Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
685ab761ef6d68b4384b522c001dd9fc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
685ab761ef6d68b4384b522c001dd9fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
685ab761ef6d68b4384b522c001dd9fc_JaffaCakes118.html
-
Size
4KB
-
MD5
685ab761ef6d68b4384b522c001dd9fc
-
SHA1
9ba913c673c3726a463c0e7f5795791640317037
-
SHA256
e2471b0f6686dcbbece8c48c39a64c33568bd8ff99be1393bba9b63a3c88c29f
-
SHA512
59f4f0ee07c5fc362751407f92ca9945cd7e2a22fae347faf62721527027d6d4b69f4113c5e68ca52c0963a7cad54134618997796b6b53a1bddc94be52cdb037
-
SSDEEP
96:ziE5CmV4MSEPBDvV0n47ej/hgOKiljTR1QnynePh3NYJRsVR:ziYdV4GD8/h/KiZ7Qn/P5OUVR
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204565107eacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422567906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D90A1B1-1871-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000023965eeace21d9ca3074f661430fe3921eb3e3220f725c4a405c738083293f80000000000e8000000002000020000000b39e05b8292f1c84595e40076d2726fb95ed6beda9607dc08f2f1e7dc04a719f20000000789b516cd3f0cafe20a40854d88aee0be26198d170b40c72b412877755d7316e4000000065d97d52844563cbc88fbb11a64b5a95abdc78368e690fc696688ff5ad09c896465dca02657158b1250a9319c4ba76f82f0da3bbf3bfaeff5e68737a56621e0a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1612 iexplore.exe 1612 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\685ab761ef6d68b4384b522c001dd9fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11d51b658c6ebd0f84f07070278c623
SHA149d957ba074418eaf62bf2a8ac799b5afdd357b2
SHA2565897a94dfda484b8a184d76ff98452a6fc5d2b04ea68088e5af73a822b9ca978
SHA51214bad5bfcafd26c5ac3c2bfd0db63f86f1cdfb0e83ce5b76fb45800d32bdcdb79ae8ae42a983420ddfb8c37ffaefa256cfbead56abf5294c219b5f5ea530995d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd8c9f3a418d7e3347307d8ca30da5a
SHA115fd8254bd66cf52c74e40a5991a4e75efc0d327
SHA25663a546d6828abe6e838e997bb79579f667f4bf629f220650e5a12379cf91a3d5
SHA512ce2d8e06a84ef219e49d0cc7d1f04aa45cda1843c613a2d681c972421f0411cb187a86ee329e12038f62b99ee2162a0180ea5172122bfa0f544582209ebce719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ba51e35b8e91bc770953f6d0489f7d
SHA190c21f8a44200aded19074adc5f9cd5c30c990b5
SHA256097efa72bd54bebb6ae2341810e2dbf5ac627140aaf85bd662871463bb474e17
SHA5126074a2769016912419eac9a921d74e2142488d2f60f4111613066dd392d83332cc28accbf3f201aedd33fe063bdfade98fb99b66ca2bc4e25e9bb8faeb13beed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed32bedfc16cd6fbfb17694909797f9
SHA18db148628c007649601015fb2ae5ed72fb23ed95
SHA25609b880ea9ee86a8b8633a1f34192022a49681938b3de3087a32e6c7ddfedf7f2
SHA512adf5b10028d14b50a35845da532f7497ae559e78651b0d6461780f787bea4ce5a5875f4958852a3648ab4e8c0c22ecc57b09a7220a042c8050bc4723ec6bb6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572ad8454d578651c8061e232b80f6349
SHA11d705b89073d5931f616ba83bc3670bd00cc6763
SHA25651bff7d9c1fdbbf5c03340fe69be03bc9ad9aca0b108752ead79c0317f43dadf
SHA5129eff3939b1d292354bf1b28102e47eccf65b263992d838aaa89c432946f34b418fcfd9b1511e461a303150ac6e66280fc903d6bb03a4ad84d7d74546932397fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c69e99d85931945606b1e4a803e9925
SHA13cba62977e665752d200866e3f74127fb05e98f9
SHA25678028effffd07706bbd516f98e70f09a90e87c8e20f912bf7d000af9a9b42549
SHA5121217a8930aadbbf4dc10c0b3e7edc3cbff7da97e9d17ab8788f04a12fd8266af61c0c21c8a316b397809521527911bf8f5d2db0b8e48daa01c6bc763220faf1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1ef846c4a65122896488776d97632d5
SHA1c61c8bf69165f53f1f5c2a43ade5ff8337df4917
SHA2561d5c6076184ee593c1251373f29ef0bd821b0b8c01c0255cb54eef3b119dd366
SHA51263a53857551d2b1aa2b69781ee832038b7dee83beb680bb804a8381d44fc9210078245fe41d30708531a68d5bbc692bf66740425c7787894ca20738cfd63bce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146ec15759122d1bb8276f7f82957a93
SHA1f261208e1f5c21fa4a3dbd9f04cff435b593024f
SHA256621e191edc562a6d6574d840d7b526128777dcfa988be5a41c267f680233239c
SHA512d61efb088cbb4b8bf144f8aa134f40a48b6d6c39b62f02e8449ca14e0b4b568302d68e5b7c9d98a5e2807e7dac5a6e6af2f6f5dc81d8e583f46697d818b85ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2c221145dcdb1891cd3a7e069051289
SHA11887499fcc861b9cc07966cb957084b4213fa0e8
SHA256af7e0f94faab0b5ef2402997dfb652bdf85558eb6622aaf2a427be51071ef0da
SHA512d8b7cb9e7549523de463fc1892bcfa969234a4a60880c5aae279cdf2bb96ec3b4b0e6ada2e3aa8ee5c40753a91735602f67ecd843585bf28e0d31a71a0621316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba26abaebc30ddbb2e59eef7916bcf8
SHA18868160b69346f4d1ee58e8ea9218470cdbd01df
SHA25609fac477beee3823ab0ce0e7c77fbc00a764ef590a3de02056d67b7583492d7e
SHA512a741cd4be85bd88c27ec5c2e03c11d773594fcb08ef181a1496602d0d6c86dd426d602c99f50f38b823a8fe1d653d0ef4f622bccbbebc37d0d0d0594a15fcc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597337a83bb46c8a85a5ae7e912179800
SHA16a7409e33373f3d60019bff8d144b8dd17ffded9
SHA2562515c8f2d2dc7fe0a8e815cb09a6eb23017c5708184a4db7bc51b94855510296
SHA512ffb665492d780aa3004b9d707f8867353887d101cd06f3045add046b2fe62d69a66e45677710c90df1e7e5d127fd23e5d5bcef633900444c35e9022dde8359a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d6c717e0da3ca441b573bd728469a73
SHA16d4fce0f9deb9cc4a595bbb5c205b92a46e7132a
SHA25677a97b562cb36511183c7311879d0bfdea46cbc3272c8c70c4709510456c94c3
SHA512b6720fda2ee3ce3073184bb4acef47c557f8d54be662eaa90433415aed096d88a99cd4a3d99753230e8b850f98c2ad97873e0ae3b878cca92286fc9d89db8263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e6912dbaed25baf9d9b94585f2fae7
SHA116d3ef15e57a59d21a291673269e99eff84b7927
SHA256b08bf3c67f0e398bf1c39f10898c6e5f93dcb705bea846b5fd303a54ef2a993b
SHA512682ca8cc4f5d2e1a9e9933a7eda36c98bda5c45be932ca6e213fae3fbe10e175454a7a994d451a2bac6f3e408b8d624f8187ef2b67a93b3b4e355714cf66f819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d09fda40c4cddc6144efe4ae2f0e9d
SHA13d2290a4a29103d53cd79d22e6be72afe782349a
SHA25654dfd81fdb7c97c58663de08efd15d77655dab7a6203868a7e1b77baf3e01f44
SHA51214b477b7718b68546d7687fe382e3cdf922c730597b8bad7377ed69ca1cb23bc9d5a7f2df977eccd3f2b31a3f6665c4a05f66cdf4e071932e926c2d70e054de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539630e7894ccfc0e8a59eaf883460bf0
SHA10846459a65e7be5ed04c896ecf4022aae464c3d8
SHA256e7ee5a83dd6028374930701bb92131dc9c89281d34750abb2f46a9a6109338a5
SHA51286c5c9e61306d8306324a93ea67bf119f1b7124e31f138be1bed8984a0fcfdc2900743ea0ecdc0d4d463c0fbcf7c9e45db8a006f6da3d94a6de9e025c508fc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b345530afdd46b18a38de0b2a78cf0b
SHA1f5850bf06028db8e03b47158fddf79a2c6975bc2
SHA25635aa16521685dcae65ecd5ab19e66e7bd14fcc740e6dc3bd7e32896d5ae35952
SHA5120271c05cd2e45312460b31ec86e8d9842f0cafcad657c1fadab0a5a8cbc2991bcf92846a389d783516ce41714057d54937fab42b9320762a12e61aca831350f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b8ce68beebbd9b5a8517791992a1af
SHA1aa27677e052c12952a67fc40f34b3a2e46e12f9d
SHA2566cbfdb53474e2623a082a46c29e1fc7c41932d9b0550889e9dc838232160e706
SHA5127d58fff0e81f66756fb89c326fdb238713b60d0f57a56eddbe50784a081f2c7d607cd4a16875dc7cc88825d380cd8119686a131947f3a5911a22cf870ccc9071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3468cbeac47320ca5ff6feddbf1aa45
SHA11735491fc48290b6c48fe8b1e6e928cdfcfae2d5
SHA256e1a228ee3ca63dbeba4ba888ed7343ce23b660c87bdbe7cf0f6a64adeedb55cd
SHA512176feff69e2f1f125e1fa51e4b047096166d7429d3cb11846a49423e85fc7e052693dc4b4b486fdbe6cfa6a91a0febda762baf7d834e57dbe77bdb076fb51e3b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a