Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:34
Static task
static1
Behavioral task
behavioral1
Sample
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html
-
Size
460KB
-
MD5
69039821a1257c39be2efa5c6438a4ca
-
SHA1
b1ace45ba19e8fbb97bee3b177e12e1938f286ad
-
SHA256
0db384eb1324b09580cb81b9db756cdd50cc20c3b8bd57c80ebd3ab69d6c08b1
-
SHA512
49d26783af38fd63d98c952dbd642c67621a2404e38598ebd68612bef376bfde1e27eec1b151010e63c3daa6a3cd7519f5afdb2785b8f4f92e59cbde74d2107e
-
SSDEEP
6144:SisMYod+X3oI+YzsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3l5d+X355d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e7a5ca7cd70c3bd6e628dc6d2372fa8e8d83a7c0942c645115a2028d4e7e4a83000000000e8000000002000020000000da7cc3b357650b5c55d444f766fe7f34c480fcf5d4dc93df95a3d0719db8414520000000d93a2da372d972fa362820a20403f9a4f1a767bee44150c0c1890bfd5cb55690400000004992db06c64a8faf061bdf08f12542079380188f62761192feb98c89e5953b333653cc77e182e6f1fe29399f6ab652603c17caa4e2696025331c5bc1cc3f8c4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1F7F491-1893-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e4a6aaa0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2288 iexplore.exe 2288 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2288 wrote to memory of 632 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 632 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 632 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 632 2288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69039821a1257c39be2efa5c6438a4ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd58ffa17e02b5a19158009261c0f5e
SHA18b0695cd4bdafb38295261b176c1e2e2cdb22643
SHA256ef57fa0da912971df7c974d866b1bb9100c2d73c9ffbb4219b8af394aec9385c
SHA5121cd0beb7c659cd2fe4020fad333fc9205cf07faf651743c25727316db2359cfb559393817fc4ba3a8a49962c364e907491f1db6f5d7ef21a6ccd0952cbc3dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d419e760a8de6a03bf136de9b6b43459
SHA15250b05cf80c6a9f80a2c89aed35e933f6bb139e
SHA25689a3dfa7ca5321f0e13e277fcba1659f7aabfc327385d224645ed909dc05cfc6
SHA512155bd2a58c12b5dc98843d515642944041d4035f6e2a245080982bca5c5de82ea52b59da552ce3c3615288c5f6b5f23563deab59241769c0a410a74074feff99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74911eed3868a7ebdf69defb86e04d0
SHA16c7e4fb6d4a691830bc178c628910359970dad7f
SHA25623ac29172cd5687cc8bccae95ddf115b4599f51b3f1dcf6d62e1c13f2b41cc99
SHA512c161a654aad7820b8cfd482b9948b19e4db6a56aaa06e6edec7415b25c756887bf7c1fa25c75f20362c4d029b9b177b444047f5f9b6f0e5d8d514ebe1f62c7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938243cc610480743fe2228f8f1cd529
SHA1fe7a62b2f3173f0bfe2b9be28c3a7c4cae4421cf
SHA25645bb5484b804588d2d4899c74a30ec35e19a8a6052d1cd829d2cad8a81419915
SHA5126dd1532bb03a228e9734cdc9829315ebd2b509f39ad7e992ef1a878227e43da3c437cf8552605d9778f7fe7dd6da0b0b0fd9498cf51e7eb33abc72f22e392f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e717321993f8cf9791c84e909abb4bb7
SHA1742e889f56a76669c1985352a80105efc2071d2b
SHA256040daca827d074fd393d35e8e10ebb7453ff97f4dfc11a76e04a3afcebbd8dc5
SHA5125233c5208b4e6bfd88482a3a3fda8a4fa4db8a3196d1039bd0893dfeaa7fc7cf3882452ed5ab2ee215655a8630a8a07fa0d07f26a2373e6c60666fcb6c8a455a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b443aa11c4009760b383bc6b40ab2ff1
SHA16f7cc51c416e379738db5a423fc60a6ed90be239
SHA2564dc20be5bc42730c8263e68b012222024038f90976afb43a001eb45e8b256fd5
SHA512b81e0a23b2dee281d0808afb2f0db13e0b1cbeb115825de44e7960b67966c8f5edfcf4529c9507dbc48d17bd0e516d7327f083032dfc22f19b8785306fd9a45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c968db3e4604decc0b9b112df8aa9c8
SHA1aceef4088783c58211e121339f699cbac182f48a
SHA2562c0d9928282d2af6c58baf3cfe2e965e6229092c700162be708f01d747bacc51
SHA512fef6c40ae6b0e0cd792b4298d3abfe0e2946d125a829fe30d10168afda1e6a0d15921be8b468b56df89a500503b2781a172c3425db88d105beeac870ff34ee92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5cb96f9a035edaf5ad8cbe7ffb2489
SHA1afb57a35b33b6eac9b8f275a422041da9debc9d9
SHA256a9ca76b1f7551ea578bab70f4670071c1799e6a300f34e6fb138e5a92863b44e
SHA51239e0052365f9cea0d5064a6ed3bc13d67cf9a6826779b9eea6af8cd8fe3eb471966405ef3ee30508a3d44ae4bce099a3a500fb9b3838dfb58c354797bc82fa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9fa5b2f1e1a360c52889388a55bf5d5
SHA19ec626e38c897d1dbf1fbf7e6b4dd17603eb78f9
SHA2562d5e6762d48c927f3ab998a8c64179253fc01b32aea3192448379b91a7f57f73
SHA512e3316ef7f7aa655ef101d99a51104b7054a2f23cb253f5ed95f7bde5bce68ece750924a91a8a7edffada7dae10d5035e05edcd9212ca401fddd67a4fe1acc20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56edaaad548cc911cdcde68dd9390396b
SHA1955e4409142a6b9a237d02df6b03483f3c1ce405
SHA2562328de90de30033e36e8967e4e7c7b340036da758a667526cf5982dd2d9ea6ee
SHA5125140b337e4926cb76b4547a8e4a166fd8236c0e1f6489afa1aed525b82b4cbb94c43ef18fde097ce2653d80fca8cb2f6d49d04e44ede54b10b87415f2330d883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c150a137db1a0dff6d7325151dacd6a
SHA11c0565022e64036c553a270d58f38dd6cef3f151
SHA2567bb790830cb44662d0aae5ba7596fa637712829424fc1aff6f8b714cc52e316b
SHA512db14746d55c36b950ae33ed81c057a69e423386667d2badc6930cdceb71d1fe07ba2e7c48fcb0bbb9f39c90ed0bb6b94bd869d1c16ce0863e6f8472fc8cb6ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57174848ac2f88a73a8cf685b58617f3e
SHA1fc6edc2f2b401bcb65c2311d2a83ac9d70b4f2fa
SHA256fb2e73d985232770036f93f18e3d684aeeabe04da33d1a60049e8acb1669b3d7
SHA5129aeac90072ea0d70bee9da0fbf571b40a2e1c192cbfddb0e6d71a3f0bcd234de314ca6837836debebd544a11f443e2de7cf8b53d02cad443419e8e6a4a881d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932cec6a92003cd912813efc51596b0a
SHA1469382a7ffa908a4619eafeb628a80f6520cbdde
SHA2560d6ca20730ffb917fcfff901ef24df774e4f53e36e1419551ef35333f9490f01
SHA512fb3472988d05f801d12ffdc36323e6e6cb79f9f338762b56eb61ae3f4616cff34e6d05cf55cdd29557c4d83c588380a731a275c1ea92fd18e4cfc476d1b406dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f80a82429fcfb149e142737e2d338783
SHA10303de103f185c4635e9487ec887bc725dec5ca4
SHA25605da910082ebb1abdc9506d1739d6ccc4166377fbc2e46117d079e7d17d78834
SHA5129dc3e904f722560f218e25bc6f2fb539cc36eaf2333dc75abea7eccc2ac1983dd9ffb350115743870ce76f474c4cc90d6caf434b3d294a60ac822c279f1a2872
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a