Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
647bddfd05b2b5322f20dbd1e6736673_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
647bddfd05b2b5322f20dbd1e6736673_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
647bddfd05b2b5322f20dbd1e6736673_JaffaCakes118.html
-
Size
461KB
-
MD5
647bddfd05b2b5322f20dbd1e6736673
-
SHA1
a711b8c61dddb0a833b0366c3faf6ec71023f304
-
SHA256
4adf6ad838d4e3ddd29bb4e57451ef3bf1825185ce73b1bfd4114aa1068b533d
-
SHA512
f1c8759217a69057eb85d29552673a662bd8498df312dd53fa0729a8986a5bc4e5e218b2b23ca2ffed65ca9c508ee1cb1f25b9482d973d97641de36b45737924
-
SSDEEP
6144:ShsMYod+X3oI+YYQOsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3G5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000214b3d6ff6e3b149b0e7e9edfe15ac2e0000000002000000000010660000000100002000000066b69d7bcc541465e779c4ea6e2d1b6db9d19c068ffab653b770f1bfb94afe8a000000000e80000000020000200000007f044312d45a7eb18e91e958ae2a9317aedae1fa32ba03e8df276dd7cee41eff200000006d50d00d577c4293721c2f95ca561fcd490a58b2510b59e37c8dcc0a5df681914000000040a1167c89372b96133fdac47461c3e9913a017d623f8447ce417849e7f0021b4874dd1f148183eb6449cf405f61f74bd82e29dc45ecb1b8800225eb1080fa0f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{507404E1-17A8-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481582" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0210829b5abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2408 iexplore.exe 2408 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2408 wrote to memory of 2356 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 2356 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 2356 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 2356 2408 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\647bddfd05b2b5322f20dbd1e6736673_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa264994366c1561ae3456781bd2716
SHA12415255d47168daea7422a808831973a523682b2
SHA256a2005788ae9e1ff1d66187f88bb5ddd54772fa29cb30ab28bee0cfd1d91d0838
SHA512611408b877d360ed5fab5e25aca48fd39cab7444dc0f97f303c47b9eabb658bd7a8267ab5d8821f63c976562b17efb9fbcc6469f349320dfe159e6fbbc4fdd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eddf637d47bbc045a33ed53de2e88e4
SHA1866ddc381402a2d3df7cc9b637d5ff418f86a73d
SHA2564be57b8ea787a43a4cfedeacf8ec6c6e3fbcd221df163e4d486698110b6a8ca4
SHA5124df27dcf4c382f4aa8ebd03469b0c639b46a1fbeb9ddd772308f32f0277fb090919a97dae3e49a88313a470f96a8685929e3c18e093446c5c2f72038d4a349f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e706e49091a38fbb5c74ce69c4ce72
SHA1e7ea4c0f0d5ec307da20e5ad4c7d0dce3ab7ac59
SHA256cddc1042bcc1875922121b14e8759c97846fc0f3629fa87b91fe5ab6fcfbd6f6
SHA5128d00c680a0fe53bcedf6ccb30faf9843b433596b56f8865a713ca538d18904ae7c3bd95ee09f0be1a1a8fe530443458e5de0c278888e3903e6d60bbdcf936f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64b907235f332d6c2ee66623a6242cf
SHA1273173c4f78fb12c8adb7c417c9e9f0da365680d
SHA2561442c7c2c4deaca6ac03a4272cbbd367284d3e44a4a25dd8b1784f8fbc63d657
SHA5120156708408da2544a45808d453b3f89e1e14eb11526c385fb17893d01f204ef9b6afb92b68cbad23c3350474c95224fea289570c6aa3f414f30d603a7230dbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb1df5a2bfbfcb13d52dac91000c6ba
SHA10efd15d87d16d5cd4ee667b8fb286893a70ef5de
SHA256dd05dd2ff6096464e8f5d6778741a04f104f7c334f611c3355933f915c243598
SHA512fd380e43503fcf31c0250deb977cddef22df86034d4fae8a94073c55174a6e50c47815825c308986fbc362922fd1628a6b74fefbd5fa96076eb14a80ec2658d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069afed816734698f6b27781c48695a0
SHA162062d0514d87ff961e97dfd3876a05972e6cf8a
SHA25693ecd34319089186450748fa9b908180773dbf89b1131542002552c7c398eff6
SHA512f6667819d38cae441ec2ec9587be923eee770eabfa1b4e7f333ab099923b6a677710447a9a916d7eeed47558222309b71d2db9d9b46a88a1a9d66689425e40fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e73b12f37dec9f3b90ce0e4c7c2bff8
SHA1441fc46ffe837b6a4174b2831d9431e6b6aa8c59
SHA2563d49f3b7ee8eee19af86f7ea8330f03ff2475cdcbe3fe88ab8aca73917146bb5
SHA5125002001e59da8392ef543edfe4c2fc792585de2033bb720c469fe1a62e2fb98dff4a0e9584db0148abd30ce16adc46fad63af12a9540677bf955ba7c745e545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d689e53c60206452775154b871abef05
SHA19d4af6394fcc30932ec3611edc752d8366176f21
SHA256e27a6d4deb17479027bd0beb7ed6be432f4ffd0b218159a9235039905229dd08
SHA51237b35edb5201c71aae1f9616b22c6bc962efc9ffe29a783073b275946a83f0f9cb68fa5bb756260f04872bbc29fab6b33d0177bb2f6ba51ae1f5aa8f326755af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebead4c3a3a5f009502bff0dfde8339b
SHA18df2f9ea5b668a520de064e58ae52764d0915b50
SHA2562f9c7030a1b72fae7f8ad7cebf81ffea3cfd1f0450fe2cce3f08d5267b2f5cb3
SHA512dad41ae9b7db3bec3c0e1c63e15c458be1cb1c9e1d615fad1598db737169b1e5464df7f53e3543bdfac15be8735d427e99f168460ddf6f5ae03c5347663b38b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515de7bee11dffddbcda9112d1aa5d77f
SHA1397212f59f0ff0bd01aacee974d9fd483d888fd7
SHA25686e25a7567f304eb116b30db6b131d528f7835007529a3ef1adec062ff6da538
SHA5121d799a90ace9604cb0bf70be44723ffdda255e096f28c66f6951ee8c56e83c73d43f961faecdd6585b7fd6376b83a85ccd40d848e74b8caaf6502f91fcb5f40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546827f6ae174942ec84b5840de310484
SHA1104dba901833d1ef1764fc028833d226cb38df98
SHA25649c1eec3c35406a2588decd8749abd8c4b05d2987c6477fd86a04a9e89e6314f
SHA512ad1111abba1afcff538eef82b985285d69542f23f5fa8d7b2f6e8c73de348395fa56483afa9acd027826d20fd6ac0daba75ecb3b56a6c742c719cfe1119d9203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b425a1d3f8ca49d1d777c2138495ad2e
SHA1b2ff29499526a44510958ed75a9a697cfca2356f
SHA2566c38b4d0a3c023d1c7b3635acee7e371c69d935153ce33448ff95c0a516646a6
SHA512a2318e38ffdf76e0ef13499208f67136aac92f0ad78b54db3205211b01d439e1ad2bf870bce75f4528d2b0ab9697f73545bd4fd1ddf8521b23821afa6924b253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d92c5e6026608d9fd9d6e345622fd134
SHA18df71e6365a2e64e0eda703cb6afb8e90feb3ca7
SHA256d95ae489dbe740a30a316c61c21835471e2ff461e75382767abf2b390a40ab25
SHA51200259975df02a71d84e1008534fc058ed0b5878614ec5bfe3bf032cd0c36c291b89889423f0b6e4219c1af216fd32ac76aaffeed777b51228f2d389b325e0dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fbe416e20292133c580e479219091f
SHA142e6020c48b10c10c2fa862a7dbb0b3afe0527e9
SHA256ba743aa3bab458889864425f9f987a4a6c95b4c1e7f41431b9d8bdb90d9ae4e6
SHA512790c350542ac650aa5f8f6ebdd88e9babbe0cb4516579ed1a33db4184aa08620c937a7da0b23b4d6c004a6bbc3ee1d439895e05d334bc528d6860ff9b9e26072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e400e75c7aed50ed21c9d8795cdb8939
SHA15e6bf17e50317f3a1ecfb2691cb98f8ade4d9888
SHA256880a3d6057310ba905f002ac401fd69839ced9a9203a99c64384464b9109fd1a
SHA512d9d84c9e2d0c95836e8b4b5f74b191e72d6b4f54335720336ebac1d8e051ae3afb734ad47a16368838c09c6f15797fdba345c8251ef9604b40f93659332b2016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540d4cc4d1e9b50958e1241cc4b9bd49f
SHA16f67153f9d0072729231d70db097a017a49723ad
SHA256914c90f886fe417c32548776f136f959331a70425060ae7025e9924cb39f07f2
SHA5128765512410db08013fb3ba2d93abe636b483d568f6619250798a8d90c2e2e9e9219cdd89c45481287ffa40f8ee775113a3a2e2cb7e9b467e99f5b72208b9fa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550bbe3df3dd224bf8d6f881a1927e38e
SHA15ddf446abc4f3743ca16dbeb3cc58d7964899807
SHA25622ed2be20e7d9b46bdac96e2951767bd677b34a7a2e66eed545810bd2f51bcdb
SHA51223995d8c5da3ce2775f8f2d338cc2f8a0591b735431d5a6f556c931ee4ab7f56fc32f2a929eb94c1547989c5d2a65f7c004a937cb1746e20935fe9727dbcdb40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ef28780b1de0851070d71e3419c8f9
SHA1fe56b8c55a726d9be7511068d9db4f41ff580243
SHA2560e58faf352f659289ac7eb5853ef7f9d61edb2cc998b19074068e16bbdbb7ac9
SHA512831b616454008f268ab076e2a576b0e304ac15ae036f649594d6653820664b0d9e8228ce52082efce741c325da65f29dad9ef3d956c4ecf59964603d0e23bdf7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a