Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
64877460eb27a3d1d5bdb4ad7468fdde_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64877460eb27a3d1d5bdb4ad7468fdde_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64877460eb27a3d1d5bdb4ad7468fdde_JaffaCakes118.html
-
Size
4KB
-
MD5
64877460eb27a3d1d5bdb4ad7468fdde
-
SHA1
7d6156830a703ad47e7a4541d944101cb511a2b6
-
SHA256
70ce78b779e87991df897f3d1200efd2c66dad6f867c9ae5937ab2399f8b75e9
-
SHA512
6421b7c4ffb54e6ea9415db2787cf9e5c22541fbe8f21491025eb5c9be4493295a8eaf03ae9a281c2d1bbdafd54508e8017c83334131bc2f9aa41c2803cd1c9b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ov0tEd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02fdf3eb7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e38a51e1bed66a4686e78c2313ad53ee00000000020000000000106600000001000020000000de582e44298bb6d57ea74fd14f4e79b1a967278c5d1caed368a97e7f32ec7a8d000000000e80000000020000200000008e2bbc1574bb66fe91f8a748a57a7931dadac22dc4f48d445843d003406e02b320000000c9d21730bf082aefb4247c5f2bb8323e3d3502ffb2913dbb6cd2568ed7ee66894000000031963aae96cb12ede2bea9658547e621592f5ae9e991e2af74ac57f01c13e1c08638cb06fc99fba59dfcd1cfba3fd2738636acbb46b9f505e8613c18b022a092 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69C84B21-17AA-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1412 iexplore.exe 1412 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1412 wrote to memory of 2040 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 2040 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 2040 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 2040 1412 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64877460eb27a3d1d5bdb4ad7468fdde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5017d951507f1ccdda65dcef1ecf5d3a0
SHA161a6cb85a1afd4662821661ccf899ec135e4fae5
SHA25608c068e8f0ca3e905a267ba23c7c70296a2911765d71b3b213b8b8679f47770f
SHA51217295442e91f06c386ab7ba0c9dbc81f088a8780bb18024f0f842714be3b7b35ed2cb0c7584d1d3612f14a9a676d936060a2868042526c75002bb1bbbfb1fe74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b6e1a04a46c3639ac3f9de3560742e
SHA1da2270d086d1b14ca063b91cbbca88dd1805dd71
SHA256110d1911e45ffcfac20a3ecbb07c35d979c3dd0769dbb98783a05f1bb5625192
SHA5121b919d036e946cc6c365db86fe3c933d8071c4085119e557b397a28a6faef60fbf839e448303bd2a71abf84b26533717204cf900c23b612ec46a763d7ed71e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4b565ec93a9d8d36cd7c6b8526c50e
SHA1d6c4ce2669f1fd4f5173f85c4f88747eb0701212
SHA256795cd3ec46b24d68b705a19e0cbe7c702204617205d8a752402d5eda65ad8950
SHA5129d50a872013a64516d6b90f450583d30473cd8023ae637c85cf91ed8dce9be193b4c7284f06323072c84ba63dac61a055959613561487ce95e70746eda9adc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519cd9ce2d114bce0185479c66a1e85f0
SHA182943a003d6e0a9b08f1b4e764b638033c306917
SHA2561e3e7fd8a5176222d2f632d2db6378c0512383cabbe5e93d324cc65ac89bb07d
SHA512ca768c0760a2aa4733ec863c5f5c46aa49e5663d2b8ade1c43e8ebb8ba61208e7bb7e5bc392a2e47122ba29bd8c952852b97f7c24e8de80382419cfedec19ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507979409910959b159a92ea01ecb2387
SHA1cd8db6336dd49054de8f58c64476f9063637c3f0
SHA256d736b36860841d40d063fc4caedee9fb8570437d98330af53524719c0a8ce842
SHA5124d612e3af098069af6cf9e12f0c536d64c76583f76487f35b0dc07ffe8a504c36f55d48c42ff8feb0d879ad99ce0aa7fd02057f000fdb6bcc93d4ea624fa6269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d2cd0f24b8419dff9afb3815b58cd0
SHA17b0e4ba478da31635d0dfde5a8a61826a3049692
SHA256ed987270c6fdd1ea786c1c307f9301bfc6a94460798816f53f74c40cc706437c
SHA512418f71397f846de627e3e83d0e9738a4c29f7a0b68063d96b7e32df8d681fe74bbd9f603d8fa7b299487f0fa9b017e25dddce37b0cdfc2a8b2f8b72932c97ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58231351ca204e9a684a6e70242ea2d67
SHA12f9f4cd1285e3faf7c21a5e7354c6513508eeffb
SHA25655781b76266fbc5e48cc49f6b72ea91fb33b46e22e34c862efc2e1a65ccdddcb
SHA512f86082bd1c49c85b1322affbcf9225b02c6ce82af0c9702dca9f2de59e2681af40e3b97ba9cb066ced4d4d6a069b7e1e92a8d607ab33e781a70e0e566ae8b3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5615adc9439686c25919bcb781a98c15e
SHA1dde4d84c487b80c153b40d5bd1c2280aa110ad79
SHA256d098d2c477a1d8a1e06cdd0dcdf626d0b06b6d152bd5af191f455bc436f83640
SHA512285ab8c6151ebcd4d8cf10131c76cbdd763f881c16c9deb7da3ecb5a200471ffcda7fb5333da54a9ad40c4dfa3e7b9872bc39f47bd4eb47d1928a4d5e8993315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f07e552ea26c48e95a6e421fe647c313
SHA13d97241a9c32134439ce8a6959f1933e3480381c
SHA256804fb99f32e73cda4192ccd882410173925badbc97248bf80905194053b88b6f
SHA512b6e9b407a400cbffc945a6b42aedb23982daf74a35777ebf9bcd490a045150189dc63cb737c7f1eef57398c35d21065b5f2caa560a6a8cc774bb0224d525756e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11336b10aa75a97c1a9bb1c8b78ce98
SHA1a395dbaeec80b75c9127828bcef37fd3fb2be558
SHA2566637a0d597b91f220814ca6c307bf4b2e1283d0df3869a3df2e040c01b1330bb
SHA512f97beca4ea3c279e2459ca5cea85299053d9b7363c7ab9ebe90b3511f3b561401add7346591f8b889a23f79bb47987ad13911e77395f08bfbf0c4b25f38538b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e2d48cc81bf1177144ab51eb9eb9be
SHA1c946a497ff93bd679a668679b95e184daff87b2a
SHA256a06fbf84fb6a3081d09f3f8f0bb7ab4ca57466137845bca09d81eb5b40e94cc3
SHA512c7359db30152d6a9fa2a1fc55314b41f5d34b2cc00578ab681aec4b30fd0daaef26d332593f3821bafda3643d28e811dcd9237d56f4885de7558f57272f3744d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5ef42b0e9a3cb5f04dd3b165205c87
SHA150cbb40a7c90dd5bff29e762bede8ff9fed00805
SHA2567403e7e23d8ee56c4810b19c88083bfa6cd05a61cf6fe8f57f5a1bd66ee50076
SHA5121300df6eaf53f6bc6df5aebce00cc88faf4bcce46eb5f1b68132584ac932172006cd9b776da93d46ea8638064bf60c3ce36630df55880c06e0ae1138c47809df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6c1b1b1cc235df0d1f1a0917abf6f6
SHA1d79d76e972d9e90119d3478cf391f3b159d5e6d4
SHA25601e9692e5113e28eb63792ba64fb1fefebdb04729aa0e580d7ba4615ae16b43f
SHA512b19c7eaf4d5512a6d429f5a133882b077eb135f175b9f3b5088d765cdb7604f18ac35bc1e2076f90da5eaf3059163a99cde22783b19dc7db4bd1dc45601b83c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a81f1ded730b27d56bf7a386deb223
SHA1fe873e730bd0179d79e16e329339ed38508fbba9
SHA25694288b50133f7b6ba18a5b1358cdea4d39ac9014e597fcc4f3a73e99daed1a81
SHA512a4c460c2b1568ff4a8447449aec7a83c70a8e22c613bd819c103213d8c460ab30f7290f1e0348a3e12fda5d0be11b1fe3cddcb7309193161341cf6b39a3357ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50133a67bb5b098e9cfc23fb1aeffb1aa
SHA19a137086ae30934a3c197bd78db2b79583ccafda
SHA256755544db8886c46b5e837659df4aebf919bda8bff9f07f8b3f25d34a2b924874
SHA5123fca91ee854103226c90a43a7a79669b44e105bfef517986e0cc3798d1b7b223cf5ded1c01326cbb9fcedcfe485821cbe3e916f3ae8cdba28276077f477c0cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c84150671dbda1ba7a78555c700b61ec
SHA12423a4176df64dc061f86de16872a425e448f794
SHA256d86fb858ba03e5d5367802df2e686bcc59d0a543e1e6cf77489338be62150688
SHA512cc80fb9d14d1de70ec00902e954205b188e12b296b38fd7358a914a4b78616993c9d856f94c2ee47435df3199cde9459668d678d1c0d30afd9220d606b08a8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557184eb92a704a0ff939b88f3a1e1023
SHA18b5c8e6223710cfb209fb85abc31fec625c89ad1
SHA2568500fd572851803ff9550530e8ca3c75bf2f92613f394d8f46f0c8a3c9064d58
SHA512770738cde7dcfc06c9bfcd26438d6ab788d9b9061f08c03da9ae3272019414582bc5f9ddd838f97fa92adb3349bd76c0d88303e1d603c36b9fbb4ca79925d91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c67ac4091b15b575eccfa1b944e9bd
SHA16587be4ed20cd6e13c46699c37d2583bb3f5beeb
SHA2568f66b34fc7cb900cc2360a695905640627258b5dcbf859cbe94c813487728030
SHA51229a5626c53bd7b388d2494818223efa7b6cdeccbf98913aacbe1210f9f766a586a297041df1f2aff8600dab808502770716d5254f6e0a6861fec71ed7354c678
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a