Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
64891fbda08c4d4f4255e6fe69470156_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64891fbda08c4d4f4255e6fe69470156_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64891fbda08c4d4f4255e6fe69470156_JaffaCakes118.html
-
Size
461KB
-
MD5
64891fbda08c4d4f4255e6fe69470156
-
SHA1
3c255fafb5d42f31d10dff470a961276750d6624
-
SHA256
ac0a12a076e210a9aded6fe203d2cd1ba000c3eb497da5c3500f7ce110c8bacb
-
SHA512
571e75dda9678227498e1721880498b1dd68a6833bedce66627b51a58bf18775b09ea667a559c0d9fe37e286be074c6dc8c42f8671ddc54ec495baa9196aeaae
-
SSDEEP
6144:S5sMYod+X3oI+YaQHQNQUsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3S5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE19D591-17AA-11EF-BE4D-CE57F181EBEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000061a56598e2bc6cda7d5ea738050641cf00f09a5afac13826da1af88ebb35a57d000000000e800000000200002000000030a832b247203bb490fc1c84d7dc90ca09817cd3949b735d1e21514f27752bc42000000013f93eba1ef7204783b4ff1e1ed3f3cfd745598cc524d842196652d375aa97a940000000a2e09125fea7a9bae8b33e9be42fb6bf4e740cded4f14f714fb68d4d18ea22c9e8f0c03e33c9d3ba7d0f2f68a38c8dc7315a8ba911a9304e32265c1671a1a7e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d024a396b7abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2108 iexplore.exe 2108 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2108 wrote to memory of 2788 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2788 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2788 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2788 2108 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64891fbda08c4d4f4255e6fe69470156_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5846b0d499f577122341111db942274ae
SHA16443b809cd5dcac2fa24c6f213b0610f8d931d0a
SHA256a2677f1d8f12cc0026a6503d9cb4030a6ff3e2f902b433c0308ab665b2d952b3
SHA51222dfb8b955941fbe9fa36e300bcafb8625cc3ed6657cd05abc3a748c814bce4598631f023ba4a20415b3c74d66ca158d6bebb39fbebe6ca79f7eb3becd5d2ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5161b0cba8feaa44169cfeaf50f047939
SHA163aaeb5a75a31fdb5aecee4951c02272da78bca9
SHA2567bbc99b048bea84078c683af013f7e6dbca58807e69e8c51297f102330911b2b
SHA51233a0c770bf3448dd35080db8e940df1ba9b903efd8aeeaa723373747ad30e33da2aac2599e759abcd7958afebcfb0f2c1e8bc8c1725cec37a4ed98e6f533889a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a6e4353260052f24e2d46c468ac4f452
SHA1e2e2bd3e31e077e74f37c816f9434e817ae14ee6
SHA256b857d8272b14aee6938e8902ac1cd54ab91439b78a6c78df8690de96550e628e
SHA51256cf47aa3381bf85a225c3cd2678b0dcd512ba3ae97cf7cd50cf93ae2e857778a8b64d1fd1080c4073ef4988fd432748b8f5ac21bf024522c6105fbe83c33583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f1f3d53e52333e372899c2bbcc9da380
SHA14a896058b263ab5f5e23ea6f79e5a98ace946c63
SHA256368a517370de5853b22b97d4308e0e88169ac69fa29568f8212ba9d63014c076
SHA512a68b1927977eceb82f4d457bfbf2c3505952ee09580e3ca74a7179a136762974004b5bffe08511066575cb8d22b621fa8c603461ea0831bd5cea6a18a396ef7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c7e7063f09f5b072a7748526feef0066
SHA1b4c802469bf02d10f4644e2e779e6558416d8b7b
SHA256b06a89b82fb862871faedc4cb8089ae54c71973e8f52ea86ab4c740b8b37ebd1
SHA512ec185b470d7317fea5f02d3d03cad749f0bfbe367450aea985320667c075b86b8dd8c10253e0c84220dce57213785fd236e17dda65862c422d9a24076ba43f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53497140062c2872e4fc31da61a82a830
SHA162f7465387338c49550545719e1865df2ffa2643
SHA256478e5ef6534fc971400a1aa1991a68de456fc5c9bd1c01d6b645b92ac319cc03
SHA51243a66be88d104424d2f1136f5c7e2eb8d55bf12bbc4569a1843f983e84cd89df4b1fc540393af0be65bb6d22e5dbf742bde92c1d88f126df9ca53fa59c8c48c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5863e4830c7be7c8c6bb875c39f2f3e99
SHA19573debc44e3e1cdcdec31cd77cd34485bf3832f
SHA256aae113fae957ae3f418a0de1773c74e0867d32831478715e5da762313b648a1d
SHA51275e58ae0965fa4c87dc454ee1e4ea4ee7c41e05c7d1f18763cd1d3b7de8290122b747ff3991483a73fd991b0d5de900a83a57ce32723a23003e039efc7a3aa5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fac40c35f68c0bff965c6f17ffd4ba6b
SHA1b24c10b90b133b34d5fd2f05db7577659569c3c5
SHA256bbd72c384b1b6ee2b4fc12480c71dba5c4c01df2320029abe92ec17120b77014
SHA51232743837c24dc672b55057c6a2def9388dafae541dff37163ce38181c4acd1071128e284c53ebd8f07992eda84cc6b6bf09a06bd36fe85ba51d48f7a4e8daabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e399727d6a29e4e088ede39d6d0ca65b
SHA108baa5d5b9c80fe2246077bbf565b3e29b32a472
SHA2564980bedb7578949123c50f59d1b425e8bfb0fcc2e4ee90a63c9e2df49372e53c
SHA512582a015541fff334a51488ae12ff304e973c76169e9f537c2b789074c3b77dd91fec685f185ee6e2716a9b2315d4dd59b9588fcc239e3473a2da30f313c300dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD510554d0dddbc581280c4cd8cd83d8cc6
SHA1a14e0906b22ec9860bbb6b55a0f24b4fbfcc2fd2
SHA2566a979facbfec4c0796d54867395784d5c74b4ccc667c3645cecced9b2ff8cb9d
SHA5127eda9e97b980924f8d799523cdf5db1d2d39460d01c463b2b688e431a9d1ed1e5325493d061fa2d832134f72e5632ec0d0f19e849e0f1879f5577087df1261d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cd98cd3a86189f8b2824577cf43c5486
SHA1b3fc2e6c0397d21b983f4de3ab6b91e8f5009f5c
SHA2561818106eb5dfdab610a6285dce1a472d8b0cbf127f2f0a44877c1da4f59a7d42
SHA512f2a8bb7018fbcadf9d6e6b7d380d751a22cf33124fd13b9ed4d3f0466602e731565d04e55f02ea684e966afe88e0fb19ac6f36f7638e7f05de0cfa2d7547d806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d60f2d229f767f5bc7f7c20fa451dfda
SHA152439513e6308ec1d07216aeabcc00f18b71e1e4
SHA2565d462582353f0228312a5deca558e202a01505476cb68dcf872e58576264edc8
SHA51293c17ac700b1c13588f2d575cc4a718f09baafc6fdaac07d7b6986413d196d4d6aa1f4f77353616a35f853ce18c5cb982586a2f0cc0f7329238c546c7b1876d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ead31d657e7486fb759a52688907700a
SHA1fee70d36b4ce48ef4cc0c4a83412c5e8e65ba466
SHA256cff9b306d2e75624294ff4e2286c72666b0002caed41f5f194b98692c66416d0
SHA512612de0ba49c500de32ca411b993fa39d36eee94bd1bd3d9ae3bf8c108e990c8ab6cbd8c18a684320f55e1b1a160766e8d5519c2caad9bae0864d5718af413103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53e2b6033d49197f153405eac79fa6005
SHA1d5d1972df6e1d589a22958dd2ed1c4780f67c952
SHA256e1eeded73e5d7151c004cd8e9d69d80efe66416d0fcf53c01ebefc46c764a0c6
SHA512450e8974682e23ed0bea85344f7de4af040d805096deec40c00b7e7e60be919edc3ab78256dec43046b9e1bbe424fc7957c8e3ee76774cc0d1cd8aedf0565a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f17484106e390c21b94a70da1333c378
SHA1f5ff9aa94f6f50b67af94497251a2a4ead03b972
SHA256108a5aaed8eda6e2dcb80ada58b7c685ce8931c448f3e7c5ef97596ef23f4b14
SHA512b302c5e854a0af1540b82a41a506cb03d15526882bd8a02af2c1676bc244282ead15401e3f53831c2f4c6c16f3082314bac28aa1ac273b534632810ea33be89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5df8fcf0efb48ae2fb260a870addbae31
SHA16fcdf08e8172a0b5c13339a02b9161de8cb699d2
SHA25667a75d2815bcbe3b331981b2adba47ec4f4f70163fd3742a39b815d39a039863
SHA5124ee99424830d6a7588c40b55965e2fe43d6769427e52ce57c41c4e11ac0a8500ee8335b05b17380e92a05f1d45a7677841cb9c7441fee0a836b00c28654a9bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fb418365543bba73e37b5ba730824007
SHA1dad05895b8bcd1d3e2599909593667a38f2c5bf0
SHA256ffe1b28065a739cc7afe499b10fda794c44fad9d825ddad67af04b7ef289f730
SHA5128ed255a82ef94acbf3f59dc4cab443f60b757e9cad7180938d3ef5e90f967bddb8c7ce32b471b38815ae484287a6900846f245a6b1315823adcaf4625cdc60ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d9da7f59ac34d66950467f2882b40d5a
SHA106b7ff372fa0a538eb878a91903edd7099aca9fd
SHA2560ec3a52d83afa0d47e84e552508de75e8675ec46af7c6f478e69d3fa2fc6800b
SHA5128be1b9ff57b6314797ed9f03da4c2092c5241d9612606bb166efc90aec8e84f51f78b342c0f67fc5d80d59026067f65b948a91a00b091153ac19629f3e81519c
-
C:\Users\Admin\AppData\Local\Temp\Cab4E90.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4EF1.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a