Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
681cf10bead356fc2bc6691a44bb801f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
681cf10bead356fc2bc6691a44bb801f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
681cf10bead356fc2bc6691a44bb801f_JaffaCakes118.html
-
Size
4KB
-
MD5
681cf10bead356fc2bc6691a44bb801f
-
SHA1
f262aee253d323e4e27fe28fd4ee21ce20ffeff0
-
SHA256
7f5291089f3c0716135c4881dc6266bd9ec02cf34f261e8d582ae436b5e5b478
-
SHA512
f18575fee2fff2eb2fb2a4b7be5c189dddf20d7fbe624575710376b4617119c97911fb440bf9b983103ea19ca238495f5bbd0926b6a6fc54c72097e27c5c497c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o1WqO84K:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e8197e71acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9978B21-1864-11EF-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000492cd16b36869849990416e5337f67da00000000020000000000106600000001000020000000d6e0bea6302b4fd140969c7685cbd1a38cc6ebd2a9d1e9eef12499ce77b6d08e000000000e80000000020000200000009e36eb1dddeeb8234ddc0db7b07c987430616ed4ac33a4646f5f951244c3ec9420000000853839601b63b573abed6d2884272e72656a87daed2781e25b316ddafe7b0499400000009d52b79430ef4485768790f1889ae8a6a5b12eba0fca3b95e81a302c8265723ebed855dfce846f534f615e68fb0b04ea5be7e4d33cbd5c1f271a723cccd19616 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422562477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2724 2268 iexplore.exe 28 PID 2268 wrote to memory of 2724 2268 iexplore.exe 28 PID 2268 wrote to memory of 2724 2268 iexplore.exe 28 PID 2268 wrote to memory of 2724 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\681cf10bead356fc2bc6691a44bb801f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285714c8fbbae80cbfb6a480da48ff4a
SHA1d0c8f9031ae7f7d69dd2f7a024eac020b17fc9a4
SHA256a96394ef14a52843b60613647fc46d15b948b2d5397c3a154481400438108d5d
SHA51247cc8d77a6b3d497198a1e79a797c5a959c0d4009242368fecda973206bb217ddea9bad7d138f89fbc3fa1cd9745d6acaf6a4b0c08d3e5e3198f0479956ff067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55866a259309e87c64c41b8a1b6d40b26
SHA16c2fcbc3a70d7b2b3dc08ed64f3fcda0550a0be9
SHA256af3640f2b36c34dac03a25f1cda033d4bad3211eb074a586f07c2a8582975d63
SHA512aa228724710a6a7f5cb3ffa1755523407d0bda614cd8749cc8ffe574141b503eddd7c54c87937c613ce5f08504253f8ac6d39ad547d96edf5b6cddff7280dc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f84c05163342834667ddc5f02fe268a
SHA1b838bbd6ef0acfb49e475094964b194b2388e514
SHA25624dd37c7e4a56954adc421ee323b29d031b73c6a2569bfa19ecc88b1345d0677
SHA5126a802b364fdccb8dda7019689578887c80bcebb2c5643c2286886dbf4b421e72f92645102684f46f483479213e6f3d3842555a9bbbe0200475f789201ad1fcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55642ef0aa37fb263177dc05be576c5b5
SHA1ae4f728742baeaae5fb5d10b4602aaf8d57f53d7
SHA256cdba05258c60a23652351656e90a7dd05674cd982c24777744748acf7d1ec942
SHA51201987d08a3e0b7922e2e8871b8ab37d8a54623dcc402cad49854470464c58277cc2c6a67ca2144b5aa217c28e049765494f14d184bbb6ceec19f8e3abb6902df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad23be7fe33b98dd0971fc61800d0a7c
SHA1dd0442c3bbf0273751abeb2374ff0381705d99ec
SHA2562b44b7d8d534e529768c233d6308f597cb72885d8a531175bc1f8b286785e663
SHA51221d79d2ae395df5adf3686cb51c05db5c9de7e81521bef60faf31bc08b4239e0c3ef4fe45b69e1690fed543dbe7a95189c506e89cc4e0ee19ef3b02791a710e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923379e5f86e650e64138d785ced428e
SHA17cdea1fbd5b4bc0ac1ff45849eb81e9863337f1e
SHA2565db657fb617c78a6483c809216863331df12be0478e0216b920461d912beb126
SHA512d477b8fb61ca239aa628d083179acd6af46af1a71037836a969e69604467086d8e5aafefbf7cddf601f6d229e1cf0b69c29641ed675a552ba3bf99db223b1575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae372647dec1a4f124a58b6f59536f1
SHA10af6101d0e2e91d39f76bb2ed77113ef32accd5b
SHA256a4fffc916c4d94a82b5a4e909f87c31b6e7420a18895045c3d3f00905e4983bd
SHA512aaa7c79295c421805075e517a4da01955a5f00b438f86e33a4832d5eeeb4d338a953748991cb7360a3684779a8e4123ca5f17f60559fe73afae8114f4594aebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57508ecf0e1c57fde7d7f53d2552d6d1b
SHA18a5333e45b87eb4dae3345d313dfe252ca298617
SHA256ea594d433b30b94a0c46bfa951d4a6376f93ed3d043815222ef8bfe33ae05bf0
SHA51236081d4fd7f19f302d4cdef4aec0eba9ff47124212604047e74cdbce40ec3d1e7b3e825bd24d830ee8786fa5f0597c39b62ffa908c488466e19a9f29761c1de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e2ad2d8a8907c7cf13889ac4a6a273
SHA10c44e87aa9a753ec8e0eee91d00566984607b063
SHA256a4bec901267afe527b70b8c0f5918cf4a7e78fec17e756d7035eba745070eb4d
SHA512768d7bf955264d862385c3cd7bf89f0eb0a4f961d95b58c48871f759c9a7ad79595e2998991eb2efa07192cbc471c06bd72c10424797a47a5fca4904bcc73e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb796f69bcb902ead9def1d15ea887b2
SHA140e42d309e3125ecd90ae82e7c680ef6ebe3556b
SHA256656035958f697bae02eb43e7b70fe2e53aea305cf2a555c31cebf17e1c1d1b6d
SHA512ac7863667814d97372b46e7abb0d73a7ee39bf14b815302340523a19addedeab5851259abbd0b23647ad3b5c39fd6959af228b2d779628f65532462b708267d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62e649e9be723e66ffc4b1014b03875
SHA1008ea41bef076d1594ba9b305f227db94f323c17
SHA256ff49bb42359383bd0247f51fa731c7eed53492c08590e0eb218fe54f6b4998ed
SHA512da429d492e897591a7a392da68deec8e60e1cc55168d6827f54b77f4a31f3a55d2ea02cd8fed5a6c579c22cb997cb7f1ebda984224317d4ce10f61af84bfc277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c45451a0176a212d77f5315d896adc
SHA18d5ceb02334c58b61c17dd2a8bf3ff65ab487a56
SHA256c96b6d17b22dbf57e2ab05dc76e00dee378ad0a94c6ee675a2629b39d78ab929
SHA512aa9a768b3d1845c3bc32de7faacdb559db0873c876b245d9aaffbfccaa979039f532c9276bfbbe902316191852c292f055a72216faee72203eaae6b43d49fd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ce596dfc4738d70e1adc2396031380
SHA1dec4bcb69c2a3e766f9d708d5d07e27c49d8fcae
SHA2569164103306ede41a7b616d1b79550b950fca4985624f3c1cf32bb8883387fbbb
SHA51297caa6e7acb1ceb6d0aae6724e14f35068f8e0490b02f7e8aaae87ad685dc4fd4ecb721ea677d3219e7f5a987314641a796bffcbba6d44e45e9cada77dfa4523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5973c504b02de45ace8623d626b3b5157
SHA18282c21787213745e99e0dd47cb600975ea80e4b
SHA2564be74d55cc0b9b4991f0c7326e6b77a429a06131ff41d6da7c70bef103d1fdc1
SHA51244080581778682f602b98f98ed5803eacba987bb7ccc01b2b2df56140dc1dc0774e59702cc76e0bf3b1422979591214a4387de1ba5b346405da184eb8c79a55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40cb759625b4e32a05065c0e24c036f
SHA107bb6fb8c2211c45295f9b255f186d91e7573e0f
SHA256e35e5b948cf7304aa4e8aead9edfdc24dda7dcfdc356318ae337158233c673ff
SHA512ce8346adf172f8cc05502ddb6fd94de10d2c7833b0cc68677aef92ea6c35cf8675fe6d5a3ea8e2a0abf25de2fd08a47fca80703b6755d60d8a3cd0dcbd9d7bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e8e5cf30286cda47e7f716dcf9bdac
SHA18e846ae4b8346601d18f3176c913973b703505cb
SHA25673aaad9de54b211893dbbe7707124a49f19ae3d5e3e3da0c47f9a63543b03d44
SHA5126fb81e5b46f4cd54500bb531c3a76add65b88ef47afae8d153449ae5e785aadfd349882cff45040264c9e8e652d0cce1d1daf9c1b21224acba89c22517fc5436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ecc6a33ea8113febb39c0765a2ddf1
SHA103e0c10b610e5d4c1370f287b9781b7564c98254
SHA256e6fb2023dae71fc4941a358c2dcf4dcfeb8445a3d30f78d367625902aa2fcc96
SHA51224fc5999f8cacd05a2f6b6c4b5805953e6b5425db26212661222d5186e173c75ed221daf19d6ac67c00a6a9d3a3adc0fc6758980e4cd743900dacfc0bcf82b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a9835051be79a5dce91db977d3faf4
SHA185a9852a90b6ed5569f014521ce2f05f2aab61a3
SHA256af6b998d0876721b5fb90836084fb484417779dd1832fe5f7d05a4a4c610578b
SHA512c7abff0be21e4751921f57cb98ac82829ddc0c0a79f86db27d5d5178e3afe0197f670e6d2a7c5e51c54d3f80798134858f74732bc38c984af67cedbd1952cbb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5191be36371b455c6a7272472b42f8ed6
SHA1458e0247f21245960953fe438133713b22379930
SHA25654103ab745ad3dbafca2fae0a0648c3efbab2435364871c4fc3bb8fa2faec4af
SHA512ba2f094c4dc4365d4130cd56afa4ccf8cb7020234fa81e835b6fa27cac2a5ce8bedfd54277963a5fe69116e966c7a671033018ca85432c0c13354d24ee742716
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a