Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
690f5cebf2d785b5c327b2a991a82215_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
690f5cebf2d785b5c327b2a991a82215_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690f5cebf2d785b5c327b2a991a82215_JaffaCakes118.html
-
Size
2KB
-
MD5
690f5cebf2d785b5c327b2a991a82215
-
SHA1
1869c4b81e7ced0751278e9b12a5595bad6ed7b6
-
SHA256
217048713d4c7e540227b3303382ed84670fb96076b66e045528033072eed3f9
-
SHA512
b435484323450cb785f65efb949888f4becbb749d304ad92f5262a032418ea493084323549807007bc33aa923ed42be3af15638dcf630e6d801c98b6e4a3e778
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583845" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A8E9951-1896-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0275858a3acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000034e925a555d734fa5631fbf01438e88b07390f85b8878f75ebded677bae74389000000000e800000000200002000000042885691a31eae691ea3401a0a1dff421befca9e937fdbe395d084fd14e96500200000009f1429bbce5a6c9ae4437f49b4bef13fa3a36dd59ca4553ecc2dd153b7c9c34b40000000055ce3df85a8962cd3e6d03b9e3d734379d323beccb768543d98bf4581b6ed8c499bb8f60377c25bc004497deca1d851167ec0622145fcfcdb3130bf9dcc535a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3020 iexplore.exe 3020 iexplore.exe 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3020 wrote to memory of 1208 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1208 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1208 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1208 3020 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690f5cebf2d785b5c327b2a991a82215_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54acedb8fe2a8744c745d33298eafa25c
SHA1d4d9590ae8c0653f390c23c842867ed9ba29ff54
SHA256bf052c4b629fe2ca0502d64d81520df32a71d5978f76572e53ba5a0756a3b18c
SHA5126286cd777e0151b3e339860202f6da3074f3cb02d2e4e4127783193a0107380ebb49e095cf5ed289b268fa8c28649753d0561bafb66e455d56b4a5944948a68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50189efee3100c9c17304da4281e55183
SHA13dcea047ffcfc6b8c1c5d4a2b4c7827a03bb90af
SHA256d19e20c9ec63248cb32c36d38c0cc7c7207c8be06504aa0cd36855399756bb2d
SHA512709e714ba016952f7a4c0f0a132f4b950c2c5e1c989fe83b656f2c384b6ce2dda5dadee2e757a35b8fe4d1d078e55a7ff351e739b865bd31adc64b317c1ea6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb2e7f485774aac2981055e9b92ede1
SHA17fbfc0be6ca7780a01dd87a59c8c4c48dc21582b
SHA2568512acca970dbc7dd451fb167e04fdc536f3acea8d8f32a67d60410682d87c23
SHA5127dc3422ceb8ad3d40ad71005fe1b1e04c543b26d1c96cd0ded90f1816b8f898b8aa5accc01311e6cef6cb32fb5e9d52788308b781c3ee94de9a18b36e8a7cd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ffd61ab4931cc0142f32f0d096f3b9
SHA1b463d6078275ab7c61bd3901c1d1df64b23ea3e7
SHA256c70dbd7409989e90f265e6e135e57929662b65a66b9e055e07cc86dbba6ffac1
SHA51232f163c25d60bda6aac7401955ba23c31213d3ea35b977c1ef082d815f08d925f0c71aed3ddbd0ff3f8d7e177fab343efbd1443e529b7dc7312e00fd7b42be5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e95ad8fe8db3bd1cfdd9fb396d5f43b
SHA1120eb5d7e6936f9fcbe4982f398e68b4488445be
SHA256291a7828a48841fd00b9942c6a4983ca0dedb98ab05cbd16eea40166e1ef645b
SHA5123c66bce6a4b99e2eae12045498c8cd6642db60815f574d39373c392e0c8c394d3333ffd3218ccfaa356e9307b099887f867371d6c0ad5874c5e9cf7792497755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1dd4b5a1928c3093d81b56ddfc7d2fb
SHA1f1899f7ce573ea790ce38da9a172a4be8678ee78
SHA256e04c37ad08d4d10b3e9d6b7e2ade014c5988a7a8c06d46118b4cd1449d03203c
SHA5120578d91759e7d14d74e5d367ac52962333a8ebe3a32406973884e7baf6dcdea21f58adcbba98560bb2fe5c873d832790fae237a664f8d07a81b0bee43c240ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1dc6d024bf2ee3c44b0d38de746f0c
SHA12d3c7a046ba47785a283f8445ae95f619b7e6946
SHA2566d9efa00144b6dd36de59d8c46e5323ed94b25affa42bde324c2e7c4f4a35647
SHA512ebffb958627a1ff1092113339e867db596b987df0a145f5cf354e8abc8f5d6a7430335f05d6d96fdac783e53bed477b09efbf1b16b3e03b1449d317b081f276a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f187655420627f3508ca74777b9c457
SHA12a5b136330094956abbed966a169406855d8da63
SHA25655580e26c40058358d77f49e0751f5a79f00b08e30a242abd6ac9b0272c317fa
SHA51224b200f0b94584bb1c32b497717647693c3db7c874dcf68e8594246667ad732906f9b5bad0129ac12493fca36e1225fb6712777c034711300f9156d33e127f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e5b74a4d1d23e690f96f7ae316ad77
SHA1d186a76f3ca4bce1eea931ff288f6b9c2feee313
SHA2567466804ded48426ce4d0ec5721771c9e8a364dd45253f1df73e7d7571b81fdfb
SHA512e7f5581019d3ed33290580a35a1889881ff039401a246eb576c3b1cc0fead9cd78539f42135ed08d1df039552611e61a977ef507c470aec867ee63608bcaff89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d0ddcad1c740ab2a1776b710c1e0e41
SHA1c7fcaacb0e80e35002ae51f46a66e4c7ea25393e
SHA256c51a101828b1dd2dfe06d96112f0414d162ae4c4de5d3c7cdaf77cd8fe1e0bb1
SHA51283d43aab1c3ff5f7cccc7148c49e6c8fcd59715993a5946c628aafc17545ff4cd400029feb1f341eb3a5e77ef75446255e608d0e980fff0f12c332c441ecb205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a87a245b8b4ced0075f11c59721c1ee
SHA1c947c54130ade500eca8076d2e6db231462d6a75
SHA256375b73d02f8f250fff920d236ad80cc6d8dd2badfb17f4fa27e880bf7a4fef50
SHA5127d5b0d6dbee75494d785341e47066d54cbfcdb491049bf334185e9e8b950f9a21ba77344dac2d4fcd395d4cae5a8a09c6e92df33a8d5e72bb277e8e6ec743aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d867d154e28b543393e88a3f38ae0a05
SHA1caf15094267b57219c3cbfd70f57fcc1d8123ef8
SHA256aa3c07782b6776b9c7b4e85da31577f76eaeeebc15bb33a155de7b30761eda74
SHA512a75a891b6d857c61eec91cc2b1b88f9410c7e212e0aa0341c5ef99eefe6dcb493136646e65e1cfb35a5d49ffa1e4744b8b4fbf43a9577ad690ba43242be17ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f7187f50228f65fef84909e9388d6b
SHA1f5f0f3488d174adea81dee58fd4ebe58b45e118f
SHA2564bbd6ace694a01c52f5fefd65fc71558c3640c8ab610335de89471c4c5b8ddfd
SHA5120890e084ecb717af445d474d1939900e486d069a1be68eaf7a41f10732b8fe6e2ecfe42ceffd839d5e94d64a4f6363d640a41c590e52b284409c30d9a9c59ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb625dc1324a4c6b738f34ff41e2e8e
SHA14e69fc49e66d89509ef67a3787016f1a07cd66db
SHA25669b58cea1233cb5814d2436103c36dc1f17b4afc33b4e4b0a10aed38191dd873
SHA51219c22304667c6365c9340dd71b48b8983ec3f752c12d4f21f7ec7a87814a1614d4e1b329381c97f691c0207a2231b06aefdc2215279631939fff71099df8e527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578600a271744f827b073aa7d6b8e1bca
SHA169a72701b63170de0c6fab93efab41e963c1ed27
SHA25614c85ea49d8aee3cf7341c9b7ee4e7a0f036ddbcc89870f950b45f22226850c0
SHA512e1557f1cf5c7627b9e0b695f4e0dc364fbcbeb159668ff8f1c883c649fbce0ed62acd1ca618b05e3a821e9162620ae99f38829acfe8dfe6dd26185cb25baa9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3878ecdbc2c62b9b02cb8d3586a066
SHA15d6810673aae780ac6ea5dbc7fb1441229bfd27a
SHA2560f99358a12d0c21ec5c0767a0f4fe9dcac67dc23d52f16ad60b43d8665a35254
SHA5129e659d2babd789d3e2d803f63d26cf421170a3391eceabb98b589fa96c3bf571e373482b4b8e8b0deef8d7682097be41f92e072c92fc8fe6f7c2999aee811bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545afa485fdab8ad408522d2be29910c2
SHA1686db0c4e32d0797a8086ab9a6cd72e0a11fe8fb
SHA2563049e4bd1ec351a66a999ccfb80ff5555166ef9bda9cbaa2f3ca67f845868dc7
SHA512973222a6fddf6055b61e63d0f309714e23a2e5518e061d9dcf15ec235782354b08331957b9db1408db974726d2c20c9d0cb9c5d0faebc07b0b10c3618a39a293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57057953ed9a51b2558a4d4c4f90788e6
SHA11dbde3698e939d1f51ffb7f69d994a4b24e9d44c
SHA256329cb0703d84084729fb74b3a070f3b969ab7a70191a3ead71a5c3e3980d0fd2
SHA5124b4eb451f25fdeaee584a052bd92ea33d0e25efdaee771f5680e1746a6b0ebd0240223a8bcd542adbcbe975a720a830e00e2b95f2dc54fe0d9ec80b5625cab9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c417120c3d770ae023c6a75b7266a576
SHA1c2aeb4802fcbe068e1a83fd403b1febd6e990779
SHA25655b4c1b632020e0ee5adea8b7700819abb483e3176cef20cc193a1fb99a54387
SHA512e1d0436510ecf5fa975b6229b87682159074af70b2438d1412659842530873206bbb1a8f983e2a133b256cea427a4e456f893294e8d17704a2b5fdc9a39c1b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514a2d462a2ff1408dda7991a5b47d9c5
SHA1d10f3cc766bea92a1d2da737d32121742ac1b55b
SHA256eb1d5bc5cd58ba4ea52241315e74c57fe3ed0df0349a726a588e2cb6d50b77ff
SHA5127bae452e0449b3d17c14ba1d2bbd764ffeb4f54585cb760192d8d06cf33aaa7e71a821ad477b8bb31a3145cf1194f6d4f78820a431676d4c48944e79126a2d1d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a