Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
648a91180a04ac24e4270e76aea8513a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
648a91180a04ac24e4270e76aea8513a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
648a91180a04ac24e4270e76aea8513a_JaffaCakes118.html
-
Size
11KB
-
MD5
648a91180a04ac24e4270e76aea8513a
-
SHA1
239d861fbe0e843ff1d1d4ed35c6dd4894c8c3fa
-
SHA256
7882b0832165d9a94258b28967ae1a2fe156cc8562216a0a0e281cf19320a685
-
SHA512
ea29480bebfeb5da11ca9ae11d89cb0fc33692260fbbfa9735117b901bdbd2048cdf0d34511da5157bca48c47b2923a1807433a16cc4d3f40d94248591ef501f
-
SSDEEP
192:GoN+xC4IdFxUzJKSNx8nDy7/TwwlegY4/ym5iXw+JUoVqNx00U7/:G8+xC4OYzYDyIwwgDyyiXw+JbVqNxJK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffe016c260ae7345ba1719555ab7a9e2000000000200000000001066000000010000200000002831cd2579c0c3ceb0bc2cacb8e75252e43bf0dd02d77455dadb8e0b64835198000000000e8000000002000020000000cde13b4920091a061cc6a6f0eff8f56a2962ce724d0aa0626c2b456ab56470ff200000004509f954ac95fbed5d7ae3c041081996d98b718af11b6d84cb3b99cb9202c686400000005505703ecd47f4a7b01180d7d263c17e566b5a913cb6349f3e35f465b5ba0c8c7acb7ab444a8faa61c7f7cab4c9c1d4bb3ada979deda0db8eefda0b08bd12885 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{089EC4E1-17AB-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c3c3ddb7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2360 iexplore.exe 2360 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2360 wrote to memory of 2556 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2556 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2556 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 2556 2360 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\648a91180a04ac24e4270e76aea8513a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9d590479bced9374c5e63f89678137
SHA19dc1faca6083dfa29fa24580e7c31c11bd76127b
SHA256d297c5f605759f6ff8cbe845b555a65f3531d0fc83891e60e924a5c5ddf37a6e
SHA512637e681f46673368f633ba88ff33b136d8a6c4455fc0294501e59b75316b7ac62e4068e6690bf23092124953222300a6d2b5454b71aa7736c1a7a77e76976585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c32e5c4e5424cc47cebb9312a14ee7
SHA17cf2bb6335a8365105e858df948b7af12cc4f6bf
SHA25699f81cbbeb31890c5ab154cfb2808d3e2fcdb53b0c469f62c1fbd622354520ef
SHA512259124f91663bb471ce0b3da95c1a9bf880ca8430ca6367260f256979ca68f468638faf689866c1c4c43e25370783be93011a7dbc82e7c67833886748e6619d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d568991d4ccde92f38b026e88b37b4
SHA17604ae365ab324af3419b5fe04582281c062eff6
SHA2563f8d1177e8d485c764eb25b7fd89d6c05f4882892b95a7468199878b1d85cdbd
SHA5129d47b0b5d337047ad065fb12c5a456bb8f52b497154267b25f177009642d449218e6e174f393966a77b9f1a763c2272c7f22b22230c7d7e72075b682da4b8e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c027913156b64bd1d1b9ac90f61c2b96
SHA1c3917bfd06f08e8ef5cdeff92e9f6a37de98a4e0
SHA256fbe5840812916121a861f57e7039345c3a2f35e84d4ce1337ec86e8bb110c6e4
SHA512f8235653c8ed6ef497edfc4acea5fd4acb3d02b4ba16cfed219ba3c4adf41c1d995a47a601ac4657b3aaf517640e815087afafa8ccd656dd15526f880270017a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d75f959b0c0cb63aa04c5a69792ebb
SHA1337324b10a441ca0d60b0c171240a8dcb4eb7312
SHA256489b273981c3e2bbed0cc5fcfbba9037bdfa79888e7380e374a06fcdfa47d43e
SHA512bd49868cfe3c7a9493be521275870c530a111ebe1aae12d87268e884fbebc84aee0df8753c66f497ffb7a2913192495170fd5bfbf4fb162b357073a232aef3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526716a595c1b3581602a70c614767669
SHA128631400488f0707ce160b09f8b1361b9ed3ac2e
SHA256e03712eb0e496c25a9d36bce675de23fa6cc7c59443cb81fc6c3ad5d930fe593
SHA512297dea3fc8c279fc898d6550492418225393256199787aa042117d63400cb839ee13eee007c8b020bae0d795696414fd9054182e08a21704f9b3569cabe42809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6bd89584849ff55fb4880aeae2272b
SHA1bd68bc9b0ade74c34098d1f9ccf5b9fc902c9a29
SHA256fa8eb7538e753a115845e3b2634be6397ad6ba9bbc25c87e73f65d853f03e1f6
SHA5127601d1435457aafcd3376cda88e549aee6bb3cf3de7e9bb64d88e303cf7dacc6dc4640b6d5178d9e1af692fb40e54535d0630ac0869ec4f511946c94d47c2bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f199bf163b192d22b5e93026d6bf9f92
SHA16b09bcdee009df7910c41e5d03ffba78df287942
SHA256d072a800153e5e1f4454a62962502a3d7ac98a678f61e12a2535e97844907bab
SHA51238eb2d0d2b183d5c08e8dd76168862acb31315665ba8b7dd50bf69e41b12ff9225ce039f065b1d0e124102cb588c8a292b26e004283be07c207f5d57e6a51968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb3b355a2a57dceb1fa71fed3715efc
SHA1887c384bcf900825ba1a3b775f20fd2b162377ef
SHA2561a411a2cbbb4e463e3aa3a5adc73795ded18e4d6d91573b7e7fb175c36d8d96b
SHA5125562d5e6c51b20cb3e50bccda0610a0068bfde5c26cf328454724127980faca1412289f428e0eac2754c0f8701daedf0082d56ef1d287ad512830e04642171bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a9586d181a2886faca510eebd40b09
SHA1f0f5d6e1b9e8cd19de215bdf0bc621bc7efaef92
SHA25629be3f4242d65e76c9adb426e4d49c924d4e3870f7803e75c9879fe800abb9f8
SHA51266b1ab73d34d36dcde466b6b9e741d74c886c6508677ca0f12242b5254edc0e2eb89537ee69a7f0712ed9062c7167eb5f5231c7cb05cc0a5064168bc672b8040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb53c81fd1c0512e6dffa4c6b600b8f
SHA17c5c970fead7bc3bbe468e43d1146cf6918dfc7b
SHA25647d57f99992540d22e589122f2991225f9293091d553235f369d58a1820a64f1
SHA512ea08b1c6229462a26ed40eda2e7d622d985100c4566d033a65ec52ddc5786f4bf0f4a8a5560220c69728779ee4bb66ccaff5bd0c1bce7e953a77e9b37aa07252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5898e8580dfc3236f8c87c40fd927bc0d
SHA1b693515ed4de1db2c6566939c4f68d6b1a572c57
SHA256286d4093311efc7a795169f2a456dcdb7d9e184f11e1fc747796c762f4e14f97
SHA5126e4e86b1c50736fc2a92d30e6b411c87acce5d142e875b4a5690da312dca8c81f5b34a5fc28dd4b59c9aff6775e9901589a827b8ffa20a3b95b29ef84bb449b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541347c8051cdd216c83faf567e119ad3
SHA1712bcec12bcc20a5387df61f26c5371e33703ba5
SHA2567f8210f9c42f2e5ea781fc7943e26091d8f914677d178d2b1ab91b766a9bf7eb
SHA512ac80efbe49774042d669b95de044200e713d4fd261c859c5b5ddf458161a20439f37ac139b0e2a7e131801666f344742c49ff54a27266df78c08334596c95b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be33fa876acaf423ada6abaca675c5ca
SHA1c36be984aae2bb35c22666dbe2d3225871e81680
SHA256c0c95771321fbe1db4098b31058dceb051c6c3735550bb25d604144623f638d4
SHA51289c2596845ab03a4c43bbbe55a63b222e8b5990d37ac3d18bf1806545e3f717d4dc6b3800d5745dc8d2c73755a669e1d1da3b8ac555ec3fe22bdb5518188e625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e6271aa67829619b963949125eace49
SHA10b77ea93ac4f1fad7ff9f93d1b51eb9bdb5e366f
SHA2560ea5b44d8e409baa062222f397492bf02198407775f6aada878b10fceeb07db1
SHA512ff918b1795419a414da804a157549a3a2ba2894ac478f0a79dc69d4e544ea172a975d3a9c643a32438a0ac0c7afc24f79d807bc24368f895cff25f7d0bceabf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cced08155beb4766c3463b10f9520c19
SHA1fb45371944b80b0e620d4539a3cad386544daacc
SHA2566c4bc2e42681c46e59099304ea25793f462693db990ff78444f3e616950bd03f
SHA51276278a9caa07308121c8d1aafe23946c12875ab0a6c6a3edf7d2478bdac8e825d404ce38d00db20fb64b8b56b4c2b9fb436c7bc7334dbde9d51ab08bceaeeedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ab8b3a58678ff4f05f267c466dee8a
SHA195e659598bace0c7d465a59cac20cf0ea9e58b02
SHA25684d477961bc336a1c01ac4de5d29e2c9549f8d1b163edbf033967a2ac4707e94
SHA512314a9d94268a9537cb60d271eec0885c9a867ce2f2f8a80cdbfacf78d2c62a93b538f6a89d174b7774d5976b1b419826eda7f7f687a663c31a0b985a1f3b7f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6dc48d0bde2c90a6430e29150b5ea28
SHA13abbce90143e738d52f16f90aa3dabbb95e53e1f
SHA2567e8a0784b6eee9d5b556570618b26e65c5492002af50af93441ddb8a810d3e03
SHA512b59ffef8df14f643db0f249154c6ba3b5dcdb61b924fb2759dc5e9932de52e5b39a2cad43544c857028d955408c552fbbe0335fbb7e7a875fa8511b0c4ad403c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a