Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
657f88b420230066f9eb344d22e64dc5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
657f88b420230066f9eb344d22e64dc5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
657f88b420230066f9eb344d22e64dc5_JaffaCakes118.html
-
Size
33KB
-
MD5
657f88b420230066f9eb344d22e64dc5
-
SHA1
e5e9d5837bf389501e3fad17e42c92c4c33b0803
-
SHA256
db9e82edb5373037f6894e1dda438f5781aff3dcefdda758dcd0719171b9ebab
-
SHA512
2076a621741a3e0dfbb203a592bd530fca056b89ba853e7f0fd4122cb004d23fc7cfe1925fea7081190f3aa0255d56a4f1ac433aee16718604a1461bdce0559b
-
SSDEEP
768:ygO3bzrNsra72Kz755T4Lw78sWsLtXC4bFPQ4rjv6dFSPtqi5U5:ygO3bzrNsra7PT4Lw7JvB5Mi5U5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6513D7A1-17D9-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03f1679e6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c621ccb9feaf76c314cd3a30423aee778e4b84d73caef487591ec2878d18b874000000000e800000000200002000000016c3da296c37eea93f7c1c41a7e99850d11b0c2d3509e4dbf86634328ef654ad200000006cc70ddce0315036b74aeaea37b013377e77dbf4b97965f20e94c93822cb006d400000007c235e8dd1ed2623aeaa82b038f52919119dd0160df785857d8192a3c599356ab8d486832095c12e80bf080ee40cb86162c38c4671cf37fd87c3588a277976e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1924 iexplore.exe 1924 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\657f88b420230066f9eb344d22e64dc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726fe77c77d98f98da097d2e56f45770
SHA14669297e312f0cad6ce0fe95e04f270fb7e9430d
SHA25652c8080843e1c44d7d79d17e71ffa352ef8d5cde32f7041b5453cea2e7804b7f
SHA512c43d4ad69e6eda62e1b54b90e737f0a51b70925949ad27b9b555f979dd52323cd7bb4ef48247012bdc881926520f1d00120c1d1799f75556f9704cae4d68cd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1154ad29091c594a3025815e81c9e86
SHA18346abe13795dd14c512c3c5bd439d79f74c7faf
SHA25678db710d6aeaa03696e1081dde3ae71029de07658a503a857772124842d44ab1
SHA512f9c58018e7a78f456daa7197199103b998e3f8a4486aaa68a23adada5bf948d626d23d85b3fbc2b21af0581e537ad86ca0aa7517b1bc462fb5966f8599b1a8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb0625229b07609a0bd4abff3c73098d
SHA1331d237c6fb6de153d3732f2711b6f8f92df403f
SHA2565ff234530791848863fcf139fa3c185e94c154b40987321dd14615898cf48842
SHA512c709cbc96a6331b58665410df0f194568da197660cc33f572132780172ae15316881adfd2ac2d0aceac75e564ea85431ea9929c2dacad8e5dbfc0a86911e5031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5b68ff4dad32ac5ae380aad7e85b8b
SHA1ffc384ca89a6ce1fae7db548e4cc22fcbed1c1f5
SHA2569fd978ecf25e5a91b05e53713959ee20f23b558f325ed1dbe19c1a94c484bc54
SHA5123a411f4440542c49f2f6f6155f71186455f799b9c2ac745e963e740e8d87ba47df137e6e21ed5f084d9a93b76d6e88e6d9d00a6484df825a3e7faa61ad1787f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4e855bcb302bb9b8464269be1e99c3
SHA11250e9fc43a4f401df1cf59771ebbf0af691b17e
SHA25684e70fcf2157bb919fe1b3368c548fe376dee02e38dfcc4bdac373f6dec7240e
SHA5123aa255b4429fc15db8f8c758d2913b460720cdb074acccfc4075682ae3711eec0a41586c19e0f36f7769b1523ebe5a52af01dffa679d537bebe07463bd7ef34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f1fcffb9698eaa6087b324ddc8c61a7
SHA1b8bb4a46654c72662871bbfb3597289efce1a523
SHA25604a671e55544c37ee5707147b71ddc10ebf7f02ec107b796aa63531ab7b1b81d
SHA5124965e9fef69529f5c1183d12919824248e4393bd9f7fd4e9c1c7d54f347d0544aa60489315606e28219d90625a6c1f8931bd1edb204d4920ebc02031ad95cb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efd0036f27b68cfb6324d3270d62f508
SHA187892f9d4c92fdf5ac3b1e01d2a23fa7c8b2a34a
SHA256c15013b9e34a3aceed1b1fd78567f803069bdff3ac22acd287c8ad335d42552f
SHA5125e195162f8b18c76f366fc2b8ec72454dbbfa32e4f4771468c11dffd7d6cc78d70ab703f80310934b3387a966b874abffb88d3b977b7052619beabadb51c26b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e3136664c3b1bd4146bacd910a9cfb
SHA12275a2dcf9ddaee56b5d26cf84950a0c5e90d42e
SHA256d8fed8ce664aedde40ff7c7b9bd277f15d979c31300c9990caec2a36c6bd0264
SHA5129dd6b4ccb0fcb16b303cb4c142349cc64412cffff1bcdc59affebaa16a416fe98edfefa6565c846be4ae0e0c7bf205debfcebd6315595b58b652d68f43651e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282dd25841ee096e8789550876e82511
SHA160b6cad2028ddf7aa111a8ba59feb88467e84019
SHA256fc0ac05b0e7b655e48009dba2167e5b35764921e120e1e34772f5f65d710f6fb
SHA512bd9173d99b895b53fa0c6d75f0df43b937a5bcee52db1ca8b3b99438078fee1301113f68369bef4d17330ec760a05b17263b761ef97a2ae232d2bcc5b23f1067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abe17a17b59912416d4d5c212ae83a19
SHA115650cbb1eb1b7fd700863444efbf62b560fe558
SHA25652a5a9e4f00fb7fbf458e2d10194c88d52096f792d1a9d587f8ae227b357cb92
SHA5121de415be0b4a378f7376443ed405f21bb3ad3dc7d05e45f9b2e7df380e922f147c157a6b18abc77db181518097455698dcd76565e8c3a56a185ddcdef9d24074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099a3494433e4578967b3b25c1b39f6b
SHA1f7f5742ec3f5bba1b14c343ba9f77e387368126a
SHA25610f53d077fc0e86b8cf8f830ae5e564e83f0e00bf96e023f37d27d4f88a6dd3b
SHA5121f7a223c5ad0a3fdf3d8c1451e6be395fc34db65c66575f8ae165ad4a243285db3e36f9d959374770ec95935b26b1ec42a921a7b00cb54298759c2077ea17dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863210c82355b42ac6ecef1373411ad6
SHA1d2f0c541de6e6058d2b7bccb58c9b014bbf79007
SHA256a5982e54d5346a36e32697fa639fac4013f31814d214b435c2632af05977be4f
SHA512b9c5c73df10d7e11200d4053d4000ca200cb2c42b99e17a75983bef86e7c64fbb86fbbf2d000e900d8c0f540ac0911ca5cca43cf633d740e0abe1639e18912fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3d800eff2677c90bfbb45571fb93cb
SHA166f0b9575ff63b46c4cc1f4332beb0625c6f167d
SHA2563ed2aa829062a99b6531f86427e0f4b5f635e3973536cb8a059abcefe43e6aaf
SHA5126c8498fe8dccc8c51f6585318b3b02e3deebbecb08b75c98dbc8769b49099be7410099b2e736fdeaf738e422004294da3d9804cef61820abc1d40bfd73fa33bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee1977727f11609214b14cec905b72fa
SHA10bc79eb424fd6120736c8d2c189ff8500ed2365b
SHA256304d07f738e67972cdec00a5f2c038bf18b21e4a1f97a420e05731f3f1889101
SHA512f3349262d4b6134954fdc4b72b57166978abc7cf3694653c07c6e600204ea51ae31ad3325bf019681e1496cb29356f70a45d40baf0c34ccd3baedae2c5c6632d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546bd8fa73b51f3fc993ba006f4b10fba
SHA1c131ce88ee571d6ad1493b599848046c7609e478
SHA256a70fa3dd75c7045d2c0626032f9eb9b1cd8e3b3c56d8ac3d282fb2fff3199f46
SHA512c554305866906ded9bedfe866fdd6c83526677e7f8cd45dbdfcbfd3ec5896748c7a117ea17932447298923f64369304631be50622a3f5581cffc85ff7af17b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53662448361b65b82671db49684a418a9
SHA12f3661ad0896bb2b0d99056920036a541af3ba43
SHA256f50cc32e5d77cbdb94d92592d1e455818a6de796c218fb3db9c2055ca0a9bfe1
SHA51254167aad12d1198bbbb9e44757304cf454827c8c4dd2aadde71e9edcf617eacb864be07416f231b4bcd4a271b5058b4e63ed3ba2caaedc329b92d88005daced2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a64f3fc6603488a32ef3da95920625e
SHA1308dee0db21cf7967e515a5b84f5aae923426adc
SHA25626517c41f39c6cf0665055cda2c2856f222777c38af98b4c8eb57af2207ecf65
SHA5120cf7689f88a5b2cb0ad6b741eb9d17d7308631f3baa9e4a13dbf9c5cd4164160180aab2a1d4296a5524bec063793e160ed035d7633eb6d0a8d02d662b8a5d48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ce1d08a846f158cefc863ef598e79a
SHA1ad05e36ee8d01e4532ae3a65f4e653558949eb61
SHA25677573831f154249a2366f41bb3982683aa6f711f83f18e606d4eec030bbd02d4
SHA51212f39e1620763880bc7a63a0d56f180ca9dedc45fa8723570a32d8a74c2f3c62042e87b88c60f43985c51ecb81a769206c33bbc689f7aaf3631f4f1f1eea4083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4dce93f94d214cd3d2cfe0e5698ac69
SHA1365ccbc2f751791862eb0b659643adcb1cea6c44
SHA256401e0a0a74e9f60e68c77f9f9e08e42f16b7b4d7cebec7a15ca11d4addac9953
SHA512afcd5bcf1307c9b824c54cd2f131fa76eeb7f385ac26bbea1d3f7ab8ae050a37e716622b12593acca15f7c4a06de83fa23c26132712cfff98ffc41ab02afdbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950378a24a963a482d12934b3435d17a
SHA16da6d635b0a13f021fc8716b2834c782d4b02bf9
SHA2562f66d029801cc94e5156258bc99d2d922bde742ad5e5f1f62439fa0b417b7fb8
SHA51272a6fd5354376ae331d9e37ec9efd8d51ecdedfcb4aca12b6441b61a69c43c7887108a0c290fd69c2f92ff51c567ec5ebf557f9b375847665ece0cedfdc85fb3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a