Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
69051e42de833fde02d08abc0c7fd013_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69051e42de833fde02d08abc0c7fd013_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
69051e42de833fde02d08abc0c7fd013_JaffaCakes118.html
-
Size
614B
-
MD5
69051e42de833fde02d08abc0c7fd013
-
SHA1
c0a8455c765037bf56955ca3077e675786437cc9
-
SHA256
62fa2e7b91b86709830797b216a29c1cbdcf868989788ed5a8e155f216746423
-
SHA512
457fc8dc218ac4b28427dece61c9b9f4750278ace045defdd7621957cc9ba25e5fabd2c52fd1a6a7aaba8d8270c523f199a24ccd3e20f49375bb8b9c59b6cf15
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5217AB21-1894-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30329a15a1acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004521fd5391184ac9d0912b8ce1436f7acdb3f6951091bc84ef24be8d19d38f21000000000e800000000200002000000091f545978b766edb8e1b63a28a04debe0752362e3189afd0b560e72e6729057f200000000e6004e5871894da680c645c516fd1dc69524047813206aeb2cd37b35098133d400000008293f22d545b3b95065d86fe0058e05de943259bd9f7348b1d14d3f4d6e1ea0f6bfc9ff7860be96f1a4e41f197988bcf5ab46327878ab47854029b0c786c4499 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2284 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69051e42de833fde02d08abc0c7fd013_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556570f181adbb9a1af81935484f0fb5a
SHA1d498fd3a8207d4290c36e7063eeedf1540753fe9
SHA256caf2a98469252c45526dd6228a1533954786321952ec5ddfee61464f39c00a37
SHA512bb5b4fbf8f399f2d5c2bb6aab07cbd38173033e1ef52d3c8ab4ee18b83b4af0b9eb6902d950456429e28379572b49031a1822ead74efaee8e5d6a74815c26902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eea6b97f85fdacce35c008d372a1875
SHA11805df731487120a72a6aa0840789e28385d2b0d
SHA256abfbcb7a17982b994d92d9bd02600b703d24bce14fd43c97a5e3193d83ef3e3c
SHA5126e0935f9644303bb9f66c3dd765ad76aa1029bc42dbd0433f5ebe58340b64310503e6f3829a359d6f509eb91d9288a1cdcfa005e89d62d49896256459582c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577dcb63a2f921031b757b058299a48b0
SHA191ae81f9bd147eefa50b7ad554fdc8c09327e1bf
SHA2562e099fc7a1e5330680cde52ce2c99f40d85e8ae0a806a18a101ddda6a07b17ce
SHA512c1b108e6a279a68a2b1ad64db123bab2ef1e8508ccc30f2411cd19787731c1e4d550e201b892dfcb05251761f94a35a3d7e069d941f7c10733d69fd809f8aa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c13ffb67f7466332e3933067257624b
SHA14e963a16c43dac01f1e68b53c0a245642aa262c0
SHA256616d6e6f252e29280e798963a4323818f4cd1cc1c0a8b6038e3ccfa0bc01547c
SHA5121ccd5b5d6b47b4eb54070a1bb31b5718145d0724ce60fadd1fd921c20cf5b5316c349b66a93caa17f276f3d7373d1a5dc0865ff6b6444f52767c7e1580cbc6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8c5deabb1fcd1303871732c444e137
SHA1b08efaf2ff592bae4dbded06f5bc73102478577d
SHA256dcce328008ccb16bbca808a807efb9c922b5b468bb91b45c88e5543625257b36
SHA512465d9b47d6c2714136b15f5afd221f53d1f4de4a15b629a03b920841eeccaca542e03d1cfb884d720de7960d8f88f267715a2a9d061ad3404179f5653aed5c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed486a7c9ef54acdab64a305224db4d6
SHA15b6d909da438a81d4686ad4417434a63a3b5429f
SHA256b6592a67ce38920ce34b9261552f1a5a0c2f6bea1d8c99aa546219320cfcc611
SHA512d155ca051091e2f14def3317029dfe5a4163b96192907b95704cebfc3b686f209a7bda2b7ae6ba626c66e80eb67d4d824d951fb4da67e1dfc86a644c08ae85c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c01ec36e7705671861a9c007de80d8b
SHA13c45c270ebe9e6712a75fd52cc01544e41d77901
SHA256135ed18b26b79233aa65b1e6f65d909b19a2fb64eb460cd13b6a56733418beb4
SHA51233b6a94b15b63fc496fcb5023805c624e795ff3569f4527f9744a2e9aeda3ef26974216d9a1d2034216102389f08285adae575586fea50e2703cb5c790614e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f397dbb3f2ce5f7453bbe6cf3199dff
SHA177830a59d319a86b1757d33631b356d5aef38267
SHA2561ee062157a9163575d603c350beaaa7cf5c7d36c042dd48f37e56929fe9cafaf
SHA5121a0f79b85a0638cbab61484154cc64ea167971786a0e7e329e6bb68cb8a59a4c2d646a35ea86465595efa7083671fa7a95d349a308d4ed34a65639ce33a3b700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf88d17f006ae368b49c8e55768112d3
SHA1e40f1b1461338f02c09dfe2718ea41cff5e706d6
SHA256f4a2645554516c087ec42f4b79efcb357c59fa18674934e89394d4916864b1aa
SHA5120fdb7a8ebaeac7b3b6a890e8b3572653eee13b7db310faf708e890c56e61d5e44010e0bf69b4108c6a4631acf2bd46086fb66671d7d475498945f43251ec75bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc077e591efe69de41ca9e0151f60b86
SHA15c042dfd7c10346c117fe145f4cd3a8d14a13303
SHA256ba5beaa4378fe79a96c8270f01489a1da7391cf429f736ab13bb321d82eab9e2
SHA512dc3e1c8c2a7f420d6ed8716f912ab9f19ec80c31ec55b3a186a8167b6122f57d02b799d4a8260ff8b06960947e26caeb739ab6383266c9a440445078932d6e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ec6313d8b95322e834e95b87ef62ca
SHA17a25752cde309b493b8a6c7efdcbb66311c232b6
SHA2560b66710b23fba5320224fa6c1eca048a6b2e7f3057ace28268d12d578250c389
SHA512671bf868ed723e397a272a5c68885fbc8254d68b9d4fb3ecf1b90dadc9367a28155bbcfd7887652e9dfac7d40a4d98bf0e5968042019e31c906938d48e9c26d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbcb0d885f57f28f2c3121b69b65fc2e
SHA1dd666524055776b40df6ff9328a7969868fc24bf
SHA25613a1ec83a4522d9738ffbe00d961a51e87733b0f41070dfa70dd623c413cb7c3
SHA51255f7b8711e343313bb3cda638fa1e37829706d8ce9f335b68c2c2baa2e7a5a0943cff1a30b99b1daec07097c707c7383634b914678db43a68d67c37b4ba8139e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3efb4264ab97c79a2d7ece5dfa6f24
SHA1d300d1a56473dea5315cf44ccec32e98d90fbcc0
SHA2561d1a48d1e3b3841408ace34ff7ad392c4a2184050cb4f98e21c26917d1b47301
SHA512360e05592cde509db4bb8888933ec579ae515ec253f6caf92ed226f2b7219fe8c19e2e363c22f89bd9c268906e7a62a9075f62016096f7d5d09cbeb6fa688bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50347ff9154aea2b98fa358e6790ae48d
SHA1017683129fdbf1c8f40aaa5601c8afb929b3e2c2
SHA256e0619b1406080b09e2db9ea39860e75109899ad1315fd5f291fe27788a691a93
SHA51249eba0d70035dbd869b116320aa0cadd8e795eb2d4349d2f819236ac6d92317390357ac362c98634d61e790fee207f97ff189a58993511f8d6e2ae2bbf999869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3827f6d15817cd5b1620645b6611e4
SHA1c4b8c224eab1731d049004c4f54751c336b684e4
SHA256d0de39d5b86c0ac92ebcfb1acf38ce6d9d71b58c89cf3a8d627722eba2f7477a
SHA512d3edb1fa3f9e796e0d8fbe1c7ab9363cba15fa62c29f75bc3bf4e659e71b86c79867e5043b621af1e14dc0d94d2eb183bc60ec4a6f1074f5dd2c77e2a745efbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d835093691e5f40a138ddcc035df73
SHA1490b31b127092755331c66347c7239bbdc0d9249
SHA256f3c8b15963ea1a5ba057c823173cba83d8a78b6439609662458183fdf8da9fd6
SHA5122ec867fd60e06cdeb2e23b7f655689fb5956b651712eec3ad0d655ade3343707be972a2ddad0b93232c8730a6e16a173150034fb1e112e96bea8dccb939067c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54874780f3a43053dbc57a2ef58f01f0c
SHA188686f3c9553d67b3c1e21d4032f747693b47348
SHA2564c2b29c26d46f05b982962f7e589525241bfbfff42280794dc8d35c286797c34
SHA512a8ece9bb0a7f63cd30d52d0a1eb8630e490e8b21ea58c05a9eaf1d8379cd015f7a6fcc298bc165e3c634571907fb7d21805ee414ca272b2ad5182c3c55b89b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e4b7cb0c80812af6f887fc62318da7
SHA13a5adf2c66395283c8cb0e77d7e6a6ca291c26bd
SHA256b78a03b69b91ea69b1203583db18b8743943b0ba00b7c4162e60a4c1a0e4d068
SHA512bda9156bb2a385bb194396f83724be1bce3e9318a5589767c28115cdbda3381bc285fe56b7aa4ed4830435eff084884853419ff485311d6b329ed72f610657ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58181eda68ea8c32a01a9a440b9205adc
SHA13310aa659a2f1c2ffecdd64d30e3b02478e1e320
SHA256a87bbdc10e31c817b873bd66a68ec72d0d70ce1dfe8f25c35c78bb56a0321743
SHA512bb9cd4294291f327ec8a980362af0a562ad9763cf22ef514ac5fcc887a11e4091a7200f956565d36c925d6aad73fae8109a0fc165e589324016ec08fde94d7aa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a