Analysis
-
max time kernel
143s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
66d592367963fa46f0c2828925153055_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
66d592367963fa46f0c2828925153055_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66d592367963fa46f0c2828925153055_JaffaCakes118.html
-
Size
139KB
-
MD5
66d592367963fa46f0c2828925153055
-
SHA1
a4e831f1024b78aa24a771fd9ba186bd6f0a29a0
-
SHA256
4bb6d94a6893fd63d1d1ca6386600f5ef2addc5d653c2820ff999dfae39177b7
-
SHA512
27ffaa602777e9aefa4f01d7829889b297a91a86a570932b5ab02fa0842dc0b5fc4c558a9880fe2bb1a511427b6553f03841cf47cac6b7d55c938785d56fe9ff
-
SSDEEP
1536:S6dNrSys0N0PSRlHdzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:S6dBKEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000088441c9c6d067c4da51911962a8c0a1a00000000020000000000106600000001000020000000042bf0bde0b8e2359368de6ebc4f23cdc7898cc78d9f32734de7c8b5f622f00f000000000e8000000002000020000000f016f0759434b2c63fba84b1194816444f4599f83d36bec54b1a3fa1f6c0c55920000000f847c4f501f17e733c764cfb6dfd884833a3c4d70c7ac4a5875957c5e05fc5a44000000008890d6cd721abdda39811065883210091f964b7bc7e76c34080eb0850d2989ac7f07d6b38b8b161b4046c6fefec8df8acac5869b43dc08b980ad0ee7623c797 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E12E1851-181F-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107da6f82cacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422532935" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2824 iexplore.exe 2824 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2824 wrote to memory of 1504 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 1504 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 1504 2824 iexplore.exe IEXPLORE.EXE PID 2824 wrote to memory of 1504 2824 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66d592367963fa46f0c2828925153055_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e441f8f1ffd3e180ae25ce3858700f5b
SHA117052ba6f3c1e0bbe9648e77e62482199f4ecee3
SHA256228efc3045ff8156e048e7ab2f6dd335e188beee6e6aee26ce1d76b306836bf3
SHA512c348f465846c4c7c77a5ae969e32f6771ca40eb2676cecc425584789ef2ebe356a0e5747371248985cf3ff8dfd6f60852e3eb92572bcaaecd3bd771accf3f57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53762087ac8f3871e49e0eef879c2de76
SHA1885e98696f5e50495838033e820e0c2ce5c4e6fe
SHA256a23812a1336abbb5482620994d66ba1a4e17b1c060fe33ad4364516bd6b8a80f
SHA5123c9e543992584b4d800a19ea397689560fb6ed6bff8bd1f927eee5ab9950504cdd39019f7623fd90bfc2e864f5530155e610d792d2d030e65c7b7f46813564bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91338816c81ecce0744614f68d7d33e
SHA13c624520877c3007c49cf862ba1923c90a590ef2
SHA2561006d49d2423ad7616b55157cc1ef07107f41497a8f378b7e1acf3b1673d84d1
SHA512d5e89db1586ec83d9a9e22a7a948ae79415fb0db7d251a0120e6d33ec066d5662b0dc8504b8ea0d81d7ef628ce5be7edb2987c294bafb1dc5fb0c01fbfc68346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a1571a3899d8aa6c6422640115c154
SHA1c20098c1225d00f5eea7e925ceb64b3f289fc24b
SHA256f84e9c4b75c911ddeb269c5a4afbb0df0e23f63dca556312be951d2ce9a0fa37
SHA512a11fd53ec71536deb58c10fe6d2719c38d421d8f9fcb85a2bd3977ab56f9895e4ac82f7f61a36c0d15e48caf27bac5694800c10b2c7f3c8615cf97a32822918e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5308f45f96c4fa03a05a6c77da4994c68
SHA1e3c53d7a4f379c0a493c96f80100719cff755432
SHA25654eae2cbacb25ae0f7e96ab29f21beb541320ad748ba2dd9e7480cbf3ddd0714
SHA5124163457f603c472d8103b4e1f0e8a17bcdca5f48abc625b015de0bf132c3c0f3ad43275256a44a97d6a391f34470edce000f367cb36b2690374b17b92be39f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5e9a600aaf9e56bdfb7ab712fc0513
SHA1440c84e322f986e5b986591f842aa17f8af930ce
SHA256b4248838752bfa39a55465b4149f96ec957a09a7cec2fab29b9062dded5502ee
SHA5127c79f055a2adeb1e44d3f0de39b507967d34f2ad50e8fb34d39900bc9d92607f1f612a953f677f777825a3b6f065b4d74561d11637f8f6a4d592aa185f51ce01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534057902186a7b06401c5830bb723f3a
SHA1593feb3d0210dffef644ceb39f2faa2688d8657c
SHA25636141ac67aa860970701b7446b6dbbbde18ed60597b675d53da33c9aa3635b1f
SHA51251b7f261a09afe8dfc88025a2c450f5209db199809efd7c33cdbb3e3ee028e567466cae9983e5680c180c104cd870ec03eee555c475a02169abc3bfc166e94d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5350ad660f89ef096983c0926f0f9434c
SHA1deb2b46c90efdf7e1feddae0170a54fac561f1f1
SHA256f84cb533a7b8399b190a63c3b8d55438f24eac45c1f55799b1770a6e9d34d973
SHA512f8caa896c2d452b5f1ee3201050d628c9ff1f34e97f0f7fb99b189452660c104b41a8fedc6fb23a081d761cd57978db2966a8c6b15ff4fd6b8b0535e13dbc1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015c6e2c0901c2435b542b5b32261e0b
SHA133c632efa21e1b45df7cf10e83e436b3473ce727
SHA2569a10e987b0c6c6d03fd9f8a812d9a296b26a0d34c72c41024ef23612360de8ed
SHA5126eeeafa374c24061821ae6bc977175dbc9bf91681579fdf6749d3b8200262cfb834363fab14bebf0df4fab89c243ad292db7468a29ab79acc9c2dc545e7c50b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57838fc176822618f9958d894e3ccd778
SHA173b1802ec5bfdfa41c9c548b24ac26abd15d3aba
SHA256b618a51e5871c9fd8bf1aac97fb71d1b75bf2ca6461eb9a03dee73816b3f241c
SHA51209d31742ae572f417e62dc876ec03233ee884635ee0bef3778e6947aa1831c0cde0b89bd82e5f478d5835ae8e16d50b7cfad2fb4cadfa7aca3c0d9675fccc740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d0ded2e6c3e634525488e924d3766e
SHA1cf2d9cd25efa26c4ff11768b42c166286e4b46b8
SHA2560ef54a8d393c5735ea2290da6279be560da773c3191abc13695855665526577b
SHA512b3c73239112c2d68723c89a106d23c318435ba0a8e8407a6f0695b8eacb33a9bd4fe2068b3e97ef88637cf4cf20bd845469284de0d9e6860af36aa7af053b7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478ffb7eaf4021250bab2e872b0b7b5d
SHA18f539dbbaf4bdef75f71a0fc12f1060ed49b0837
SHA256e93e1e78dd0e976de9d407e58062f4e91eae333860d6e76cb06eb64e9517e300
SHA51237665af0120f4c72d679b1bfa09c5f8bb6accafc23a9a32e432418ce801c0e4c672df0976213af88cd1e2efb4493d88e9cf47efbf6fa041c79771cf99d865efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe9e2e110c7a925358fba2b15641b85f
SHA1519bbbb821c02ccf18fbdc1bd9dc57dd7ae3be08
SHA2566abe21db4f400c3bcea75f57b920d9d5bf903775c382ac07ef45a7584f9bbe44
SHA5122fed8e00cd124251f3721bfc913e677d702a22d18b39ec5969e1caf09e268712193a924951e39a90e4fd8cc70aa7cfe4e729905a8145268f2606f9f11c3d4d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acdad75553fe9a29ef6ac9e60f24cb90
SHA12374b98ed06a1957fa70715b5d47446d29dfa774
SHA2568962825a1d678cfa9f78b17b85b72ae3386f41d11668af23bad8d76fe954fce2
SHA5121ef53129ac4bbab84ed4c15f6bdd320060cab985b3748520450fe109074e1590b022f54f3428651f505738a4f131dec83fae4782cf6f897b2ca9b80391817644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7efac73687db9ab05313bb050106c9
SHA19c069591775a37dfdae53414f6682063a0fb0ffd
SHA256d65c153a886d715054e57ab174f100431bb3354d3201c6bb9ff8be05c536ad86
SHA51234f896511eeddfe606487800a878a396677d4644e10177731fe946c9f18b84667446ccbde84c76013a4b58843b0f918e6fe929072c1e5e63339e9c805b546732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582be0ad651f1b7958c345000e417c485
SHA172591b7d15da40edb39f166a8ffb0da421242e45
SHA2567a7236b21393deb602dc23cbd8c529f45651687f08f51f0da3eeedb6df30fc1d
SHA5125a2d0d329e1c10f42e405b7fb590e55720f84733f4fada980612ca7d84e4fd2a5c20d4569f58913429de220bd5a19af3191aac6d36531f60541bb0645316b18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537088ee8264257573ed7ffdcdac37e7b
SHA142fcd45718416d1cadfd7f58f84b11f155046791
SHA2560a27e11287cc68284a21f6198561eac87b67e47d2c0332fb8b7f67ed4ef6e573
SHA5120a8e439f7ed784857d7f104414bc59d18c99a360ff71eb997b136df4c0441efbb9d529418c6e22584285e79df3914c000adca86d4cb9ba6a7cb4124492e52dc4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a