cb454ccec6d5598e5e1334d05c935b5bd31a4a
-
SSDEEP
1536:mQcu0dyFR178/+TsQLCVcKpCp/BA30kCdQtpQ5FBE0K:mQcu0ibI/78C30kgQnQm0K
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BB140B1-17A7-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481231" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c66e5c05d3481945a272c9b5520ffbf600000000020000000000106600000001000020000000ee00e0fe29877d2c5c91f390159baa8abde2801d32ef8069ab23dabd77920c5a000000000e80000000020000200000009750233ca6c8efa7e061bf98e430c1e5c6b79f2204b5ce4ba17b5f445424aeda200000000c77c6ffae1b00b15b5428019feba6669ecb14a4930b4d6216714b107ef53d0740000000d363a3a7dfddcfdec9a91447ddfc53d51ffd563260d3e54dea30910bbbad17c68d6bcc6a2094864f00473f7f72a06957de0ba1ee018560d161394f73702f5519 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b1e650b4abda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2892 iexplore.exe 2892 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2892 wrote to memory of 1960 2892 iexplore.exe IEXPLORE.EXE PID 2892 wrote to memory of 1960 2892 iexplore.exe IEXPLORE.EXE PID 2892 wrote to memory of 1960 2892 iexplore.exe IEXPLORE.EXE PID 2892 wrote to memory of 1960 2892 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\647820b8342ac8e803e9f8429c090b12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5686420aef003f9b2fb0a1f93b837cc03
SHA1e09f0f9d17cf9d8c71aa10ba70963e19e9250a1b
SHA25614c3aa3556bb2a3e3d01695df096b6014e1c3fe8d3c8ed8ee33409e4cc92c90e
SHA512cf71dd2e5ce9771f6359b720691b777936ebe07148f009d68d353e512475e5de7b2bd62900b3cacb8b2f9fc7074dd6bd768d5b48fb95121981d0deb2e1c1d0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d7f07479f06cf6de90884c639c1a4af2
SHA11cc2f572837505331c33cf933bb6d4505fd51301
SHA2566300fc928af8ac2478278f48ae58f0ed07ad9438c83dbed589b0ef4c9f502b0f
SHA5125fce4ce7b670fd639611efb4846f93a2dcb2e9cf45dc54fd1d9613e12709d1521975eaa4b990fe2656db491237aefeda6ce223ab151803cbd041cfb2fa155f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57426f0d647e0d039a99df8c094e94a16
SHA17a32124bf9ff1bd01c773ce6f1f8cb041b7fed5b
SHA256a99cda7340e85fa133418ba3604b49ec3529956fc33af31142707e6500d824ca
SHA512d3855257e6a67d32552f8d8322da3e3b62c92cec990343f3d924cdfe8cbc6d1f77de4a699cfbc0bf2d5547a56bbcf9e4bbd023fd1f524cb9eeb002f699d81b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51c016ba17f86b9a3b4d84b2dea595a58
SHA18cb95cf69270b26a87ed7283bf744b8b05f70c37
SHA256137197e6c594fda3f10db9164c4f1cc153c66dd24707beb77c310c755a97693d
SHA512b1992539ceae2281c54ff0073d6a119291ae0ab09d3179f0a26335b137c79f5c8b05d2aec771ed741fe857b8b185628491c8d4d2be65f348f7d419aaa8035a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54522f939ad98003544ac25f6d3557896
SHA1aa8917fa7242f63cde2b283215c7eefab5c6fe09
SHA256cbe018a06405d885d75b99c70f84d9484bd5294c492d197ec48dcb9a63f12ed6
SHA512104423e603972af6d24614c0b452d2d3548319ca6c8cc3acfb16b2ecdcce941ad12787e9fdbcddfa13ee0c491f7cff364dbad384960b81a2be1074a25641ce56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e580bc81a59ae6e46555a9e991e6ca15
SHA182bcfa17129270b3c550f68814d9db424fb4833a
SHA256dd80c55141cdc551e47549b4e685911faa98979c55508dba5b08a8e8717fbb5f
SHA5129b7f3478d46191992b64cf802ac448ae0dc9d7af533b7c9ef9c7d98bcac6f7b314e207ed7c7bef5f1787ea7c2337d156a74b6254bc537ff18893a98c74ca35f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5249182038358679b92470ed8b5df139b
SHA1305c1faa92b928baf6a7b85ca4e990362835c875
SHA256dacdbf8b938dea8f10d688afa5e110e7d2ea4551a2ed1ee8df825fc15ac42e4b
SHA512c48274c08c6d69fdfb50070d3270136cd4241eb4a7f85ed94ae6b97fade8a5ff2c0ef5e9d538b104d5794edf697547c3e07bb84c7b0616ef2b399ffb6405ea22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54510e8223056a94605469687cf1e7e0b
SHA170e58a5bd27a94766714e69a387efb77eeba1545
SHA256cde4b2587c4ac1f25b236750258bf8c0839ebac001fbca9c177e5e4f32863fbe
SHA5120e963c786466557c889d4213a40a11607805dd56630c4de0952c91579a9ed8e2f1b3c7db5a863f64bd1fd36d59ce85bd41d93d01064f8f2034a8ea5db82e64d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD587e3c897e7b68420bb0fdd4b13a65ac5
SHA19cd0ce54a16bbc6ecd959e2fba9e67fc38101437
SHA2564e5cfaea9c4acdbaf5e63a05a8e707997477c040adc59eacf4007cbbf9b67c48
SHA512119e5b680ed9f1f4f167aba0ad8bbfaf7e944c9bb5b0a66c305baed4889a149be91ddf040070ad4a0e75a5593166d48590f18f2ccc431093651f5ea07f69b9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e45df5511684fe315829bf0c97547214
SHA1d617f1c5304596a6cee1be4737c9f927622384c0
SHA25621579724b4fbaa829bd1ef97f284d6202f5fc9d852e6e6da88ddc8499ace2daa
SHA512e724e3cab82d684e2edfc63dc7db72d3ec3ade82150a31d9f60bc755da27e53b61fe9ed34e17a95e8c894143967c8c966ee016ddf9a41ff47f703b425dd68a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c0187376aa7ed0735911f4f3a21d71ce
SHA1a3d097c6070a9f2f4061b2265c5f6384b100e261
SHA256c6effa1f8c528cb74e30d979d3fe8d7d4ea2be321b32391bff2db0f6c75369a8
SHA512dcfce002466ce435ce591d009a336b7782059e33e78f4190b47cb762efb93591eee39ced3f34f2b40a8af9d3672767ad8595f8e4910caee48d81d26fabf43d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD552f810866354c7af6ccd00201e70aafa
SHA12dce791217157ceb408f53e1f268c1f26d553375
SHA2569f89841bb243c328000ee1631807cdd7755ccd5a98f02d274257eca182323850
SHA5129a6ed44b6ed8a0fac0309dfebee38c60a8aa8ef7c0627b93d99ba3eba70178c293e141370e99635eae147e93a951366e2fa802b3a1f6430d9affa73150ed37c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50db989e1949fc234013923177ccfacdf
SHA14ad3f4d9a4f4e400c051d47ce1e3990ff5839c09
SHA2564a1e0af1ed9767cc91b5daad2bf7f27841ee92efedf3798918ec2e06f1cb626b
SHA51291d3ff487a40e5e74b016065219cb6dc24aa6fb9254386641629f2ed8aaac01dca29d179aa2c2775a101693e4eb00540dbca118175c5086ae302f141a3b3636c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d383c0750c71b6f978f3536979e57381
SHA11d95bc95b09535226bfaa9cef257ffb808f42ce2
SHA2568b16da2e1f36b1ce6fa69fe3970bd1fa3e817a774c1bb3cdcba8245a58e74e13
SHA5125e065375a1bb9228c4f65c6795c9ba5a9599cd6343c0702568f9055f26f495283cd877cc8144a1635a2407125dd2b7358230fdb00019de6bdb50e03a7f4561f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52577ed28a8a46b20e358ae28cfc66569
SHA19d8b5227658e15f9889c28f43b0ee8311d9b8334
SHA256aac21fa3978a44ce180ce0701af334445e43f84882ac28745022b8006ee6d786
SHA512ac1efe50a8a5b514bbb4e7482eff2588208f95fe81c2145e0045f1671f8e67393e6f60619da4379b0c019bf88f149173ca902545af51be297743bf9a9458f1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d1125164b6d7d318e464fb8120de6eb2
SHA177abbddaceb5e58e15b8629be4241f651b16b815
SHA256927353c0bb078cb2ba585eaefe98e9cb4416b5f0e0e1fd3978b849cf9929c453
SHA512ba0a118d8ea4faa3cadeb5f007bb08f3450efbdb45585ecf3a56b371f9d95063f39800495e5b0ac2da199d8c88e84fdd345578d73a4192e5307fceca90a7dc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ee6e6322cf1ca4e645fd35f199f32ee
SHA1447d5744fd67b357c5c612d12a38240ab254bcc0
SHA2569318be0ce7dc45ea8851eafca380cee62df6157fde9f75c8453107874483e789
SHA51213770bbefebe98c11addfd785473b0b1b116f9d749fe9292bda23f26df2874e009eae5fa5702dd029da9191f2da8c1bd68f61922324ae3e9b503f71060974407
-
C:\Users\Admin\AppData\Local\Temp\CabA8FD.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\CabAA29.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\TarAA8C.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a