Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
64b9927444d29cc0e11ae60a59da17cc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64b9927444d29cc0e11ae60a59da17cc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64b9927444d29cc0e11ae60a59da17cc_JaffaCakes118.html
-
Size
67KB
-
MD5
64b9927444d29cc0e11ae60a59da17cc
-
SHA1
b0f8d6a7152a1f250c2ae0692335573ce3f9db41
-
SHA256
237a85130bfea94fbcae8b90dc772653f2120d60f5be7cc48997f7038a70ab3a
-
SHA512
6ff4a2b47105c9cef52b753990f03ff14c22fa9e292a593dbf37f8d0c81a72cf484408999441008b566ba0edda0a3eb28e4929586e347139a2bb8a34e47c3499
-
SSDEEP
768:Ji2gcMiR3sI2PDDnX0g6HdXW2EoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JIqG2ZTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000011a46b255a208aa1adc4a8fd64aa9582f91fc70cb86fcd509f63bf0e12234335000000000e800000000200002000000024fb4e778330699ecf050488cd94127f78d0eb47535c6a841c371d14850e8f5f200000007680901ca33b2bcefafc3ad9e4514256bc106efe399bd918cd765d2f29cecf9e40000000929f4aabc67fe3d9a2bd92c5e27a4e780677a227f3349fd2a1a8509dc8db16abc5808aa00d5c7fec69ef525e73a83b95b8597aa0f3e3b50609681f5f6c22c6a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707bd1c2c0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE214F81-17B3-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2128 iexplore.exe 2128 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2128 wrote to memory of 2108 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2108 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2108 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2108 2128 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64b9927444d29cc0e11ae60a59da17cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5994d5140d92964f3bcb9363a9bb46f1e
SHA118e6387b308a5a1d4025249e6500bd52d44aa9a8
SHA2560425a34c6a86cd6e86fe5b32887a2f310eaa86b911996a8d2bcad724314c27a7
SHA5129b02ea02e2d5dbfb2b3ea3b762fdfd6eee1a9ab7c79eb6b36bb3869c305287e0784c55fd0db5d8106595e08201be2e433b05d01e3136ec86ef9caa9cdc6a1e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6d62753b5fe53be945f84417dc07ad
SHA12efab37ddb0f4e38738edfa69ebd6cf69c0cc778
SHA2567826a43ff524b09b1b98cbb859f041ca34169d98a977ca4c600a18a164d57989
SHA512a1f492cca3cd480ce40037ee78da24a28eeb3a2b8136e1a30fa9bdbd0124110b78820087d935a9e143cbcb454ff623bfb22f98fd0f3eae8d197fbb055b4cf318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b081aa126cc3d2fd2305a7d9a6c8e968
SHA1bb6c3cab29b8bea033cfcfb00c7f9f9356907b90
SHA2565445ef11375956db5ac579ce15185563f3b4ae7f42fe284faefcfed13a712377
SHA5121b8cd70cbf3d48049d96b73fba605cbed5478a7f3287f73e360bb721379261af6a504ea3c91a52d0206feb27f804b2e28fd7437ff4b4d30fa8d8e17d2f775d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec87584ebf14c71d6413e283d43dd1f
SHA12d2e120cdba3c0550da60f6c76ca3a3dd09f3314
SHA25614a27a3cf1db73aa5d92e0deb4aed7150f1fbd1f4c5249c489c69f44949e2d8a
SHA512613e0f85687e9589de73975b3266461c0733439b103b87eaa46db2e4d78bda8f6f6cefb1ab0e89b621ce01921743a5fe2a6b72545ce56af1775698d0ce2d4a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aacbd11a6c47487f80b257e96f5b38d7
SHA126c5f7a83731e8f25c777cd6442007156c900875
SHA256aca61766ea09d1b360ccec2db076de80986ea0bf6a045f046e2d05cee1349aef
SHA512b5584a8e0d9c2c72919ad8a2fe5bd952cadee2b5f7056eec417464fe1af15b4ae4c8ece3990a47a632d8d5851b4d0c7f2de15aaced885fa9a2150d809437a921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d95b6c1d929474342d060077ef4d3e
SHA1386f37ddd0d0ff1c4ee754e4e10634227c120c8c
SHA2566956cc85bae8bbb0449824276b764179f9f7911cd491bdfe94f158aa49cdd3b5
SHA512479ab84c2cb7270642ede8acc936afa8ab208afee188c58c8998a33fd12c64e114c2c35aadc2a03135957676fd2930aa37174a413b16166f48837d4da3874683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576e456139479404b3b530dbc0a1cbe03
SHA11d5bb791f249638bce66514cd7fa1b2f11006de0
SHA256d5e5bfa20e640ad9af7b44d21f7cb81b314a1afa8376d99c7c3f01fa20da2a50
SHA5125ba7d50330a1aad7cd2e15f94ec6655d7fa471d3e987b2d0ac99a643598083e28088e450cb5daebe5fd554a2bdb4b25b2cfe55228a4b08bc9bca956ed4c4d9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573edd009f76611e6695c91ba778f1908
SHA12f5cb37e42c3ff31f92d239bdadc2e1f71498fa7
SHA256ab2e507e576b14f1cf6301e42fd75d3ac56c96ce843f6c50dbce70085959512d
SHA51234f216398dd233f2968051dc5e4b4442474f8598c77a4427505bfe8fe7fded0e775e44c6b643a2f21354eeca88daf50ea6e659c06da668b48db73e908da00fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f799167209a68ee390305a0e132faa91
SHA1103fa86c5e1cc417a43efbeadc365172d5c03ec5
SHA256d10dd744b736657ae45cd9bab71e306cdfc16a30febbc57a7407b1ded557613e
SHA512326072faf4b84a9f79603f952dcc69a1e32b724e7d59315e3259795297072363e6a75dee655061ab3cddea0efa4e761f4c3d82a98f6890942f27240ead3dcf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e7327a5283cc503c8d641830b2bcf15
SHA19d66dc9b689f358887f13cfac3fdb0dbe596ad69
SHA256a1dc720fcdec96f56c47560c3ebf64a8f2d69683daebd1f1ede15f6fa642b08f
SHA512a6c9c99aa47209b84293429282b4bb528d202c9428cd96401ea1b82e976cae0d4bad038a5d5225423f032f98dc47d5b6a4e3bb209b1abf7fad05889441982e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d55391c2fdcc37069bbe7cf2c41374
SHA149804337f451e6adc1159ee822d617d0fc41b04d
SHA2564c92f3e34a1222c8bdaaa615ce396bcfa9036c58674f7b847b2594ee0b9cf96c
SHA5125228dc9fb13d2551a87db8acee6d56fdbd4260222b4f8a0ec0c431f4aeb6bf842b29171c08d420da825f5abb23edf46d4f99c6bdb921d0757b771d5c73d4cf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f515658d9c7b655be89ecfcc98845822
SHA16f9d7d6e87c328898267d946574e60488fd8a5b6
SHA2560152fe016605099b028627a11a4dac431e72d7d539e248f4d953359f42dc5d99
SHA5120d12825930de8be6b78f355a4f566f5243274a29f3797c5120ea2826dca69995b1d3dad8f1e589092c7563710859fb97082cbf6275477916c5fb18c220a31511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd73e7d7107bb827f25827c6b27d33b7
SHA1b15b1b7ca443464f08be3652b633280f11f59122
SHA256d02d8f6027927c1c05fda6907262e688a305ce24ac5567ac39fd43975f83a3a8
SHA512a42911bef313abebbcc767547a363a554df34e4741db681a2565c88085cc4392be70ef005bbbb70e95f3311af4bfb530c73d910acc318bb837084cfd1838570a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb101bda9d9ea30cf702ae59b5dbc7f5
SHA187ef85bddf4254b59a558b9b9a1a15ef22bd67b4
SHA25610ff0e28e6887b2dc4c68028059c04d721b08abf6d4a192166628556b081873d
SHA5124042b3bc6f15aebd594915600971504838a84cdc9e22e9fb00fbc0e81518bcebda8a1aab580e361a3454364fc0325f2f76568707f538848511db9ecac17f5507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c84eb90e2f35649f33416c051b9fca29
SHA1cf28e8348facd5ce4f9498fe27c50fc788bfa65e
SHA2568fef0cb95152f7ccc4091ae40de4cd909f5d7ba7dd9c636a53823fa25fb63c26
SHA51207e49e8a57118dbe853e4b1cf9ec575a6011de0236279193375de407abb2d4f43960b585e0e4149298dccafb69af729cc2374a3e4e67eba3b0df5daf41c79e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23356db0e83fa5560d7447c0692ca12
SHA1c22f1c78c9c4a566b6ec3aa7f583e08d0a639e4f
SHA2563780721d85a61a536b4249e8451cde865abd0aa39d61a93c38dcb32c4791b7bb
SHA512e64881de0cc008148b4335a758a130b7f3851a7edd8635882e8ef8cb12283a6823756cc1ff80bbc32f2f56c060944ca539a36b2aa570ada672b651c1b0bf6a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517921fc43d3d474ec5782e7319621d16
SHA16e14a3a5bc6880373afad31114a8802c5a8e79e6
SHA256ce2602f6bb2e5e1fad6106800287f1eccb3016636ce2a325885a5a9b7bc2e60b
SHA51218953fad23b2f62697cd66d85bcfdfd1c28da16ec39c458de2f14ca25d842bb9753e2cf4f73d3b4e65ff695c4ad6e6a8aa161e92ff8dc151ec0cfdecd9110952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30091ac4218c2cd1b1d1a0e72d11dbc
SHA1e13dcf4278f22b931d3c3d8cbea073fc761b764d
SHA2561be2f4763df12c21ac7713d441a22c3f1527a84351d97471018159c3dec9836c
SHA512d357834e1ed55c7390cadf5dcb3f1d17deb7cf95fbf5d639b04fe26eed3e0c0af21e60e0ce3943b410bd6f8833b16aacea772557fa5cf511c50768d632817a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d22e79980dd7574d911d11cb9c33c5
SHA11b5b4ab1416035ad406912adf7d6faf5243dd553
SHA256b2ecba8e8b12ebc1c18ba4fb8465f0bfdbbb73c4c9d02cf3d1c5e78c44ae4476
SHA5122757352d6d7625eb1346c6e7e26bcdb833eac1f226055dd83978658ae8f542f824397282bcb2984fe44b1b8d0b93e7e788dc2909b02c61c39bfd91324e074ed9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a