Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
648ab6165e0619da5cf0576f5e06d2ef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
648ab6165e0619da5cf0576f5e06d2ef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
648ab6165e0619da5cf0576f5e06d2ef_JaffaCakes118.html
-
Size
461KB
-
MD5
648ab6165e0619da5cf0576f5e06d2ef
-
SHA1
0cd968fb9d67565c615f712de6535e010e3c4ac7
-
SHA256
070259d9488805d1fc480da912c524e250f666d283475ca33bad0dc3fe1360e4
-
SHA512
c54c63aff74759c65e91e09dff0236501d36815cb1d02e917653424092c81ef5c5324be15bd0b626f598a56a2e6916d00a69a63867a0afc3eddc5bd6c1d6fe3d
-
SSDEEP
6144:SXsMYod+X3oI+YNwsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3W5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005bbb00f80c00b149be6e3df1be580eeb00000000020000000000106600000001000020000000f63604b85efd5f6b56df408f508a6b62d6e2905784660ea95fc6aa1afd5fb782000000000e800000000200002000000023b3729c94eab022f16d39bd5484c6dff59e0074e80486ae14a278d1c64b41d9200000007ede04259f427893b60000dcfcbd8a4b09c64df6e18cec442b26f812a4c2685d40000000aa16d6c529aac3ce2ea4e1b8785c381670382189ec6b9bb381176b4cee32a3724d0c4edf180fddf5ca9216b395afd289004359402f254316a8db40782e59987d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{120E9A01-17AB-11EF-A336-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808001ebb7abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2216 iexplore.exe 2216 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\648ab6165e0619da5cf0576f5e06d2ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cc175a0b933ce044338ae1298987869
SHA1b7d4938df0d262c71cd5336efd4ba8fca956e517
SHA2565b73a83209cfdc752cab324500d1602004ed472d39e8fba1e24045b8d5232a45
SHA512dbb496ad3ceacb3d0a36fa98d720ee452b9b6c241ed352729328d0ab9c97fee2c74846265bf768e7074d998dde7d5c9e0bf0a9e34793cc348588fa18c788bcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034fe1c9db2fa3e6a69c4155aed7c941
SHA186fc37613b1481350f1ae5db3e8a637fd9c427b5
SHA2566bfdc1029b208104f231a84c963a9e5a3a92c979e8aedd2b39b8f0ef418194bf
SHA512c2147d35082218ddaacfc69a650f50481b67ed86a84abeeec461f45b18e4942328adc98377a2cf25e948eca1d47de3e391f858d291c8f341d868f9ceceb047df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ce3b40c9fdd3864f9c2950eaa02476
SHA1cd195a70521bde5b1541a7276f8054af53677e11
SHA2569c43d83c7b7d55656b1a73af1ad34939f8f23a4e06575d5934c0fb1e7dec440b
SHA512b278e09052f018ca530222bf8df0c86d0c957c32fdb7fc26bd2896539420d8d0c4b7f7a2fef6b573ae0d18f86c2331bd63779af929b15a8e41dcda785ee32cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50568c1fdc41ff7546478bdd799346e08
SHA1995e9ad2a4dfd2425d7d10248d34a3ffecdc8f49
SHA25661bd1f2349104364094a04e92980669c072307e61a493385eaca7e1c40194865
SHA5129cb4bfab0bd91200b39aab612c8bbd74f3f0482fde8995f2d9d67e44a8b090d8782b2324017fedbeeae365f1e864c13556fce6639e7ddd569cbf25dfbe367cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4888de748f371091cf0ff19acc4428
SHA1636a49c5b7ac1931cd1962a4bbd214be01e2cf58
SHA2566d03f96f40bb7dc8b541947c03c323b9ff3183aebdd5814c04e845821a82ea9a
SHA51250e9652ef74774694086dd11b66c000ab8d9032b2ec5e37f0352f08986e28875633bfa5de2aed976b4e2ee4dd23f353bff09108eb2ab90a99f5e35b2d7e7b461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56974e7ecda89d21747affe6c18b4a63c
SHA179511349d1e2eb8d5217af69769dcc4c33e0377d
SHA2568a3bcafcf0ee957a33adc378a4160be93e145f2c2d2e4bf24f99108d340e2155
SHA512b5f0f9d1921c708f93761a1e9348baa9008f6f0397e86a207032ebf21123407ab3e7071c046f4446c818bea24646e19c305c82a76c2431d0410cf7c6a36eb7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d677a07f1a1d658a29fdd9f9d81d61a4
SHA1c9d425dab95b36c91a9b4e1658e02b88b4c32575
SHA256de63c7adc735ee9f5e5e02d3c549da68141439be044330d23d0746e0f9b7f632
SHA512c443f94ad8712267b97ef3b60f05dff67e5f40c38990c3e1d1ea0a555e854e26a164964e96d2d49184c9a272e9244c394768f2f2e2d26bf85c64e5c51cfd808e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50257d6e9180258b11800c32480f7deb3
SHA184ff78e8518f5269dfb0b2cb35b78f557b7b6ef5
SHA256916159d031e579d19987d215ca0883e82ce16985067297478f4a09f970c4ad23
SHA5128c30974fce547cc381e2e35d920ab8f9685e0997e4b052a6fcd73714c911b5bff767f2a7b9da979ee3d0986691726daca2ebd257cc9b0cac90b76765326c1151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a72fa18899d0cbeded6bc97813b4c2df
SHA13283e10b8b4b93368f9a5f265205e7d85c3a0ca8
SHA256e177767c526169aadd8b13345709eebbd717b541338818ee6f2d09b60339bba1
SHA5120014c7ae9805f96d53ff7d78c9c286faf0480898a1734726f26d60bdbb6afbc127dc16622c416e98ca5ff7cfc9fb52ba785a763d5134549f6f3ec9f16fd8c500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985930abf85c0e63d071a7f05a65c094
SHA1fb4d79c10c838446269630a3637dc5230eb9d25d
SHA256683faa5d7f55564520ed8852fe5dd157c6144677afe410a7e464bc8e9b2b6e46
SHA5128cd037643778863f38f01e204be0f995da775dcb14d6b9a5d3c1f8ee3b3b80295f0ff8172468e9647a461b7722528fa5afb9ca56251f432e5e5e484165b18529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d83c0178a482b96445377d3e126c2ab
SHA131995342f21ad64aec3df03c876cfccc3cbfcb13
SHA256fcf5424cca9f888eecb67ff7b0fe6d2aceaf8f5b04717f7d178bfd871ab5ae86
SHA512456b05844a0b33302fd7dbf3ff58b1643ed2533c8f6eddbaf6417cd0a1095a7af7f3a366ebeffcb4d1053f955b312772da34f33381a42aea00ad37bcd0c7cff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b20a07235116e573bf32088fc260770
SHA1d0390833ccd73037f4eb3e7b82c7333ae45a0ddd
SHA2560c91b9d033b60eb9bb7e9a540ea671d8aa5a1163bce2e509451f850a1146a31e
SHA512c9239ae9f2b4bca7591a5e7cbb5b7b41d4f6af33bb310f2caa91232e0f6c586666ecd767aa331b758acfe473afd97f331f2821b63bedd9b6ba16e4752b1f6ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3f268c9f384ec192bba014ebc92d90
SHA1087b448452082ccbbe8e76b590507ed77c6c9e1e
SHA2566124ef3c420bf9a51c59c4cdbf3a5e4e82c413ff566fabc9aadcb0595405fb76
SHA51261218bc9276e41fa74c908e7e43faa342bbf99f00caadc64561938650e1d7e565f361df99dc5863d7b15e1152e25117c4ffdf90f833a5925dbe41aec884ec2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7331ec99c0ed74122b4c839d3a6af1
SHA10a921c0954523ad9d0f4440a2bfa240e6dac34b4
SHA256520dc48bfae6decf5c8199528e4a720e225e0eeb2fa995bbebdc07aa39857df4
SHA512e566697a1f38e19837413d49e8e2be4b4f5ec81b1ff06a3d2a41d28e637b15b6c61cf533f08f2b6b2194c3ea721f647af0ece4321423b37451071cc737712ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2243d002e52024718a0e0d7dbe5b490
SHA1fdb27176b7f2906c3c31640ea5dc2b0f7162fe74
SHA256e56818ce93169dcc3491154929edaa24b1e587ba4fff57943aa2df49574c4d6c
SHA51210400004c32f5c2144a9d0fca0b7add71f76136718f4ce354c0e2506c19783b4781d5f045ac1cb8b777d247c29020eb0757eac0df311ec445191495545dc7553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b42cb13a6a277e0f564808d1ded5344
SHA145e175b1fb59ef454de8cc5ae5837f958793a9c4
SHA256c380712b535bc69d61a99a81053668a5f7420f54fbeb1d3ff4808b1151ad0806
SHA5129c25c6a329d3b4ba3b155a84ea84052e59ea3f398d1bd45a2dcc548c68c2636fdf271148d7d2291699eaf835531adc56ada34a183c93145863271a3526fd4552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922c1f6d80d9f1b5500d2f601ea331db
SHA1ab62fc52dc7c13b2ae5a2412db4357801dd579d3
SHA2564569349056bba0e849635edbf45aa3061116cd474be0e6479fc9572f310c00f9
SHA51207f04f04c3e6402cd448fa2986ee17d28fd8f0a7f11689435839387eca82cab4b80850ebe3c680a55f00c09fc0b723848952072a3d0b728b2c262dfd889b97ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d782a193779ee8b2f688bfd2c65bfc2e
SHA11874a6cfbbcfc01929730a842db4dedb2d92653c
SHA256c7cb695efb4b19b3d6c189df834fcbb4d048e754488ffe8f4b0bec20b076ce18
SHA5125bbb2f05f77ba04748b34139547702007364a9e059bddc01ee768afe629cd6c0dd9bfd1ac36784e7f5098d43e413b38725c65c1a718952424947be63e2ed850b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580eb7ef55f1fb2f2b453ad6679e7e630
SHA124103b219ec66eb71f02810074f4164ec66ccc9c
SHA2564ad65f270e2222e19e1c3bbc3f20d70ec69a65ca310d35da4648344023797a5e
SHA512844263b1e1d3518f85275c376a32862e73429dfdc8e8683d4ee2c0a699e43f0fd936aac7cb2bee2e7d010da7cbee2cc03da9df6c27b33b2bee9240d4a732359c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a