Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
659bc8cc2c120f0cde3432ef3aa275af_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
659bc8cc2c120f0cde3432ef3aa275af_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
659bc8cc2c120f0cde3432ef3aa275af_JaffaCakes118.html
-
Size
62KB
-
MD5
659bc8cc2c120f0cde3432ef3aa275af
-
SHA1
143dd9cd44f6523a875fe8f32d7badd309a04c76
-
SHA256
84c32bcd6f264248a1652206b24542c6a086c5c92f8809e0ce5e36deb98f5d92
-
SHA512
f16be244153f7666167239539f554726838efb2bf9ff136c1dfb087dd4adf9f2965d5724090fb1d4463eb18e62e9ec5303fffff6fe9da4efd0ee611c34c56da5
-
SSDEEP
1536:JBwZhYhOMfNVM4h5T/pc0zbrga6vbNniK:J0hYh9lu4h5T/I9TZr
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B118C5C1-17DE-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000072dc7ec251a8a04cd53699cc4dc39a53d34a42698f9974cbabc4cf893ae9809d000000000e800000000200002000000080af4c14ea491ab2b6dfd140f94e15ab710230284276d9afe589c409afca4604200000004948c4da7230f676efbcd0b9587b5fd794585e9eacdc34edecc8c60144dfd06340000000ed282341a574b95a49aff412d9b23d7f723c2a3c4ed8b0241d4b8ef1b49357c9a6b4bf060955567bd7156ee352d58768cff39e3b42f311ddf83e3d94da509bf7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10294f86ebabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1992 iexplore.exe 1992 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1992 wrote to memory of 3040 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3040 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3040 1992 iexplore.exe IEXPLORE.EXE PID 1992 wrote to memory of 3040 1992 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659bc8cc2c120f0cde3432ef3aa275af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5640bf59b70ccbb26d8f087b9fa5149ba
SHA11e64e14c6765f786ee428a1a1cb83c4097b1e1fe
SHA2563e71466c20a801ae0170b25e7cf7bdb4f75dfeb6befe35ac2eb956cd40959d42
SHA512eacd4dceaf801d77379821313107f213ebe94547686bc132bd7a88368d7dc5970d4fe1cead59558d20eff1d9bbd80313b83b39fff142e43196e63ea6384f447f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD500b4c4a0450e127bd709cb14947efc70
SHA1e0fe26b000b3afa1527bd9f4d33b7b72cfc1e5d0
SHA2568d13b18a0f6db96d2ccbac3fbb11ee1890ed08ab8b25f1dda5b04b04d8333f56
SHA5124b50c4b7de747c7d945d9d0e824709bc84df11770d8a62fdcb6c8ab2da707b66b0fccc394f66638af4c4674b80a219d2dc6bdcfcd3f7f00d8ee6138ce30eac09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD569f1b77192bc6250f25e23c23646cd08
SHA1a6515e241fe17ea96974377cb0a953978f145149
SHA256f74a981790e6283d94471c8cf2eff8b23d20d0ec3b4eb22ded281c6ce3180be5
SHA512bb3a26bf35047e83f8c5bbfc2f614dbc4c8cf546a421eb5c1f29e517d7f91cb3c110116df75154e2876af963fa0362fbd9cfd11e701cdef4a94c49a22f1fbc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e3c1a0a1ce4b6296ee23693a0ce10e5d
SHA1893c41ae06fd967ab1b91de53cc25149cce8a201
SHA256714a5dcd5f65051b7544e35a3ec0ba60f31fd4d76798e7fbe51a4c96e9161aed
SHA512b7296a34f568933c54e7011addeaddfc759819dc641c737f3de694e26e7b9927b443cc750dd8210554826b19f13a91a3f88a3d952663f4460ec19c44ba2a95c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b0e1f9499736a065cb82466269cd6893
SHA1418c3f64b2f83267a229e7778d331fe463e39d9a
SHA256d0bcf689ee9a2b9e01c141386439ee4bf33e05be9cae8fe089a52ae6298a2bfb
SHA512eaa020e027d103f5f1dc88b90ddf66fc5aef80d813f635f935932b1b08439d1aa4fc054535aa29588c9ca9e7dc077b1d5a44d4502a7577755a3ef44a4682da6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD549ddb1fa6f251649c8ba96ad26bee613
SHA1108deeeb09ab6a9e2ce570e5718f29f004a04b94
SHA256e87899afcb8338ecfe2c131405087277e07c64a05f0930d18b64d26c1ba9b0b8
SHA512113987677dd37979c740885040d71f380a471be2c0a25026b3b35dd7694e88eddd6bbd7ffcf94cc259ef1ee55d78e8e9e7ce61b68fc1298bd09863e7fd353cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a6ae643f23bc28f5b2f830805b2ecb5c
SHA10e4f8fab37fce9f680b4843260ac0e2c937504c0
SHA2561ff27fa2c06469baa4eca63c2a05770f9c686c3d15f5700f64e585fa75349902
SHA5123a8601fdb30ece3ece88379180095c61eab365073a2a4790b1273c39271286e24edcf8730747971a36425c252cd2d9fd90707c5357ff1540d3962400fbce9eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD501054643baf2568fac73eb5f2703794f
SHA11f9df839f2eae3ed19d0bfd27a68e30cba005d60
SHA256a41bfb2f5645b1a2824b14cd98cc23aa30fbba354e5500df77c33bf95fd0a25d
SHA51210f5d1c040fca61c4a8cd31d7cc5d143d118a30037a0207692eef57b4e0e4b251023d58bd9828542b6282f6ebb09ef05d4867a14e6b4c18f55340e9cfbdc64f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD515fff934f7e4c9b2646820f13a862b33
SHA15b0a3bf3729e5064b5fcbb48d21c3f037ac05597
SHA2565efeca92032d2c09bfdaf584d276ea880c0b77cde0f5ac61ef5e06ceebf83226
SHA51277913070219f33957ff130aa47f32b7ca974b17a4b3e25e3b3be420787724bd6e6748f61243bb2d090bd7a75da1babbdc49bf66e960250ad4b77bc0585d3b7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53558725f353e7a4aa1dab3bd84a05f36
SHA11b626526ee661b9c8f0bd3368c2b6b08fda52878
SHA25664302ce4c12620746d7c58d925a5418fbbde63cc04ec950bbec20a01e069f8cf
SHA512ac4ee81c6481da9bafa6da18eac63b32aa6ce9a69c90e50cd98ad998a7ab472200226ecf83b730103e47abd66818be31de0e6caab4d47014893fcbd195ca8418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a1a42aafa2e6148cc6f98207b2bf9d8a
SHA128405c69181c547afb17a192c1f412730c473f76
SHA256daa11ad0aea887828e55576fff440bc2ff6c78f02408bcbf3c81352c0d2d524d
SHA51264eb499cf31ffc21d5ff4929fe6f9c92abc114f7a1bbece6265ee65b177f2e15b5ce44c926c6b7fe266bf9497dd6c9e8085912923e67e0192142500517e41b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51489f98d5446f846aeaf86b419a1c63a
SHA10f9c814a5ee8667cd64811260e1e93f01970aa06
SHA2562d4287283ad859c089ef4362ecfaa70c7267635e46a700ea61d00b08d44e345c
SHA512246e87b13049b41cd1710d8d96214a8b77ebde661645c5374fad98bced92f09a87ef9a000663fc5080561c6b0e288e0d966b94ab89fdf9b2b9c2b6fd5f75ded2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c2b2cfa2c71f2d1fabc8a3b18d6457a9
SHA1c05c3f2762ef147499d1c6e251e4fd80b0955957
SHA256e685a02d6d932cb206ecdcdd25110e81d87c674de72ca7f0c6bc130cdfa77413
SHA5127b072b336d4285d2faf6ba353f1c1226793707141424101023cf47df405800d5d2b5bc7345a3a6d321fb7135c3912c8ca65aaf8a5dc5f4d70c3a4599593611d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5010af70fd84b00e66fd3a5ca05a9ea49
SHA1f313b34136a8c6857ed0b05079301699ad929154
SHA25630484bb1921903cecd52ddf5ec7500ca2c0a429bc04914f94bd8e1277fbd3168
SHA5126889ca1a2082448e3f4ec8daf354bbbb5e6a046798c0444971721ccd8a5e7970a53203f641676598f5533d7ec4a18843bbd40f8a10a04e6559d94ab0c7a37230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD551164c61e583a43b974a09cb121e1056
SHA1ad92834ac611dae95671dd0b6df4c8a15b674ecf
SHA25666e893512d7d9f952171cee630e9cca8c84d36a2c5497e46f2a4c0b15d439da3
SHA5121919e894a1defbfd4f8c5b55cf085e17633c119364b1c27a7157882b8a641dafd03ed29162fa16794f9953ff7eb940435bcd4c0b5275d528b6cb3929c12fbf83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c824cc865cfb60a104a7e38357d80e31
SHA196227490dd5ae5eb54d7a27d492eb75357573c73
SHA25630b7a90e2ec29e8c85bfa2efd3eff10a1673d9eb6441109435af5eac6285f562
SHA5120cb90b59bc357f7dab22cbd850ba1950f1853e7354f231c61b76cd3844098635be1ce7ab1e86a179ad28720e2fc4b0b04d043fef2225e38479549848fc061227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573bb3ca6f65bb3abe7b65e1c8e631ea9
SHA131f0d6145f1df8e75e6c1674a983ca36027c8b02
SHA2568240ae6bcf15451d28a52628bebad5c825393d3448668ff84a0f786d30b6d8fb
SHA512ec6d4246789099b0b7e2a89c4679e201ee75dd71e7f0ec6eb8a5293a8be5f4e111ff0812ae47154073646f8fa428668b74418791b603fe1c15cf170f3877cb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db41a306c3a4307f47d94547584025f9
SHA1598166d632df06766f672eb1cfe8928835b86f7e
SHA2564409b37416f5b7132efb620e4538c7e470ff91439ce5fa4b997dbc6e76e54102
SHA5127ff03b5b4074ab62b57fda1677e9ff9cf0caa4311ea0a27b4a31475306f5810a3fcccd0d2b143af6ddb403dfa37174e5691a31f02a2f68980caec5ac6609bd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50b736b62b1a8cee01eb9ee4bf26b2060
SHA1d2af1f206c2836efda3aba356cb45941a6cb39a0
SHA256c011c47d7f1044a382e26db6c44df54453fec10845c6353a58136a4ed06114ed
SHA512512421b9176a486574ffe918fc1929a0e093ce612e4f65514b81de6fbbb68d4050bebf8a18eecb29c775b190c989e4e3aa8349986a19cf0135050784894ce548
-
C:\Users\Admin\AppData\Local\Temp\Cab2639.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar268A.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a