Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
64bd1b7a7ca946aecd8f4f97d3050ef5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64bd1b7a7ca946aecd8f4f97d3050ef5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
64bd1b7a7ca946aecd8f4f97d3050ef5_JaffaCakes118.html
-
Size
460KB
-
MD5
64bd1b7a7ca946aecd8f4f97d3050ef5
-
SHA1
2cf3b511023b0c7e3a80a4c38ebc49eb13dbff7f
-
SHA256
b14fb0e593c43bba27f98b9684bf4b5f815a0b6564ab7d103aa7e0f386adaf16
-
SHA512
a433cbb15d5601546a54bff02c57cddeae97e5bb6259592127632ac8d7ba2005a980dc9cf2fc97d20cf1dd2fcb14570eb709a1eba583af42cad75b7afa91a25a
-
SSDEEP
6144:SisMYod+X3oI+YxsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3X5d+X345d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fdda48c1abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000011f2f41d00ad524bb030de827a208c2200000000020000000000106600000001000020000000f7cd6c03879bee1aa06f7cf972ded25c3b8f7e544d7089b39e4b02649d992efa000000000e8000000002000020000000ae4a8b38a08c7068f963fcad43bd2efd3538e96a6038133964c7c22f2b95d5a220000000d1350a32f9d52e0d0682f9632fb2da2ef6aba70fa512437f2a18a776bcd8f44540000000112ae768ade168deedd68f27382059adaa7200faa618d9cbc55f8565efdd54dcbd2ed8d8dfbbe23c2316d15ad68a95ab26e9234432aba5c7695a6a771b578bad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E645CF1-17B4-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2076 iexplore.exe 2076 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2076 wrote to memory of 2812 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2812 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2812 2076 iexplore.exe IEXPLORE.EXE PID 2076 wrote to memory of 2812 2076 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64bd1b7a7ca946aecd8f4f97d3050ef5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a0ee3cb0fac8f0645fd95b0f498f6b
SHA180a2f77216ad7f3ceff72f77c6d84cf14b2ef20e
SHA256d210ebf590ad1e99a61ab253c45b6df6901ec48434df725fa2b35303ed6f847b
SHA51267f7f89aee9af54e7f213713e5e3b15543fd334944d224d610c8c9f78a7ea706ac80d7d7f94fcd27050d05adf668c371afb406b4f51c75c723ea33e6162441a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb295a6996e7ef463a3ed6d7eeb5b4e7
SHA1d7aeec622a8738ebdbb4b9d4196aab5a1e8bea9f
SHA256c53f8e4008830772b571fd5bf4863eec8c36504c7fc6c0998f1379b22d194238
SHA5124bde1468c34696d7984f0cf130921a0516f12f3038b83900500ecb78cc35f58254cebb2745c7fa0cd6507b107a35e5e24d9e2407230c3ba52f9ab3394235f72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6203329430ac46f05b1270939268fb9
SHA1722f8bbf079eeb7f08e1fbe6c52911531882c0ec
SHA2562e39da591a1ea1c3c271b3566b3776c7cef590df9fb78f3722393c75af09d302
SHA512b54ff8bb8aaf4ec578e2227572d55a45e41f594a11729c96140fbb0121892549b6f6412b62eca2cbd2e69e4572d16b7a792cb6e8869096735cb57d44fb3e9e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5672ac513a2bf9cf2c650f72b1d4f39d8
SHA18a9a19e60681304aa419877d12856eb5afb5bab3
SHA2567b08a60e4fbfb32fb3133475f73142217421b75db6013015f27e5fc5790452e6
SHA512c4f4051124cb592c5da0c9ec2cd99d2ebe1cacb29f1ea7bfe37bbbc17cbf27cf3ce87ea90285843a3a59168df253f468afd6a9396b6f13f9bfc1b5e0c7065d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f4aa39219845af4e635d3529e5e444
SHA1909b0696e991fa85f131ed98de24a0d22c40621a
SHA256719c87d15b1ae3a5e9087a9f54626c9e46c32c3cad77b21d6bbba799842752fc
SHA51262c58fe496e21059239d7f1bf2dfdf55a8465fccb810aa74b35c1e08a3993c72f0eeb51bdca6d3a977d6782d25bc28ecec2d60f03853695bba43bf16ce639477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50be9248763ae44ca094817617b707e
SHA1faf67f8c717e8077288444ac92528e67f2542ef4
SHA256f37f254bdceee218c482d636e8e93e101f086aaf08b829f269812643b6193fd2
SHA5125e608cb06bc05c58e68b2f15f12d07759b184a7a4f66d97795b9d97f8bfdfae45e05f4916b34033d9ebb5b88abf38214042ca3ed2132ad49f19c81bc5dbcbcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5376f460ba9490dae126c0e863469ec5e
SHA186695ecf8286aaef15a2c93d3863f0477d4a8c31
SHA256ee8749f23fe30d45a4230db15ff2f2c55fe7898b919187d6f1b763f514770546
SHA5120aa1157b7527208f1778761a71a690b0678bed474497bfb60e6d68b82351f009135ab4820de09f6175c5a43d2a54fd3863fcf4b8a52f766eeb72004ebe682710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f34a1d4cccc9943ef90930d8bfed431
SHA1b5e0f8a325ead0b1f49eb17e1f75507809026a50
SHA2569ea427b2a10e325c430af02e816ef65a0c60605238be3694efd420d3bf80f8f4
SHA512593599246d19817acb2ea36cd5884c63c17fc9e29137c1d6a56a463c87e02f249d00828409d687a81e7464ffe707ac18261c57d80e20312f369e9302305031b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb3939f23dd068cf4fd1d86e0ffb108
SHA1c569eda6d1a5a1d94d2834f8140322f3cf0186cf
SHA256f17dd10e0f0d492c9fc9b2530cbdc9230fab60460dcdc6c2744d9ea4f415cdab
SHA5121bc35764961d6dc60522c3a37f52e0f22518d2090e44d2603b27890546d21a881fbce891db8f12c68f8684e69a4e3ac16bd9c0d14d9cfd92e7b2e7de5d7efbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be6f4252e2a5bbd0268c1a25a21aa226
SHA112f08c99f37b1c830bf6c435ae9da9cbaf4f23b9
SHA256f8458a7565e81d2f1abd97adbba0dad736caaac4acccd2989cf4e4816b692a06
SHA512321df8bf2f33d892367de2222fa54e0840f1386e03d8b99148759ab44f6c5313b7746a71f7f784198efe7c106bd557f950821d766a195dcf35a49ced55c061dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b401b5acddf441c88c044509819e964f
SHA105fa8dee95a81a14fed92d526393f7253b865d10
SHA256c5793b05e9fbdaef08e9dff204da96b92eec84bd9f46aa49d5856d390d450208
SHA512a22471553d4e8079b5a7950d572c2e4202dd1a549a6fea3a7bd812d69844a28bd636b3b5bb9858353aa1c5d2548c0190bc9807d7a09602d1d9125dd853c41aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b528b37c102ec324b70c79f3e5bdc5
SHA10b8ca6386801b6ac28262330d85b8718eacaf646
SHA2565e55683ebe98d00ac3cca16795d06e060d2d5ab7d0f101297542c7ae3a8fa4da
SHA512d049c3c22d1d9bc18c474e82f6e451fdcd4e719e3f5d402eb5e79379cf607af5a441c62ad0eee620f19aaff08cceb9e1bd937ac6fa9f9130144c920823ee3ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555569ece97d3b9b81eba6783cf1b486
SHA199546ee80354b7fcdc50f1f1ff56585c8d78ea2d
SHA256332efaf45fa5e4e8e433c824ee5a1ff7d657349812343d9f939b656be2c3850f
SHA5128c820e372929626f7fc4020cc9f60dce76780f0f85eae3f7edd6d5c393bf5e8ffd6b688ebd668982c439312727d1df97eca80ace64454ad0df2eb12edee90f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c728398d10e2326be019ba713d08a5
SHA18b055fa293e0e1eeef76210c30c7e021c169a211
SHA256f10f36c67a235c76bef9263b9991ec076d37ecf36eeaf308a988bbdccb7cb838
SHA5127636a926e348fc86f66e9e6d88f293a1da4dcbb35283bd2371dea0930642ead4da92e4f52f0845321170c6332da28ab73f8729c32bfab64b375e7745e6044653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893eb37b33fb5928452f9e3a69d3af04
SHA1cc7a8770ed9e02aa4083be82925a7c19361c748c
SHA2565fcc313d37c05d62f0e780024bae7f2703ccf619231ae44d36ff19bf5140357e
SHA5120b0ac3205a22fca08c8ad1ad845fd8751629a2a2909d4b44ea406b95d6ead0f9d8afaf9a0996a1aecb7a5f68f50312d3e6763a9d621557b0ccee727cf110e9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5016ada1d17e18655f34954b0f3975f72
SHA16b6a6a294474dba412811cca26cf06bb36b9f83f
SHA2560f3b796d99b25cf1d11358ffd82abbf4ec9e14cfab8aa91996f4e0b88ce60282
SHA5128c7868cffc3af0a7a9f7f4ebc69e4009acf7596bd254098a21e018a89344c5757d053b9d98032e3bc35307bf335ac201e254e38a7d0ea77e8f2be07c4005934c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ec8f12d940bc0dbb1cec45e8fe0a66
SHA1f89736827775d588fbd14294f05ac85fb864894b
SHA256d83a5671e0825f722e6e9e4284f96a6b8e5e3c2c33b310ccd94096e681aa7144
SHA5122da1f3401d1504d0a0fd8438e13b6b1a3d219ebbd226ada45cb05eb8d29602ce45825a7696807dc3c87c30d0652324bfe4cab69ce2bb8ab23f3ad67d1b3af392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3aa2100f678b2daa3f9c25a97b85966
SHA1b35ad02153e289a0c254c1151ce7235e921022a9
SHA25609a5b3956315717b2d2decaa7e9c4b97a6d84ff2a65035475f3231eb6f9a3df6
SHA512aeeb4b49952acf5bf8b214ae337216e1d0ea493c12ca31cc8fc0b70a65f29e1b2431cb5ca66b0b32b790328e9d3a06c4c3be3a6c5e29b6ccfea4dc80e4b317d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb197888cf9c59e774c4219572b6dd8c
SHA1cc5faf8e62a151e10ea9ac2b49172f8290715c5e
SHA25632d1324315a47403b537b8001973b13a324e6b82a7db5dcedd7f997a5b5ddef0
SHA51246f64f0b8b079daacc93c66d9111ebe5197f3b5f58acfa2b6378de83a99673781fd8bd377a93d819791d5fee1257a27c5b42899e7a360e8b925a354daf5403e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a