Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
69075eeaaee230baf8ac2d68258061cf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69075eeaaee230baf8ac2d68258061cf_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
69075eeaaee230baf8ac2d68258061cf_JaffaCakes118.html
-
Size
68KB
-
MD5
69075eeaaee230baf8ac2d68258061cf
-
SHA1
fee4a932970cfad7078866881a5a9f275dec7b4f
-
SHA256
51eafec7b365d26428465af52fb7b5f47c200a1fe9a27babd4feb12153c3e4a1
-
SHA512
55f786b37e68a8a953b34034f011d0512e11eb6f2e91c04d19a378abf8cda602fdd2a0d0138598a6400c41b9e16aff6aeb0f9119b1f88949233a5c88a24aa3c6
-
SSDEEP
1536:yq4H5BxC8NeOQTtxNe2+WBQYZNePCb4NeGV58kxs9bMhrn:yq8ahB0lxs9bMhrn
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 80e8e69ea1acda01 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB16E581-1894-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2860 iexplore.exe 2860 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2860 wrote to memory of 2948 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2948 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2948 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2948 2860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69075eeaaee230baf8ac2d68258061cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a43fde18616f01f2fc7001833c6e8141
SHA107663a4a7ff777abdfab06c09fb2730bfc84392e
SHA2560d069833eac0a5ae6c80492a982121dc63de4c3812d9d85fd8cfa8db73d61f22
SHA51202ae080664e2ce7ba6684385d25f0787e721bc7c94bf07cd7a5066457f4e18905504c3d2fb022ea8a153a12394eb83b8a00b0ae83964f96cfd1816688c20f294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af4bc77cf3be4be6f99f28ed4ba24253
SHA1222af5c2c1c9ff21130752e82979733178fd8efb
SHA256b7fb37eb2d3b88ce967a7a6d9762315b946c0a0f8d5675ad8e7011db09bce960
SHA512e426acd98ffdd58aa338586faf2607ac0e184df86eef3b40bd6fd2009da6737dd7612eb6b9a47d8710087789d1aed48fb820b0e20a80c0d2b4a91c7e4ffdc499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d328e7b441e9aafa945ccf212d448e51
SHA12082ae2401c1b27a8313254f5a1743b848bf889b
SHA256dffc2706c51d6ba9d31d150387de9ba6c767331de00022bf16c4aedb722120f0
SHA51236f9cdcd7ffd74f36312b7fa54a923a7f361f3a2995c0307b9023f0053b464c4ecba165173a6ee6b7f4f0d3f9c1eb9234eb86075e0df1f2e88d38a38cdd61e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535378392a1f004ce16b948051a5317d7
SHA155fe1b689e71bf1a6701671c79408ad52d96845b
SHA256776517ed6373a01dffe9b9d524335d1654e8440906c5325509e42d76db25fff5
SHA51272926768a3d27ae9438482205916ad9f8a8a568445155df902a767063d0dc868db387e7551ae01fe7dd465312f3e01c8d61992f7b2bc2a73f3ff5276445d198d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e854ffc177ec7b8cc9b8e262499b7c24
SHA1202a960d041139030ad2fd65a8404e44ba65e896
SHA2568cb07ab9522f18b8c11368faa160277e4af71018899e307fc6d8bc54b77ea361
SHA512346e8670a3d62ddd9657a4bb70e74eb69b12d171692a667f3861cad4561a0bfc91e0c2e9b6f62552db539f9c29d4a5dc4757d737e1060f3d385374c8cbf92073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540169116cc2c0abf95f1e6df55337c3b
SHA180266c679bf1fd15f0efbeba6dfdffe323ef0b38
SHA2562eb642d685ca02f0a0624d0a991fee62c19eee2ef623354e2323373315c5cf28
SHA5127b1cf01458642532eda6ca37355807caa0528887911184863125ff6d763da8ff7d22b33f2b8f79d5c1ccd8b8ad7c896e5e527bf343631d161948f2c0b7d8f1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba68df2e7bfc0ac2be64ee3e0af02ebd
SHA1246fdee367df7b6921a142733d5be86fee84c192
SHA2567222abe042866ccac366bac95aac9147eb6d2668ffbab31857d2d3de734b0ffe
SHA512080524a26f18ec79b13b9dc4bd13ecf02e6b0b05a090f010ad4b0744893c6a2c41ffbc5ecf3360af623b8b62e05549027aec6a79fa2fc1d40491a12cc50e90b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54171b2599058147af21b6df64e4eb4da
SHA1095d249f701cacf22f3e74bdd6076bf09a1b0868
SHA2564f5ac5507491c480f89f4d17e17f61ac480495f6f34a312ed7c9e9c21b0d0f72
SHA51255f8d799dea2bd37df054cf02d51c231defe2d4f05bcc45c9baf1bb4003ce7df5118676fc583f8ae26a34db0015123b966fb2559e8c4e9cecbd9c6f1687a8730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5189fc38f541111591651e9ab684abc2c
SHA123912edcda32b8dc777a52cbb14dc785c5bc5f0f
SHA256b975b491763c64c1d62a19ece0fa5157529f9b728881936fc5fd2a1bfbadacc3
SHA512628454ed7b19de7224ba0725b55fb6873f2bae68633b807045aec4430402e81061951da35362374cf82d5475edb1aebfc2747baf3a99074a8bb9b146e41a5f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0dcb9d62f7330f4966d5430da745293
SHA1dd4029f59adb6f2197d29ddf5959d49a8ce8335c
SHA2566fb562837f4ff81385653ba2916011db2608f3d11df01b69b933e896b0a9ab15
SHA5126d829838159c7e2ecd9f2c82a45f886dfb401b9c21433edbeeb63e4f719cfb54885fa76fa72332af23bdf5a5e97006c65c9a67a9403ee670def1bd0b4cf258b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e82d2e09878b14813df46026e3c4318
SHA1ebda4e2b59a44f67268fd1b44de3019a2849d83c
SHA25677ec162cb291b7013ee35ab36cd52bc3d6e28d190d382a5cfe3bc2bda9b170d8
SHA512d32f1df9b7124ebc46ecb26630d095c16353b5b6c59f41f49c1eb0d3b8f681f2d239416b9e24cbfdc3d4e37b53df5ca62b87eb8897f7d2390fa92cab6ee7621d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5eac170e09b75b5615fb1de28424f86
SHA1d748b2e5c2be6513645e34bcd3b18a961b64abd9
SHA256fedb976ba83132dc5de98943d230c2cdb949628bb238931e3f6b3b34109eacb9
SHA512709af223a546127eb89ca7b8e0eddfdf1a06690b87db39de0513b6d6f55ca31e389952b71d76b8f792b0620acb196eb3f7e351a964a1e60df2654d6a38b023a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50bea2f7e94c69d466ae084d9842bf1a2
SHA1fde65946a8c5f147efb7025906a12ad9c23ee154
SHA256f7bcdfb601f4a09de98b1c69ee692c76847e9ffaac0d06d94446303d766828b4
SHA51214e975064a5ba66ae41f10fef087bcbcccb00230eaf24266c7b1dcf420d8c8e61c0ecd839b0a46920213a84b34beaeb549df4e528243cb4628d29bc452cabc56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\wp-emoji-release.min[1].js
Filesize92B
MD55a18e242e5852db26743e6db36f2358e
SHA1c6258fa68745756827a07a5e738280923ce667b3
SHA25649de0f60c7cf93772f9fe3a75cf8cad8607c69d10bd9828fab7e0ed8d8fb599f
SHA512d6cc02bbb42d3197b94a9cb5cf207abfa2cb1f837a96089dea9a1f7fd3f367b3a56268a0571fa831821ddb07941122b7e3aceaff33ffaca5402402a455c5354b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a