Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
69104db271821e732a5592899ac3d632_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69104db271821e732a5592899ac3d632_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69104db271821e732a5592899ac3d632_JaffaCakes118.html
-
Size
58KB
-
MD5
69104db271821e732a5592899ac3d632
-
SHA1
fc2eb63e23624aa639c5acf943875d4a7d7a22c4
-
SHA256
3f8a40d756b7d967cbd24a5df54f66d90959683bd54ca1e007527e9b6fc8433f
-
SHA512
8b7835006cc35680687b3e50d2e279179301316202aa79bba15d0358e90bf43d6889ce9adc2264ec71a2fc2c35561da8024755ab20be1be76c53da40feb5b3b7
-
SSDEEP
768:+iN28K8y2uHTyK57lJd0rOLICQ7XMW8viZyj1Ju308W0L:+i4r8ybHTyK57Dd0DCQ7XMWgiz3p
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e94f67975050548a6f1f781ee83b94800000000020000000000106600000001000020000000b89c5d4f96905e0d1e501eb9103894195f5c2c66b62315187b91c978ff565728000000000e80000000020000200000009efc8702b3ef7b4002a8f7dbcd56632278ae863f402630fc5dcd5441fdf63c02200000007aa5a0f8c5bdf2145351443f60bc8a70b45bbc8e6bb52c79427629c58fd50835400000003f2ef71efe5c9e9c360308a82c767b803b9262d9b7256f0ffc86c865e6df0394bdf46ba40b4b9631b4562810be1ac12dd083eef3f472e6c08819a929e604d7e2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ac638ca3acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B73B98C1-1896-11EF-A7EB-E60682B688C9} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1692 iexplore.exe 1692 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1692 wrote to memory of 1936 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1936 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1936 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1936 1692 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69104db271821e732a5592899ac3d632_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf772bef483b562923126cd457ff30c
SHA167f14db8337f96abc7461237324cc8c82ad3c858
SHA256c05f22e382dab558e60b0977b73c93866ce64d427da7e8633620d57649609d32
SHA512b62abdab051c3ec58d7fbdf52c797ac936d30c27710439dbbff7d51d4141cfa96e9b2b0f9b750302b659b404a91bb059edf8eedf3b6876827b44dc22180f49d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be187e7352de8985f748b2b252e3c5ab
SHA1ce507df1c094de5779cdb6d89cb6ea253ed82a8b
SHA256a209cb51f176e9615dde58f134c4a322662ae1a1d4df6c76da978d7559a5dd07
SHA512c8333bd311c79f232555020f40dd3d410314d1cfee58ae31c9516ecedd32511f3bedd7d56e53ffea527be62bfc867c1ea8b8b1ace73aa55bcc4b45e3bce985a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9f2615bc3b953f8a4ae6c1e6b8812f6
SHA1f67feaa3a781001427a808e40e3d6aef3fdd6650
SHA256e744d5b1d10865e16fa0354c5103ed6f9be56fa12f971e57a02fa8e2152569b4
SHA51276ad37f777f6c478321d8565161947bae260f5e82cee478a6ac36b85603c7af12427152445b6b14cd13921fe011edf8504221a685a3c18e17dfba9ff633d46e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fec35e6088a71cd85a18c270dbe3cc7
SHA1f7809104a61acabc588d8265eeb690ef79000cdd
SHA2562a12356e0417bd8409b17bb8144b3dd9ca5f70033691cdb8280f815cedad4673
SHA51255c46c97626133e1ac2ec5dd8c06aa5ccf6c85820fed8c0a399d6edabd35e56b6f3b0d69d27f96ecef2a96138bcdf9ee044377754981a2f54274ab225ae4cdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293e09771faab157456bbd5119ed9c8e
SHA14325e349861b5a2c93d1d0c03a5a32e5dc4eeffc
SHA25688585cb1e8fbd7b61117fa1cfdc3512017bf623df02774c0274c1286972f10b5
SHA5120bd97ff2d0b9b5eecdc95f6fc0f56b5a38e9fd0d93622da239983270d1740b706eac785944ba3bca08ac9efa23e47c2a6b7387d91395981fa1010e4a1729df2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f0cf26a60e3d79728f5b9b8bdbd7f0
SHA10b5bb285d5c03f03d2def73652deb15fd706d65d
SHA256364227df74d4b1d4b2d309d8a0671ba1cfaae0a422b16074fae2322f1b3c078e
SHA512d1358faec3c1cae563697389f8c7c4173e021d0d4a84828e08711b701c96d65de8d09ea806470c7a54dfaa45696008f9a287f5b8ff22423a5228e12a42c2295a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507f63c5fe07a69bcfc6d8287402c1309
SHA117d2e0ae802e296a5e8dea56b44b529bf31e2fa3
SHA256fc1753a025c20cb168563f83cc5fad03267f34ca7d9a38e614c456aa38583e1f
SHA512e2528c1447461fef68576871f27a1acdcdcbcaf9b758d0b0918bbd91835f120665ad30e7fd57d3bbf6021afb985e8a7bb2c5183478e92bd607cc2d8de892ed54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6b665dd496b0bc69e64d1e89eba294
SHA1fad5dec9085eeede4e1017ae7c5f90acc5c4bbc6
SHA2564d74a6744a58a876fe3d027c1b7a38e1f6a0cf03752a66fc9c38de2088edab42
SHA512c4f0543b3e874c50cc07f23181bf7bad94d646f3cf8c68b371081a570c9cf7b8c8529e0cb182494f38ec12505aa21357fe1f9a35aa3f2edf21a7bf9b8f307c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a2d14f90fda9e2df671f03ea0b3fe2
SHA1c8c8f9f96c36e9c1d5ea8278d4f26d230f3b98e6
SHA2569e7f088503a96453dbed017fb22070d1d3c4092a5f4f1631a68c3c9cf7e321a3
SHA512282ce345ac5dd9db13fa2fe90efb733285248f353f297fc69d1309de6102cae7ff7ccfec89de2755817e3d8e781951a470b7bf5fe27923513b1f893698e9e67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ace6bbc3e4133d396bc7552c424665
SHA15a2249329781622f4d209ab24af32dd3b4844993
SHA256878d52e98deb03c36828ec3bb9581efc103ad26de2bfc008f9bf19b53e65d57d
SHA5126472daf140d2284fa42bb4890bd22da6d940292b8aa9e24b404b10d492ad139819ff012ed8ba8735dd110eb5f95843f47de1384e549ada473e7569c07f81cbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ac9ab7739d928d8af6bdbe2c9b98a72
SHA1af2df7178972117d446f900abfb17a241405eb7c
SHA256b8dbac47ec00d5abdeb9e19996072c4460b018b09d1fb7709cd5d5c9ec254d5f
SHA512382f98fe0a37b6369c64a5e06f3dbb2fd332ee28f3a59d97e37245f909750eed206be57bd4c264065041eb334610553722936f8b1f1d07f11eb1eaa1180a3824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c6226e5634e81c483305beff500dd6
SHA18c8760c89494031a178b7c4bd9f4871f38321396
SHA256f9cd524d9fbb8fbbf36f2d2928263afaaa2dc99168fa6384a1fe532c97b70945
SHA512fe7025e8bda5020c671a27d9ca6fe50e558339a83b9a4afef97d44a83a5b46bdb37c2e79144c2eb7479424e197dc7e48e7b874360906d5f520509bb384111187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7fd021d0e781b3cea317842e8a3051
SHA1964b052ec89e66973b46a568903849e4e5349e0f
SHA2565c7b2c2546ad872b2db289c71498c808fff01ab8aa8b85717134adeefb9bd540
SHA512edd61cd98c0ae92c2ebeafe5ca1ba89ff872a57f82f9e89da5455c01d89f60e06f518b82688d2c4cbfc9211b3c418be76f3bfda97ffb05f8301e8402ef8d35c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbdaa23cc37dbea074606be40d06ef4e
SHA1b9b4f2073460cf8d9f9fde74b3476ea68ea91e48
SHA2565f3b27f7f19dda373a2878ee9b3d33ac0c8ee200a96b0246b0708887676f3458
SHA51274be0bdb0e1c32d64ac382f2b99df9c5b7fdd0b22226fc7beeeea0cc3a7e1df93c4a83e602fff0317e5261c6acc7c2dacfb3f65c03017bf2d94b6a6aab06906d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581cb3ca8f33625f0d844b9b8ede68de3
SHA166621222afe3e1391ed219f8853b7d421720ca10
SHA25638b9394c70f94fb3e6c9c48ef26308fc7f29205db627001e3870b7b47454e36b
SHA512d548c254f741fe31e7bde2b5652000e8c1429fdaed197e113fd494cc6daf1ca8057ee3b9895230a4a029632e5e58d430d70bf2a489bd7c14c5a8825969cb5b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cec4a6197b0524e8766329816831fa1
SHA1b1c7a795a76ff3eb627d372e526caf1bd87954b8
SHA25635aaedbd4e1c89d3a9c3a8b104a7ad90b865edce69ea50b463ef6a5143c7e5ef
SHA5127dc7cc5f9cdb9d56ad431e5b5d5a01c6fec17e2f5b4d35dce15afeb00b29614eaa20d4ebd33f0a54b060290f4b75a416b4f6df633652a6374522e19c1c8c4932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d2364e2f456298ac4e50338f983523
SHA105f5011a4e2c2258247ab24e049c84bd46b98990
SHA256adc90b711ba75888e2c611cb159cd7b98418df2824e6af1a413768adf209c385
SHA51277dc5d1065e7dd998af3202b38c1fcea2fc50eaa5075415cee4c61254026a4c7b0b8a0a234bed00c23bdac53a3a43a4c836a7f702bf7f7e5b46806dbd18d9c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb4d62ef2b80eb49e397d067e9c65fce
SHA1e11355890a5f8054a266cb47c30b127f7ceb274c
SHA256121a08647e492d5fd4d09aaae7fcec94750e93626faf65ddcffa06e802860dfd
SHA51256098a09147afb3b46df7aa2f75cce30e6f9ea09df0ddb7d435dbaca71a8d33e04191900511e093cde89e583800f96e8f7be727aec3903ef13feec324c325301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bbc70fa2c7b4f0488018c97d0119bd0
SHA16fe3d05d4267786b46f6e5a81736989ed0005095
SHA2568ea7a90b3f7e37e4b317b6bed9258b725348fdd472bb4be4fe3c399dfa8df4c1
SHA5120404b9e1a2edefea8e8a0128839c9a416692a4867860cdea29f3e17c30c6c4103b124ac63e2bab37599d9ce985933e31d03680aea8fc3d14122c9414fcdbb0c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a