Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
677cebf5ccfb2e45adce7fa179da464a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
677cebf5ccfb2e45adce7fa179da464a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
677cebf5ccfb2e45adce7fa179da464a_JaffaCakes118.html
-
Size
460KB
-
MD5
677cebf5ccfb2e45adce7fa179da464a
-
SHA1
7215360b7a56b9cc5510fcbf6fb878090116a18f
-
SHA256
deb37344b7f6aae40b68bf7d620e6a03fb41ba625957284248991009392ddfba
-
SHA512
915a45f2cead070d70d0f0ccca5dfea6828b50078ec63d3803acc32d6b09bcca624582d2cf0d0db05d8260c5bdb796361c8dfa4813ced2ed1b5ba9e5a31d7934
-
SSDEEP
6144:SxsMYod+X3oI+Y7sMYod+X3oI+YhsMYod+X3oI+YLsMYod+X3oI+YQ:q5d+X3l5d+X3/5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCB1D791-1842-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504b81a14facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422547932" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d23a5954299d0a544e596320028c94cfec2e50e0587b31ceea88daff3a564d14000000000e8000000002000020000000a22b17f6ffaca33389422950fabe10387206db6807b67e73f688ce4913d7b73b20000000cb0f5298df8e6e72469f9e7f5107897a062f72dd0eac19aae5fe9260dc23956940000000901b1ba8d7c1df75e59e86ab4d763d90b43ad017b853faf731451cdceba715b1532236ec32e818a9db1e9589134a2b98ed57011c812d45c9f1a2b786946a9d4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2836 1936 iexplore.exe 28 PID 1936 wrote to memory of 2836 1936 iexplore.exe 28 PID 1936 wrote to memory of 2836 1936 iexplore.exe 28 PID 1936 wrote to memory of 2836 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\677cebf5ccfb2e45adce7fa179da464a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5125965e759db5368c1efe047aca1d177
SHA15b414044844c58d516699450600fe4eae0d268b5
SHA256abe71ff82d2cc2ed5856899089dae2e93b4f1765c3b4ed0ee7f4e051abf2f4b9
SHA512ed76434d177cedbdcffa0e55cbe46a7a8f2532e71e9932d6b3584f76d8bcaefbb1601e0e8458875756f6a1f5022d16029b68a84dc0c2c812c677a8f9060cfc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294535d34124fec3b7e5d0ec776e18e6
SHA18f5d1c6c5e8813b35089cbfdff43cc99cb67bd74
SHA25674f398fa68a0e8cba56dd24ca248d39d643c85daba21cb395e9002379317669b
SHA5120253f0d013598aa4c0cdb818ed26416fbfccae417e9c31dd32247f4b515fe953366c94b2f44ebc64554edd6880b436a6ca346c802590fe436c61ee256a6ffcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff3fb0ee2abad28b7a499e63886dea8
SHA16b01ddcd4869dfa30ac6b0ca81c56240e1d809e7
SHA256b2bd0a2615a61f061b5509446ba004d859dce9df595a405553dbbb6ccde029ca
SHA512db809c571e48c2458276c2ffa0ce4947eb24724a531325df7b2a8640de1f003c1491e44fcb5a1a757fe6edec88f3786e6d56a33b6ab743112d2d5017340af9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505adc3b8c88ac6b7928cc9bd02033167
SHA1d608a29ad6abdaf3d47d12add8b441269e178c27
SHA25626960a93486347234b075a9a9b594daa02494363883c37ed89c12c6559e50135
SHA512ae2f0dc47a1bfedc908d6dfa9595c20ad71ec05792daadb5273516b97a354b8c97050db80c0f9ff238a38e4f478e7a853dfa59d2356a9b52291b108f2d6db66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563242a0e30eed9761886fc20c19d0aeb
SHA15429e98e6cb7327599d842a69f88b5c5be51933a
SHA256b75445963a89a247e7a9a8d07aee73b70447592b31755aaa7ab843b24cd9cf6b
SHA51231ffa3abdcd7fdba25047f43a959e8c28fbe107f3c5971f71321623a0b03de9c51ecd537e4a557905fbd7d2500e87a5c874ceebe42fbb5fe48d03c98cac69465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b3423b7af119ae64e3d47adc3e145fe
SHA179848afa891d13c74cd9177f13d96f257361dda3
SHA25627722014b56e7d0cc56163841cfbd34e46acb23e309b7740c844ffc92cf23644
SHA5121ee0cd00b6a13061c31a7c74964ac30d2e97e6419eb039349b99667cf816725976178ac2b0f27ed88949679e6dd2b9561f23b59548aab01fc10e1b0d8f322cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e02cf38d331c53248743cc7ef6e9e47
SHA14b490e54852eb101785a3358cc64e621d8d70152
SHA25664fd8bcfe6ab3cb259e942d1fbb112b8908bc16d699e0a52cd68e0bbe802dc33
SHA512435af8e6340560689da1323cc356bb148dd74fdb00fc737c490b08ebe343e56bbcde7a3e67bbcf99e9e3b3cf30894a5ec0e32b3c6d5b4e80f9d55bf314317228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57deafca72dc6c7890f50771e9e6ab171
SHA1e01f0211525a55a430e3a4905350284cb29a7aec
SHA256d59571a7ae76e4a42bc12e353a410bf244fb5bd4193d5b2428d39b67b9493a86
SHA5127ffa188b93dccdf53743f13caff819ca83104a352f05d6c620daf0f406b5cde294380ae7295b4369494fc3ff7740fa10d2a4e74a47c97557caeb8c12dbce84bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fdbfc8b7d82b19566a45bf978d0a51b
SHA1243ea5e221278040a0a848147d078e3fd6e0b0f8
SHA25691c1754480d8805c8a3cbcf69dc3e0cb1883eb353a83abc6023af723837f0f14
SHA512a224a8e3a24174c2121a0607fc205d34595df5f9126b2ba5695984677ae0b0cc405e616e01b9da073a4f6d9b5094212232479e8cc4c290725cf9e49a498464bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda153632e6481fa77f348de7fe42e01
SHA179bbe61eab7d29a1d040db0d8571dd8ea6f56a6d
SHA25607430974674c8f5978bc9187db5979cf1079a31e318d74a3297b7d613419b106
SHA512ac22e5fc34b3330e76cf2d02eb5198b779bb58236e525bb252c03488feb2c81d9c2321db20a2a0076b6a67ee67e1f7901174ce78cf4efb03b8ff54a62bacb538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f44379314b91a7969d0ccd97702dd175
SHA181a556e0df30e289d02b22853c48bac970fd7ae9
SHA2561c5836a653ac0c62ec31bc8ab00c801a137f3d9308ad76eb14e0f89a18558247
SHA512288db3f2efdd7c0eabe6fc99cc47321489025384e8f766ed0eac37ffacc9762b7f7f1621aab193d9414a8adaf128e7c8c2ca6b70de6ec91275fdf95a4556f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e514ea5287120d8cdc0020bb48e37415
SHA1b9e4318a7b374aaa95858fef2b2609b4fa207251
SHA25609973e70a400dafa1266c9219f5d18407f9563cddf7d77548d0dbfe7f93869d4
SHA512ffa55bd24c0b7108dc344d8952023cb4d0e77c5cf69ac67863669f34ad8e86da5a541fd2a90bfd98223831fe54cde8e5f4eeada3ffa3f0f3eb2d6260fcd4ef10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4fd57236ac0b9b7eb35b069144305cb
SHA183e4a3e0dec2116bfdd36324cba42d88b5164ba0
SHA2560fe5b8e027fede51778d1ebf3184815968efa020c4865dd1621670f28b49291b
SHA51210949e622e6b927655d175b7e2df9bb9b3e6e71af9f0a52ac78f58cc7646aa9078f430f181066d7fc7fe71e7ef2838b951f5ecca7a21e6abc8b72df999030e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9afbc726bc05a5b8d9e36eec2547e5c
SHA1dc68ebe18316d1ea2f6687db09a65d88a67369dc
SHA256d44648c76cd662d206e51b552625aeb26b6da0140603889b505ee7688b0ce794
SHA51205dcc34b78b7bdc9b49f89c973dcd597efe430521ba068f98394b9473f9e617b03bc8910b17eb371bb9c5b98419472c288cca1b1f4144f3a957aa20dac492448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae7b0244656eccad2612dbc6a94ec66
SHA1ef5ba33a29f7945bae0356efbb82e20c9b741fe2
SHA256c66fd43723d6c8440324e07b23d55b132d0120bf52016f8d16417ffc2f6c8cac
SHA5121a732ee663cd5905729b5e86d4a75e2e2dd7606e5d33a929548737f5c85ec9a2914602dffd49aa38378ce52f3e181a6c0ab0f1d098ce375bc30e4c8cd3abe31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5993a32e8e37d2d20a6365e9c64599760
SHA18052d269a7167df56c11f16429dd5fc0ef1f68f1
SHA2569059d206a064410d9280aec80c39bd353ecd915515b946867007e630f448ca09
SHA512fcf095b2bbd101334283ea970f99920864d6eef7ebfe3228d49cb7a6f99d62bbaf44fa978eea202aeb7f35ebfaed41330a50a34c48bf59ff3fca22743680cdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521bb79b902c180d28c574ca4bfbf496a
SHA1c48e1404e64280c36272fd4c6338457e35f23a37
SHA256c26eac6a5d27f33fb01dfb271915c6480e01b06c30422bcc5a423d8337153ecc
SHA5125bedac118afcfcfb42e9da82ce57345fb15aa5f488a4cd061408e40dd06f6acc6190a22656d2727c573e68f07a25652dbb2e8853a6e2c9d545337c7f39bdb4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55280cfe91cc01c650085dcd686e283ed
SHA1e656f0be917e096fdfc337f23a673c0794f69230
SHA256bcf66ad300836058267d60deb09b868b0fd619d34828deebfa7b91cf0f00cf91
SHA512654687f6890619bbdcbacc0689002b6d53d286517d576f857637981fc59ad94a49d1e736c932cb7c7221d16cf919c1f5790f35a1e0d00d0e583c892ced452b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5181d42d236c1d81b3bccbaf7f99b97c8
SHA1890ffd39991cbe7777e6772035839834af6eba1a
SHA256437731585d5cc83c99cbe0b3315aa8a586e51295965f7fc76cf4e365305ecd0d
SHA5125ac71752704b5de58d7f574aef6376080fa6f530654154649a9407645ecdf54889d3a8e160050709912e6ed46df009ef6987ff14a3e32645ef875430e08ab9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85578e86720b47bb7f8f8e29d06a4f2
SHA10eec7f553e32207eaabedc86404da0cfd44c2f28
SHA256ba4c6bdf98a39ded9d8f57837cfda9002f28e7aad32a99e88d2c6a33b052834e
SHA5128429464565f2f7ca615948ad8ab25323298ab5e1fd4b137a527835240448b4c49b377272d839c07eca15f8b56539021064c51f230ecc261ead4d65cdb5725546
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a