Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
690c2eedf075aae308277d29e5b3d8ab_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
690c2eedf075aae308277d29e5b3d8ab_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
690c2eedf075aae308277d29e5b3d8ab_JaffaCakes118.html
-
Size
11KB
-
MD5
690c2eedf075aae308277d29e5b3d8ab
-
SHA1
9e85f86362158344b834b595e1cc1a99cfcb8222
-
SHA256
e1c75ceb66120d24c82b9002ece0b9616b28320fb34775049905bfc1f20101ad
-
SHA512
d60a531715f72225f280d86beed8515c3b9bd30b890f59f14d9594f2c6e8ed1405be0244406e6ad3269eddf938a4e67e7e7cb753f66a6c8a73603e427561ee68
-
SSDEEP
192:un2RyW+a6bh+JL/XxYYphGWG8ZsPBGKxIZmaBG91opB+aBGV+neojmGZKLDQHrj:/BWoVmvoP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583533" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B091B6E1-1895-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b0b9d2688d79274092e19e94d3403e793e908d6661f2b88674beaebfcb19e053000000000e80000000020000200000004041da1de435211d45e8a1df0e383caefb1988fe2302146af7bbc8bb6bebd9772000000066a3a29cbdebfc092558289cfef65a91a5dc354672f5c70c0ff8bbbfadf359e640000000868466fb6378f3dda08763a496046b1784c6048595b547aa006fe0fbe19399960cff30fa2127c36c3e48fd438a19574cca68094400868a5d896b3e96e896510c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b16f85a2acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1612 iexplore.exe 1612 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690c2eedf075aae308277d29e5b3d8ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b77c1e3ef84a19d74d68bb3e536c70
SHA17a4cb476586095ebeb22df4e8000b0c212d153ba
SHA2562a5a90e73054f023b9ce2ea577de6888ec711d0c1b62c33e4eff2d8319a40e3a
SHA5127476f41a2e9bf044fb67d0d48ea60f0a9575c8fbaf4ca6a7c81dfb19021a066c262935d2917e61dccaa871230d431566a375444449f13c5127ba46920b00335a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8002220e874d9f7efa31f43b25ee56
SHA1696a06ca78899c38b54fb324953ec411928d5f8f
SHA256149b30ce76f64b051f6e50d0d0b4ebfd2285eca17747358ed60269ccf9735d1e
SHA5127deefb00bc3962dfd006f508968491dd3707170b0923a7eb24d72b8cc68c58f4b9b7445ab78075b07c5374bca578cd7748a186aed505e982b1841072b274dc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b02efda9177d8d34406033995abb1c
SHA13be6070c3617f4b5d993bc3802da9dca10258f95
SHA2562ef50262625033ff9d17815c4c3b8a7d14f5f58c866aeb6b1f64b4d2bc4fc3f3
SHA512afa7ef7897c52a145205833fed077fc75230ece7b73913b163f03e1b2a514873151ff6542440c642ab4597cba5fb099d311e383d50f32fa65a90dad048d997b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57acc0c01e0e7c0545aab3276cf54ba35
SHA1b0d28b5ee3bace3762d96ac608b92b554d718973
SHA2560577eac9fe01c5e6f87c8ec49e86017dcefb43e3c925d57c40b89e82e3c763bf
SHA51241ca18dfb1cc6476a1ae892010f89ae2982f83c23b47fa34afa9bfe0bee556c60b32f490d350a05f3c4d03071875c3861cd237ca21132eb32c3fb6507693d9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d72ac56c27c6a9153661712e0b9363
SHA15394263031e89b7a7cfc09b631cfbd6aecccbdb2
SHA25687dd6d18b19a61c4230f4795bed363822c403781aab650b2a65e00ede5ea025b
SHA512e701d21e7444b965e6d655f68d5be9687842de4a5427b924128210bf202027393894f76ded3da36ed43171e9e299933f04636339dff14576b0872b22079ebb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba5ffc2f42ab4e40de83cad462b471cc
SHA11c8fc9983ee89a2844b91429075a7282d9a901ae
SHA256cdc778643698b3058b355ff701c4ae7e496ea9a419c78cb51f6d56364609fe2e
SHA5122f9a837181fc8b26f6b57a1bf778eda8c05b962d9285cafbde103ac337c592c1836ece652e8d78012537181d50238c0f480c113688975ebc607b0f13b89e7c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0dd72ecfc7df086319d6f85d22f516e
SHA1f89721daf6359167fd95ced6bbb2c95ba5aef125
SHA256e82772b30efa45397ef64b368d8c62a84637d41ad437e33e5377ab9520fc5a38
SHA512bea62d13a08d00aad98564f42b0e25f25324734ee7e89d29813b8dae62644444c16183f523380f030c291476b471afdcc24ae54cb1840176edd72f77ad6c8cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0dc00c4d4b44a04ec81affd273f9e64
SHA18e63c435417c63f7ba82d404c9b050b373e018ba
SHA256d0bb0c7e9f8320cf453301c1b1d56e2bc89ac06813cb5a25d76d914bdeb327f6
SHA512d778cb0c601741a7c2d970bd61b7e4e240e41eb7414d8358b63062bfd133feb13d1b713c02857a08697d4c4a684e8fdbda7301430b4940f2337bcbf3fcfbb85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5298482bb28af9462096af4a77ac0ac04
SHA1bceabad8f7121e59c30d8799289a13b73d8ad729
SHA2560290d676f448c27b8b108777b3dfc26435cbf6e70e8b9ecb5f0f0106eed4a4d7
SHA512026f85006d332e95c47fc58e4249b074ca6048db5af7b7947a760e2048ceec122fbd906a5f8bb80bc79c38d31b80cb399b7deda661bf71d40afd72f832bd054b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c632a1fb95d31f2ff34216cf0a59fb
SHA15cc8be7ada52cbbb303488dcdff7c9ae718e4de8
SHA25632a322c74354f548f22e52b90cfd1b2f11dd77f858a3f4caea045eb7397e1dd3
SHA512cfd7a6bafa2a8bc21f6aab4517bb295e575cd0a71443a1f05bea95df303349357d12464a5f78b392ecfd88e6550662ada476846eda31312cca3f2500c8a7bf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19cf04a1d7a41be3994000315935ba9
SHA1248ab8e15fe739fe628b4c25f51b2f47764d4605
SHA2567f90caf41c2e8a805f8750ef83006c8e737bd71f355cb5d4f9e35e99f1a113d5
SHA512e5f0b565cdaaee1bfa57ef4b90001d93cdb2e59e17f39a02abc1c21e55177e6aed9ac5b3b8cacce78c1db3018e7e2341e7695fc661a8dc6aac84e71afc6aa63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fae9aca7296f16a06cc4bc40ffeb10b
SHA19d0b8fb5013ded7b5eea8b5fc279e0fa309f8231
SHA2561b16e7f6da5b98b876520878893d67c31dcb11df05209de0c2591cb30c342502
SHA5122d632e47196c6bf26641f4994ea35f3343e3cb8597eb877ca47da894048db37a1c5556f65f5e732a64c774ae1e342ea2b4cfdb4a9341e78e80b6582953e07c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f75d7e9ea6a5543564653a1473642fc9
SHA1b702dfa1067f74907861a743368492d95b40e7b4
SHA25697752726de73d16bb23bf7a37c63db239a58d464066ee0b9f39cfd881ba48e3b
SHA512876231bc1458f152befb6b045e7c183f216678321da5b4cefa27c8dbeaea53540c9e1ce2fc62bc8b723688ae3f10d58d8160d2f9dbbfa5870e33a93630a9bcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fadd9151a969792ca91c2ffa4ce4c48d
SHA10456adae02aebfbbc898d4ec7c10d69dc85578b8
SHA256bdcfcee8000178cf3dc8d091cb0f540e748b2cd5f71ac4a45861dc34b969c9e9
SHA512f747e31603637087e40a8ae0d270c00902d9abaac068a50987f194588fd8312f1758054c13b767d5872d2a9ea1d395eea865382bd9fd0e428929504b870a5636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ebf1a5decdb9d9011154269adc0978
SHA16a9529dbeb896f6ee5166655200172712d5010f6
SHA25624d449ff7892eb2b5c702834070ea9b32f403638a9345bde4f0ebf4601bc2a54
SHA51276b8df79bf0307b23ce97513d23f4964296bb6275a11058f1c26fdd16a62f154e0db1588efa4ab8a274f02c6706559ae8cf460b0ae480ad9afb9956852d827e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555456548aa2981d1e2952624e1262fd3
SHA1ba23de6e48f111cb604d9b79cdd43dddedc74789
SHA256da38c1c56fc7fd316f08bef49912edba9109ab13407893bd5811b667e8296f57
SHA512bc584f77bd975b2151c395b33eae84faed01dc018de521b2284392bbcc846a04e1e51d8df0f4ba7642c377de46bedf62d002e0be8a118ccdc3e29cbd73b85762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff324d7b1e85a551f6c23ddabb49e94a
SHA1a4bc274f5a5c6cfb3f29c630b2a240b9ca10626b
SHA256a8a84a49a038b574bc7ab5ca9892b18d81a14c766a5045e1443dedb8e04c7004
SHA5121767401fe4d2f43596da65872df76fa399c2dd29f27bf34425012fd141e180cf0c42d626268df0f00791fc7c79074fd30ddffe22a9824b0eacfbcce52a69de2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ded3947a3545ada29324f3de11b70cd
SHA17dab48f936af106649bd2a3f9c2ee5c2a087ec48
SHA25691720edbd29d680052ab25792ef0d75e27f19660726a1821ea4e759ad401d011
SHA5128f96a7f9a34be1071a3d0a0575f4d3d822d6cb768000551fecb50bfde2b56878ca2cd3cd1ad65fd002c7eee190e32958fe8f13b69f9981d33348af1febad76ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1f071a5d992ae16a1d71b1ba2624d5
SHA11e01699b06bee3d2dd040f94bd87389c9cb70249
SHA2566f44333601b66a448a06bbd59a956c47a47a2c1778815d09850eae85765631b9
SHA512fd20a1f100e5c746fc5383c0704205978a606c329fc1eeacaf590120a55fb0e01f70edb41d234c058ea351af4f7af0e06247a22fb99faa83821c287ff9b34573
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a