Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
658b1dffcb6eacb1b3acf86715dc7e8a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
658b1dffcb6eacb1b3acf86715dc7e8a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
658b1dffcb6eacb1b3acf86715dc7e8a_JaffaCakes118.html
-
Size
460KB
-
MD5
658b1dffcb6eacb1b3acf86715dc7e8a
-
SHA1
00adda9e784258f604c5460087b9061a1ed9a069
-
SHA256
fd2949c945e1118e887be12721c3af4d01cd96c720432f8866f811d53e762c4a
-
SHA512
122653a656b1f621c4972f535bf499b777f425722e98735175fe7b3f10f703805c9e10ba4e773900759ccfba703bade3027134820fb9aa49d0d57346d2bb4cbf
-
SSDEEP
6144:SbsMYod+X3oI+YCsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3u5d+X3x5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80625773e8abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9ABF07B1-17DB-11EF-805B-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004353f1d06a5f3b90fed02d54cb4ab175cd5f52fcb2c6bbea783ec41751d717c1000000000e800000000200002000000084835c9cf201b484d4d532e9fd10d8540bc53fb2932888caefdce9823f5ceca72000000095c0cde2ab28e0ed0a77d92f43ecfb9656425ec8d01e785ef66ceafb9c01cbec40000000224bd906103d01b2df41754ac1f2e856fecc2b72fc5d3f1bb6ba17687185f77f9795abea6399bc3e3cba023d32207fb05c0fa55b1da24d703d730d6ab0c7719e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1232 iexplore.exe 1232 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE PID 1232 wrote to memory of 2372 1232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\658b1dffcb6eacb1b3acf86715dc7e8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a504458c0c73e3f40dee6e6b49ab5d
SHA1774649a8872b341078ccb2d5e6385b1935b8346c
SHA256f1468a2042aea3b083ee8a4dac90cd1648bac22e6177e6281617d1e4ceba0813
SHA512262b57a031dd34dc2e2f39906d31eb6dd11684a5594da116f8d9d8b37cdc8e8c373cd09a2e05a41d03f5cd945bd7a9a4255e0984bc93cc6f1d7d46465ad53c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b17b3409ba237343a5a6deffce3c533
SHA1c5c32b2feb7d6178353a71224d133f85a1bf3714
SHA256d20aa8137bcaae0594b322bdd32c9b983cfe875fb6e00f680c2a118bad399a5c
SHA512e8b07e2d888c96395be06bc04e840b60da6be988996484aacac27ac75e30edafa0426551ef51ca03dcb85aa25e5297973614301af26b6a123561c936cf168f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23878f5d18cfb6ceeff061437518a82
SHA19c0d3d53e5e1dc88a5a162b52acdc2f6070ba843
SHA256b4844e1744135f73a17920795e69c6fa1a7d7d6bbdbc17554017395598a64b54
SHA5129ce1a9c9b7e6bdf8fac1d1688929844667323265bd253d0f78ec14b8f9f8c8ece2032e1f4fd2bbf45910476817bc555773e48ed795a586c9605d53fc11ed86df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c1f94b93984119275dc8b380efd07e
SHA15fffdc002db77e3cc0d06af74bb601c0bf6a9c48
SHA25617957a99fe4e2b65ef61b4b8130f156d78f05c89024f497094a61b46e1fa38d2
SHA5127d8a5fd2dbf22917cd8bcc0e0d3ccd79d080642d08b6c022ef101ad88b181e16901fcf1845d1303eb6baa3aa93b9e73e6132392ffe62f7f2f7493d3999e0b6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f2be026b59616aab1236263ee0db84
SHA1dad80a20768f4540d5bca92fb3272cf6e8eaa874
SHA2569b86375e529e1fb4122977ef43bced6649299928ed3f66ee04a4822c8f509ec0
SHA512a7a804f28e6d55735ff8782327ae32074a07bf752e4806da9aef5b86f2d4d34b67d606166ade432d725b2802cd39528a273731add2ac1077f364451229a2a161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74c2859d4da808fd13912308cd871e7
SHA1d30515e316f1a204c53de1c5e3b6406e56d11f45
SHA256a0833fd9c61ce922c72621a42b726ae4bc082985fa7967a6ef0aa913bae308e6
SHA512d70aff8cb064071ceaac17a119515b68c8b28881b5add7dc4103133187b831cc4916b9f7c93ec26659b2d0a102e5ba9443cb4665a80b08dfa3f3fb7d5102465c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9446f90102a15d982707f0ab4853a76
SHA1b9cf819298bc524c5a6c40e90c2b9c5ac3b786c4
SHA256ea2db34c1c73e88a47c2d8e747a8770078cc1c738ff5cd66d069ec574c8f76e9
SHA51231d74abbc406541633b7fd617f7f2f20fee0a068fbb0208964654044f2ff6a2008b8275725066b8cd1d5de5c11153f70719cc85dbe8c1705ac7898afeb10903e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21458fdb287245142c2aafcf8ffc36e
SHA105b8fa67a038d21f8b271c4df1cad92b21cb7df4
SHA256ee56c3fad659bc32d86c3d4d11bdc10038cf8882aebd8c78d6995096de372cde
SHA512be4fc4b0c42ffcaca2543d032c43bf2c6235342f6d8177f08a055c2e01acc5ee638c25f1330a0cb9f656db36534dfc5911f0a493381a6d9161ddb5bb87ed94b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a09f146d7b4921e25cb7d38492d8bd0
SHA11db5b18967fac170ffa873410c222aa60bb40ffa
SHA2564fd767aac24d6a42c98c36a74f29b57f15f72006c6bcbc1bdc85baa69567e7b0
SHA51287ce0a84b2d8a3af44805c77ad4389a9aae65a90d2dafa65ef515a11abe1c0ed8f9152f5d84cb5aa25dbd6e8bb9fd9b07a7d4d89385536bc724dca9bf607747e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5684e2167f4b331b3e7e98d72226212ca
SHA16e49c12764224a5e522c02c683d30e0727b84df8
SHA256801474519ec6a1d33e75655060c979661d737a1a80771546509434f64d613af2
SHA5128078852efc8e775a5d082505c5c594a7f9994b9406e75e11f75526c06dec23018b48a9192e92ecb7a5b1e8fe0a38ec79276e3cfa29208943f5f068c53a733582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54884504d89853db26fd45a67547e3d40
SHA153a308a48cd8574dfbabbc35361398b49b662c5b
SHA2563c2e2ef3a55ce3f95536ab2dbf4634fb7639547555e70102371a8fc61378ca17
SHA512c8ded2c2b19324627287e2307b48b13b343b00fb02479063d7d98fc16762fa59ed163b14be6c6cfbbd6d6e55654f0113c96a8459b07cbc1296f7b566eeed1261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e7fd4541b6ea13942fb2dc5d473b50b
SHA104541fd89fe7dc9d4b4f81b1cc15de4180eb72ba
SHA256881e1de394333297f7109637f9b90f77a7e3813fecf521afe6c37593e8dd5f08
SHA512f04882a40fb5c87a08d71ffffc50373913a61c596cf3220eac4ef286767e24c3e6da1583fc18ba87b532e32e1e381a7cc1d159ddd8cd0bfe97a3727c3dc22520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515999318980e80e27e36d7a4571b9948
SHA1e06342aaaafae1ceff68b3f57bb17c98d2e86887
SHA256dfd60e1e472aedd91a404b2b2c5dc7427341c9eb96ffde6d1b6cae565e0302a4
SHA512a4df33123e3f936ae7792a6fe20ec353e0acfb87e985cbe9044eca415204a32d8b59e2417abcc6e51f926d607eab4395ae91f7e0a89fdba0904978befad8ee44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513df8f3c0507ba1c77f43a30a85ffbd3
SHA1b5087f62c0b40493015bfb6bffe2f964c9c26319
SHA256e94023d1f1cd1ac60da7ca0afb9e3751faa7bc807a0a0da35f3e76b65486f6aa
SHA51277ccd4cf12e848811bce9640b5c5794cd84f878b4435eea15d6a56ceec69ff7fa24809c7abb7abb27ca0bc67d188d376b747e1b038734bd46b7ae2aaf80ee378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc5105ab2ae668043df9ad86102f95f
SHA1232a2d2faef20a43eb775ac65571ccc64532905b
SHA256634a4c8d48bb128d324f8b422f5b1f83f7e1e43e58a9bd8d48f3a85cdb469022
SHA512b9e4bbd33d27a6fbb093a47b6f3574406c6e2b78cb3fb611c27d6d51f247b4832c3dd3aac8ef3d4c5d8263812f14bc319f2b80dd9aa0da58b886ecad81c4a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511b8c4293b258cccb44e13f5fdf6326c
SHA1db02735439d479c0abe5604158280b0673db182b
SHA2563d72c0394fc528ad4cf84a80106d828e5880c744911d94a47348a40db15f1560
SHA5124ce7fc7c537629d74f4cee082fdf1b44cf28ca90a7cdacb0d61f613b3a2189629458349ab8b42b0badb0bcee3a8ee31347b0ad9da809a1c2c66555487b9cb067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528016eaac3a4c6dd97adad96a2672edd
SHA18eb2104ce178da95b6adb2cb919c906b3572392f
SHA2564f4920a7dfabc0f0d8f598f61c13776f58f3974cd7b052b02449b0145fec8ffc
SHA5128543dba0a03040671e53d977b9cac50b7a0d8cb38877b65170c6b6b90f60d4c29c0110a3bb3d479b0ecc4a6fcf4d78af5391b9532a6f4f7fd19b10a6b4a323d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8574e81473e5bc833337b634d7d01cd
SHA19997641934c41cbbdf6fa1a690fc7461dc11beb5
SHA256bbad815619618c70dd8f6f25f8a27692559767444d5ed33286fd918649b63b90
SHA51200b19cecf66c23a7df00e27c7635b9d458f7c122e7a83837967bb5619e022f1307dfcd0a6662befbc701ad3349f546d0d519de48bf9809fa10cd7cbc88a13e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569941982306454aa6d308988d0c77703
SHA1c6752c5bea55ab557c8f7aa25f8374cf45722be1
SHA2567b90fc2b36e45b29ef802cf92d42f74e55ad63654381a552f9cb05d4ae108537
SHA512596e426f852299ee8c98f299dcfc5379f1c3d4180c5240e55f79cc7138b1583b9ec4ec5b6a8c5d7ee81c6b6d9063a575f30d460c75e3ae78253c36e4eb6a3460
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a