Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
655a1a7d3ddcb11798ceb5b8d36f4144_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
655a1a7d3ddcb11798ceb5b8d36f4144_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
655a1a7d3ddcb11798ceb5b8d36f4144_JaffaCakes118.html
-
Size
461KB
-
MD5
655a1a7d3ddcb11798ceb5b8d36f4144
-
SHA1
6222eacd13bc6b3ae5ebe18c4360ede63a712c5b
-
SHA256
8ecf8bcc44974c8138307348af09829204b916a1ba9d8ea6c486231d00c6bdc3
-
SHA512
bcecbdca49a696038b216bdc9c9326661b1b2d9919a9a81928c29dcf4bad8f87465d0589449ec04f47165dcccb7cdf87f9dd07655e0ea11b6b9a6a5323d04d63
-
SSDEEP
6144:SssMYod+X3oI+YtsMYod+X3oI+YbsMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X3X5d+X3B5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422499798" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0042693dfabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA9CB591-17D2-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000003242a5d8188fbc8ec682bee6e9d1f3f69ebca750c31d9def67f01dad02aa2065000000000e8000000002000020000000cc486c6a8dd6d1256dbcb63469bb94df1e3d242b09e8b9e7d825f50e2e6b203a200000006c8cb0836dd24d5666430179fc62cca194198bba365a531b3e6c0316a9e35666400000002876be2187e3838fc9a89ad7fc59ee24118d94d960b4e43b62fd8d32cdf89a84a2b4c792b537b145e3f66d99574006c50bd243c9e5942a821a87365965082ee6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2224 iexplore.exe 2224 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2224 wrote to memory of 1452 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1452 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1452 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 1452 2224 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\655a1a7d3ddcb11798ceb5b8d36f4144_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545cfefd068ae8cf554c5a5128777b297
SHA1a3d9e3e210b16f42da7e602e3d712cb40b4b5318
SHA25697f28c0f0cd12822401298bc54f3dd4e401b778906d00edea25097355558b2df
SHA51205d3e010d1b7c11e79d194e38a1db16e54a24990712174a72514dcf5a3d81217203d1658b5ea45accc169d9da73d42216ff7d5b5acd15b6bc2992e8167cd353e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8f99d1ce67d5f881107c88aa17c1ec
SHA119582cbc525cf7e8721f5a413dc30d259c89d719
SHA256f8e6e85e39f2aa9a79dc708ee5d5f0d5ce5bfde0f8dce3efa7a9c97f29fd07f3
SHA512c9ad04b47e7f989d25cc46375fb774534e0116153755cdee6c698139f45b2ba4831b9b24aa15707b8cbb0deab03b73c9f22e5155aca00b407a5cf6de180ca5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b99ad4c99aa0b18d58cc70e27ae1d5f
SHA1a0ce9ca4c6d8b400d5c00200bccbf3ae93bc7a03
SHA2567857792fa6520676dae83a0a8c95058564f38552c43f611531ffa268a6a2141a
SHA51222ba9301aacd8d585df9e70cb38ec9a32fb7614b99bee859ed6c5ead5d5bbfd7fa86daa0316f8c0d676c36e6a00a113c5b59b28df6fdeb30d363f2a946d0590a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2725fbea7705b374d81f44e249c1af8
SHA1b5eac76b3758a30b58320105c99230ba1b5def8c
SHA25679ad68140deb7dce061efe2efa92ceb048e40aa15b0a675e47fcdc208cbd1aeb
SHA512115e7f06cc19125a60f815ada9404b5dc50479a1fe52859342f5375658b12decffc40f83d8a8d276aba622d4162cb0747a1b2784020679a3ded0f0b6344e5238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af609c16ba6525dfaca732a3fe7c973a
SHA16006c25da3712ac4e552f63f3a3480b928e1b481
SHA2562bfa84c4199f17c735419e1e5064304a1ede7557bf052abf6482b6ec21343f7c
SHA5125a09c03c5fe6ce003d2dc682823840cde1a004b7c0e9a2f8311650974ff45f70447e73e749740f99f4edb13f813f48acdd124b900367d0ad89ec9821c025f811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb879a78f0499a43ccb520accb6f746c
SHA1a73d4bb7368f06cd9e0b42441b46e88c26ab7b08
SHA2564bd91359f77001147252d2737e3923fc489f85c58da0d1d548079341489d74a3
SHA512a10b757d90bbb5e946f620e576d87ea97233bddffa44d3f9f9cdfe64344de5d5d88aba366b263df310b6352ff2a7738d49324737287155ac7ea2e8e23c5ec6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e7b4509f0faf3c5af6064ab424a11e
SHA1c0adf9590079532a688f9213389c7486a3e7a24b
SHA256a2049f45484a55d0c4492344f7a04d3b766eebaec69102b72335844b2e91a5a9
SHA51250560d7067809c1f9932038ca4fc3183641fba870a0d5ca327eab40c9fae9bec3e3d3808cbc64e54e38410fcf868bb7aaac9ea7caadcd71ad68bed58d7f0053e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87e6773d42b7a07ee27ef4cee0fd95c
SHA14eea95392655ae1525d6e678d3e67cd005a1b61c
SHA25630eb2d943d5f164f927b16a013cd4b3d79f45b40c60715123593600e237054fb
SHA51203869f7a863a03a4aa38163bc0b4e7c07a66412e572cfc6e55b43a10fbf64dfbbd6fde834c5853d3e0451144dbcfe00be61ad34e69ec1d60f3809644255e5cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849d6c562af129aacb802491b9a1f636
SHA1aeddc9f42db9857ce58f366eb9770bfce9e00ccc
SHA256daa9178d838d9ad706834bb08a11ba495978fa977c8b389d8881dd2525cd3d56
SHA512c9485dc10d651b81c0fb4bac6266bcff61c7a2d803b3573ee54a3466b8706954125df418c96c69187b7e98cda2e83db9fe09a0d760b3bd32ada2868ebae542ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1747e9579f4d05413b8f49d8d1fb0d
SHA1eac9cedcf4386a14dd73cf10200d88682cf19e1f
SHA256cc48388e5653ff383ab831c3f042db85a8a8f07c311ccc73f4c4a44dce3f648d
SHA512ffc7a260bd809ef504fec7513b1598d54a4b3c5eda43f52b718f52e1c4d059e8927c7dbd9f5a3c0d522528ddd56ab9638d497946dc41b0ab48624bd2b957cb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b60d7e1f2e7a8e0653538f954accfab
SHA1110ba1c86e65f9ab015bb2917652703407575198
SHA2561310adfc1b9c5e96f6fe1a8df473574d1f94fcbc09fce658ede0887d964a5e78
SHA5125c34b1785f30e1d08f6d8b8f4f785a569eeed909223bd54f94833d57222901eea2e8e0e15a53c926c60a594345d1747cdcfa4ae2ec8e276960685ce377b5ae33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc9632c08b129e598381313be6bfa9c
SHA18e38e37c78cd87cbd59b4126223533e9c65e170e
SHA25654e423d75231489ce41df4a609a0c83280f16eaf2521e183b7f121b37e24168f
SHA5126dbff044d0f856f837de72823ff797dc1db6c87ffefb56407de0a14a3b43aa202449b46125e4d60e1a03645a24742e1707fc0b270d2bb2b404c2da00d7f5b2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad89555560ac7ea85c0a3f786a019dd2
SHA1f2647519cb571a74d0f3a7f53b6ecc9c6a564421
SHA256036a278ee1abf27993b6d1c79f7b315f71a9e636a3bbd598ed49e39be5b6660d
SHA5126f09e854899b42a54fee04e14827182bbc5819c16c7cd4ced2dabcc16b1c6ee6899fb662ed574e5bcabacd92078dba6d4201011694de6da0696dae256883cc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b1ba7563b87bc39792ace041f6cf55
SHA167d3d20930c786b6cb2e6d1fedfd6b112b67c909
SHA25651c39b7e463947143677b4b68011a68d97f75fde85ee85ea9a13df319278e451
SHA512f47d960b520baa17cb0de78680c3e9997ae1af2f40dae7630e6fe2c83009719ca60144f020894da3691bfa2fc77143ed180a460e93dd3352a9de29da84899b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51040b735a8bc331bd7e87df56a046406
SHA14f851b148c7ac93000bcefb135b1efb5542e7cd6
SHA256ab4d96bc5da93dea3c9cb66ef65560f35c2af3a23c824396b7d0982a48862bf6
SHA512bf339acc7a373d07372941e742ff5a23add21fe5d940f8d468d3238f07f44e2cdd1ce935906bf5e166bf1ae7b97f729d71923fcf0454127bec7fcb3608c639aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8076d03d4e94414a47406004773df37
SHA12b30b954344d72e62e0b5a543c0cfbd09d1ff10f
SHA2563b27229916a079b82b91d8e09a18e0337272fb228de89491b02d4def82b4dbc7
SHA5124bf0f6e6c2ce150312a4c56cc9b7aca89b7166b2c139ad7c6784c6a202716341e30bbac36bc6a4e240e408058e418c99fccc249bd3dd3633ec63340a040355e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ef4ed1f7f360ecb3da84d6ec15a6db
SHA1fda1c327bd943d819dc32c78093de0e3aecdfb29
SHA25629f9a3d20cb6fcb2cd068756873c645786e6d7630ba7b99d4bae2145b1c22bbf
SHA512bbf674f6bdc86506c93c3af46b9359e0d7871d7e5c9acf820bd4b279d7c52ba92c28caec9a9c0e7e77df655169fc70d179d5b2315e667c4ce0292e06b43c2f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819d0cfa6c60f3e1c194cd619070cde6
SHA1aa6210cb1d5e56f2934fcdd2d80e9e04fd8e13a7
SHA256bb9b2a3246567cb7a6a52041a6966914378e598c529d26a4056d9cfffbe56136
SHA512b1754dac5bb0ff9c5b4f5ea6c88f5b8b77ba56e4ec6671329f40a72a2e8ee6a0621b4bf1bf960c6c379554dc4fa3662028f32a6fe8751471776121cd0a26f8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab3267e1703247366c15e48fd338bcb9
SHA1615e030dab1039121ebe8fe6fb89194934c17cde
SHA256264a09bd68d48a1f51e81328760a1289bebf9bab29d4f89497f93002cc722bd4
SHA512369106d3ffbcd1692d9060a5ca93fcabaa68c6ee899509d4e9c6922f21ad8a2c49102d043b5ae3f7b9474e63b9f02e4f15e0143a19f6a10f0f90000686a40359
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a