Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
64860de396447feead70870d9e437f90_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
64860de396447feead70870d9e437f90_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64860de396447feead70870d9e437f90_JaffaCakes118.html
-
Size
73KB
-
MD5
64860de396447feead70870d9e437f90
-
SHA1
5c79d534e14715ef244a93d993dd85ba41d5df36
-
SHA256
8dd7ca0a310becfc4db5196969d7a958398cde2e3421539cec870728f9f8ef8f
-
SHA512
fe76fa9894471de411f655c812ccddc08de07cc8b9d7f39ca877c5458ce916b8955f9293449514004842678efc3ba78191c32b60db6b7d8359c60345f38247bb
-
SSDEEP
768:JiSgcMiR3sI2PDDnX0g6sD6vNUDUeoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JQATzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e1d20db7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38954AD1-17AA-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010458dac239bcc43a312cbcffefd4108000000000200000000001066000000010000200000008d79d7b6445a7d262306a130b63c1087f6c09c3ac884cb12dae9923d1bb0ac9d000000000e80000000020000200000001274dc31fb82544e83ac4f661569063441ff8b6498e4caf266128338ffa0eacc200000008722c0623da8608a9b93809bcdad97db420ec7cb7b7f9a90af64ac4dfa453e68400000001fafdf5ae2ab823976100fb7d788e5080e79c088e6299d3827542fe797ae0120cdb29470047f387b2f703de2023915d63e9e97a11fe9e11b44b25c3c2bb16726 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2872 iexplore.exe 2872 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2872 wrote to memory of 2556 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2556 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2556 2872 iexplore.exe IEXPLORE.EXE PID 2872 wrote to memory of 2556 2872 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64860de396447feead70870d9e437f90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5698630c06133f84857f81b16cbfb28
SHA136609a632ace03ce2dc8e511c9517b7231f6aff1
SHA256da5e5e13f30b6b8bc3afb6533bbd7fce162e9f7aa7588b09f5b738cc16600422
SHA5122dd21beaca7a909532c99f93509d067d3ce6fc2878e14fcdc1480aa6b0b2a1e5572fa5d280e9084d8f86c5cd1e4a03b00dd8cfb1dc8b307d5f2b50591b65905b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544fab6b340ae05abab7d3960237547c1
SHA1b7ef0ae97970bc2ec9e45b087f332f8f66e3a6d7
SHA25654facd4ab9c0dcfb64f2729671b21d2b687e8ace042e71709b81d9165cfc3aff
SHA5126ab22e0737649693c01d95c035af8c7d7b394b55545c39b721340221798b0c8c83d778556c07f611d6b802a45eea2e5f012d54a2e6e485221269fc4f4e0a9587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5793e7b616eb03b58eb3ed4497ed04cab
SHA16b84684b20134d4c206e0eb34ac9e487d9abce7e
SHA256860faafbb1f9226b45f9190a641340912180f1c4c2573214ee9189f3d7ecc4ca
SHA512fa6a1e96ed2c2b598557b90b966c487c7e267272ac995b38f03b2754bf6b94131672fcf94b9b0bc4cdbb31392f2289ad0d58346a96df445aa7b531de4ae7817f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54825751229209a491cedf005bdb85f13
SHA15c70f87b0fce6ff01895d1e34e4d5ecc77f0b2cc
SHA256b86f7ca8ef8b964d8f7bf6832d1f16e85dbdf821e1a5feb2d493f7b9dd3ad996
SHA51293b7858348da206df4a61846d091befe0be57936001ba4b5bf783cb1d184b2a69b89e06ab3dcf01aa6a61ba9e7e1f2ae19a0b517d16283226e5a986124f34bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162e7de658ab6e8562e924e7fedcb7fc
SHA1b697b214687344ef41be73a1b00d38277acc8b42
SHA256055a47b78d82fde55fd078857a3ed4e95fb5fb0994c536e72584ae619d6ce295
SHA512a5aaaf65f9dcb577522142458f0e6a853bbc9430f145e11bc4664058decdce817098d0d96d3d8a513a94927cc60ed909327dcdfe9a6d2b59faa7c44ba1b4b29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a991ada68331010a64cc077d87ac51
SHA1faeb85d5b3e9f45b614f24827e00da4aedd17155
SHA2568168079487bbfe60184a0033961d1a472387b59f88e900cc762e525d07658718
SHA5125cfd44a8ab4b16a1e61fc3a831b49e230f87f3550f58d76236fa2c73a8983aa6b9f29801347a78219def7d81188722d18af794b735115125a50326fdcc7bbcd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c951af34dc34f677fededcf4783c79
SHA168d714174639d9e6da7c81635ad5546d9e101817
SHA256cdbed4ebffcdf3453011a2901ecc1182b4a14ec81dae4ad8d2bd857712d9e1ab
SHA512ea21e8541aec2962d478b7cc0f244cb498b5918216ee37292ae0988a0af0c5d1a71c622b8a064960e5be7e8d94a2fb8a14f33a7f0d1e13ef26df5dc011cc8725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d374b61069e4fd6590ba13d598b67c0
SHA19780db59af9a94e9f9c652fb4f2a4b35485005c6
SHA25697ec8b7c445edc4de1707540247178040442cbb0a20719365c2977ba339efb87
SHA512636ccc8ed06ecc17971b9d50389bc25e332f6b325e7abc39c3852480b96f0da138fd2705c9b4216b18b5b8995c447de7cba85ef712774823b452449138c01e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc8267dcd86cdc8f92bda1bcfb0e42dc
SHA160b059a14b7ba4f9f7f95342fe83c3c401226883
SHA256ff7d9852b5eab8c80c505f3b90c44a579110030cc76ba0d848908ff5b5d19342
SHA5129ee6b58f01b8106854588dc0341b5969b779f46356a07051e6bcc7cfd82de95e760d3b145fe63e7f4d9390ac29732b74da6e4da478993ce80043bc0ef94371f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f066c12c60b3adddc11ba4fc7dcbbfe
SHA1e02eb7fe42f06c485a6448a75a1de0fe69644430
SHA256d98bb82343088005b1d4b7339e7aa35ab24c05f3c76fddd88ce2ee3c8d887249
SHA512e3e8813c5d21284b581c1740a06db5c9d5f05cd4d970c40c0b7fa92d069c0c4c4e3ab610679fd92f028a530d552371f154205f2e522e3ca689eb5fa995cdb47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c076f5c435a956ee21016376a8ebca00
SHA1e3cf5182078fced28976f306576a8a94d284b4cb
SHA25665d47f2ede06b35995effdcf5481d7ae16261116a52ffcf8e3a21710d516363b
SHA5124cb78989e5687e2414d1a7d840bf581677a395129cf27d7109bd08f8b3a43e446bf62a9bb78162b4fbbf0408ec865fd8dc4727ae2fa499299603fce6e9880ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5452cb16bb19ac60572fe005d0b6479e1
SHA15f3102beb62a56837a5882a597afb9dc540dbe2b
SHA256bfd1ec458cbe4105a4f69c05f4347798270a97bb000b7b3bc0705b51ac67e5b4
SHA512c495733727e4cc70f9862db5439b89522f67da9be6b82eb0b8e31b7ac88fd46dfcec4ee5187b1dc9fe4b521562125dbbec440c86f87b04e30f9e57c012d53061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19993dec52a34c78e59d156367a0d77
SHA1ea9bf05259fd198d8b4d6a44e880a6df75d4e99e
SHA25659ca393d998ba4d09805788a3b8cca82bdffe873f201441af01af8fa93238730
SHA51200e729f9d8a3b198df7ed61a60bdf01e051cd28c87be6e61c6e2cf6dc3dbf34a49c6068accdfac2d616bcc0cdea4030f69ce121b8d92ceeeb298290cf08c4186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f171c6bbad8ceab9a9a4a66b84d55c93
SHA18a9608c7c85f30c718b7478fbbb74e34c0db18e2
SHA256e05922886e828021e15629242aa92fe1c70f96deeb248a72625578f9bd1353e4
SHA51238a35cf034192b97eaf6024c4bd2d7c7d6b933b0d922ed7c37678fbe306b7ef509ee748ec2a9034a5fb54c20efdd6cc5b845bad18e3aae9c74533c6b71133f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59de3ea9fd8f22c33c58949a20cfa5fc0
SHA15e743ec49fb7bdb898b5d0fa83900a0fd26bc3f2
SHA256664c04699201ead47c42b1d1a04b3d4d23167ca44582f232cce9e702089d35e7
SHA5123ce82752b2340673ea20e52ef545e776c9ebafc2018949ddb9eb0444d3c955fa5aa968a4a41cdbc69de738050957b29bd87f8ffecf54ef235836771df92e7f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a6b37af3144a0abf358734d83b0ce0
SHA1896d51bc4c7cd98a611f02c44f7ab5d4b28121a2
SHA256276177e5ce1301a49e95789e2acf8dd08a8ff58a4a009527338c38e9d6550fb5
SHA5127ac3b3c849baecf57c0809a9840fd89948ee0bd41246e0e38f7e2fe66f52f2a6382423e9591b1222b275cc2d331d1c3aa711d63fb132f1d62577f321a0c141e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e1419c86c099af819c99c52ef0adcbc
SHA19438b076153624deb2a7e81abc7f7aa4d04d75d1
SHA2562f47861ab051fd9e87f75a62ce4551b0fdb10ccb22ea939a17b718767589849c
SHA51263fe342f742ab8a2221bdfc790da42475734f9802aff72722cfd7b1378295c9483dfbcc8f9daf06baff5b8dc9b320df9485f31b15bde96fcaa4629d43a0eee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544522e2743a6ac0c3c4f2da4d934a1d0
SHA140ad6202e6746d9944ff3407dc78bbea7cc0a031
SHA256e4adeac68eedc7344d31e960ed4ad3a8aec70b55cbca328453ead179290d6f2c
SHA512b252a8b2af0103cab11d62af83a45dc6299afa19f8a52be14764006dce629e6ad5e687fa92a7085d94fbac8ba346c581617c3aafb264bfdb2deafcc3748ea6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d0b7e12e18e8d87c2226a5c66507bc4
SHA1f958db09570827e5fecb8621f4c9ef7fbc2d8738
SHA2563a7a3fae6022accfded3a7a18f9d71983ea7c274c082fe8d37d5a2ae27d995b8
SHA512f35b52fe03daf7bcf9054a1b157008f27910f1e84f1ee226393ab6500eb48cb563cbcc076a270be4e72a4a59cacce933ee3e9dcc8e745806867fe54422c8bf6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a