Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
658a15dcbc3a3ff0429d2c334a202fc4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
658a15dcbc3a3ff0429d2c334a202fc4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
658a15dcbc3a3ff0429d2c334a202fc4_JaffaCakes118.html
-
Size
460KB
-
MD5
658a15dcbc3a3ff0429d2c334a202fc4
-
SHA1
1f9c0636f6dab6cc70cb9629422cb9ea1f15cb91
-
SHA256
2a1f973a33522f566b8cf6407ec920567a51fbbb4045d6e2dc84c987f3eaf967
-
SHA512
2e4baa39c3342b62d4f9cbca093d011c8f46e1f60cf6d65ef4c43013a658adab19e910e3dd9f634ec078361c8a764bcda8bab9de378cf7341929e7803612c4be
-
SSDEEP
6144:SgsMYod+X3oI+YYQHsMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3F5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004c5a18411b08cf45a54de398f7c799e100000000020000000000106600000001000020000000fc0e478250a0a478b74b4d1954768e9fb0554ae17280fc59d77e0ed794b7b90a000000000e8000000002000020000000229a890956ac2b26b91ca536ef9d8e7434fca970d2f88da741a3bb9ca8a39570200000003f9519462f003da942e32c6a209c41fb18e939ce1add59fe6410c40a73345d9640000000ea2c95199605c83ed6e2197541b9011b20c2db7dc17519fcde917e61c4899041a4c30d21b1c54c6e64ffc049d10b8f7965ccb3fcfb508001ba1fc73198e930b3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b09b43e8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B0B6401-17DB-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503531" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2072 iexplore.exe 2072 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2072 wrote to memory of 3020 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 3020 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 3020 2072 iexplore.exe IEXPLORE.EXE PID 2072 wrote to memory of 3020 2072 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\658a15dcbc3a3ff0429d2c334a202fc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524dde6d7595ea2f085ad99b7293ce230
SHA1145659cd9633e32cc42eec0d0488cb91b0623992
SHA25685a6f38e04bcc72a0c4b6a6352b36960edc40e24a9a56ccc95b3ff9d49e06104
SHA51291893a706001b90d8cbe3273e8b40202478a5469999236d34d000c069a9709a3ee0e28b915beff24848fcc9454838db3e4ca7b997e61680660eacab06170a09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595351f2eed2b59bc0247742d5a871d59
SHA175ac2dfeaf664294c96a0dcbb563ad1bdcbdf0e0
SHA256a8bd69f56e361edf2fcbfada4a098e42bf71b6d6ef334ce5fa41661f910bd9a7
SHA5127af48c1d0a4f953cf64d8989905c413dc16b538fd6be21828e111d779936a2e3a6f1d640b5121729cbf2028cf5f54d2afd0a4f3d0010270ea356cdc188f58b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51737539eddb6101ecd3d086f3354c500
SHA10d860095b8f19b4520e2039bc3ba170859fc770b
SHA256ed6935739de7a249d7c13230b72b545a06d3519a15a9099300c00b8fa74428e6
SHA512fd958b1515e0dbbead437cb1a6664de22236064766eb0876f7e091d160e8fd3665039790c838e9911d831220f7651493a7af2ec3d9d4dfec546c057117d95203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc79d0c3c152eb708eef3f3340aba8f
SHA1bfea76120e6ff3ee622813a899f8b32f99f75bbd
SHA2568d9c7808443e64941847458c5c67e498e1cd96e60e405701a2d49637fb6a1ebe
SHA512e0b098426d80d857f5e4b535eee3eeab0c681df0df227e652ad65893014cffb8b0dee9a188b076b8bdc9dd73726ab8e70af3317c6d9f41dc86c6d1976aa66160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52468baefe82ed1191755bf3f7bc4646c
SHA13ed298c6745c12f4eb5843ae1c0591b2ce8e41c4
SHA256232d193e11bde8885389b982b48995237e6b632e400bc090cae4bd25ab001e4f
SHA512aa44e67b72e56ba7e7464b54bd4799c5221d3e527722a7a1c5f145e71fed2c2f33a44bf0857597ba71d8a1759a16d165a0785859a40a96dcca060ae867b17d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542efea7e001073142cd399294924ce6d
SHA1657469017f31becff146908e0d4fabadb90bf965
SHA2561030f770be5db3913bf58d9499ee9885f52e80a957c40f25aab3cd83cd25f2c7
SHA5127fed2c47260ed4b8561af3b3557af10a3472c44566c30c005319ae76ed3f9d7cc83c1cb9479274eb2b17d91fea828cb78e50e1d2a86446e391ddb320370b448e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d281748ad356bf64c9d4418325e9ffa
SHA10dedfb3e0ce43b7b583dcba526dac891b0df6690
SHA256b7a50bb7d7859cbf2f621635a84cd4b74501e460967cc9c2eece249f6756f20d
SHA512a5765c56325cdf1bb0bf3d37371b37a11d6ed3df7713c1ab185a4fb2dbb6f2b0298a7359a8602606417079a2ec40adee77a475f1fdb2195b0e21ad9ad9fd8078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac1ef86d915c77ea61f5fff0f15dedf
SHA1b55d2127763fdb824fb549421389e967b7a087e9
SHA2569d035431534d747e946905a643d56558333129b06d94ba04476ff230ba00eb0c
SHA51217686cf41a32365c01caddfe37fc146ece955c6c0d1a17372ca870cc60eaa04917e28e12af6877408042b30aa0e06a03be803c57d6d2f566a497708e56d8aed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594319c9a968f7be32a7d6ce1a26a40b
SHA117c495f25c4c37dfc8f347c3388399f2beca8577
SHA256925c52b7d78acd60821047e512cc25621ae6271eedc82ebb33fd86787b22922c
SHA51286382484a4c658696f06c2c0e2502a1013436f4f75db6e49b74667adc8b8d3d2e32d172e23b8944b68abd1d966d4d68e89b27f29c068105e1df22aaceb8bfd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52704554c9e8b1ef37888c63e270e271e
SHA16a075e5c06fc9da6738ea4d7c27404413e4dd616
SHA2562ffed8be2014c0907dc3d009bde237d451e6b67ff21e87e8a868c5b5222c1a9f
SHA512f6260b3b0870e7e8d23bdca4e37448daba18036ff58e83f33b1c07a547702b28fe070fb220429301c074f3b2e16bea21120014657ebef20e28e53a3fa636a344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02e3c444ab83dfb7c73d59ab16d4daf
SHA185e59e02f97cde44a93ccf28a000bb3156a1dea6
SHA256517c06f24f86b3059631914854c2ba358e6ab9f60917a4ba3a61a43ce321bb3a
SHA512bb705328980f1fe34e05df8af31934c88b2542d3792c422ed7eed4a587661fb1dec15e4aaf9deaa80e78045462f9208cb3f0e584cfb081ee84bd02741b812732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667a72b075cac0469d3b3b01987d98d0
SHA15f1d0598ff667de52cb07ac5bda3a03fd0c28dcd
SHA256553a6752b83dca1be84c4201c9b313428e939b9fb8494254ef2f32f676547a11
SHA5126f1b0aa389b140c17f46cf987b4e77cdf42784a1a21c88bf1fd9fe68a96822244dfb561b458b249eb1855dea028430b68664a89121b4245889ac27121af352ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58afd178613d051f61c530b93f6e4a425
SHA1f4b9cab76ff978b83eea121ff076e05261914d59
SHA2563bfa091eaaf782c36153cab855aabc995235e571922cbb5bbe60ceefab6af215
SHA512faccd5ba3b502341a16a8a2c11abff20d956dc0a9dffa70e4c29ca1ca7f46660442b97b745cc37edc9aab47d7d42bc08c505480a56e454819e322f892d46fd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b4ca3446f665aba4fea181c475a4e49
SHA1c754896ad01c206302290457c6dc273d5799a4be
SHA256a7b4c73f4b880366107d348bfff839db1942d1c4ef3883781a8de57b32ccfac8
SHA5129b5b654c79107f19048a230ee11b906079556192921962f87349a4495b29f4ea210ec5336207811a8ffb55768315fb513a51699986737db07a2f465c19e4dd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818e67ac11c7e960422b0456b8755b8b
SHA1a34ef8b2aded7842d2976bbfed10a28e142427d6
SHA25601ece643393c9ea935b6e8d095ea4dab1cf847bd236eb0e69546d92e01691d66
SHA5129cfd9a8eff24cb3e63f326f57fe60824f55749d5f336f93add79bb56fc519ab7fffe520901e45e28ba58384d8f85a85b1943728dd98516047bcba1cef1a41789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0c6048fc5fb70382442e5aab6a64223
SHA135dc21b8706ea928943a468a2743f026432c4bde
SHA2565a645b90f394720ada4b2920afbd2317ad70f5dff04b31c2c613d119402e7103
SHA512e25b2634a6941e3a0b465200e1d7a70b020bfffaa00c8d4d184c5b9a4052e260283fb5b667ccca3522991281d6ecd14eab9b4667e6b64db3e68c007fd5fd0ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3847cb19063ade6232cbdcc4b5f0137
SHA1bef784ddcb5628be1ec1a416da07a0cddb46cd0a
SHA25638b2b87d55646a9d212717ee5dcd7478151b79988c8131c8bd650fd753ba6236
SHA512d5266b0d4010a328c6a1ec218a7eab3321f12deaafb47ed3b92c5286ae0a95883e019bea593158f3d3f34c4c5153f415ed87fe8e3d05c04c6afa80e369833c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5633e6e79ed681899a29e380228e0ddcb
SHA132da5bbd20971af3aa4748397b271f17a8c96d8c
SHA256d6663b73ab1659702f1b63debfd934298a7f74c06dbad9d34919895ea9bb774d
SHA5125ea6e1a41c5d222ec2c5b9fa206bb98ee0abb9a7c8db05f754be892669b38b840eac7ba8695d306d22a467fc920f5ba43cb35e4382ca230360e6d927951a0941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553df307ac263c17d797e0ff23d9bdcb
SHA10eaca724edbdee30b83e0ab5a11546f8585372d4
SHA2564a784b5022e741196cbe9724cc1d0a160e08e661e370a26f6d31acbec1947ece
SHA512e22456ae1d85248e77b99033c105d0a01098e013136a61e2af355aad8756c7c49d861b90afa4c8b22883369490152eae58169385cbe0d123788e95d6daa39f3a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a