Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
690419b94c20a3d4e01304415f141768_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
690419b94c20a3d4e01304415f141768_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690419b94c20a3d4e01304415f141768_JaffaCakes118.html
-
Size
23KB
-
MD5
690419b94c20a3d4e01304415f141768
-
SHA1
b802a18108aab73d56b61252e4d2d06aa562120b
-
SHA256
90c9fdee4d93f21e5133b65c08ee37afdb09a5169b53e417fd4e4331e465ffe1
-
SHA512
2af4fe61e1278f23459e216b222723673344806ed3f6abcf003b65c9c054a8e3cc767c947adc717c649a7f8ac2b32fb04aa357e5866e98c855f0ba3971f5866d
-
SSDEEP
384:oG2rlrC/Lw3eC6uLIfdWHDTQ/V7Na6PVAJrQpcessOD7dT34LVYN3Zf:oG2rlrC/Lw3eC6uLIfdWHDg7Na6PVAp7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03F72651-1894-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bea3daa0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd8e94cff025df40b43ff0314732ee4400000000020000000000106600000001000020000000ff32273f7d1370718539654afd575d8f84977c009832f980ee82784f6a8c7978000000000e800000000200002000000098b05d9395934a9b96b65241a7b6331bb16246e1d9f01c96f1627e77ba643af790000000335f40e67993fe929b1a601da1481d5506db4ada00be859bfcb6def979ef269cca85f5439851cda43efcd4a7f619d21c0fb217628237d6acbeb16dd20e7a18dcf2de9dcebeefc8baca4041f8b2380a3c912794ed93bb36d313eab3d1db599584e46a8aa33a45d9c1ac4a8a8135fd2534909d32bfc7b6d28d79678dc3ae1194d8b65412097ef40c34a6eec902f2d84212400000002d491d3791bac3f40df8a76a44d2ee800bc6eb165c819b0d71850f0a7ca0a3ba260ea8a00fff861b107d1548063630d8a5a824b2384f368e3bfc9b09ae81596a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582814" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd8e94cff025df40b43ff0314732ee4400000000020000000000106600000001000020000000669f9b9b6e8112104aa34a5926484668ffb7f5d2f3fea87836a6e81c4b719274000000000e800000000200002000000026c382fabac63157dd16632ebf153560db01d3d3bdade0fb8c3769bb5d5442fc20000000a2f04a4764706b424d053878310de9999246098b0d8733eb60231888319b6d7040000000f6adb914a6f2665301814f451867c28d5bcfe89f606167074cc624de45e75ef1b0a4eaab739bdd120017b82d14ddda2338ab8a5f164fdff2c8be49461144fc46 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1368 iexplore.exe 1368 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1368 wrote to memory of 1624 1368 iexplore.exe IEXPLORE.EXE PID 1368 wrote to memory of 1624 1368 iexplore.exe IEXPLORE.EXE PID 1368 wrote to memory of 1624 1368 iexplore.exe IEXPLORE.EXE PID 1368 wrote to memory of 1624 1368 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690419b94c20a3d4e01304415f141768_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ed43571973589ec07493b54fd245345a
SHA1511b976840cf8f2e798acb7d986ec64b74f8fbe4
SHA25667b8961c271be22121dd54fa4cc043c8f6cd27c1c4aa612104eb7ea4982372c7
SHA5128b36c01da4c0f028aeebf2e2eddd4a10197facca7cdd3a276a84010a71070c0fb0b14c7e5492dcfce1c4ca4cc80a1eb28100fdbb06995a63c201f3e6cac619df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c069f7e582905b814a118c46a1623416
SHA1ec3c2376545365da5d8bc907d1da636e9ca890a8
SHA256dedcbc6facdfb3817c71b77e7f27438dfde76d11a0bcc0e4ed7cfac9cdb222d4
SHA5122f132e752933c3a4dfaebc23e3103cefd33c144c3677ddf8a9cf957d830dc9b80b869a11ebfdc0f097f447b494272794ae33b6705fb8154769f06f44cc2706da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd1666cb74aa0832f04fe692a094d1a
SHA1f5cb401d9ec2896fc44e4b64b8af630208da202a
SHA256784c687abfd19463ec6de1e942571f2e21520b997f843ef81578324b68ac4004
SHA512c8546687e57becf8b89ba03e47a5a03b0bee738e641ae165c7e7f5c25f662e9ac42d3bbbe73e3fd00e5ffaaa18dab8ac96df77aef797c6779d7630ce6107bb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d240eddd571fcb0f9a2c78824e7c5a
SHA1f85258dd056c804290745eb5e107fba5dee34559
SHA256a9f1f598f341fe17ce8cb4796403a5c5b87d33258b7848df60dbbec845ce7774
SHA51224f4d366d71104945724985791f1ef3a7954fa1096d9d0a9563c503d25b862910af9f07508785d9f4dfabf730e6b10397d44679c3b5d5bb7fa2317b52467bbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e3e1ed29c79bfc2f2baaefbd334abd
SHA11f7eff01593b7493b3daf5dc099a24f3e0f238ec
SHA256010361240305ae8fe718a0d922e144f88bc6ade9665da92d7d488efac26fde61
SHA512811cae1853bc3d66f7ff0a6cc8a3f9d12d71f853eba109d77d5f3300d63ef06b1d7e95154e31848802f5e37a65e4560ea1256fc25ae53fbe7859dd68f9bd6135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597cb26b4e2a381ee05d9cc8838904a19
SHA1e0eab7d7560a1b6a3707b248841a215d2a14e55f
SHA2563d89847da4818017b3158700f008dd4dc9f29ded5f591dee5e9b5c7daa881e9a
SHA512f361324f959f90698cc6804195ae97eb07aef5acb8cb5bf717665be97ccb2224640335b9cca9d96f115a0ff6ee497165cf6cf7782bfddb3723c0441473754d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a744c1c3bae5b8dab00bcbcddaac47f
SHA130f5574f039bc7e4ccf2577d4314788b6e0a08ac
SHA25662f215660091f65e81bd2a680fc5629e36ddc8a2a576cf878e93e86e9e127247
SHA512db74fafb01b677d6159e7ad8e0b31c6e17206d91dd4dab4a5e9a99a92ee00e41f6efb3bdf1769489a3b4332114733a6bd08c9f905e8260f0293753b12dc108e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49df46a5b50a932a501f978534dcda7
SHA1052f3294381996654e0c0a40249922a854ac4378
SHA2564fe6a677ef73a8c209572d361bea8fb4baf252230184810fb9db09590699737b
SHA5129ae0b7e31ae04e1c0a567328e43d67dd8cae7ba2c3c2b81b6503255ca27315c65b596770a34bdd0ebabaa6f9a8b4c254ee56a543b36c9f847d691dc336853dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb42a6857db652741ec8caee46036d9
SHA1dad00e5d32691165d956a87d5f435c8fa70f687e
SHA256c19aa47ae5a0e39db69836f261238ea182be4cd6304894160677e458565c984e
SHA512dbdd62422f5485bb4c6b810a29c4e8bf31555e1f496a8eb5004461f51a8512f648a432df13bb695ebc0887309ac24adc29cf615b2276f7dea369f5e648b6903c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5dcd8625d2f9283745e3d7c6b151ce0
SHA16ecc93485b4a8e4d0e77f8ffa1783e8dbc724e3f
SHA2569881a564b3511a0babb2ff40d63d001e777efef136d96967f7a248f08c835cfa
SHA5129cb0118bb61b50bcd6e417b2dff6a9d7478ce20744a21aaf4bd03e2bfe4462659a6809723950b9a04ff6332d3f8b124c7fb5f4a2b840a84393e2f25c91e144bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4362b699bc3d7630da72a2af39bf11
SHA19279f9f1440f1d1fc9fb816f17650a267605ba09
SHA256331321aee3bf6f5b362bd5f8895b6d603d5b9cefd1ae0ab4709dd4300ffae47f
SHA51225b15a379db4efc67657373729f3d2e1ff6d993f711ca68de0d4dace608eac2e7f5065067085604acd5f547d9f24e75f43b867554f6824b35bfb99d08437ce2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a2c725b4484c0cb116cf0520a3e10a0b
SHA1573ac861ae5463f1e0ddd5a44d2888fa932e0048
SHA2561b59c0acb903108e965ffedd99be170d99c5dc8ac754599617e125658c142967
SHA512264931dc4f2ec00cae8f41ca269b0e8d62d49a5808d4c12d8417fe845a78fcb1208ca14db4a9dfb481cab5053c87b5bf5a5a1d62d0962298541dccba519d49b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a