Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
654df04abe0a0a9629ffe0244bec48c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
654df04abe0a0a9629ffe0244bec48c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
654df04abe0a0a9629ffe0244bec48c3_JaffaCakes118.html
-
Size
460KB
-
MD5
654df04abe0a0a9629ffe0244bec48c3
-
SHA1
c18ec0b9cddf5108e2130e4a24e18952b8afa70f
-
SHA256
396d3e21f548d90ba838d42638ad191add19ae00f45561cf8e8695966f049397
-
SHA512
450a9cc49d8ea455e09e4bb9856465da29bf80e35035ae259f4b5878253fef7ddf9094ae2aca1869d369bed4c058b608df92ac9c70f419d585b8869beeeb3fc9
-
SSDEEP
6144:SQsMYod+X3oI+YnsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3t5d+X3F5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e148e3dcabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422498644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AC23981-17D0-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c8aaaa3d4a8f59b3515f8e103ac106ba823c08e2f93ed8e995758855f92238ed000000000e80000000020000200000000a25396d0a95e2d596b526ec39c2bd479bd8cedceb2a802a7cb18b736e0a7d42200000006148323128f67bf8ad08f2101a261a21df4345a8220ef5243b9a19da5ace9e5c400000002fa3a2cbb3478714bd752b02ea9daeffdc413d4b6fdbf424490bd17bcb1eb30d6915c58bc21b230c03ef9a13c69ae5346912f85cde34308439fc0d3b45a5b5a1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2140 iexplore.exe 2140 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\654df04abe0a0a9629ffe0244bec48c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2b4a528851dd0a962f71a5fbc45d94
SHA1f60e43bf6641e3a75689bf48de149a366bd509ad
SHA25629faea237295f34b4a841de9e95509163069370481398616637816853e176689
SHA5122bee55fd32a4d5a0a3fd90c7efdf56720bcc6df659ffcf61563ee0280bd364021d28651ed77c93dd8cd4175351689c0724a84dc0ea373fc1e51d8ef3399000bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ca3cd56b259db96851e48e907bda42
SHA1697f34503b6c923d52901071abde4b49d615bd7d
SHA2560d5e2e991afc32915d42e7a392e56a3e246c67af1e834aa8ce569aca2a5aa240
SHA512d13109cccd66f05efb69db22a90c170c696f725554e21a6d28a022992a381a3ca1fdd23ba7f9c86a22bddf2c266df01ad7a7e3002ceea55a4d097a428a3ffe01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f4ec7f237879abc2e09b97ff6c8bf0f
SHA10e7625387d738b19f09c1f5533b0ff270ea521f3
SHA2565031d5982d815118894d27709ee270e483d082517aa06ef354043e87e1b6a374
SHA5120bb367aaf8b0e6871f17ee41c5f69dbb4ff6b472c942086cbf06c65f5ea599c179731498cc74d41e660a96088e5be29ff6e62d9d6296056ef23ed825d7ade771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2a322cd8c5cb7442b1cbe6910b165f
SHA18b272cb9c2dedbfed28dda081d727f157bdc9180
SHA256d5858e7afbf1b49f6b43e3e4b77ba77be88ac5f96c6327cf19971f82ae59e8bb
SHA512f33d17e404e152436bd2c70da8b1d9a2a2e50f7e7bbc5027f8ef9d397f8b6309b270186b83f2a6aa89dea769bc103f5b2f67888c21127da674f8210ecd8111ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5434296b5eeb83fd2f6e5a51457f3b74d
SHA18fdfccd4d184f7c7cd4e28e0ffe829c01884feac
SHA256f4a58647686c94e99d6e430f03ea10fb04c0c4cf1cb6a7ac837c43a50a908fb3
SHA5129b90ed68d1fd7395e5a27c870ad743e377a9b0f248064c368eef4b215707549eb97d808808ca4d59458435bd223ba4a34f129631d46e33307e60432c22a36334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ec1e7703546b406d4dd4d52a450108
SHA19c4ac017cde6b7a071d9627ad6eb47d7be662d20
SHA256b00cc174f7802d2897f93e8bde1bdaa3a274917ac81485190e5df2eb6bdaeb32
SHA512d6b82357c289912bb35426aaea0f7b8463313715d74237ce9884cab9dc80491d1fcece35ca407702cf05d18c75e7da45b0f18077718ba34e3a1ec076294c6503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c98c461d904d3b8b3d479e79e6a58e
SHA1d5c4c11c83c3c559caeacae759179f5904ecf2b9
SHA2560b1381b3f52d467c7e57fbd971c6872d43bff8e71edc309ca40fde7c0c18b5da
SHA512f3ebd6c1631e53695e3c90ec77b54c26c6756175e0d8920bfddd819fa1b9cb4a83d455630ccda0f1c465e0a23a71650e7db542d988fab679d72c83f3c77e7d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69d97b9f157dcc9c403e7ed5c926409
SHA1fdeb5cbeab4e1ff7ea23b9fa68dd30330c12dacb
SHA25639e45911c123daa17a28dab0077aef78459e30f8b1e655dda68127b1699b564a
SHA512a40ce75c0daad616437cb45a5dd994d377da57e39a4203e37487236146c92aa37538f1a70aa71d5d2ad79ccc6d1bdbf4e48cd9b7fef52a4e348fbe437af05d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51191a8b13ad0ceffa51ffbeb8a601768
SHA142f9d962a86de474711fbb072c496f4c68f9e9a7
SHA2566a3d123e20fee0a3acf8d812c768495a969bf43bb577933f38fee192372e9de3
SHA5123567284acb31ee03011cf2a9faabd0c550ea41c540a5070a500e44c0c04beefab43854a9bcaaf396028eecdde7aa05ee1df055433d18e895a03106b1bb270380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa87da593664bc90908108ef867c4df4
SHA198058edddc0a83aed2a5afa3311d8f8ba46d9b74
SHA25613ae775c06fd45780775e627c091d3ad37ef801285a71869d794c563844ce015
SHA512217a0d107697f1aea34101cdc8893b88f3fd07200bd2b77b38953ccb6372465946f56bdb9e990c07d264844334fa0a2ed8354609608df056ec04a4e1f1680763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52504e06fc507ed40c433049327ee1f94
SHA104b259bd3f528d7410c53378a972ee49aa7cc09f
SHA256bf4173553a0f86ffab0c4db94bd8e835fa4e699e8e12320c5c4e0d7ce426b987
SHA512d4cd935d25cdb141a0ddeb822d15c3688b064cb1364b3a1739a6983505c30d6cccad760b0f54fb1cec3e63701d0250b8b408f23a77b926b238fa8c3f5a3c5f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7f9d8dfb4abb8e3867de013383bbda
SHA1cb4967f64d81abcf8fb8699290be502c469d7dc3
SHA25624b57bd58ea246086b77637fec85e141e87be0dc30af55010259a20fe4c9f379
SHA512143d3fa852a13c3d02af9c5f6fb63dba408d5ccb78d0a4275bfa680677b837d41952a27daa46be8afec515cad34223f0c12373011bb02c8aaa8661ea7ad569eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4dea8484d0c7a030d5be333292da693
SHA14581dc789a8166d4b03183cb69937853e105e53e
SHA256b81a4d56ea5d93577f1d328ae7f148df32a50817ce9e7cf6a3864fe8ef8ae25f
SHA512df5c254d512c00c301440b9f6c1ac7a7334018f14eb13fc4e598662ce56cfacc337a4528d6d2baa1adc70a8c28e681bd74a79ae2ce79b7864f6af2fd2f241b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836adcd3d425be28785062bf76b837d1
SHA11a85d76fe0bee3f0ce82ec688c66e00b9b73b981
SHA2566855ffc8d10b75c4a46a0720b819a12979a94a97b7b2f070b62bc8288420c78e
SHA51218be08a6859bd2293028895e8c7372d7cdbfb493b66a218642591ae96ff62dd8ef86f2ce9f95fd93c5d199e48a2e7af6328ab3f48faffa53be57914043b6a7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f58230541ee2dcfed77a92761fc579e
SHA1fc4e556635e3577b9f028a3c06fa7c7505f8ab52
SHA25612e475bb7e2355e543ef91381284783517dd1e287fea844c912c3e51c0552fae
SHA51224fdd41ca3a167148f643f969806646430d387774110fe5ff780e464907771ab9891904295f6544d298d8e260e6b281b809ef8e073a2966f0aa833680cbb83ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c38c87e465a1cd5b99c72598df961279
SHA1353998ccdaa7bc4f84b153614fbe8ef98cc6bd1a
SHA2564235e8efa8de9312efd1227f3be041b8abc8b359d10369efe09ba453f016150a
SHA5125eaaa9b5efdbc58ef220cf14a87e9fd3e2d0de02fa07bc2c1b1e1a4ae911d6f6c6da2f72128cf3f2d51b84a7262932556717e5f97e7a4ead7a07ec0652f87b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5cc054ac3c3ff609a42e6d1f61db976
SHA1228cd0ca5d811e97361f712480898744fe6b82e8
SHA25614f5a57cfe6e0750a8cb6274f8824996b5e608887e9f755f80a69e925b9fe2b6
SHA512f25814a1fee2e881b206b0ac830069349807800a4e91a932339dd4b708cee1e7b51cb757a38a48f0521aae40c60d9b52183ad943f68553240152579139ba7f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50939a56631707805a23cfcbe6000d62a
SHA173afd5c4b41f531977cc155cafe42a8038331797
SHA2565d45cf08e500588f52056b7621939f496d13d7d9ce7b918ccb2fecb84915af96
SHA5124838e9cbc37f0ec6ac3ec56920c25df384b9a0d9d8520d01293f8fcc978cfa88201260c3481b908c8a142d176769596b513c1e7cb129f283e6591dd2d52d33a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce969a712f5bb81873b7bb1f605ea9a
SHA1b10c295acfc75c4c76ac55c2413293f24f15e202
SHA256452b90d8bfef9e12b3f6403faec5cb021f4fde6949c2beb64764f800eb26b411
SHA512700911af815efb540760642615915fa37ebce1553c93662f6e112b1672f96f17c171824ebf139e552b43ca746016c2ba69e1e36628dd0b11a93c86c50c9e89a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a