Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
64743156fbc58d0fa32b909db0c46386_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
64743156fbc58d0fa32b909db0c46386_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64743156fbc58d0fa32b909db0c46386_JaffaCakes118.html
-
Size
69KB
-
MD5
64743156fbc58d0fa32b909db0c46386
-
SHA1
d0b2d9ea41216ded5cf0a01b64f368a2b0c23a89
-
SHA256
cd53754b66814dfbea399dbab511078356a1bd8e516edf4a6f777dfb82fc1823
-
SHA512
a4d0f9dbe9ba989502297e60a5b33bc99e0657aa338ba8d0d8fadbe0400444fae3f3959f0fb4ff0bbe8d047c0e3831957136fd567a01fd9361f435b5817e90f0
-
SSDEEP
768:JiBgcMWR3sI2PDDnd0g6OnfeWLboT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVz:JRFe2UTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006a0157a3d9729e45b7b77662c2bfa2030000000002000000000010660000000100002000000014859d1a05b23ce024cddf11698e029a77dce6bba952e4f062da715724577d50000000000e8000000002000020000000a52998b3d7f8696a0b62ba35c10fdc9674519752fff0b375b0a7b8c01947ef0420000000278600129dc56ad3e460540a3ef5f6de9b9591e6d5f80f370faab295b7c04ed540000000c2cab755d0a16b24901c52b31746b8d5f126e3e350d74194c1a1e84e3aabf186c930c00561642e4090471d67ccee1c31070f1f668ad370a68536f234291f72a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B22EE351-17A6-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3054cd86b3abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422480886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2204 iexplore.exe 2204 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2204 wrote to memory of 3048 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3048 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3048 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 3048 2204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64743156fbc58d0fa32b909db0c46386_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5630971630376e3632e522739c0c5645c
SHA1761177d18a7269157b26850dffeb30a019cf3a8d
SHA2567279d47ba1607583a2ff58626fa55332a85e373fc1783f2eebd9c26455e3d730
SHA512adf30b5fde50d96c8bd13cc32ac396e6afaad2317d4033641ad5658810c36c9839416c88cf169202b4adbba1839ff55d1de5a328cb772dc9a10d1826728fc59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e1ed7f6990586384f2429e9d3fa7d0
SHA19925dd96178e2af3fdbed1bd5d839da726c27fa1
SHA2564bd299f8ec59469f6a634e40940efabb86b544c9ab7d32b4e3af9d1adf8eca15
SHA5123c53d0eac8e019ac64d7db90059cab2735f9dc029706f65326f0f9ce53cc7232bc64b3ff775abb06f6f4177ce490c7368fd2428eab4c50f536f83163d1d97fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2f3f713130571870096be4b070439b5
SHA1bb6419dba9821a6687f484f286383d962c8ce884
SHA25618dce363b80d579967d1b1a71c6cd002bf0c9a06f52261aad8b9f9c3df09a674
SHA512fe5535b1220f8e372ff2b38800588c20280c5925a63ac4b5eb5480fbb417ed871a3d1d587bb26decb4a1f72f9a20b723d6042db0c6b0bb11b321a9b2c11ea8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cab30786dc3491a93b74626971dc7a9
SHA133e06bc6d0360026ea3398a86b4df49332dcb347
SHA256f7808dd6cebff6fa2acb61eec7c5fd601d0bb46586c1442adf9a5cd6935d48c4
SHA5129da449e5a7aa5f4707618f6cb18962781badc9a33d5ffe76f2f3f90e9467e073ba7ea93f3b2292d643f6bb564932db8113c83dc68cbd68aa5111a785e38c12e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29b0f204ab45d49d4491f233a5e2c38
SHA1695ba8d257d6c7eb843a69c974eafb48e753301c
SHA256f823709cbc26bd8a338921eabe741ccb9dd6f70b2f59a2e2b214bc7010b835f1
SHA512f6ccf63a288d01d40aa62941a67a3844d4c13533dbed152a65f1c2d0cab825061e91532dee35c1088f29c3ac82433e356815ea3e6cb2f83dd8e49fedef7a9583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ed0cb0ca68eee5e698745b21732d31
SHA1f0c925cfb4116144c9fa3b8a408b9c3ce802bf7f
SHA256e4b067d961be915c34bcc7b58b43b1ad8738e55c2f3d10748ff8fb8e67df0d3c
SHA512e23d93f88208ff3eb8c914e2af111f2c4f8146925313baf26e6b0041f0c44e87751b93b925ab475c899599642dcd266a67d0d640c2e986c91d7e737e79cc6a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5467b05459f5e5d56ddaad0994390f344
SHA1341c11fc242ede3a915f88f4e3aef08866e77aa6
SHA256406bdda673fe14e5bed1867cf479a27dd890196dd2d7ea186e2dfb8ab9172fd0
SHA5125791cdc20f09dcef6df8d8d1d80563fa11ec04cfc01f042f2421411f1cae509abf5ae5f2ae475909e3b6e3702a858018a948f688f500ce7eafd0fdb35b02576f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d00aab035fd96a53ad73e328a84662f
SHA123a0f1387113457b0fc524fa3e3237f362020728
SHA256b5dccdf922be702dfbe463486d13518d1535561f800bfcfb97fe06e9992de8df
SHA5124d00b2085dc45b2571958fa3cff6d6e4edfdffbbae5df51789cc5d98e4ac0b28291fe919d2a863a576a3aa471422d5b7ba151a77087074db0a6c5d0b7dbf10e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304bfd32da581d2ddfe4f07c6027dff0
SHA1eabb10b9636456d688cd6ea5beeb5d9f88d73ed7
SHA256f05dc9feffac4f707f0638a0f1cd91ff1dc1d7d03b3ffcf3868bfd9e5d00d1aa
SHA512d69d0fe5a52630b04e0c647432e2bbc75b496898c55544545ca601f36dcc6c82e762b8c227aed88c64114a26ad700903a6491d02dd795358e6d8699643b4cdb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e657c38c5c473e5c84cd485166e2ae
SHA17d85a6033f30d0fff168dc2cb704ad48816eeff2
SHA25616100147497ee1e360bfdc135d2044598ea274068f29ce7eaaa778d2c9793705
SHA5129b801321c6b9b31ade37c94cd8505de64f4d5b26571114a62c99fe6fea4bbeb04b5582507a2c6a01fc53a745d225b326f870c57315ee8d1d8d6b0bae9fcf2f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd99cf1e7cce3b108df7e7779721e66c
SHA10d0e47fe781c1db807c6c1c30f2d1ee2bf35b97f
SHA2560c225c714ac92408958cc0a727853c2666668257ba34e05c8d48be2c1af13318
SHA512e76cbbd7d520b13350965829745bc429e80c2305875f694ad91a3150f22911b1bfae41a8c541b6283eb1ea15d5f4c0c1db6031c04ff7873a78dd14df929e6428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a82edbf00c747f0a5ff731cb75f1b57
SHA147eb3399b48df9a46bb0e3ea8eded654e7f520b8
SHA256f7afeb0ff60d8cf0759d8424643371846ecbeb5a0a6f55472c0b64119c412d23
SHA512fbf685664306fd2361de2ff0ebbb118b65a28ee3290901089f9c49d66051cef985030ca379224e658c8bd903cf91017d717591f67e478ecc4174368162fadf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2e5c330ae33d245a8489f5896a41f96
SHA1663c0d2bd9c095d18d6f5c06434dee4f812a6ec2
SHA2569ed006147e26daf25f7bb37bde8945421be6e937ee6cf21a8d1bfb09228be779
SHA51221f82d61ede313a7b988fde7a307191fb1032b55a75a4898f358dc101975f6ed8f5e28aaaf265908a254261ff780a75eca4e9e7051635619a3b446675e4730f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5068056b0a5f0b85ec7e8904e398c5f20
SHA1d4eb813e7533bc783234b9c90f614430cb8c7e95
SHA2568ee9baf3af546a180ee415143ee17fe43ef2b9ec9f8cbd463a569dc4bd021978
SHA5124dc9507af88039f1a4c9ce7ef3f4a5774541431ffba15d3e5fac0e7a3a0990a0a049fc4171f7af294cd5a8d4eac81035b5c6fcd7edf7badbefc9eceb0ffbca5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673ba7eb9cbb9e948af2fefe6932c6f8
SHA14acad5ad3052de0a87d2bb9ab5985f75ddff5224
SHA256458117bb9e8950ab415f6ed6d92c097c51cd34b3259623effcaaac824fe77a09
SHA512058330c425979541a15d581a03d550cf98ee58132cc9b9ca22d614e0b3ed847d35fbdf45525e6c4559ac25487f37897786017fbdf99bbb4ac4240c5b5ec62c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3bc30f68ee6cb3cf97a1110de04175
SHA193ebb7f35e39d3a24eca962038fdc5b789b84d85
SHA256eeff6d3fb5dc14944fb8396ba01a8616d94379ed28e08d3c94bd59a7c9ac241b
SHA512b983faf042c10aab774bda4009f0d84cff23115969f79be0ae0f9c6cdb13bf50c3da45ef56bcc61366215768f72932fbf5fbd2486bba55800229565bcc8729dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e138d9052508c78567f045e6ae15df
SHA1a30ecfdb0888956e3aad3ae64b6f2f152e66a652
SHA256a37c02a6dd8f8127639b6fb0ef3ef3be8c67e126eee501e9bf29e8c42b0e8c65
SHA5124ece98f23d78a095534ef369729ec21487382bef4c7178dcc63fdd246cdf2e00b50610afbfc1fc6c0885557e8cc5e6e5fd4e24b5c915c1196ef1e7164321a1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c59520581154bf6209aebe84b12012dc
SHA1c460acc08eaa9a47add73f7057b339a3022a819a
SHA256f1c15c406d4d2f05c04fa5e38f5c10085f1e63b4613e8c97627691c77d263019
SHA5128dd2c13a25bacc5f7e71efb5100386d5da3009accf3f918f9ad3c30ce5ecd2bd27ea8e720833bcf90a597f2ae69d3dc2272acda3d15edfdea31eb78074fed953
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a