Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
657c9d74d80b1a35aacc8cd9fd74c09b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
657c9d74d80b1a35aacc8cd9fd74c09b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
657c9d74d80b1a35aacc8cd9fd74c09b_JaffaCakes118.html
-
Size
461KB
-
MD5
657c9d74d80b1a35aacc8cd9fd74c09b
-
SHA1
fe6bae045b13f863aa0eee5eb08407ec1c9488dd
-
SHA256
a2295922eab0f7438c501b854f4b1a043997cbfd223711436d4694dcf55b7605
-
SHA512
7efbc8401bef93986a87ce966f265b7265a3644a512f7060ed7f1747f4aba48c3b4ded5f695c0870f488c02bf0f1dc9b56ed5f87733d27baeec5d2d0b6d2d11a
-
SSDEEP
6144:SSsMYod+X3oI+YFsMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:t5d+X375d+X3f5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002a3a7cb13e61cb24b17d7798fc08ae87e0541c6b00151745dcea82d0202534e5000000000e8000000002000020000000d55ba3e07185eaa3561cb3652ad5d1a518b12d364669ab6379d80e6dc54da1ac20000000fd3f0c776d16da32c0406290685aaa2c1dbd047882e1d16fa37bbebdc793e65a400000009a68c3bbe1e3401f522dee8cdfc5478d4290b5580b7b56136128d6a7afb509c18bf0cbb7fe415eb39677b066b0c274f353d4a94df1cb05f07ec43b023ec795b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCA1D1B1-17D8-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b630b5e5abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3056 iexplore.exe 3056 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 1272 3056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\657c9d74d80b1a35aacc8cd9fd74c09b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c01a61eb9be25290fea69cef6b51b74
SHA1404ecff3a43ec13a34a0f6bdf1e026ab3d1a9fce
SHA2566f7bcd9a513e4bd0750a964206596a9dea1c1536fb7feb7534a48f0b0ecf1c22
SHA5124f7fdd42df731fb7fa72e6e4c7313d3c7132fbc4bd6e711faa31c940d46a254e9d783eb1226b22bb0d0bf8277c1105b54d0283831bba4940c7108f61700ae9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587e853b01cfbfc7e68f8703daa3e6e07
SHA11188d842950badc29ffcee9a58d47735939836d3
SHA256937b4465b9b83daf968f2343a879f6872dd62c27fddaee6c938785b528feda61
SHA512cc8d3df5fbb7b4f7a5dd709ca728b2db1fe1fc6106117d59e2677b73d7267b74ee330ef0044d598cf14f73b987a8fa2cdf7aafb35c78438018d717a058550c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cafd88d908a3ad1223fbeac5e016070a
SHA10f278ce21453e703afba71ef5c3836e84d64cce8
SHA2567d65e756365a348005bcffe2512b2e09dabe52f9e740864da24697404431b303
SHA5126da75d00345ea4c392caee1763570225ca3da4eb83ce8552c706a84a0bacfb5ae6de3286c97beaca647ae6d547ad55a49fd6c6556c795ad655ecb747aa8ef7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3e1e8000e9198c9bc53f65996c4ad3
SHA1450e779065025a9b507058f7eb7d6e4365eec4d1
SHA25659c808573de41ffd640c352a55c67c4ef59a87297c0b8df609accf57417239bd
SHA512a90d8e2de726a2e5cab2f9f2d51bbae125aedc5a287b58ee607eb8d3c807b5507e6fd3c60d77042a8b2cfc59697caaf81a8d18f59ee8ee614177e050a2af4eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c031c4867a92113392ab779c1aa30d38
SHA10200d6543a88883a557a3517d9a0d04450ddf54c
SHA256ecd2dd2105d98a88f92cef5eaa215c5d8f4257435832a7ef861ab87dd329b42e
SHA512563cb2de5d672ec38736304ca2aaee5214f7ba3dbffd53184f01d565aea139a3fa7176c4d6f1ab2c7a0d060ed838778747d879e5599e01533d7b64bbf640ee9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f7b2bb7bc0727ffe31b965a7b50cf6c
SHA11562b25aeac9dea6112f104281c25772ecbd0519
SHA256b1df061ac84ffeafe34074a4080b207ae96d93bc4ab31ec65f1398769715210d
SHA51266d613266eea281771c3e17023a78a75c8cdb8c78ee7e060475088bb262b7b34a39038474f9b097cae6b6506d6242d245cddcd1b4d79999bd09a01acbf8a07ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562811126de4de3abf160eb11f16bbd7
SHA197b9d76c415fbabee7123319a808d0b556a1c865
SHA2561b43848416f042b8ed71122cef1e7888d06c58f4a6258ee79747431041889d39
SHA512e9ea971d21c8a0b15b47f1b2bcff732c15db3ef25561e883e5c4f8742fe35daf93902485f84fadb6975cdb58fa27f2550127f131a8c6269b3e11c634d82d1eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5906c6c77605da043bad7dd5782cf10
SHA17207c08debb10c283ad684ce4c7ad736b9e39b53
SHA25660ded9e16773c19cf63cd87049c907804d46511b238da8b2f54ac4f5daaacb64
SHA512d75bb98d4f02ababf16c21ab23c8de76c02bbe21e6824a1d45b677015c19ea0f4dacf82191456a8b003bb6dadf4ef37b861f64148b08133dd7b5f48c2f0e2a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c806187ea75ac56d4a3c1ee26431bb
SHA1a2a1b4da3e51c5217069c76f3a3f2b150c2678ae
SHA256bd7fe4200c2619e5de390a4ea8e16d9a4581f530152ea03c126325d2ae2d8e09
SHA51234168615e436dd951dc098241b6530d92fc5fe56585d1f07527093f1c106a3b0a934f6b76fefbb243660b36f82617aa196016b239efe15050b9faaba4f15068e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ffc5007c1e253a7a31b579b390edb1
SHA14da0716250d319edd0e5018e44b3510ec9661a37
SHA256c9936dd72198a8457d308b18959473a24dee52756dc409d79e21aa80aa7ec167
SHA512bf7faf7b37fc1e2268a88fa9bddd280474d4daf7c2d089137850272a7958d9273cbaca30cf737d1cadde496e4f4b3e82fa13391f3cf85357ce2c02ada1333180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cce6a061a5db4a1a3bf779116203b847
SHA187aee9ba220bfb7c3d24003dea3905166a601a1d
SHA2561aa719054cd612c3fceadba092df0750e3b6f3286402e659fa2cdcca8ac7f529
SHA512706f67d13f1a4fcb7eb14b92cf649f2bab7d47ad4efff3876c6f24fa3d924f5e962ad1b0651cafa6bc5e7e9b5a2802609877276241e4119ed4ec9aec891d7613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fdd612dd197acbd0d8762c911423f32
SHA15aa96bcb5f0ff927652a8192330f0ee09b3d3017
SHA2565d5eaebd2e0df018518ea84dad96633685cbeb84de49b21c6066e7dcd1bb73e8
SHA5120a8183a5045f778f9e05cdd63eb523e6521cf3438c8c4b2df961e087923fb0313b918d70b4ba2680b53c89974b7fce4d157ee1a1cc6cfc79e71f31e43e041df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594e352fa2423676b39d78ef21f683bf
SHA19b1567c6286fd7c4264b59db50926965e51bb28d
SHA256427b8aaad7e600934880cf0824fd5ca7e0b3bbe591468c438856f4377a3415b9
SHA512cfa0f95516d202d404b8ad184fa8e944f23f04511289417b7d804810dd08af78920acb36449a66e68016f015916b0f7f222909608cd039823835250783ab4eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59644f5b027845965684d55d556b9c7fe
SHA15ca03b19eb2bcf3b9884835f888a362297d4a606
SHA25694a3a6d017e62db7aa0ab0342f2be067a5d211e3afecae27b31a71c702e602ea
SHA512f8d65fa3d4eea9b527cb27663e0534b7706849c2fc7c3f42f5bc2f71675054ca1b722ed23fee54dd565522a882d69bd0fcedc603178c8a9d14ad110c71b289e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7bbfdcccdad29fa6305ac01c33a2bf
SHA1c1a9cf10fc8bbf5e602979b7464d4c7225329cd0
SHA2565aba4badcea5e4780b9a216d1304183146d31dac509907618a7292267f70bd30
SHA512446cac261482f862aa25d12e5ecb84bc1a23653af6e0dcc5061c33ae7d16d701300d02855c07c2f75a6f69c90790dde5e2b6abe3f3513b407adf07caaa8903d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a10ba05fef7f9d307e4943ddc78e735
SHA151dfff21ca5863f54af099c00c4a726505109449
SHA2564f7315e91540dcf2208aced2b5c2c6c8fa626eb2f52654de2407cd766e223f28
SHA5126f786d12cf1c1841401a160b6f3df561a831202681460181f0b9faccc07e3b3e1c77fc28992abbec7346134bf69bb7a3440ef3b076ae5afc9ae49e5aeab14e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1455f76cdfcc05c032c94ae514a826
SHA10e74783fadd4e29322b491b9db2278a332d593dc
SHA256dd6e0f468e7469b3d95585dd72aeb1fc028ee629174f2b77c5ddfbee3b83b5c4
SHA512061a2e7d3a810c87b83dcee57a57c5761a3012ad081800e0f1e14bbcf7d0f710fb858d5f611e8d8cc765064ae637ca600deb79b9584ed5d73bafeea3440ebe2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502b01f05627926487319eeae32551b45
SHA148705ccaa40973511ce773ec63bdd512165e2849
SHA25607563fa7a1c2251279f435940482b2ebf422e4249b888889db738c38b2f2844c
SHA5129f375a4cd1482e84c6c3584e33c8d002ee3db29ed51e1470fd8d6f8dd2b7846c7874efa0f59b249b8094d1d7be85686fa6c2ace01557eab83b692d7be61715e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dba758418ce4c14ffcf6da13d7876cd
SHA1c2e7c4af55a34348b4b50f744976e88d3c1573e9
SHA256c030227b3ae6176b3c008cf8ae4666cad096d293354579a50946dcc8b1290a21
SHA51237b15ebc4baa0aed8006213406dcb6423a8faeb88897b253edf4eed2a6a10ffc8f8d438d947aff2473af88dab6fb9178011a894fe520a1914db690ace96c4ac1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a