Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
691168f4c8196f97a62343df4a229efc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
691168f4c8196f97a62343df4a229efc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
691168f4c8196f97a62343df4a229efc_JaffaCakes118.html
-
Size
3KB
-
MD5
691168f4c8196f97a62343df4a229efc
-
SHA1
272c35e3b6d53a4f75a6e789dd935d8797b7d1ce
-
SHA256
1b4059e69c88f4362400ef0fbcb272049f175184241c6ee38b3e56b837a34b38
-
SHA512
0a7d0ffcb13d8ecdbab208aa7c16c1ff6a2c800a45888a9ceaaab9eb5d5f747f73b1aeddf9d7a8b98b92b56288a3c34d8d2b3298509e2c4e74bee701e1335257
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ea09d3a3acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007427efada894cd45a13bd64369c32db300000000020000000000106600000001000020000000f2dc7a8304b47e50c9f2a6b23f6fbdd42e465e9186ebca0598478862a8a4e56e000000000e8000000002000020000000b94641db73e68f9f6f34a83f9db6c016c962f3eebb489b6eeff3a15227a18d43200000000a95c4034dd0a4dc971573835ff0562ef48b62817035c3da1a078846ceb6f24740000000f70bc0172443faff02e2d645a03b081c4869dbbf38b740113c3a2b151f6847f4b7f6e30273e6d9a17dc3cee526e0d479a0f72f524c687f343bc2fa0153bab60c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE5B44D1-1896-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1976 iexplore.exe 1976 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691168f4c8196f97a62343df4a229efc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546480fec6375c57df2891c9b4e8a46c7
SHA1161a9508e768a523737b8136b5f602956ad968f3
SHA25673389435d5c488afde9aacc0351292e299eed0ab0952405c89d960c1ff90b456
SHA512331e91c9191c3d2181bd7db8085bacc35843702136982bef6829ee49df9f6d58aa61899f8d335220fb720056b7966d666e41ff8f10f3fbe15d0785ab86d7d068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522eadb88744fb98225072c3593b9a0d2
SHA1cd1c7d6f6be5419951a5984c53ee134b8fdf7ed3
SHA256820e85d02dec6d19969a60edb103ddd7667f914fbc3d888667335edea1a1c8f5
SHA512bea675d21d77cdb7810d147d633cfd5609e4ee097cb475d78fd54db76391b0e28edc59c4afd57d912a2e61a2bd5027865e8ddca2f00372b533ee61fe680afe15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40d63c3f44ca8c038fff8513c15fb23
SHA1445d6853ba5db9b38212e69e998933262c64fc07
SHA2563cd43ce36372814b8137d1bd8e1a0a4bd02cd044c17cb0cc05ee6a470f5c757a
SHA512e35412b244a47d77cd3e0e5228b6190a542f7a5b8ce22dd852b556c59bf2a080d2fe61db67b732bb87138b2b13b6d5acb169c2012da1e2ee801fae12e32e33af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562e9acb3028e09e39e7d62b9716f8bfc
SHA17f095a0c3fdc47a4265c1a4b4c845fd8a3272132
SHA2568b994b33745aaffc2c46a593eece44816e9518daefe16b202b0a0af0979b1901
SHA512dac3617fff695d4452294047532200c910cb7b8b3fe270d26e257ae0cc9e41f347461c2c066e72b978c7473753ec8275f17fc65c01a92d5594b109c29b01b0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d78a95edd19f99f3771a51500c763e9a
SHA12be7134309c209d374df52c3e1711a5d69a1b4d2
SHA2563a72f753e787011b4e8906674a7285ef9902b98f24066d6f46cb2b136b1cdc8b
SHA512a267f6c9fcd9acff8651968d49cd56a0c08389965694a6efa25a6843ed1e31fb1eb8328aa4c63feafc1f7acde7e58a34f2384d40a88173882dadfb11d967e923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c66d6b91609bb98b9689994d8fa416f
SHA1c6cf7e2690c41ccdbe5713101ecdb38156c0ee0d
SHA2563888a060ff4ac53c6a1387cd8bace275650b594a410f31fc841e93678136a6c0
SHA512ae8ef5cd4c4c055f437dc1aa1ec6f1d3c6a0e24183909f661c3a17ac528241a1b78b62c3401894e0ecc87dc6ec7d86074ee7936e5c6d08378366f8090376e225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c9e5d563d9f20b29d737d6e4c462988
SHA1a307cc5b040f375f2989b88c903869c257ae5d06
SHA256a91ba997beb7aa374560ff5aebe918c841923c8624df42e1d083a4cf511e9c03
SHA512265a1efcc7e74b7515c5663a73a80ba1642ffa92c013c89912aff340c7628f233869f11de146c2283184954a5264f0159877662c93ac410a13b1d5afd9c692c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c1836c8fa08bbeaa4c00cf395ae526
SHA12cebae892fd37f06533ee990d3608dca8d244309
SHA2565e2ecdce4cba58e529238e270483861b62de3cfdc3ddc9ae0cd8fe0c860d1460
SHA5123515702fc0b6adb0bccdfaf8bdf9e710a49f26b759f5f08d18137ff11b84c6b6d97f3776d9351aacb5b07952ad573686c5aca4a70f8b2ce5db923f88dde083b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43abe8b8df5977c667030cf5c7ae4e8
SHA1601102626be5648c69ce809387170b60e7e5df63
SHA256c9a790bb99889ae591ad4f7af10b18d7f604173243e8dfbe78371ab8114d8de1
SHA5125520ba3b76dd1f4561f9982aa17381dd11dd68c2e937c445cc35f91c13cd2cbd973aaa770f3c4c0a836227b6a7c9492a1a5a85f3955cdfef797c47becb8e601c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5341cd4098ffd364f263d95577892904b
SHA1a63a78e13eb49cc6301e022eb3ecabcffbe8699a
SHA256e98a3b707d2bcaff26e14a1f264d89aa3ff7b365cd1890aea30ef91fc8f092f1
SHA512802936686aa45d2fc85fa0fd1f9b3ee071a15952ff3ec5f310416d0d5e79fef76b6a479ef4aac48ea8f74c7e700fc729f7361e2f962ad28a2052a5301fc91fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbaee1e96faabc9c63bfaee4c85a2c6b
SHA19c2c0534103b0d6e29acf382979073524f4ff001
SHA256de38a208edaacc13bd4e3e4ab53d697dac7a7b5e7eb21b3bceb8ae425f103a51
SHA512462235a9b0a23fbd3ad042de7edd58f1441bba277d01f360c9d2ae6e1dd8c846778910118f4b1c8a7043a7e3d13da297a32c827eb9a8d24a27f6c82c6dc13773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357214c55bab351cd061d0bedf347e96
SHA1915c5f10a5c625f8b5615f996e6fe4d237d1c5df
SHA2565e80f9e510cd3fd150ee5af7b2b2d89ed57d6c793c6574b1b0b68a422b9bcc86
SHA512079c06d1f322d39ab0cca3ff8760336a15d986c2fdfdb623cce751b186128bec92b916c34cee70f2d9a1c8759abfd6bdcbb9ed3bcc63c951277cf96a246d62a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d176e7405e09058b7fb8da968e7a9e1f
SHA185990c8711d33b7d29c88424931751fc17c59355
SHA256fa75ccf456a4a6342a10353467e524ec5265f68ed8c2e4ffbd963c22cbf08dfe
SHA512a9ebf208fef8509ce7e2a08d42f54308cdcd4de8ebb48ad4b8ff44322ff00bcd893d97c2e6460806277ace5ab93ca86a192f51cc14374607753b672bf937fa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272236170b19c70de004445b66c08227
SHA18f899583cbfff23220df791e9d7ad276fa4eca0d
SHA256e1ee5bd63393c1ccc889aa78dd37a01f8999e296cc19245fbaf6d2fcac9c79dc
SHA512a1902d2b21f39acf703027f896e0e33dd60d329266b592685d13a1547f63d754d24f67279d8e492dc8573f1d4280c46b6a0399a1a2d9a0dad7418a39bd1d81e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de03e53d9fa849ce2cd200f6dbf4d5a2
SHA1f9242e3662d240ed3fab5f28a113e94e57014c2c
SHA2567ef827a0abd1f18e772790a2830fdfa96160c7bc04f54ecc71b752033a0f271a
SHA512a7a7e58a28247765df3f1d8866eac84e1286b0b3c92f566b731b3979682455eaebe9001a79fbab68427427d1c00723ca883b6d7f1a964b587b6007e88d4dd87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52fd2b87a1d5cedcf2a175b6b549399
SHA1a584077520481a6ca51636542d4424af3cbe216d
SHA2565b1203729a21829d10c93c37fe8b01af95072686f89b10f6b95f2c2ef07daef4
SHA512afea4cd8df60ba7a56644a025d5622cd7fca58f57fbf8d077fce6b63b4ca71c5e6953737e5ba7cc198f7990f51c65f0c7565397c7c64496c3ed7229ec726f986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40b01ecc47663e9c6c3d6c6c183c7fa
SHA1700c9888050f48fb18984e1a419ab997a441498d
SHA256f439ddd8cefdfc7505bf61d95295a4e3fbe7369db1146a69eedcccd6314fca5a
SHA51228d9088338f3f7d7aaed605dae9f02141ff64c9ed42ef0c1687c29b583248aabb779c6833763c3480fbcbf4e3412a75f85779507fb63e2d0209eb898342d83da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df07bc6b41abf43069088a324d2523c
SHA1a1c745e55014e5b30cefb698e1aad5fdc940b643
SHA2561ae0e7b68f11ae667066f5b419420ce37f9c313e738c1ddb44f3a49d0d91471d
SHA5127822799c6d42193f5bff1f50a11bdea96f943344153b273f7caae07652d6c66c318d5a68c5a2ae1b33bc7803365eae996fb3f8c6e097d420b4b0da8a0f2d2839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a512eadf3c0ceb6b74a7c1f9793bcf81
SHA1e8f87aeeac6edc01d2937af93f5a33bdd10d6705
SHA2561684b29eb0bdef65fd938da77d2d92849d66ae37661fd4a3c8116f07ca1f84ea
SHA512b9d035187bc7efead730654c13a2c6852c1592624e00de5277ecac9e936f27ee6229c48fb4d7a1beb8654b7a44ba1e79dc0954326ebbe6e1666e4678c29d51ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a