Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
663d967e8a2d1c6c2cee24b269c54a23_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
663d967e8a2d1c6c2cee24b269c54a23_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
663d967e8a2d1c6c2cee24b269c54a23_JaffaCakes118.html
-
Size
460KB
-
MD5
663d967e8a2d1c6c2cee24b269c54a23
-
SHA1
89d3e9463cb92beb019cef90ffa1dd2e71545a1b
-
SHA256
85c92bc7aedec1505ebadeb5382117f513b1052489c1f637b1f65c3ca5895073
-
SHA512
dce926722d9e9758f82224712554f019991e447eafe3d5efc0e5138a416dd81a49320bac5c4cc40ee332e989b3b65a9d98b0d141cd81127b8ace7360f32a1d0e
-
SSDEEP
6144:SQsMYod+X3oI+YpsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3H5d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bb20640dacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422519477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e6b8db7a6322f8428edac71a8b0378f200000000020000000000106600000001000020000000508167415d38471bc5f2793b5f38a55b33db0783333f3d132addb9eb38a5e8df000000000e8000000002000020000000f0acbc27980e4e174b37ef884cddf6d9e79e1f83fd07f7a64c7d22cd7a52e21c200000008cb7ff9a7257f3fbe0ec4f8c976cf75aa69b8076464682bdb017ea70a743c8b94000000000ae7aa58c69b72026db70d4bd6b45b755e49b58375912ead2e22b481d1d423d3cf2d5547d5206fe0efcc7d644152df1ff64850178312072e0a20e57a7e9d0a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B988D41-1800-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\663d967e8a2d1c6c2cee24b269c54a23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8d728c0cef8b7121c4a493495be968
SHA1d1d91d6fe43dc607d090aec451ce6b896be489da
SHA25650807c02f95514afd8953c1aa4699457286465ae1be184659fcc9b642ca3309d
SHA512947343268adcdb6a4e04c80da4eb4b9f777b50756ecadf8cc615713d9721ab03b2f3747ec7d63fe2b7f2d63096aee1df5f955dbb3b92221f4920b823ca78daf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd57b8ba9f4fb94bdcef4daa91bf9f96
SHA14529b591d31d53044fe6e4ed4dc096dbf00d0e42
SHA256ca69eb660a136c293cbe0d1c9ade34930261088d4de02f4906ef314810e93be0
SHA512367921d6153ff4861947a1e9eabee540b7156dd13978528a76969796c6275147b85f835fc1b7f36a6ae759393064ae27a8a62ed0a8fac16f2ea571d6d7b5f307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6e72e0a234ae3fc5cac05d7beebda0
SHA12a8a8c90fb2d519db76f98871b78d08cf05b9925
SHA2561fbe01fe02a3d44edaa0f039c486fcc44d052663b4c452285d46159e97bf9cb0
SHA5129fd4449c78fb5c7be8d69d4f094a266186ebaf91845ff82cbae47e49a38d414d3030189dbdd7b9d297a06837933394f35c97729b585e449a1a068987f87f50e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5846f5b6b7cc194315706b2052e1b8
SHA1ad94ce44c0be6c3d3b2ae388835d1cc6cbe852a1
SHA256dd43e9252e777501a6237422367dd7a4373facd67f4060a212daa60d8339e60b
SHA51276b897b7b3a8b713c69a8019e3b584c80ae4404eec7895e43d8503ec467950a96825ac07e3f8e54062f4c7aae02d0225d990f2b45c84707ecc3f237f175eb515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b5cc8a359176e1268cc2ad3f761482f
SHA1715dab379f80cc07f4a427a94501cc6fc7ff1d41
SHA256c8e7f9fb3a440888afacb12e0dab9f37ca6ef123aa2c14522bcbce9871b0e110
SHA5123502f1c23f176bab927d7f60d9780541ccf9fd72a47dce2e00396ababce4fa293b1d81b5183c21632aab3d0893f53c2c9dc7184d237dccd3b009ad9d7f1b2dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b73ebbb72ad46e973468d3ab69c4802
SHA14676e42a7885d796d24435864fc605ca209a1869
SHA256394a79afcad0d155a23761d4da657ad10df389eda5618287c0469ddea41e0a91
SHA5122f4bc60554d861cf80ff34f0be93b205992e1451cbeade7ba42d4bf5a1c8b3ff1d6aaedddbf22586009b358ce31288eb995b782880abcce015e60ab59c63060c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b5ce6873e469708a113fdb2e696949
SHA13e6c4a9b1595dc5d6e8d635fb98919bdb433645c
SHA2565d2f345996f36dcdcb99ebb60acf3408383ca86f5bc224c2fcf0c4aa47f8a727
SHA512bdf635dd7c442bd076beca2c1df28a32eb74d4ef739786b3f377a5011975cd3a399d8bf5af53a17b3603016ae437edb04f7f2d4613e7627887e2b3064f341286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5806e41289d07cc483a37ab5103809435
SHA1a3aafa496247dc7d65768bbfb590db81169d2c28
SHA256a4c6456f1224beda44666a4fe4bc1a153d63804fff9dacd2697b9fc76a2f1114
SHA51270337d26a51f487af3e42aefebee26c29e43d78cd7dc4bf3e758285da1acf3dc8d6f7d0a5a45675e4adbf1db5d242a9f2c1172933693d62caae53798ea2d96da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426a1dcf881192ec932ceefbd70d86c2
SHA1800974af6797415477baa7e82d21c0113a233e89
SHA25656764179f6f6d1c9a0ad5bdb0cba15f83e6c0323dfbf8a9376681c3109ae430d
SHA512d021c15fd8cb225c0b09dee89b9753c78ba54551369bf859aaec898b515f7c4f6155bbb28921ec59d772d87b28e7437d2d091279096abd8a57426fa07e194f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52620ab8cfceccbed72629deee7f630f8
SHA1facf453e4a8be5769a23a9b29f1398b136ddd8e2
SHA256a474f40d9016ac6c11005642fe4bf57ae32157de81cc83e82ee2c591662b3cbb
SHA512603d3816130d9720dbe626768bae4e22d638003ed77d75073c5a9a2ee40c428dc08de50692d42cf5a1b8153bcc54fe6296d31ccfee1371ff9ad52f9370bd4ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d821c2aadd917b98809a25781b10c8
SHA1cca328eaef717b4068fcdab2d001d4ee644af332
SHA256409379dd3566fe5765f3a4534b1221f3d28d70ef2b0915ba23f6c26b91acebda
SHA5121ae861db1d8cf1bbbb388d5294f15db12a57db3e699880cbb0530c40008922599e6f3db747619a38fff6ac4c89079f4fdff0c4e9063a661bca0a489f2667745a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4b41377c9651336e92e5420b26d94d6
SHA159b999352663e751573a90ad99af3b415c19d365
SHA25631531f9acd22e4d64ae0e0eff6e1948db3af51b765be6a1e86a67c7d54576e8c
SHA5122acdf81d82f3fc4df9c4c340ced7e80ff3fa343c821e1e85d95662173ebaf18b4ed28df87cdf6c2bc53bed813ad522a0da99f631ee80b848e813560b05961a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565173f2c491a457eb891d67e7706cac1
SHA1e9bfb73d9d28e07d09e779bb45fa236da110ff2d
SHA256b79b344e79c9c30e2ecdb9757f51ead38b086f6a0eab3a5d4ccd5f373a43fc06
SHA5125c046f52b9cf84393a5c26d05135f95c44136989be6e259ebbc778d64215784ddb19c6a817412a329bcbdc213ea7782b1df55988b31ec960adee59effb2dc63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b2c3c452c9f4826c901f579b9b10a1
SHA1d52c387fb23e027a56c57892b3472d537f76b708
SHA256e9f4206961dea28b4ec9b99be7090c4310d0b7ed75a63c1a3f88d239deb8d350
SHA512fecd8261d24057b0f9d1924d100549ccd502ef788e2ace3e620af6bc990e80662fa25241a00c54f8bc4289786ed40336a349074e88d4c29a0c2ec9c285986eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cf8e43b03dea01ec2e5a087213592ff
SHA12f0ffbe8c43e1f2db2a8504f20ba2540c03a27f5
SHA256294c3442e22b182e1d9413173d6c1f0210506c4f822c5480680b4f6b57d3bb36
SHA5126ae949eb2ffa098d2ba19372dbeab95bb9e8bcb3a088e6b106f4697cbae16756df581187d779727fea30a1f83b9d82cc6914681bfd2a29341ebf5454a01e3939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579edc27592d72c18e01ebdfa7feba972
SHA1cb9604b227362671cc802f1d205a255c0ba207b8
SHA2563e875c20d65cfebe02144c99ca1da059f5d21cdf68b1de4bd67883a6538fb80e
SHA512ab9f74722d0de40d5e6143179bf7c68e7e0ab977bed9d78c47e05a42073877b83414b4612dcce3aa147bcdf546da9f3c75c781a2997b1e78e77cfe3facfc8555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ff8719d11d0e3ed985a997eae3a5ba
SHA15978da0f70589abc51ee18c4099fb1cc55f4fd76
SHA2568a90d8c9bff102c6425e8818813d24493593f122309f3f0a8dcae70b46a95c45
SHA512e463e93ee25343b38fa1cf52fc52a8230a690302171ae7063215706fc26213c593faee936a4f834f58e24844c0f2d67adc1c37044e3b772336f40f7a0dce42af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51083c3e6221638ce9e90e08e7a8d2f02
SHA1114c130dca1284daef373fcfe6722b1b7ec2bd97
SHA256121194c80fc9a0d026b465983d4d1886b516c263c2f7067643b052cb97a56896
SHA5123589a241c1d651a6b4c956fa554624a7c77ce0ae4c2f422f2caf53f7ed24c8eed2f5d133006b688a58bc025ee073665fdad193d9d60191cbd8740540eed93307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c640237ffbf0a7decdee6948c7d6ff
SHA19e86ffc87d7ea8153de4b0d29e5814663ccb7e8f
SHA256d8c9a6b052c974dd042992e4b92d765c71e0cd160e87fac00712c62a6156280b
SHA5123e69cb6d890a3013b0fb2bdd1b8c27cdfccfde91d58df0e994784ccae65d0025165f2ba8543398fdc1b207d3c63a923730f35b423ac9ac74881cc78c3a8d4083
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a