Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
690e965aff1eef058e5ccbb00893c226_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
690e965aff1eef058e5ccbb00893c226_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
690e965aff1eef058e5ccbb00893c226_JaffaCakes118.html
-
Size
37KB
-
MD5
690e965aff1eef058e5ccbb00893c226
-
SHA1
6a2ae3d65f4c281c85e5d2b31d42fa32b8445c2a
-
SHA256
922b387439b6b35904128cfd3b3b760824f9ed4a3accbadee6ad68c03bf30d52
-
SHA512
3633c4b20d42c66fd54fd975feca0f96ec53307e24de7a50a4416147b10a7750b70c9a8b0d9c784e8f64d641b140e6d8a636e8db24932609232cc863da6c42f3
-
SSDEEP
384:Sb1oCNiZo/FMf6jIBqBM6gBM9/uZLc5uLy+o5O30wvOFx16nYpKtiLgQxGf77Us1:SWVi/FTjI8C6gCIZw5OaKdZP8bQb
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56485261-1896-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583812" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2028 iexplore.exe 2028 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2028 wrote to memory of 2016 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 2016 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 2016 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 2016 2028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690e965aff1eef058e5ccbb00893c226_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD547297d055f79de73ecac458be628fe0e
SHA15719879010137804eca12da341038ce65a606efb
SHA2563cbe05d88d29241f1359df61b3b39bf46797d5efb1f1cd2dd1cc1a818353f615
SHA512653f05430c87b125d20f463865272a14d10db9b9a62c050933699a8e732b759097e2e9fc304379e8a1bbc06bba54715e314a402cddfa660a8cc265d869affaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5314f43cd7f9cfe9d6370f387d80fbb19
SHA1c4c67c04a7582dfdb3c8ff6a4a42714ebbbfa1d4
SHA25613ac48dc7f0d99f28598aae7fb188a63ddef630282695d7c94884bd7dcc97c7d
SHA5129c5286aad9de365f95b66698d11428e58b4c264d64de6d264cabb2a4b2b000b368ec7e9af68e3f6d9743007e93bbf77c9cf05d6ada31d2b8e00f0290666d30b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514b92e127516780103c2bedc603420a6
SHA154d0c4156b101cd590b11e4e9256e3e99846f470
SHA256a678c1c9c05f7d03a0d60661b81660b7f90c9a6e4685a8dfd8027d301fd9824e
SHA51226e8579270e018fb003ad1eac2290b8489c01739532b582f87dc9544d1c2634e7597410418fdaa87b6b4aab8b560d16630f1ecbd6a7f9d6208ea59b2b139f971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1635f3341011fc17b8bd0595938a1f
SHA16ffd1294f0273f3d049509244679cec87d08e7f9
SHA2566ff8f51815670e24facc8f44c1d94b6fe503efc59f79df46ce59dc66ae35a17f
SHA51232ebbde5c661c344aa715de5448bd1d4ca9c5517ba828e49a34a3c10d339a522e68221dc5fbd8da9e0a0a7257a70d146129396dc9265e810529109bd09df6372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cded350f240f8308ae99820d412c51f0
SHA15326064f59bf6badc41ca4db4aeee481c4c9e572
SHA256645ea28e2fd4ee16564372f8c5bf6636fc89c89f91e0205aaca685d2a19f3d18
SHA51227ca96c02d1a768a81fc1ad38890fa9162e86e8caf77020e82bfbeec3c443fdb6528b93b670f6cf5fc6c909c6ce416788ee9e85aca1ae653c13a2caac1ab8903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b68cbb8f81b7593b6639b35d02e6e9b
SHA1fcf39c1d174a5dd4086681463ad55c0c069fa5c2
SHA25670502261038b74428bd0a3d412d6c31dd69a7e5d6f0151592c4603affb1ab7d6
SHA5124b5216b752f3d9940ed0d9d35388b373584c5318569320376497b2b4dc211da2075489d710a509179c32719da9ecb7168d83a2b78831e95bf89a407a709b2ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b840715787fb56812c6b3ef82494c3
SHA10cdc28b3146a0062e0afecc3860e982a697db973
SHA256e4332ceda76638dbe5cf02bf80402d2cf5134f607da9260260e9461cb5b2edc8
SHA512179413545bebd249647a753558418ab8c3300b09ab8848eccfdfd8a172a847a0c6141af96bc684b416bfabe68e842b09eb57f22c079dbefc9f5ce1a5e6f41fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b5261f0200945eb285601badc5f14e
SHA1fc1f44da2e48095ed6761027ed42c94cf9363834
SHA25674de460f06c7de90231e17288a1c4244fb7149cc280bb0e852672fca45b1758f
SHA51211ee3147d9bb42e090b059f0cab1db3222252d738f7e2dc5b650797956384dd236bb939dbd634ee8e40da56ae1c73a05774fc35ed58bff4ab2a3a5e7ef9dae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52350aeeacc20cc32ed26187a67246eaf
SHA13d8d1672511a7d16e0478c310879ab55648e22c8
SHA2566a918f229f937a0ada01a445e5a32426549125be545889ae7d90064a94926360
SHA51270fff56405938223ae409492f86ba2c08f534eaf884ca258b262d73eda024572bfff282912dcbfe049e67b9ba71b727f3d6667d7a3555a89b38832040c13688c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566bd70c1e6c0ecfa40ef7e0de0d12166
SHA14b55385544a0409cb5d4b18028c221cd72ed0a8d
SHA25674c3b8eba8eaa5f874e4feab44885d4aba776f410dd3307f93f2a26809f3a11f
SHA51207e2d85014dec3a57f15fb934985fb1169cb626ecb839589664680bb3620b608ef050eb0e51292d45350ddfa724eec7b02452f32d59ae2479600e7801aaba19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6236823ee6c249784561c8c6883fa2
SHA1579b9e60d1216a46f1faa44746f1c40e8b585308
SHA25638856dd75bfe5949f3db59480c2b3734f0a70848b0a098b0bfd327823a737d42
SHA512480811be6ce07f68d9e2f31140c35c222b4d21ca32f6a3e9e3e965e2643af9dab910baf39c2b09aff33a13c8e6401c5f5aa64462faa3d7afd50474fcc23430b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53b516c569b1b85e61f90f18afcb890
SHA197f42d72a2cf80577437eaa35f0fad3ce110fa79
SHA256f25a5c52ee5a382e3b74edb0255b1051baf5d2ecdf951527286a49be3311693d
SHA512c5844e06bdba8fa449f8a89fa5562a5eac436c1a523851f441486edd655cc08a962de9f12cf82a2a4e04851a2821ca5b4c1d77ece7bc9e196d5cfa0b704bfec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da07c034faf8ab2a7dd78e2ef715506e
SHA136d34a690711520d3e3b9daee58244d8ac4d744a
SHA256d7d24a74ea005a2514a891e545764bd8b9b9d799fe41fdd6fc0649af48f98166
SHA51229d28c98a65bd50ee732e49b16125eddcc99410cf317fa73dc4609c8557d3a91150c08ac828649fd024c653d480552472cc9767d3dd8830a2b1a99a753c8dd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597238327a2a3eb316cf6b6b0f2b45077
SHA1b1ae475ec217b310f0c7a12be3708c85994594fa
SHA2566907c2262025cac566bede4909067002d2dd5271cab51e8942356a036df4889b
SHA512a0e6590979d12ccf050226e2f6a01a881213995212694936d313de2ad30afef37531b3efde45a6a8a367f318f23d1dcb41e694e31e4baee51bbbd25a655f4444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c603248d0ce4a345757f8709183192
SHA1757b360611af6e9e17943af17db760866e44dc58
SHA256a942526b99849143d20863879b4c4d97415572ad42bb3fd7dcb388cc30521d45
SHA512903896716d77143dab1c558417d2fd5fdbdf144d2fb5b4431bb6484a11e45edf5a7ecca181c05a34aea40f94e878b712e3352ab82b96ebd54e6cad42394ea73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff9fb38ce4d31d0942147128b582417d
SHA1e36ae317be182ceaf9427cbe36d5a0ac20217296
SHA256fec1b02543979eca0ce1f9e47c748b830cf29d2a4a2d30f4e49af5dc7d7a8379
SHA512048fdaee3657dde7a7dd2db5f84a7b5c46de0cffbf0f8dae2beaff03ead24a8b4a6e52295791d1876aa488d5e22152fba79c5c735078eb037092fc4756845090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d28ccd30f17f30f8ef7815eae8de00d
SHA11aeb079057319bd156cdfb9dfc1878f2e584a84f
SHA2564f055ce45d14e0251deb793c43ab111660ab38ec2dba014589e393f5bb1b8819
SHA512057d18f67aa95b54277c5290983422bc4431f9520ce233acd4f3af1530c960884b15f6856d8c15e89422b83641392dd7bd04405a7c2fb712f8a570a92fa1f2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53cd285e89792a070cb360a0f1b48aff7
SHA1ab5f45a70eb94dd951e211056b55fceb696e1cfc
SHA2567bf4efec1fe1f6814e6ba52eff1692abac2429a2788c3cc0295e527ec102df5d
SHA512ea7b663b362091fa3169bbbf659a261273a7c4331a1e89e62e87910483be255a2523fa0faa556e75772393be99e99931c09ea97e1398d816774830d05f9a60f9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a