Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
659e1c2da13d276ea8a1c3c9b3ccf6ec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
659e1c2da13d276ea8a1c3c9b3ccf6ec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
659e1c2da13d276ea8a1c3c9b3ccf6ec_JaffaCakes118.html
-
Size
55KB
-
MD5
659e1c2da13d276ea8a1c3c9b3ccf6ec
-
SHA1
716b654fd2fbf4266aaf3e39a76e950723a6651d
-
SHA256
a7a83cb3a9189b5ff35377a82ca6e1fc234d92998a0d350d92bf37d1d2226541
-
SHA512
ade6b7d04e006271e597df7f0ae3a314227ab8a56ec30b874a463b50b7787ce8f63dcdbc582e8db4c41d7b55fdc46ba4188931bbedeac540c91ba5ff61118ffe
-
SSDEEP
1536:j6sIgSAEZdJM7reguFuR6h9EKwFr1gXgaHNkBRP:jEgSAeERP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007ba5516a197a0d468f6bcc03cc7a6e3f0000000002000000000010660000000100002000000071218bc8ee8f4583a437bd3754dff95d6cd3b49469f36be76004a126c91c5aa8000000000e80000000020000200000005dc68c1080d4b926b3ced3075776cb5454906b5414a52dc183b191e11f08621d200000003bae6ca5a1574e5f80048e7c7e8f9698c59c1db1bda9d9df8e0dd535332e09eb40000000bcab8aa3e975859737b9cde9daa1783b20088f1a0470cf151be9ed64f9bc911b4b88632f221b282140b83463d142a2c99a80fe78918f3060457f55a84d64fbb5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E17D721-17DF-11EF-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dbe5e2ebabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2204 iexplore.exe 2204 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2204 wrote to memory of 2612 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2612 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2612 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2612 2204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659e1c2da13d276ea8a1c3c9b3ccf6ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525852c66fc16bd003c2bb825f3e357e4
SHA1da900ca2e33d8fecbc81841f29bf5293ed81f07b
SHA256903f5ca5a9c570715b752a4d080bd2724829b0f3d1991cb5ad429bbe548b58ac
SHA5120581842f536ba0e36ec6f0c0e3755d3b75d5edf89d7c0ca5e7a93dfe420a6ecbd32fdc50ab2b33ccd80d45476686997a952ac2e10589a6e408d53b115d895437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523bd4036b8065acbcbc6c89dfb824c01
SHA1a0c2c067ca3c3f613ba13fcff489c5f3cce0ed61
SHA25651324ad969b90c43f37e8b3fad01a8ed6849d52aa59a8ad916eea2826eed4abd
SHA5125473dae0a1bb4d2df2bae0e7c1925095aa79d2cd0018bc2fa7b603e65b3c6db1bfb81a00a502d14b1b90d6e97627d4b89d1e3a42515b2af7783c5fde14f95182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b97617cd424794f25502667364cf95
SHA161b95722c7c17e6a7e306371afd929e5598e61d2
SHA25686f4cac6dba59e13c09ea2f436a4f691b8ca157a9e3e865971afa03327225a76
SHA512f44a41ce70a94bc272c81dfbe78a169c79800ad19ddb2fb1e5e4e3068ba2dcca257d7a5972a61ecdb3c7916efa6700680e452bfb83a03a4183cc294947dad6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b87bfe9c458d2123fc656f6f0792b4a3
SHA19718dfa8b6c815332c071adbc76a049ddcc8b01e
SHA256a9fc34eb59262fee7e247a0bf502b30aa537106b0afbaff55a84cb61a5b1ce20
SHA512bd4e044513bd536256c9d393a3cddc09cbf30a5008287f5b65a27167a95a4d6114772212c4fbcaf3e5be07d4f164bffaef6d509f0c389c582f4040a34da80be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598dca6f4096ecc5f58ff73c127b56071
SHA1a3dda7f66beba0db57b03572731791a1b6f2a481
SHA25691b691ef752fbff84ea2ed1e2aa24b444f2c7d67b002ec1b4948259a3d1469ac
SHA51246d6b7b0bd109847c716bd46cf3d882bc9cd971edd1c7977250758f11f761090bfff0c71882503ae307d4d533d4a281e4167c0ef7bf3eb162c70f9cc501d2022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ffe46f4ee3751b48fb138c94edf9cd
SHA105d65bdc0a7e5a5931c7d2530877bd1dec5f3318
SHA256ff8b6e86cf36d847235d90ad26bb9f6dab85ca8ef914bf14222c2570eb7bf17c
SHA51206c03ad359f28c1c438a377255f860a52d80a963fdfea29ce27a099627b4403c46fa885d8ff1bb6d7bbd828bedc78acc50256698ed04ef7114cf776b6eca05b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d10edd5b179571643a4378dd232833
SHA111b2f767355a60b678611d0e2f271095fd971a17
SHA256a1313d3bc7a6a173e0d58f46df22af681831a56b8da56d638921fb01adf9eb1e
SHA512528431a168efbd5f02a1dfb9cf163dc41a5560bf3229241ad0e28351d7cf3745cd07425f8468f37b67d716f5812db80a7df051c929a31e767dd33d92b64a7cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c0cd71f733722e97050216117b78c3
SHA19c750c1492ae30e4db42807744f4b5c96631d1bd
SHA256c8580726d3d9a54d01468bc8e2fd4f32749609704a644bd72ab6cd2598073ead
SHA512621d1055af8a590c6d1f2620e95a42f54d4bfdb3fbdfc49a783076a35cd266ec9e7630956cf9678ba78195a816aab8e9cf1ad18f97141357ad9348b5b394cd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7829276d75690a47b30f227d130f7c5
SHA108915f5a5e103ab9b34911729d7e44057c4e99d4
SHA2562aa5e3a3366e820655da533aa0c036fe9a4742596336daf194080d784dae7118
SHA51275ddee4911feefd1f0ffb7c0ba4ce0de8e54ecc57a5628be87eb977728b9d2c215c27ac05e3805f6e47e4e73a493f84802f5acf8e97a8bfa9a3e76d37966d8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87c1ccaffa966ec67b5e85480e297dc
SHA130d3c7ddb2eea7e9838ff70e7e58119f715bc99c
SHA256451975eb53abf8489f8bba789c61669725ccd08e9ede398c2b51a0718c322071
SHA5126022d570398632e1b15a266ebc6169c95fc768852be78a971754a0e19dffcf3954d182a85075449d205eb800826441f50b6cee595e99e24714e38b0e46628eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb1471569058641c563254538a694b2
SHA168159e69d26746e960f9562316994b374b023c72
SHA25695fac1e8c71c2fb5002a1edf3e00d2add44d5b350cbfa7c2a639a7179e586626
SHA5122656a5ded211a936279ffbcf32a3f1030feb556ad78631626a1faf7fd4b3cd839d9a6f0df3d784a20bcf91da4f8342520de8f64deba667a51930ed3fe1c499ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8166a95d598af9ad834dc123680ce3c
SHA1eb44916999f770efdaff805b8efb55d933655e03
SHA256ff814f9ede0dbe95f142e864828986161636f2fe6befa7262deb62e5510827f2
SHA5124e32c6f904f4993a3a4a5af802a264cb1964d310151106d39b0e80bea4d83cc1a5fc6e5f9a3bdfcbda77c41e2c5341eb9629b6d7676d18ce18a8ebbf08bc51b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf434b262bebdce42145d05c83241f0b
SHA109bcffa95fa621328a3fca3174becba3e4d7c786
SHA256fe79d22bf3d64ec8d1851805b7d7a7f7f9fe6c0a5b67c025a23d28fbd8fe3729
SHA5124f54a86ce025decdb7f518dbb36bd0d269149b74f09393d8c2b3d31f24cca241fd91a696a682077c86aca440bd87dff5f059c21b446c6dd267836c5410c80cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f2e888518b55119c8e86645abc47607
SHA1dc1c8b7fc55969d7279f7c6a030172212f329dcb
SHA2565c8322078f25bd1d3f438c020c2e3abc432b46212a2cd1a78d8a1cb0d89810c8
SHA512f211d0f238ae2f324ed1edab777435346a53ceeb4ecc9b18d016cacd9a46f5e4e5979b7eeb79d23fa9cd6a209ffecca7400afdf4238652f24a2650c70bedaeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52102c8298ff67b4d9fb4a1a3c7b4b6e2
SHA127c966c5133dd721dfee883f9dba378ecffe678b
SHA256135207ecccbc26e14823a5f26d7c8c9b9b82fd44cbe0536432c15037155895d8
SHA512ccd3cc8c243b2cb8703c9cde1dca8505a72b029bba0815152d1555457da456cdcb2d2d15e7585f8266400c511f9185dfe91144916d9ace91d1f61ae284dd53be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121992243a1c5dbcee73f4f9210a89a8
SHA10540bc54d20ea628ed48582ca07e703abd96e019
SHA25633355d82a5a61623cfb4da0f81fc2cd86943a6d80d7a1e0eda33c45c8c54dad7
SHA5127f75681a7243da70b8fb9606f09ecdaae9997eb859b94879a88820f5b454141f99ae7b80fafeb8c9b5f0206b44d0de9230589ded72e4212b337e09dfc4ac5f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5868a8cd3d317219334f93800722b20ed
SHA1f818fa75e24c76fab08ce719e1cc0eabcbf38cf6
SHA25658b4621c1e851cc17f000a001b70373de8c8a379e5cf1c28ea39f622a418a5a4
SHA512b0a83484c6023ad99d6f4642849394200999e094d369023ee56c81b8d8db5020c70f271f88d323ded74dcfe778d003b399dc4a71510230d0c7310d0cb25b6aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c36f67d8ad91f2c5ae0307cce1e3330
SHA1c25846baea02e7e39ca7d9da8599233990f1497b
SHA256c4edb5cfc06786287c52329b12d12f548f9cd5ee3e091c18b5bce968da4732d3
SHA512631f90fdcb71287266d383c9d3bc9511fa4a0d0f25ba5d4bcf3d13f19d08af7eff5d9633bfb1db52e6a821ef4777f3f99ac6841aa7753ad11c64996379765f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c29f9d26d7b126a48da7cbf074d8e65c
SHA14027b96d66f894de3526dfa45eca7f03f8cdf091
SHA256f86daa2de858ba0d04b3181ab3ad8589e2c583f8ef896979024b6bb123f61c37
SHA512418896a04827a87c3bcf00127ca6a40dcf8866980015c89332e39e3faa503e57b2dc86e13e88e0a736504608843b37dc3bbbe05c4b8a73df0f777f5e6992415e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a