Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
64b5528c57407dc365fd51ab52c40f88_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64b5528c57407dc365fd51ab52c40f88_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
64b5528c57407dc365fd51ab52c40f88_JaffaCakes118.html
-
Size
4KB
-
MD5
64b5528c57407dc365fd51ab52c40f88
-
SHA1
3032e16bf97cf81f8b65de02a99a601d98117264
-
SHA256
6a58cfa4c43334a3227197fac676fd545021b476bcb78d894cc2c7bf64156e66
-
SHA512
fb6025babbf779afd337f84eec830f6459e7d8335623603cc46f898a553cf239b1c891a6824b62a08724686acb0fa2d3dce78b38c54d9736a4dc7a6229a628e3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oTCdBC8/:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDh
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106fb1dcbfabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486185" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{080D6881-17B3-11EF-99F9-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008fad4b5ecf33682c8b285c21d6b89d850811de4cc6c20e0272fa74967393ea51000000000e80000000020000200000005d4a1716c6290ad668f0ff11e3ee3962f812baa50d4b6cc6590bf08773dae4a920000000b883c40ea6997a10d9ddde5b40c1870e9de4f1ee856d3218d74f03bd194a3e5940000000ce054b633a5d80e7821050f3d8d75f8b23fe6205295d6ac6aed54aadd92b956a67df7eae8f6404e5c167548a6c70bb8dbd8d4d4400e5c09895b91eaaf3207048 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2420 iexplore.exe 2420 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2420 wrote to memory of 2376 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2376 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2376 2420 iexplore.exe IEXPLORE.EXE PID 2420 wrote to memory of 2376 2420 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64b5528c57407dc365fd51ab52c40f88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50957ee320114958b328907882f79219f
SHA1509c6e0edb325ddd439b5f579fe0eb3db87754e7
SHA25642e0fcf48fc35801ed6276492a22a98b6559fea5a5f055908586799682bf9aeb
SHA51267ef5485bf81ce04d1c5f588de1040f83526569820082ccf503ad515fd2bb647b23c847012898abda81bd69b38be75f909c79c6f7b2942b856d70b0b3adc232e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6f0ef9d3d220fb020c40a5b9ba206df
SHA194afbb360ea7df723c7293896026b5b0eb104fcd
SHA25622c9c45aa6af49e697a714d751cfdd405f711d1f8c7d83163d2e621ba79086fc
SHA512fc0e878a57b4fa42baf317c24c4db5bfd730f46ff8374199ce6a5071e8d6c09cd9c0ea0684fd123af68c31c5640f3fd48367f7ece74b44d6283a0bd3b7d0da65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44e8f412949f5014183e75a49e6e8ab
SHA16eb68485d58921970112c342845a43bbc3e00042
SHA256f31f355977a40ae6b82e92b2458c70dfc98fb3f0a2d984aace13bcaff23400a5
SHA512b17e2359082b849a6d38c88ee9f72f7bcdade5e3b9e4f81d50091f9b5c33d7cf1e2afdff05061b911e8e01fdd0e6dcb22f28e1714275db5d1eeba2de5bc6887f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58810861553589475fde2a6f165fde768
SHA11cbf37760f7a7051bfc88886725e7b018a2abf3d
SHA25628ba00f8e9597dfec2e1e3c28cd3b1d200c2c088617c5b7d9d12e38eb1e200ee
SHA5129ef13f4e5de68a5e173e07b4230b8a19c32c66a8ac99dd2d713c9391d79e9c97dfca1248b674e24b0c7c9b9b9b0cb94407f10d61212787dd03a128262cc1b48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4837157ab98c0e426918227d5b241c9
SHA11d4589df0e987d841e93fe6d79bb2c6f200acef6
SHA2560d896256f55f54285232ad51c8455a413ec16ac810d5a16356fcd723de9ac4bd
SHA5124749146cb147fff327c54058c182cc01a818712739e031694d9802a1472fbaafa5b0dc4398338c3e888720372b8ca225e981f93acd694c03df75a8c1f28b3858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da8642d880fce5ffd7ec87276a802ac9
SHA179a96c580f656d95e7c095120e3fdec50cb4ef4f
SHA25639d59c20c5e87b14c6e12db3da5eb566741b07148061d0cd06ed382c53cde9e1
SHA51232568eb41250e3d62a63399bae070a46b9f63f6de2baf25ff0205571f98f72fe542a011a29de6ec291c7880f539af9300b1f1b6770329a8fc194894335dc9432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6ca021e484fc525368eb8f0ae4bf48
SHA116dc2863187317c19cec614384635b934178e859
SHA2560f7105a15afa42c9ee8fffcaf41c7c04f82540497836fbed7f4f21b410d364e8
SHA51250f525348cd6ef969590d1e8153704e0e5e121f6bbb9cc844816221b541c20ceaf63e27cb751043065cbe0db8f1d4cffeabc58138d22d1d5190f8ab82cb18849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547363228616bfcee6a37179c318a301c
SHA15ba8bd5a2b2797ad94cc621c3890b41276324c01
SHA256e29a1ea084e7532166ca47f969dc1423271280900d1c5b45d505295cbc38f395
SHA512380031e09f08bc367de4734b599c9039d1b5e914028709cb6e019c839482989d97b02331e22240f7ac356b41b12f663b8d3562d995ee96dce8fd943f85d269fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06c3a4eed73dce24027995f6d6757a1
SHA16a952f41cd933b929a3b25d11180e48fbc57983d
SHA256df972d838df0ec095d9e309d1af8d4bd519211c5964da06c5d96827d97691bf8
SHA512147c318b15212556337c3d9510c3ba044fb19083e8b6dda1195861ffd17a066ced5b09b7a3d0e82ca5c9d7c3f7b337c6df5b2439d127dcd14c31e0bd3a204ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504c53b2a03fc63be402519cd1e316bbd
SHA1e1106cf3f807c2f830d7be52a9267bbaf583a729
SHA256e7b7ea2b926e98b0afcaa7e5fba7fba8e9ef313c16541dfea73c6ed7acb3f8d1
SHA5121983cde67fb5d575fc0a971dc3ec8ad37c59fb79e8187ce77b36fa54bbbd289ea93f5a5a648b353b2c54374d70785c36d601b1d322677d41f476e870bd7c923c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515060df2680692ed627ce36a74a2cd13
SHA1c698d0ab19766fecbcb66852c9322831cd5de6b4
SHA25697817f0b96604029e0ee17543d6644cce6a86cb266d8890e287fdca4728cf85f
SHA512cc787a0656f39914951289ca108b6fa988a34dab2c749451b21f515ffdd352ff9aed237a311f2eca5438379c5ce808921369b235f868b589a6d52002b44c5ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edecb1cb2022904dbb016ff7647ec2f4
SHA12d339b9df5d7b3cc58a8ab51f89764bce1d1f3f6
SHA25690f85cdcfbf05e97d8899ee823c78c05cb576e648ec7fcdda99555c0000d495d
SHA512ed1e2afa4c1694471993755958d7d5f28caa14a1024b3108e9881e8000fa153a635ec24764188f25988c9e8ac3bcdc5029d83602081b7f6c9e6aef1e62f4e79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9d57176a608ce68465cb4c4b3772e5
SHA16415692fb13d80c9fcac5289390c9df1073ec00c
SHA2567b3b6fd8bef81b3d4037fea5d5200e74ea91d549145ccb5aeee0b0522eafa1ee
SHA512f3dd86904f3a95f6a7d273949d1b81d97be10a323919ed25c7fe719c21f5df3078fc55f301c42f9509f83af940c3dc31bb756660389cb7895a8383cce01d95cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf14640cf513479360447a4a286e083
SHA1fc4206029b88600148e39451e1a2897594d46f6d
SHA2562492ceb4b0d7bbb8537c8d741e68acde1e58e360cbe9dda536ef10f6a425b7f0
SHA512ab56b08cb79141e0596a77a03c82a3579f1383ba91254cae3bc2c917559ef7f3959417987bb6ac885b9b37078d8d5b01213911d58bda898eeac2b044e3cfc8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e52e2ede613f0f7ec52d1d44eff04df5
SHA183c8fdd0a32d88398f6036575aec34554552ce89
SHA25638f9315fbb2132f44c23d2c120feed9b7851800d3ffc3c1c93e31a769dad61fc
SHA512676efc1e636c9ca592feea739d57250136a5fe828af87ca6c2e968b9884a47dd2fac2f1d7c65db256555e8db96d0eb533a8286b292605760c80c18e79aa43f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ed7a22e4a9ebf87c1c0588f4637807b
SHA13520ea660ee85963ba9b4735a8be2d5190b4bf0b
SHA256afbebeff88551aaec1192a56dbc312e9f121f8a3eca93aae7f52b92bfeaf8963
SHA512d2434fbf69ee1f6dd822c2abcc6a3107b78e9c419950ca29581a63a0549522b81b32e8352c727ad30dd0e9dcccdd788fb6bfaa874e03ac257741556b46142797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac425a152adbbbeb96a5e45ae3503cf
SHA1ded95797e2a552ac2fb67f8a3bceef03950874d8
SHA25644e20bc59c2340ae3091f645de692d09bafec80054a4fdf3947b19afb9883a8b
SHA51244ff305396a85b3885803c4b29b1efc32650b7de2c2592760cf33a15e9923d7bf0fab0e3d095adb98b4014188f6a4836302c5475ae50f013300c675a875a647f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b5462d04c3b889d947153b46738fb67
SHA1c30faaf4ea0b7c64671e6a37af95b130cc2d11be
SHA25651939253c02cccbb8f0767b915f6b389fcd76ec85c1abb24e7984c92bd980b07
SHA512e1aed306ed6b7d5b85beed699bd35dcfbf0daa4c9519373204baf60a47e67640a290ea3f55c05eb56900a2af9231f2172ed3b567064ddcb88c997757a8c3d8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e59eb47a93afcacd5fd0b258deaa3f
SHA1b9499f6b578c45da54aa4eae298a1cfca37e9ff7
SHA2564f46c7e7f0db7030d59aa0a592e216b8da8cd616af987b270c05c9e108ae7e17
SHA512c75c907b5c5605dd042563ebb1a9dd2028e08acda6bdd964746879c08defc96434b30c3e50d6f815ec2180a7d894316f9f1d903b32fd7b7c77f902e83660d439
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a