Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html
-
Size
2KB
-
MD5
658c92809b6f8203826ae264bf4dd4f9
-
SHA1
04b8005fa19a955d5c21fed155531cc4cedafa60
-
SHA256
0695cd1574bed33ace77e99d5e957e437c91df556868d931e4cae79ea6edb6e6
-
SHA512
e14f6e4c6d46ebabcbce2b9c161745773e48404e88624b01f17e226a8fcc0e3e7725d21e9bc49bd80f91aa923b0694539c3de2bc6124b1dd77c6b44cdb21941d
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f877c4e8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFF68551-17DB-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d3474ceb6a0213269bfed6a3b9fa800597f8880bf5ba2230568d0137119dfb69000000000e800000000200002000000021a09b5551727aba4550d96ae522a86b13e71ea27e53dcc978eeef6ba43236e720000000eb1418695f190d8da7a8fcece238fabbdf69c72a59173833aca8a2926916956540000000b7c3ccdd70577314a95fc0707071dcfeede14ce0325c355301b4c21327ee13ad1ae975a3e2019fb82b2d5fc38d659db530076feb889816d6e7b3be67ed7c608e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503753" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2140 iexplore.exe 2140 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2140 wrote to memory of 2180 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2180 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2180 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2180 2140 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\658c92809b6f8203826ae264bf4dd4f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90e7311448aa11b8ebfb7583058555a
SHA115d830e08d0ede4479ca22a30f8a1bad38e06f0e
SHA2566013dfb64f97d8ec7beaab86519161530c9caf2e21611fa08fe188ae0ed16531
SHA5125b798dfe5bf841c084851a5112ea002de257cabc8d87d93b92c2d19ee35ae734f87a340012afd188f647fbd867aaa4bf8855746a98eaf081b3990d46ecc9ec48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda5f59ff83e995f578967e19b312064
SHA1fdcf52acfa6fbd47473996c4e5db138dd6e24182
SHA256233cebf8864cd92e703c3840aed556c054f35490d425314f7887e15b62b27bb5
SHA512d97dbeac87dcd2d81b903cb39a36c3ed5bc5c13e1eac0729e2c84957aa00b6c3b7ae8f4ad8ec4d463ee9b18c6511cb851df48de77c826ed05a5b403ad38c523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6a50c1194128e7240d4935e0e6e6bc
SHA15b7ec8908964424c5a60d1f7e4f1e197e32f7c71
SHA256202f7d48d930e56a105725d9d54c9691a140880300fa59d587e17bba0a2db92e
SHA512c771c87120a6443f652071320edfb86b78c448cacc3f21b93b05746eaf9f0704e14f36086557d9b9e4e197c67f10548dfa10b85c9e3020a90630e8d678ecb63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb9b43fd159a1cf0e8b70ef5dbd7b10
SHA169974c18f7496fcb0f4f2682ff38b6e56ea22138
SHA256492a755f06ef52884e152983ba84ca672699b02dfe354567fcd67aab6c5fa1f4
SHA5124c189d515a793865d49e23353d67833275abe099b9c47efea0cfc4b2f01eba6a56853557cac7ef07ee4a32a07d7764aa801a2b4d370e7844b6d6ffa422135d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549398ddaae2ca05902e50728652a5a9c
SHA1148e3f9e0f4235bbcf3495a3b263e9e08d6c44b7
SHA256c3b701d740bac677ecdb39a6319e0f786328e6fc15bf0a6ce5529a62ebb74cf3
SHA5124c513ad10bcf2509748e12ce796f1903ff524a0df1bd2ac09792dca5177b9b894463dfe4df8bf8ebe21da359108242e070e2079fc6b3b1f47be27283898dde49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a5d7886eb83450e85e59244f232a7a3
SHA1dc53e64fc956f6c0137475bdc487abf2c5cc372b
SHA256c1715f9e1f8b82ed2d9b94380c0e11961e65aa6c4b8105f6e168e2f5f1e6662e
SHA512c7cc376a7c02ad5fd9bffc5ce6ca0fa522c6910b8e9962572e903b10cc369c8274ee089ea63218a790c2e6964191f3cd6d00a8743b73909cc1869e6a6a951151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd812b26edc2569e27d078bdea1e8f7c
SHA15bfe2e4e4c2f17f169465ca8ff1e95f1950257f8
SHA2565d2ba670bd7d13a3c3594b0910ad8f7cfc731c8034f43e8946be377799ffb967
SHA512e05fcd4e34952084d1b1f361759de5e1520bc5a7aec460fdf329f2ac8a51b1fe04761cf7258e4dcdb7ec18764f75a89ae76d64f69e9527c168342fd881a22c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941c5e6baa8df17ca55a6091220cdced
SHA1f0682cff15f237d61156c4fecc301bf8d7393462
SHA2566a5dac64ecedb58d0dfa2340a7a02cc06cefd39ad7bb83867bbeaf6959bcf046
SHA5128f447717f36196f9d9df4d687d90d9d6ef0cdefa12c598c3cd97b349c1357f57783514229824a65bed41b422a00b324e2ddd68f7162d4ff190a45e283aedab40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f735c406ea390e063629234bc4c9660d
SHA168636f8eec57f1986fc1ae5607f02e4a71ccdae4
SHA256abf0c6a955a7f452829b91b8be5140ae5f26b3f24c9d86b3d1f404440b15ce0c
SHA51241685aebfa8468b15d7f1abf77856e1bcb303a2e3fe4b6f4f1f45c84601744e88a015712d19918c25d0eacdc85373549cb3c440a5fe98795c4b8db2ac6978731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d84e24695d64f1d89ebdf951503d740
SHA18d4597da623ebbfc1f8a62641a42b0d3998346a7
SHA2567cb43c1d4bda3c16019ca2eb7fb03184e0dce286896bf02c238b6d7e8b6e23c1
SHA51237d2f385cd0bb8e746baea64b8d823ffd19d45e892f33b92ef671cacc3a18d356cd9f1b88874b29ce6dcd7c4f6fe0af05b733e9b23bac72c3113e7d01d9ecb30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c841028db7d8c04a23eebe867cce78dc
SHA16557ee3451dcfd8564ad223a478c538d0d984061
SHA256abea62a2d79db69bf76691f6a1024b6896f5823be1fc88aec08f1c54a6ab0d11
SHA5125756596a1d5467f07fa55feff536a72b3062b0f73717c07842de8b60efe0c871ae42cad5dcc905e33be52403672b95d67a6e57a89e436e38e719227a9f858cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50975fbb8dcb903614646fcef179cf0f9
SHA1d21105c7e1d9e19dd1b8e48132ba41d663955ce8
SHA256dc254b30155b042f0e4b33a3696b57478c6a535041ec1d746885bd736db2dcab
SHA51278d6251a773f3a75dacbfa4b6e432bad74bfebc3e70633df3b312bb283e0d55b87cf40c1c8ba556e670eac031e0f2ea7d0e59f6c4184ffcd2dfaa72c1017ffa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c84d5c158c2650dd9747ce85eb62e67
SHA1ce642dff701affeb59ddc8a36c7a4d12016d0aa1
SHA256b1c58ca07349e6ce627b51ca70b3751aba868629abc3c2c7ee1952289fc9f4e2
SHA5120a2db610bee30ca9a0d54a545ed1f2860765207f7c91311b087277b504d21c05e9e1400d9971fcff74f323a3bf9559079319b033e20cf840126a2b5681d9aeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e124f464dd69921fb9a29aec9b51f4
SHA1ef0cf3f06a046071f8da30a2231adf0659f9d4ab
SHA256e737f1a22981bd3af47fe01f4f7254f7b708121ee74b02cfefe53e5504a26144
SHA512d10fcd120e1380f8e439890428bafc4179abdf4a0e2f99bbe0f9f20c8f3438e9f66b17ccf4f5c7c260bb494a2a0b9a2dd86cd0feb106911e1f589b2b894218d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567b31ff30660a667a4c2d0924eada654
SHA11cc90c6917df110055a073a7c1909b2e76c471b7
SHA256f82263354370163e3d435288346f3c6fc0ad7b52444f9b39883e269f3e7c018e
SHA512202aeea404cab14eb7f2640d718dec5f9d2de3981d931c08e2b3f4f031502ddc55d3a600cbc28fc2c4e2e495508d73f95686bd01068c636091ca859ea9c2c71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adc3d89b7ce20c2251488f8c299f10f1
SHA14d1c4c74166584e5217c568511870d736a7d19c2
SHA25608cc45710ca153ee1006f9f21df594760dd61cc171f3166f96a19af807b152ae
SHA512c93571577e72ae9080efdb54887f130b001b777eaeaf2e24461dfa69570610b9c8deb4dbc9fe48db55dd18fb653023190a2aa1241d4c25b9af522ceb9f8ed897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a1b57b78cc1cb5b80fcf46d69e4839
SHA1f3235f900c357de6431bd104e4cf7d33e8e37f51
SHA256a7b0a42e9bc8dca64efd8f3e45280effad7e4887fe205d092b7d7794b38f3ee6
SHA512b9558149ba2faa623fafa39ece1311a65aa686e94a91738dca1bab758ed2c49203c43850409ac6ea147d931de0bc8747cba1d6a79cb14d3fcd6193caffc851c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0399c2faaf9d23875ea27b28821e221
SHA1cbafdb209785f9e7a533885c6887cc5f9064b1be
SHA256abdc34bc2bc638eb1614fca5ed8a62a9928fd9bf8d00f3db004fc88d005965e3
SHA5126161ca91bb3a8bf504de36cc5b3065090e63352e7a5b3f78e204b5cb31417710ead1736acdb9f04397f85107af4bea92ce05f0bb7ad6ccb50a682e40a51b6bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59522172815d68522a1c0e2ddcd0f6ddc
SHA108c2404b8fbe4e87cd273f065a7595dae0ef2d72
SHA256d4311105ac49c7f1490851eebba9168af536c5ec23a72f1ef6c46f45be8b3bdf
SHA5122d068e1e2e7c8c5177898db1377c1a91589f6b1e6b0cb6df8495c61216ecb455c1bcbfa17a9e43cab06e4ed94456716ca6f1991d7c40e71206504a74a8900af7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a