Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
685661c7b51987f307fb2d7915e064b1_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
685661c7b51987f307fb2d7915e064b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
685661c7b51987f307fb2d7915e064b1_JaffaCakes118.html
-
Size
179KB
-
MD5
685661c7b51987f307fb2d7915e064b1
-
SHA1
077c38ef6546e60e250194b3af6b8a980567c7a9
-
SHA256
6ac056ff2499de5a508e91d9ce6929be407199b48c712c2048506df55447dd00
-
SHA512
0c348e7fa9aaaea1d8052378d2eb025b137f47b92c6889e02f4768a9be38926dd7c84b6bac3614ddf9a1261210ef782b663767c79b27d7b6a614f24e2427e229
-
SSDEEP
3072:byfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:+sMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00079487dacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422567540" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73FFF221-1870-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d79a3ac5b21414687c14e1fbe55765500000000020000000000106600000001000020000000274d7abe3d5e91b147c2f92104d2d349111258a65552496402e67c8b41c57b5e000000000e80000000020000200000008c9a98e8f3516db6e47ef5c276641ce4499ae7eb41af7ce8180e7e6fabdb5ae22000000050a040e3dbda642f5de110fe670cc0b68816509e8fb4be9e87fc5e3bee96f537400000003c027a0e785fb196b4cca80bfd318df9cf2135ac8cf6a3bbf818081d815e1d988e697d1b7b2b5bc872b71d7edb28d6a2d5575ee22c8342324b56d4726ba5be0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2924 iexplore.exe 2924 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2924 wrote to memory of 2112 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2112 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2112 2924 iexplore.exe IEXPLORE.EXE PID 2924 wrote to memory of 2112 2924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\685661c7b51987f307fb2d7915e064b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a9c9f6188436a5ef1acd1aa9912e62
SHA11846594902a39bc12951bcce795ba9adfffa14a1
SHA2567020b8da55bae66785482f9f2862aa13943fc40e2ea24781453389f2d83f864a
SHA5125875635219fb186db8fa061d4edcecd94df262e362f5b34a1e2afd7107823f7db54851845c3b3667921bab0e2c6ba8ccda95a8fdf292b2da5bcfa351e077d435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59603998406d26484b76bcfce05198c9e
SHA120ba488c170b31cf55286d4908eceb1ce09d8acf
SHA256a67d82882ee6ede697c30c4bc4d8cd7b213aa7769a17c1f2f5c55b255bb7d556
SHA51271349e82103f5ea9d9eeeb356b12962d72a545249c23eb507898792efa8e5e4f478704a58110343f33525e283474be37030fe9d6f8b5be5f641e52d2fb1a8e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304872dca2c67b15abaa46897fa4a08b
SHA1714aa5e8ba21a42b6899ba4907bda6304f23f320
SHA2569de34ea9ebe3abda0315d5efcb5ae45537b80bf73257beb86378bcd1140fd47b
SHA5122d177435672c3b144ed4623c6e4d36b990045b0029466bd916491906d1c1f9b183a21ceb85e5f2296bc1c5d8079cec81ce396312755b6bf50e13bf9c32a09043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6022d6f98d55935f3d0874d8241224
SHA191bc3e7d8cb0c25c9f8ab871c4c9eb00b57e689d
SHA25600881e7492ee995f2e583956d5cf07e95ede2caa96e982ba3a176a22f5e32e9a
SHA512601c69d14e1cd14d4ebb6ad9a7a2e275f37c5910795ea7e66015c1a6d32ce06bc46bdd53e2570aad9c61e5658ce9f76edf44f4c1633c6c6828e03c406697056f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a1c1a66effc79bb674911bd2185371
SHA1faf1eaeb64bb4eb1df03c8d668c3194793711750
SHA25620e39e8013ec3a4b1896ed2125b252429ead532b86aa99f29b1925206f29d451
SHA512157d20762f9ccc673ecf0fd9616bb79b56c86136c390cf2ac247053bc00861ed009f5bf9994123f48b7bc239c7afe90239354163d94868a5dac61db6465574e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0029996c7df9a45d7b630f5a0397566
SHA1cf92f10a5a3d0d560a1f8e1389f3e6709877a195
SHA2569b3cc3928b0027468213617d2cf05515f60f3101802ffd61e5c82a113d436863
SHA5123bbad2a02bfd73a139f036855b7b90ee9a9dd98c448a190f4b2c9630112bd0be0778a80fd9f925090f11c239a8fa96d40b7da7748bd22b05fd3ea8f5a7dad4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a060fe257a998bc674a513f20767fb
SHA151cb9b089458f3cf22c1ea70557632e696925a20
SHA25664047bbfeba63037b2251354c4195fedb03f12530dd58fa656bd21d9c99f6ff3
SHA5124529ebedac1913c2ddc03cbddaab9f2f6618b15cc9d053e49ecd952e92ff80a343f5176ddd2e629501604fb339b1b0239d2ef100e6e27bd6f2560a11a0074628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519e733a3a297d0a3da47d36ec885ef2
SHA1e39c322fccd0c1f276bce10875c1e5ba630ee84b
SHA2568b7b46a0d65306d0387603051c1af2bca7f77f22ca64e9ed3caf03ff14499b2b
SHA5129f625f5b7709a66789c24464681a1644a3db70bc970ff3583fc8d4165380f52c74b838e93c8b790eb83abc5b64eaa7a64e27088ec7675d1b4a03908b99b4086d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532070888920fc46071bee85b033e9f1c
SHA1de6c96477f429e67bc0ded7c9892e2ee319afbe7
SHA2560d9a1b572dd09672f13ee04c7a898a1523ee1590f62830a02767a7da21798dfb
SHA5127876dff709656b78c3a0dfd247b52b83adc4123246179f231090fd9820c7929103a5567325ad571f64c96c5fb9f258af1cfd6efa68cfa6d0906c0b936b04fdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffcf6dbef8c45744bc8072774b2ecde4
SHA1c6ad452c8af7bf86b1d2262ab2ec7d6e6fb30658
SHA2563a7fc5e805ec35e208e425c3c9755b55c96102b1936cfab10d5decb1f973e7e0
SHA512fec6ac74ce8674435a23ab999ab7ecdabe06616e6a2456a8b34569f1f889ce12a106776592734c084a136eef3b083b659b7e5b543ddf0ab24ba48f69e1dd52ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582dafef8bf1a75f58f0876606fd06fe6
SHA1ad2742256b72630efaa0d10bf163bab62a432067
SHA2564ad43ace8ee375968b01a2e0c5bcd9fa61c3758cca2973acb3d931c1cc69497f
SHA512ba23e7afab3a0f5cb3aafd5b6f111a59ba9734b16767d930bf60430171c939e68c99f2defcc52a7f6ba1662ef67eb4a9412098cacc5164fd0d95991111ff9d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c15e91a9d3c625efe10d5ebcacad99
SHA17d192a57fd72824dff656bb886d869688d137f4f
SHA25680c4e68ad3a8865db962fd02fd97983922db58e86545e7595485eb88a43bff43
SHA51200cfb35cc78e995d5ee9b42c37784917037e528ad30fc1c0fceedd3b5afd32863a13a383324e4cb68452bebb2b038bc52d675fe0f55d7d93776bf73b1f888353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0cdee7cf00570b323da930997a308a
SHA10360eba06144ce51ab9b2a0912baf282c7eeeb8c
SHA25699868bc30e51b312cf22d6ec177b7f8f3c03998784a19af30209f78c9670a2e8
SHA5121d0c4317e0ba704e503b28d27607f6615a3c96791bc8f4d6832dee13dbd2753d740436717ff0ca6630d6d84e7f5a0c1cb6ffab265e8b9e3d57167e47e7c83302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29c8ea5e0866f6d5f36a3bfc4afdfac
SHA1a4513632f76e25b05ada2ebfee696f0d2c66bf53
SHA256958118dc371eeaa8a03b13439c38e4d50146c14bac8dc48525438e489b78c11f
SHA512d57b7eb0dd378756957d0a10271f830f88c55425d1793df1e0f4aee5c0c056ba8a2db8498a70eac96aed31474e86945703a58f7bdc4527090152c0b57725d1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2c846682311de7c2bf250ace1bc9633
SHA1f0548f224a424b4a7aa3c81c0df1eb4004449b07
SHA256b12ad98925a2a868b469cddec0687b2a30588d43901148a816c265ff0ace93cc
SHA512ce795ddbfcf30a09379894904c35cba9c8a02a098591017b6ec73ce8ecbecda63044e0857db29d86475ed57f9fda7275778b8222ac7f876400248d7da162d7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862851e411d9175eee8f97844d602be2
SHA11e64943e1ceff2036bb5ca2157b63f761a2ecf33
SHA256ee439662d47fdcbfa4b47ed7767cdb50230fbaf4f4d0a1612e26385037d1fdd3
SHA5129de359c3f8a1a1ce04b7a619745f739e941ca0528a2ed40ea4ff07221e14d323e5471e24eaa735e7e80cbe498f2f35e183795b4516aaf9a0fa6cda01b6ca868e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d582c6bd179d47d7c4da0f09343b41a4
SHA137daa09f2fd1824901120bb76e3a1ec8d53d92a2
SHA25606ed36e9c3e9192c62ad77ba0f61cc9708ad7737846ccbf19d757b08d46cfe95
SHA51241a37ed473954b44f39ccca712a5c654108d4cfbe0b261bb8661319863bd76eb2043cc23e5c45998e7fc4d1afec6a225e0b1c990643321f1140828f52e36492c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54631104b1a5cf3e76ad25c2daf044416
SHA18cad30ce2ea0ebab7d6291684e44dad40cb1e549
SHA256b02eaea0c6688f83df28cb5900536c0a56a69dd6b2cf3bdefd0d68cfa6a0fe36
SHA51286cce8044a0e6edb3446aae9954db7e3cce6fa436b0c726d4c14bf123bdd0fb729180723ada051c600173ccd92faedaea14758f28494ece5d7cbd63c5869bb76
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a