Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
659f4784510dda10f72cb19562521a7a_JaffaCakes118.html
-
Size
460KB
-
MD5
659f4784510dda10f72cb19562521a7a
-
SHA1
a621705f2643b97df5a1ef27143857262c37980f
-
SHA256
95666e422c91bbc0bf3a32b9c35a22d60a77b7f0d084f38bf9adde86a5a1b599
-
SHA512
af16d187fc1957a71ac12518b3698e67e40d5fede242ca1b50c874f79ad71fc0a0d2de0aa021ccc52a725fef3597f8ef7ccb7e10687d30b1e3bd624aa35f0979
-
SSDEEP
6144:SSsMYod+X3oI+YQsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3Q5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422505171" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D2A5101-17DF-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005571463a138ed8e583029a1c5a6a5bd45c89d711e1854c0fa570269bb0ef9156000000000e8000000002000020000000a8a09e86a39484032764b38be4708ee41dfe7519b4416658dcc3fb22752eb22d200000002f01e1336e1459424d2f34a411c31e7c858d90a2ffa433b24fa7a22a8f4579d740000000c39ad80aa5e2bf0ceeeae5a3ee20feee5d1108454bce7860de8fec48b080db4d013c815b96d78d6e06b4ff7a44f8d04827f3b5137485f7d002489c3a4e307c8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6095ad15ecabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1936 iexplore.exe 1936 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1936 wrote to memory of 1296 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1296 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1296 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1296 1936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\659f4784510dda10f72cb19562521a7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995052937772fd06979a1303ab42f9d5
SHA1049a7323ba147341a8be044ece2a06c97e7bb72f
SHA2569513a22704c203c7cdd7d038224dafed367de6153771b1ae3330966219586e7b
SHA512bc61a76959b13a23cb7ce35e6509030955f1df5646e6627e3babe1931d48c18fac0528aac7c82515a986fe78b0fb85ccf48b521d67ecca0b8195375525c12620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5bcdd2eeffbeab58cc067f70f92a525
SHA15157ce358a4e7a5b04ff0dfe13022c0ef86f1525
SHA2560d31d8effa70bd0da167ec39b3506d2b7b759f86b5f2954e7ff5aaa5eb304762
SHA512adc7245e643344e488f45bb55766f7cc994543ba23034fcae279683303e2a2065b35239b035ff2358e6330bc994fb59f562fe074b840628694b97fecd5388e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b6e224f29e04cb315c791ec769f9e2
SHA17f59f1c7f2683f415d0f2336fc6fd6b1820bd247
SHA2569d5ffd2514a74c4076e8ad05efc6584de42e57fcdf7cba45cc53b7170d894a23
SHA51205999773dbd10e2be1b681ddd01c54a16aeb268707a752c08bc83b4cd22dbffe8e3c0c5cd1dfa0568e4471d3a10ac09f6db4c4608c01a7636bdde6e67f293345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58616837fba7afad02c122535af96d249
SHA152ad6ebc2e48aba79fea5903bb8ebea3f92843b3
SHA25668e4aa9e5338cfb96f22ba0ca3281d971b2b204d5c613e23c945cddbcc3917b4
SHA512b37b581a90275f852e2fa5e0d3a48f106a8ee77901e7d85a36667cf9f077295f9a923488f048cf4a7e9fd5d838beab1a4c6e55fd047a6b45f371a6499fa72b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0872070b211b81bfd92e8fb29e24fd
SHA1e5108a2756ffcd4c29cd855c37a9079bf45a94d6
SHA25630141e3af0614d404c2a154a997660acd9880b2dd68eaa04fe91128804457e04
SHA5121dbc33623ed726179a14973dbcaebf0856396f96c4f7abaafc3eccb28d10fcbd9ce2c27b459f9594e781022291bd6a57dc306657bfde0d895a4fc3237b057a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb2a81896dca7693d738b9b43e4528c
SHA154789db3b1f61a69e67e77ae12039f5577769100
SHA256c8d64ee0e98c22dae04ded63e486e4d59ce8e92321df4801a21c148d125366ba
SHA512dff39971be50f5a383d21740a2971f3d2c08e4289b9e610e872f66eb38dd21a8bf2290ed556880c80abb5afac781e0a2c563d845472ba3f01f5390bea88f2e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380bf50f021f1653b147d25c0172b23f
SHA1591722fe4bcaa74bb43d797acfe612dbbcfbb832
SHA25639723d2e062cf5ceff216c84091caed28036096a8e2f4dbf6efe8fa17696f667
SHA512b0bcd3df8bea8e6418b775100d5ab1b82d44e0d72f4c38c3776e243aa0695d5ae8325b5a80b14b74a517f5d3e06c24903e796f6f3f7f35b58e3a669bb6db6bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3b2fabf2add11b85fcf3c3e7500480a
SHA1b3036f7b9758f1eb30ddc3d69a639c83667a2734
SHA25670e769f74ac3fa81e2fb0dbd1f2cb03192f738ff215d2c2c640e319df3d03eaa
SHA512f571edac2f61070322283490b19cd151958484af03bfa02b6ccd982a19da8f609bdadf784ccded0c7072cc2f1c7b7a5aa6967efa7d493eb0abd85faaf0d4a4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557038332dad01b1694e814cc20cd2b6e
SHA1eb20b16ad0f334101a6c2147791b413fb1392706
SHA256c6a7d97d1d7966f6843644bd13d4ed8174606657f3d7c99caf7b9e9cb92cf85d
SHA512fc67d9c1f6730f95f7bb800ba07b4fe90e650af55ad84ab5d26113efaacb3a57bb625278af2390cfca42ce6ffe6662a3217e3262724af02a6e1604f82afb4c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb4f0adda969fa8557e3170933fea3c4
SHA14e4fc6779534eab2ef330a8e41adbdaf02232101
SHA25699c98bfc588b2684ca2e474d4b9b143ccb656d7659e42387ae8ea60f4db9d150
SHA512b84339f2c0ee16aef2211026a91cd171ac746993b9c760b18ea8dad430b2eed5a301ae85f5d2a83e6396ea2b9eeca63986c42409aac4851817b891fe902a83c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e9fd313a963b8d660758f34186df6d
SHA12f006362f30c0a9edfc2e5a2db9831e877135271
SHA256cfa33c52cd2198845bf18a6935a977abd29ecc58bc7290868441a878a64b7133
SHA51283b14a2d90802e6cc25ef0b5645cf0d0aa8cadea269f084c7d18cffe785c17ab1d7532218e715de611d9d1f0c8618b9b12793ec98c801292a78995e406b10f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b74b46485b956385a30d28baec20ad
SHA12bde3cf3b783154d21f3429503864854bb07ba32
SHA256a39200b2fa8da794354841af30c362e089254cbfbbe845345790d1c437a0bbc8
SHA5125457f67cde328b2ebfa3a41085fa204dcb455c207c617b46f087a46d1a60f927360692b053cf17dfd2065f170e4e5cf75913f653b3e9d06355be33d296c3fcf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512efdf7163ecb468dad3585ecd23f8e9
SHA1291a04260fd9e8a672211f71e99de013fc49717b
SHA256e0abac65c5eb9e510f4b3a5c29382a5c45ced1d9c19bf28c94fbcdc041197059
SHA5124d71aa2b20a4dbbfbbe6a177458be813764f26a5cc4ad1ac5c7c624d5c0a52b365f5d113ef725a3e41e0ed3df16db9d95217936c7de161b5f1c0e8a6a5b74e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f858f55d6ae22517fc1afa4bde68ce8
SHA1f4c7f3bb07950d339cc5e413ad1bb4ae3b5b4d9c
SHA256d018fddde17652ae4c2c3b60c2d017cdd518782ff78f736d3777b262f3345782
SHA5120424a7af0a62b8dd1f256ef19168a22b013f788f60bfa13b0d7e7717610b6aa1673e117b59c2f564ea6104745b2cb9696eae9af9f6e8e1966e2146a4cfc0ecef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6b8764faf3395448860d62fd5d9860
SHA1aa201f19663b150e17e3b4e72b3780c30d5151c4
SHA2567c81732f98fac111178cb0ab7cd622dd251d3e8eb74ca4a1bbcf8f31af33ca16
SHA51220a0746d7f113338707acf43f124841f020c47645923d057c9ec41332787a6d84fe6888d33815f697207557ac6a4e8c95568b296b8b2ce5d25f217aff6ada5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f5d12d6970c1d9d20c10ef0af5691a
SHA1a930e757b82e81416c91baf45c6800ede87b40e0
SHA256157c557f0a474767fc59fdb581776d66ec492754f00bdaca8c5eb9844f73da33
SHA5121ee29ecfda7ac1056740e6b70297f711be8206ded259b285a853d6f92a425de56a25cc67dbe0e0d791d9432d10183895f4f477a7637513af4a4baf575bd7288e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba9f50ba592d4ab2561625771e03dff7
SHA1a94bf777b2a8c294d3f2dd38423b7d1150c644d6
SHA2564e6cf7ad98b63abf16a36deda64eb408718aa1d8cc715db06fda477316641cdd
SHA51255d1f3c8f44e020fcf854de281d0e2a45240d612780813a1f0f2e6404919a6f37c1a54ff2bd4a442b83118483f4870370cd60fe9314183cfa983eb3a381e0ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574fc2e443cd9913e662764176cece782
SHA1186210578f2fd941a7f919e2239ad9222c22739a
SHA256333102f5ff3be319565eab4f383c211da893ec1ab7e7f355535ad73b5121db71
SHA51270394dd817042e0f11c54482615556be379653e86129733dbfd86bca6af68d34b393fc5851c7ff9ef91f2ba313b499e7fce77be1ca996a236cd50b6ff8b4944c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cf0a4f36bcf98aa3fa88c64385c023
SHA149e6b831da1965f099b80910a8d3da612d330ca7
SHA25698848ad3c547fddae640dc7702a9449f8ac61570119139cbe8bf056894b22aaa
SHA5129858001bf8e00bfbffbaf36db82c68b927cffd2cbde3adb66a51d3705bdb1595887d97681e7a1f40a92242ff3b31c325532a4c61eab0d7c13fa5ae29cce2eaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca660b7dd6506caf3f911f50a256eaa
SHA15f01783eb68ea356ca1e5570d4a4aaa661758912
SHA256098aeffb002556728efd7afc9c834b7cbede73b53eee532524b4a6039baaab02
SHA5125e16ac5c10b8f54e44ec4cc35f124ea93e3d049a6aae62984a39be99c174dd047584f7033d879dbeb026df5850ee1641a19b37c642e7f4ead129ac5f9583462b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a