Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
684838a61514d73393a5db8d0fbcaa9b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
684838a61514d73393a5db8d0fbcaa9b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
684838a61514d73393a5db8d0fbcaa9b_JaffaCakes118.html
-
Size
68KB
-
MD5
684838a61514d73393a5db8d0fbcaa9b
-
SHA1
015959c938e0e3571c7a9d8dcb33b278656d989d
-
SHA256
ea883915ea9f30921912be695fecf80975b8fe38e90ff194e5e154c7274768b2
-
SHA512
f49d70a6e0f19ee9d31956d958cc753088dc835346af2af41832f04afb87ca1dd9fe7a40922a569f9e11232fe02d862aff86e84419b2cc3341937075f9f37e33
-
SSDEEP
768:JiygcMiR3sI2PDDnX0g6Z4qKXgKnoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JqgFVTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0341b3a7aacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422566228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65632911-186D-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2f7c905e48a084f94169adddcb8ce920000000002000000000010660000000100002000000039ebddd519d400817dd403489f31a8c961d202edcad1fc6a1dc6acbf17823b17000000000e800000000200002000000035f202724659ffefe67d04eb28a34adaf95af55bf2c5e647ce906d63edac883a20000000185de28147d49c76deeb5ebe4d8b02097c4515bc6ca79028ebc0a58b37b4d222400000002d9b8dab3e45fe6a137d6b963da389d0b7020f9adfa3caa8fce594f7a7a95b549536a73213fc886ed55c3fba9e176806a96b1be90aa43065e9bdba59a44c998d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1972 iexplore.exe 1972 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1972 wrote to memory of 2476 1972 iexplore.exe IEXPLORE.EXE PID 1972 wrote to memory of 2476 1972 iexplore.exe IEXPLORE.EXE PID 1972 wrote to memory of 2476 1972 iexplore.exe IEXPLORE.EXE PID 1972 wrote to memory of 2476 1972 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\684838a61514d73393a5db8d0fbcaa9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553de5e819e55c4c65fa4800bba958ae3
SHA14f73058b8610da60ecfa945bd809ebd8ea91fa26
SHA256ce7a717ad5a1933a178ad9b191d5b1cd5d0565b124b827a55df5e556b92f1e9b
SHA51234da127cdbfed46a823a62d358ba61173858f8ef5ee55b28c617bf1596a18611f9380016eecadc32c1f817b1a196c57e63738bf6b66d0167cd3083ac310d9990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596623af66d19aa17933a5e5305c96695
SHA12d5bff06b9b0e0eadfb88330eb470937f1ac4433
SHA25653f4481a4054b40d8f9e7008527e440e887fd5b8cb9268db6d1243cf7347e5f0
SHA512394ef18d9455c99ceb8d70acfbe8cfc12c12b60c32a66e8e0686e3386a9fd02548b70c85b953b02f92d9b336cf7e84a80022b975c5bcc5486977f2b6fc4cff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bc2e7484f2e1075402fe22fa779790
SHA1ead8260b373636a2cd100df1231705e06eb75d6f
SHA25600787af74ce90b194ff6d5b2564017e24e704373c8d287609a2f68bef2dde906
SHA512d7e13e4538de575899b10ca3b72034e55130106766e3ae728a27833059ec61f03c02e0c2a5eb92a77db20b469991f55a4dea6e2f2ecca6849b6e46f0079c5420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edbba03b34b442f3644bcb19c03e560b
SHA136810ba507ed266b17322fd31a3d7207fdfbcab1
SHA2565df7d113d124766fe7f86f722b9f56841651b7cc3dc01b558c9df6a8065bd1cd
SHA512c68f0ddd09af43629c64ba2fb2d745d4ce758b51c7d80a23e29425a5bcb51942a3ffb2795e10230bac0a5a04058af7d6843bbc05b9c9b21d2b2e2cdf7ab9c068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a2653125058442b914a8e9e3ce74bf
SHA1dc8822b36faf71c0a4f65f6f7e23b907abb2f02a
SHA256363612e07baf99136a8497551ba0486d96247369d2553d06652884c98b076c6a
SHA51244eb8b3d6cb6e6554d82a31a0fea969e62fe772aaeb9d58ff7c8e9afe918d4f47d87edf550a87bdc4228238d3cfc83931df6164ab330164f575b1393a0749c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5284dbc0570e1c756fa8351207666404a
SHA176eb1bea6fb91999821338376ba6a0aa8e96c78c
SHA2562502a3d2593d81d38478ed0080518a6d4ac65088bc333608e3050f068dd7ca5e
SHA512faee36708b0e48613552ce0a8b0f225c7158321ac393ec56fbed5bf719e0d5e931b0bf883ca18834ca340bfc20b442d1059306fc90dc9b030086cca7f3a3d497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0806ede47348517db48f06c6c5d4600
SHA19f3d4814a7f78df8175a1012b25ab3bfad5e119b
SHA256fc4d35ef0a7da710888e0e9740ee40872fb1edf4b190150a45852985a379e3f1
SHA512cc5a5df9dc8d2092c34c88fc96da505c4035f8feeaef1a9f930ee2cc0e8dfaa40db26117c12934d68e0a343fb54fbdb914165c2c0c2cc80873d37b8b92f16d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51341df7f2ff24f6eb8eeee77604d3803
SHA1b1e22ac080d4f18f9c53e3b12b6d07b9b7de75f7
SHA25628980cc1936cc3072fe67e72d719140896306eed7c2025db7885b0385e692efb
SHA512d395cfcbda0df71b5cb85f84e50967ec6e24a7fc4aee3d342b2a0003e42bc612d36de1c5df8a2d70c49d40239bf4c83111e3e97e851b12356fee9dc1ef7fcb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679e7a17c2f065b6b683e7f5bf89245f
SHA17639f851355c3570100d755bb51a8216941f451d
SHA2564c3d45f6bf5d10788412a56e5884fe2e967a07b63492c202498f5702c48929e9
SHA51273f0dead28a922c0cfb7637bf1d3f48b96d8ea273dc28a96e45b3253fc697a8b53ece544c7cf5da794ce180ec3941e2a4c1bdbf4b6da809959bd3f9a9fbf1f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7660fb95cd9d091267faaf06669e41f
SHA1af111d9877c13cb14fdb2b09e36647482b6b97a8
SHA256a1ffc711371adb71d66842d3841efde60465cd905ead649ea4b0b6ae7f70a1ba
SHA51218f71a0897f2265bc798312afdaf1b6738876446a83800d2f583ae3d4f66cff7c6ff413ccf03b23859e0f4f9921e49399049eb311b5318890408f19090a695cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5242a7fc2f7d7f7727f3d26bf71381
SHA1528fb5452e294ce59fe6094e541c98b0e6553d10
SHA256146d2d6172965c64596cec967c0e9003100afbd8e7d8043b0a59e4bb865fa633
SHA5122ab5a3f5afb4ccd83efae9ccc322f7fcdeffe1addd6c7eee965ed0c1e45e7a5963fa468094524d97cb70795d6a1ed0e6c30f7a3ec3ca8936a29946bf16c1f48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e62fca04370215b77d4af3d531df11b
SHA1053cd4d20845559c20e856dae1880ad63bbf4526
SHA256f9c3264025299843fb9eacde01ea8f6811cefaa26207a312db63fe72020e7a7c
SHA512ce96e3a68c8778fadd88651550299834088bf337e9d11dc958ba35381257a3fa418ef9f13c90f4ff733ffb3a04ac5a6d16c21fbcab159657125d906bf3f1aa58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53803a501840ae483cb5802f6141453ba
SHA14e304b8f0e47378f63592d995a26c2bc18d1f085
SHA256be1a682f49d499aa50786b3a12daaeec23ca483d2afde1fc361e983eb0a8f4f5
SHA512fe4cc73c716ca978e52d898a936063afe8015c8bb18b01b4cfec55cea4ee0d77c50c140654e3d09b6b994cb41233b11296e54b90d4e439665a8313271899f2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371c2f5d3d0f76a36aa6da90c7e7da5b
SHA1462a9bacdee74c2ae8c5ee58cc2ff20325ff79ae
SHA2569910f2d24ec7b34f577889882bc588e169e2efaa4ac804f7acaf98620654b472
SHA512c85cecf97a4055c32feafcb08c632459293ad9074062f8415fe9c0534c250ddbfbab6b64a2469324aa4b938e8c83331ecedb1aea120192365425b214b23fbba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965ea01d3813614d695ab3e0f8e1f789
SHA1c506ad04e07d6ff6788aa4999c353eb10df15898
SHA256b4482bc0eecbc8cb7d90b23441789d69ef1ed68c43cc50db5d601078addc47ad
SHA512152097d32afe7cacf9c67d2eba001ab913a414e7b51e2de6f3f9dd76c43da06d1ff4ff814ea56842a52b734deed029127e9e30ce7542eeccdf7bbe7533a82e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53f5bd22468ec8aa6f8429c005e3827
SHA199efd73bae54927ec016a613984d3694b88ac095
SHA2569fc5a9424311807cf4dcc1c36ac79831a845120456efca79d7fc2153b3e07cdc
SHA512dce8ff77dfdfbf7d29a1ef86dd0fe898d1f73e9752c1134039e78342132c06f1e80e0a41fd0c41f94971924bff6a2a66fb2fa285b0a0f2601e1b812243638445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb7a6f36462433cbc906c81b06caba19
SHA1235cc0bdad68d8dd8b6c052a9e7a3930e6e29861
SHA256d351fbbb1f6aee37226328952092dfb5d164dfb7c179a87166ebc2e04e26c4c7
SHA5122aba194fff1a30e5696c7a12e16b880c471359cc4ee158e882bfe25dcea4408afb680eb4cd510695fc4d610360024c28c1adf28d06a3edcebefa330d7d84c4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1bfbfac301bcb344d6bbe99136accf1
SHA1521b3ed9eb4e34acddb5bc6830e49f4864f9fce1
SHA2561a0a73678ce6ff41e7486d3cf8e155bc4fc257f8f821414e63cb989e97c9300e
SHA512e85e31a913dc57a784b3156f8895ea4e05085c2864c83bdc9c9a45d7b05f35ee4640db56651bf55de1339cbf720edf9bc6e89b5ce31cacfa494bbf8f4f142398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9cfb66531b5d882b29af7119db97c8f
SHA135372aa3069c5a50e3bc1046c65b2c0bcd76af3a
SHA256f4f1f23e76ff6aee67695ace91d7c40b6a45ee9c6862e354b3306640d95c2af7
SHA5120ce8b4feee330b570e4d9c4205330bb0fc71027bc152444ac22bd5b8cd3fa272a7580472a2e779d36cf98fd517d47154032c314a067b03b0d7f530c355df309f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a