Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
6589922d4c4984c942665891d4f1d4d0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6589922d4c4984c942665891d4f1d4d0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6589922d4c4984c942665891d4f1d4d0_JaffaCakes118.html
-
Size
68KB
-
MD5
6589922d4c4984c942665891d4f1d4d0
-
SHA1
e62a6702100341ed904bd660522f28ccf06aab8c
-
SHA256
5bce58066a12f6a0aead560d3fc423d84e9114f4fc534e257e4168f45d315005
-
SHA512
f28a646295d5a97529ff7aa214b7930538c3ef286a7a6aaf84528578ce725af1e5efc0389cc7565d1ef35c023753bcf237288c999bf33b203c8e53a6fa44a7c1
-
SSDEEP
768:Ji39gcMiR3sI2PDDnX0g6wN1pX7pfZ7RiDpIoTyv1wCZkoTyMdtbBnfBgN8/lboz:JJxP1fZUNFTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43B9D6C1-17DB-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0014718e8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004da77a0a7d846f8969b3699597f9e760a382fc2dc80766d7729e0b4fec6cc62d000000000e8000000002000020000000321afc23ee5b46e0d28ca60c64e78bef775094b54e72ca260ae259c2d471cdbe200000009f394f746e5d502fc781363ac6327caa3d34349ab54bb6428b58f2ba19fd1a5840000000c2159ccd33448aeaf340815ef586ec507ca6122757d7034670cae7933442a209be35b3ecfd0e1dfeb8614684042e336339838a1e2547b819fd3436a866ddbdb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1768 iexplore.exe 1768 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1768 wrote to memory of 2172 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 2172 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 2172 1768 iexplore.exe IEXPLORE.EXE PID 1768 wrote to memory of 2172 1768 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6589922d4c4984c942665891d4f1d4d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4006ac5fdc157713a31528792171819
SHA18d2f55993a8ffd99aabf7dfc24818493176f204b
SHA2564cbc88517f553f2c11cb602ac6802f6553ae8a1e74deb8cf12c74bdfea792338
SHA512052e86e84fce43c68664ae1b7193e92fe6eb1c3a7ab7c125962ac95f321978e9c2521f5c90fd6652fc02d21858dc881d1c215f73a5947841af0c78ef71085f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51120765207f0efb9d6ab3a61a45114ec
SHA198c72ae284b8bf3c2f6d6b3160c9821fedfd3835
SHA256825e13e04f73863d7b7a645ebfe4159b2bf9b53600a4efca0b91f8ea52b2f4c4
SHA5129947f206a1c3cfdf8b0721b5811288a927780f2ac6bd1a6c818d569f75a9ea52c6a2aabb865fda71b284a550da5f78028c90e0148cbed3ab1600a215f6eb3dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7e8cbc25da3c047e825a197294bceb
SHA153f91a778f9d432987b7dd4abd82691e23e0ab4e
SHA2566610f65499e3763d81017fcdf7c9762d1d2a40fc328de30acd3c0671d05a7dc4
SHA512bab4a257850175e467240518c9d4e85114825cd49fe1255730e29e4cec4d091e912b1e8559b488dbc2c6c09332a22520ca7fef7a0f8174ee628985420b76a8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e36ce3a929cda0534fa2a7f480e5b8e
SHA128e5e1c7b1a2bda87eda459db90e72dd54770ca5
SHA25690eaf44a53fcd5bfdb194b173a4147d486135be4425ad9f156d62ac747c8c29f
SHA5121a70414c9adc3edcab93b5c0942b485e63982ad42402c499d86df44a0f9b8a8e142e899576014bbd3dcadb1f08fe415efe797f33a9e15b9db9365029ae4f1d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ad7dc11268e73be4bbf1fc60cbb59f
SHA110d6783ccb9c8407fbaac90df3bdd2ba60ee570c
SHA256327cf0f6e9edd4fb62749b8acbdd378fd25b32616d7ab7babe7bf26e81796d5e
SHA512c3868e416da578d1adc6c20399642b1b665b7ec6d741b6db9d2e65baa8f7d94d5844130ae00a1867b6dc7bb96ed22c3d3b2d6cf5fb6aab6640a56eb195b071b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f81bb0390954e17c8c52d16744f6ef
SHA1c9d9c85fb4cd93208abc52b19d906ecc1fc3991e
SHA25659f47858b85b171d9d62a0d917b6d483a620a0dc1aef8446240bd5cdc50da407
SHA51276311ae8ee801e965b1aa50253b3c33797c47783ee6b3890d10ecdb14235b106d4af804f714fb471840d04ed7c36dae9f4734c8c5dadbe314179ecddaf476587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5767ce182fcfe78dbf375c46f4dbb7c12
SHA1f9e2310877a1f4c8f81b6da1f1fd5610b2f295a4
SHA2562d86f34e2f3118b6760c82312dd83b11fccaf2c2218578333d9143715e1489a4
SHA512921709da5189bd4d32c89f9f9754d7075fb3613c95bb6c9a92517cf11c989f919099350b05781cba0106bbdecaf9bb1d685e91e0bd2af693e1bf4d38fe7068f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e39377e85fe46e39b431c1814d9f128
SHA1060d881dd7e7b35071a6330675a6dc195109d9b2
SHA25621dd58c77124c384385b6f11195b45f3ad5f454d35d3190485d09dd356d97044
SHA5127205fea2751826904803e6c42ae54c0c2af10d9d59d947ebd799ef28e744ccd8cc3630ba8edb7c38a09bf437c61c6a6a326f7df067766a0584b8b25be60c1e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f39ee20d2d2088e3b04222d253afdf
SHA1d5966d8ad11c99924687ec6716a5d4805182bbd8
SHA2566776c962093c53f9d903322dd17d6136341ae5e89b7f322607957f7c43b6ac19
SHA51267676080e4cec5a98ff8b42e937323fb33bf561e40f13d297fdfffc2c4ccf436375141dd07c28cb8bbd2ddaba9e29311b7e202ba89da456eb1e38aa50641558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198f8d4c7a27acf948ce3defc7ef1ced
SHA1791a8cd4d0ff6369d7951730ebce816201ce077e
SHA2560bdb7f6e3d4601149cb8febedaf419bc98cd402d6a2389b3a960f9911bf1e381
SHA512adac3a5c4167d76f7a2a80db3356112f7e17076f7d17210d38c73ce3f20a572aefb6ffa87404a36983fcc3c98f3da7d80b7a883a8216df2ad3c5e5fc98e874f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae07e6350770f17e1df34d739efc261f
SHA10211046954d8200cfe41ef141464557e1b59321c
SHA2564ba36471e9cb13e94ded27cf1a8ff35d7fd0e5e648cdb0f9fce90f29a1f3a609
SHA5127273950377a42e8d7bda967bc84b9480e31590f63e902861627eb7cd63af6acd11d6d47795009986b5bb0e77768e0cff02c0c1aea4349ae06f09955c5dd0e093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ea4390fed61ad1e33279ccd115bab9
SHA160f60e3001e381deb8f50f21f59cecaf1219794e
SHA256c84f0ff78496916671524c55d7da96d19d6d707198e02c3fadd445413515671e
SHA512f1a90db9636b7a8ed7a9ed52e985305284fdd0bccb411d3496fa1fe4e5b2be83592da5e1976d141f8b60037d17ecdf5fbd90403a17c3f93ae32ffd5fc553db3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07de5ad35cd95c73bfd3e6530ddcd5f
SHA1d0c9c4742a19ef4aeb6224edd25161e9726f8d9a
SHA256ce2ad02e5f979b3ab1cfa0c5b8b535e5e61b3ab9debd0e54458e97e4cb6ffaf8
SHA5121309c1c4924aac506341aeb729a3d6dc2f3b329f300c6e7af9cace04b1f992d2571cdb27d51c7b71c947405f219fe3776ad158a16ba7175e33ca70f4e172efe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5322c5a545c36670ceee55d7896d54
SHA1efad62ea5b5884ba87b36d067e1411b503d4ef83
SHA25665e65b0476969d3f1bda2c6099360a4b8dd5a5aa2750f357b84ff0e966bb3ec9
SHA51288343a72c4f677deec61a726b2a78df79e97b16ca3a2427de6f7e55c86f56a4076444b2d22fea5a21db192a48bc50f8aa72b08b2f533c64fdf3d7183b4632f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b1247964a24091653c85b4a92dc154
SHA162d15d73a3136fb9c54c048d269dca1df2076471
SHA256a5a6ebaf801823db9d627f9c4ff2d8b359ca8ec832f1f66ec3d6e20941319fa6
SHA512b43aad03ebebdbcd0a84659759ab519fce88440558d0b0445b3383d0f972be4819c0b50b5da2da442f065a38474a8994c605e8a2fd875b1ffec32f84506c5e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ff5a1333b1e17f4f368da9093d2251
SHA159677e005e0c19963e531bd3327f21418dc64f1c
SHA2561900d06423092d48b7c0a9f7465a8b3352f74a6a725cb7d4e73e6812e6daf660
SHA51264d18c8fe707463ab9edff0a77276502f6ea7ff66d12d7c28e5fdef28c4788cd3b0c5437f035854ac530cca43ee37e057f582e3c13a4e09db463336edc753350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd018df4e95b2e55de1a1ec52c03a7a1
SHA15977fe7b0c9dc68ebe468e92286420122f4e96d8
SHA256fe8a27d2eb32c0ac715cb4fb43a768b42c3b4603c5d094fe7d783f826b047583
SHA512be70500ab6fd36372d1c1859e14859acd51871fc983702a91501f62ea7afd2c245fdc558c5af169aebf44f5d9daaa6378f5041f1290811d89d28854313893f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509e3b93aeb3dea659c8dc560c472374a
SHA17739d3f5b59f6c4450c78e4ba06b4a262e4f09c7
SHA2563697c9f79af2739a1196a82e04e597313fc32e270f384ee32c9ea82a9ccd17e1
SHA512410b3dd9bd7af55aa3b2da76b54e30baae584ec7df57a93a697ee51362b47b304d7e6a48492db117029206086b77ff2b386415cdc57a96adc1834d7aa20b6c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1bcfe7ae593215bd27ee7a5b3c41955
SHA1d61300bf758071a79eaa4461a6b416484cd0de2b
SHA2565b3232b6bfb73987131d94085931067c623e9bc5da0a46b059bbdd0eb0c332ed
SHA51201829c596611a7cce985ed22dc1c748ed6cb1d9572b4a0feb2b93359ad7af22404cef38256f323549f812b1125d7c1b2d65f7a9732804d768e72eb7ad28afc19
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a