Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
659996c936da826aca4c9f7bf82bb86c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
659996c936da826aca4c9f7bf82bb86c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
659996c936da826aca4c9f7bf82bb86c_JaffaCakes118.html
-
Size
14KB
-
MD5
659996c936da826aca4c9f7bf82bb86c
-
SHA1
dedb6eedd652ef046ccf516a54fee747efa8d82f
-
SHA256
645e7ee190891c877d12750e9c3b7e7d0a1083bb3945368c879cae994d1408ac
-
SHA512
bb8854772d2b6b1fae177e4907818c4cc762859af019b4a4f4e78aa66e2f52d67711e9a2e7522e5294f76db7cf47353a1f3978e9d3d77e841137dbc1ae56b068
-
SSDEEP
192:/MAPT3eLOTciZziuoyCwBXgVF1Rr//vgPd/Hrjp0/eq00X3Uufb49bxvDc2Ke+lk:EK3/TpiuoyCwB+n2PrF0/ezWUDoe+lp2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006cdc5e42e34d644fbb399795906e28df00000000020000000000106600000001000020000000bffeeed18d23e71ee88ff3b8f882f00c7d0b2aaf8b4d3d571811c2271935fcfb000000000e8000000002000020000000195aab5700d11b173dc8ad1bd729be83903d7bae34b0ed86cf1f8e2de23cf73590000000a22cd89912e4dac442bdfcd15f66db17b601978a326cb744c7134ba79eec311ab4af7f80eaad665ebd8c788d666a424b5247691ba6d2eeede2568dd9955a2788316452be9c6c43f169d415b3f69bf032320cffc85640218a75389b360dc63a2e782465624ace447a22eaa78d44f7f801932654aa465a58f10cc73ac5ea3e717778432cde31a713bd5766ddc5ca090e8740000000effd4c2d9f25bcb966b2c1dad94325a40ea4d962fd5de5b1c9cbe26a6f3c1ed4a661176d77e4c0678481ec503e1cfa716389a8d6ac2643de40d7131f6bc8842a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{583FCED1-17DE-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fa602febabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006cdc5e42e34d644fbb399795906e28df0000000002000000000010660000000100002000000083448dfeb81276e703ca9e49cb2b34d2a3f4b859c8c2666a2e12e7ccb1aca6c6000000000e800000000200002000000057dc96458afe79d69c9aa4db5d38f098c79660f53151efd644250d1d310f1c33200000000668c25c1887d57da9eef7494d30d87daf52a0039c3eeb2a32c390c24a65c85a40000000db16fa3db897b5beb69d426438ae8fbf8a06b8b1933ed426023bb9200c19bc5ec585cd55ea812f500e9d7621bf816b782e708c85e8df44e602ec7e0dd1cd3a76 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 1664 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1664 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1664 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 1664 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659996c936da826aca4c9f7bf82bb86c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f1b3203436adcd9ef3bee050fba79df1
SHA17717406f58ede030f29a1d963d91043651f8a974
SHA25685190f6ef66fe55c8b1f27b77b12e789e6d41c5a6b26cb56332e373df62be193
SHA51262bcc26b82a532f38ce7b2df6c9df06300940eba087e8344aee39d801aa1f3a51f1029b83aba34770d4b90aea04e59662558744c77c7ebce3b968d249b344979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51f255234aed0cd3e9210cc7983038f77
SHA18913f2c12737b9b9551b209d54fc824bc575dfa8
SHA256c2afd0964fe5bd66e2b15f969764a84cdcace9e039bf7c55ef71ee1ac1067cc4
SHA51290b62752779274fe26a425e6f618b011246bcad5dd591df32025ae0fbf904cfcd3929cafc17687c547b8ff8b9ce9910a315fee2b0194c2d778b30d8a7335b563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5314959950ef9ec18638e6a1ed6698031
SHA1cdb38d031c55dee9d3d99f7092d9af4d05f27b36
SHA256da4f5b3269723013ac1b783951d9f3f349e8f625d62b5c20d490b3293187572f
SHA512bfae097bade9a7496e25a64b2105c638d2919f363a534ee1343ae3927ec9ef9b22037167681b3b9b2596fe3f819e8e6e407cc104823e24bde0e48c536e9241a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD507e3550fa4aaa3775dabe87834d90fb7
SHA1210db43b8df8ce48f41bbca24c4006358301f425
SHA256650f227ee9b7285a5c1cada66d2833b9ad14f04b491787af500cbd198a475a52
SHA5129144dcb5fcee63f07d006aa8864bc518c1ba9e423e625b3498e6b26cb6a2144222a2cb3dcc9757ef0a49c188e35d6f5e50fc0d04bdfdb3b9f71e6ecabb3c86fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5371c2f548d4298a974bebd18f18fb24d
SHA1a8a09da91eac8690dd12a7153adf20297e306d33
SHA256e248f474535464f15e6a2c85c49a221586622cdf4f9bf327adb2b6f8447ca98a
SHA51212f53997eb910db14ee17c89a5c73ea57f09638ffed43bda504786d29ed736c834307ffb80960c4e0187d32de6b5505e35956bfec8f3d47d16b175243744cd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5127e397ef7dec4181c73edf513e0da9b
SHA1930ef1e120ee7428e2f30093e525eabcc645bb75
SHA2560950748ad045dee5debe5ce5733a03e10ff3e466e86eb32476dcd3da1852cf3c
SHA512281f41e0bf80302e7093ac6814d3532c9e92f595bd2edaeeba9edddea43356c32717d0143c27755f2d28dfcb1b3a210787db076f14953244200ccf03aa02e635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD532d158e82d22776e1f579411841ceb71
SHA15a3c0841ae7e3218167ee4c172673eab98c4e8e6
SHA2568e721bdcccc2bb775645c0b62660cc080febd2bc2ee0e5e67b70fe0c3f151723
SHA5126d62922da1ebdb0f00ed4c69245958ea51ce93ab6f296c2396e407d294dddeeb669aa1596a3aecd213ad5c49796b462bcd895ba7af07930c8e53be63d132b9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58dd7031560fa3313bd9c13edbdf51555
SHA140d6c73dafb2067f18659db0475b46898ba30086
SHA25602766a100e93621ed9df77dd3217bf16039a115329973501fc7774fb6022057d
SHA512e76356bb786402caa28115d7b20d84a25e18e8c06f25710f9d6917679d0a21df2bc012915342692495f17294f5c270e1b920636ce0132ae83bb0ca7988d095d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57d8097fd67b3db5e52b872e140d8216b
SHA10944b7291e55582597ac3a2d97b47c8f3c81f813
SHA256ee4d9196a9acac9b4495cc4f940cc50c3dd600f1b49b1d9d8a7d06cc1b0a47fe
SHA512e26564ad0e764922dfa6eb5e70113e25642294e903f969a0bb1eee78485a7b0a76fcb40795dca3b45908f9d78788d76b22cf0f6335380c5a30a97d6bf4410b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55ad347e2a62e4fc4bc164f95fef977ef
SHA1e328b1e9d39e169820f6b8cc97dadda6990bb55a
SHA2561150c1eaea014b9ddb61227dc8d140b8297bfcc7c39fff3797eca890cfe69c02
SHA51245f257720a9c4e72686da546eb4701ed19086d713f9417104e81d6b9b6c5fdecd8820a49c79b99a0c0c67333c4ae8501f196edaf59d9c5b0b1b519a732fdb34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5143257e6563e9df928d28ebe2af2400a
SHA14bf9932a8608f1c88a72be0bf5af4587f7dfa049
SHA25681723c1023e0aeb4ae944c85222c86ac8f4ce710f98cae1939f1d7f139855502
SHA512d9a932470caa2e8e17b17fe4c8347519dfe777d81b973a31189f5e8f52602cbaaa74d50942ac6bf0bbeb1f0104e0bb4b0098f57c5c8f22ccd348ca5ba4a6c00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e229badc9fb16d9b85e493e20e99a072
SHA174f54c97a05a80a1e2484fe91eff762e303079cd
SHA2563216d999e6b1a0c6ce370be1f032b86fb826b5687b75ea70d99602647c01c7ae
SHA512ec3dbd2913b16a2c030f7eb9ae07dbf001eb9ff76505ebef8138db3b73f9451c4e1f218a4ed065d6c766fc272acd7b99a4ed9ed1d2feec8059f354ae651ad657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f1cb6ce263d7b10fbfa389ccc0702b1d
SHA1014250a212e0d7d55bb70d4e5c3791f21ebe604f
SHA2564a6366b19b57d421daa1e0fb1d1f83f9c59ee314556343a80a65630e4b4d3626
SHA5120e5cad8a03298601e9cba808a268dc76426f2f70a42a4f19b8425587111f847c2b913662478bd6e55b25a58229be62386b3cceb2635d3bfeb2b7ea59cb13b946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e07db64ef5562fbfcf70364b5b413b4
SHA112a4c19aa90f646fbfb78327e1ad952889df5360
SHA2565ce166f7af42a3f03e55486a96c2b0cb10141a936dcfc8fa27a58bf21cc8e67d
SHA5125f778279ec301f07141958d3c2231c8d7627d30392c7601b262c246751e550a65477c31c3ba7d60d44368cc6e726176bc0bca3b0e1dc4f1b963b6efe5ef21397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ed89cb37b3549f753cee1be9eda63420
SHA17794f25c2cb57f60984b516487b00080e80f9134
SHA25652d2d00bc10231328908e0d584a74294253bf857c95d37c15e90302292498934
SHA512befbe20b4acdef21fdd971d3233d352beaef85857b3d495247822c0c2ee43e54b39eadc29735af938f49b26ac4ec696564efec510a46acae887f2c52a33738ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b31d1066b35682ee891ed5906a0a37dc
SHA115440eb86ca2c43173b2aec832f2663f185552b8
SHA2566b7065887c8f4778f42be87f4aa5b82f235bdce876523a7edad176f3dd9a2d19
SHA512beba0d1c40e68a503224921287519356d8cc357313bf5c967f3f6def7fc7d04a305537477f33e094d68f06343ec102ef4f44de1b316075211abbc295c59f3b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ce12623704c05020d16ffb176177165
SHA1615f503293ff1465e7863694fdffb125297a10c8
SHA2560d9a321beb783e81740c042893f34d91befc5877984fea9248245e0baadffab6
SHA51261c0231a1d72463cc7ff5493ff9807bf23fdad3b49e8407dae4298a1a33d2a32b3b17ed53c3060c41e3b5c66e614f2fc7fdc7298800738d5d63ae567e5bad018
-
C:\Users\Admin\AppData\Local\Temp\Cab33C0.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar34B1.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a