Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
684ebeba21a28e3d4f639d5487b33d63_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
684ebeba21a28e3d4f639d5487b33d63_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
684ebeba21a28e3d4f639d5487b33d63_JaffaCakes118.html
-
Size
795B
-
MD5
684ebeba21a28e3d4f639d5487b33d63
-
SHA1
94f571497b4b0a98f300344c8a2108593eda3766
-
SHA256
14b2c13d0945c868c61d84b1a135a01c07c53241177f1c2ace1e6edb3055e7e6
-
SHA512
1533ecdf6c12bb5da65b79d7c930d304d31b02eb0d38324e86d506fcbd3f295ff83113e572cb11e4b2d3b4e52828a161c8b66ba6b79d63bd31f5c2afed5d2bec
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d56a607bacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e19bd33c54bfe294e802bccd9e75d2593f3be4d6fe85a23dc1557e19f3c1e5fd000000000e80000000020000200000006ee314d815723345f230dfe1b40bfa565b7b8ab0c1c1358f7e90c58898d0278320000000faa88e37937606b477f89d2a9fec3ab1fda4dcac99de7eb3cb2c1c6ad737429f40000000a05145392c878753f9b6d43addbd90d991522ad4d5cb8874753935f87a4a9ac430a6d75098392d01a853e53ee9ce76e745d69e15fb5a567efdaa6461faa15457 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BD52E81-186E-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422566721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3016 iexplore.exe 3016 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3016 wrote to memory of 2852 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2852 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2852 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2852 3016 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\684ebeba21a28e3d4f639d5487b33d63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285eb181f9913257588b22efed4a1a0c
SHA198911e7325bcd8e0ac4c0c7cc0246443d933af12
SHA256f1ceed24738d3c12c07581d3aa4c12952fb029b5569cc955ca675533c0546923
SHA512759b287437066d1cc81d85d4452b806103c790ae2f0880a432f4492e212232f0b1415a73e20c3b046b3151504fff4a47a328720a309ac255cf060ee1b22db920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dfec182b46bf672c4fd20b3bb6300d9
SHA147e271b5e270c80b8d34691388b21cc0d408a41f
SHA256910f7cae376f760179ef9161fbe25b0a3a8706585cc01c3ef659f5b9d1341a44
SHA512e3e684394ea2cd024610391dd25b108c384f7fa08fad7a1880468e6d97ffd092f10f32856620ccf790770eb1749a43c285b6dcd1329c33d9ce8b1a3ad24d29e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801e643bc42e4e69d7a7b9d072d3ff59
SHA104862c283716904da637c28c77a7cfa2155aa351
SHA25681828babc2257b8b65a9fd61207c2e13769b97643bf2d710963479920f5f6ae8
SHA5128c5b7e30b970c063257f30444b2fd60df4c2c39715d25bcbc8eef03090205fe09fb6fef1810d7e53b757f1bbc12941f0896a68cea31f478188e22c352ff4ef0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61791c152c2afa41a5d29ccab80e56b
SHA15856cd7a31c4295d19d483d461ea2820d9b1a40b
SHA256dce5a3c9d81b4bd09efee52229cebbc22b02b34bc3fd41288d4a9f7100346d26
SHA512ca52325c3612e8bd52793572ace19f7da63e93c36f5fb483fceca19244df727e78a45f65a07a7a7517e673d9370f9c5850b4305fdcee8fa11744c938708aff77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841d6aa9d559f465479e24741fc801df
SHA1aaf1913d516fe98a872b3a33ab96112111e00f38
SHA25677da03b25d76d05aeed69a1465f11cc5362305e963e22f39318f13818fdbb264
SHA5120d75fa92e8e6b6c2da6c3161fa5072b2ca8aab137e8ced80a2380a71848aa98b90eaf16321342bf2f88896d54cd121f2a42d7a3ce1f809ea2a6c837eaf57b060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fbcef54389629b9c7186aee8ee41d8f
SHA1b50450bd30f524fe758dcc6530225a9f5fcea2d2
SHA256f797b7a7bfdd3ff3bf3c0faf24abc633f6c417e9817c4f558deb624fdf2e637c
SHA51225ad98461157190e35d4b95314413faad49526cd6eaefee9921cf131c09ef40066c811e4440565cd68fc6746eb34bfde809d5d1ebf2e023cf2da2159e3824f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e0acc42ee0bfd5d1cfa1f52c6d9bd61
SHA15019987f58b51d64b7d32b61798844936f90cd03
SHA25634fb7491032e36e25f8b255c602bc3b8eba2887a758eeb82c0d0618f85662e96
SHA512222b7a6518521aa515c91487869048c03840db0ebfa20d0163f50d01afa75629614b05c2fe64ed5967d1bfe8bec9f112ea812d62e228db5c1e0e9f0f6fd31e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e7ec3980e0b90a193bd38618c209f57
SHA1c772a944b0a839467f727a4d44e5646e16ce7f8c
SHA256ce9521bba4e7b769a833f3718c8931a99159fd2aaa82785ef894480e9c66e52d
SHA51221ae44d2537ab312e98e1622b2a1d46467e807aef25c28e23bcf85c817a7be10ffc433f7935f9acfabf848d83bfbd320958b1ab6abf34bb5f54ccf8026817074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dccdbd3dd532f714f6c7bdcdc74e41eb
SHA1b2033ba76a7576d2a3603f24b4bfc4ac46aa6371
SHA2562aa9430f6fb190d665796557476e77a133f48dc46752594d30095649fb119a88
SHA5127b8568e3fec6e5b1064a8a65917dbc42354c967ac5761093a3a8e8dc3032b5c4566301083363225554818c23067a07e9d837bc657bf27f80df7e9e88c67c6cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a308f87c6bd0de1ceb4fe5aeac692329
SHA1c82d87c210fd1670f6456b75606b0d507c45064e
SHA2569f3d02008a21dae94af5ba1306fa5e6076ede9164efef70b2da58732f0d51c26
SHA5120467232485b5eb88dcdb46419715117eff2cae918ea9c3f23d0bf237a4631948b9225345386b4a2bf8ef8373ee0742171f338679c79faa48fe486c1fde9e5cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86ff54daa0bfd85dbd25674a06f9add
SHA161ecf661dabac923e1062afa750f0dd852210df0
SHA256be43db52a93780ca3b2134b6c28c6bcbb41e8c984bb7d8cc50f717aaeba98f1c
SHA512cffce872306c31fd1cdf8803f9d953e6eddc3b375d97559e67eb00acabc6feb81edb2968c5f253fe41760a1c8345c9b17ea6adbfbb6efe602a0f67ae37a3153a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a0068c920b7c25b51011301920e59a
SHA198628581656989f5041c02fcb84d0b828590725a
SHA2563bb30f34bfc2c94405d501455761a6e2fbc9896dd76022ef0058b76682d6cefa
SHA512c93718093a6e42831bb15f1a4baed559a3b4e34da457f5fed4009c5526e0f50ea6bee73a8c74248d72c69becca2aa3b171e929773bbfdfedf9fba678a824be7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034bd63ac08ab16f5692046c00ef602a
SHA199ea9af9972d6f49f64ee87f0169dd568bcd0481
SHA256a6ef57cec2466d6aa6016644552b4b5ad2c6e42b5595612f1dc166aca1f19113
SHA51222615868ad5d66d62ba6a1d6f1a43dd3ddfe4783033f06b070845de25e31accb48e8232d4d6582fb2fc714a62178e03b426b97f3c08d6088e0a1fc4fc159ac7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0850e29475717d96274184dbcc86414
SHA1335c833ec7741dca1187c08bf83442cf3a319bbc
SHA256fdab3bf2aa13cd9fc94b55514a7992c9249ec397824e4746f9898b0616935e91
SHA512358540931bf4f76a63a7065db7653c4d7935b313e0ce0c0f3d02b6de35be4f2815b5ab69751412c5fcde7c762f3c5d85318fa0a70bbb24bd7c955a0efe29d334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaeb3486d66af6beec4d34825c71ec39
SHA17331a1378d5231f6d58433093e782671c335e3c8
SHA256ac7ace7f790ab5ce0410b649a6e93557df3272a33b4639c1625ee4cfb19a31be
SHA5128a670a9dc7c364968d863d7351dc0c10d9bd194799a89237be2fd05246d1854ad51ca245fda2a0621e415d3a052c01669ffcca9e4ddc6a390ebebeaee20ae05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5581e6ba1b59ce0af7c711e0b42c91b24
SHA1dd9888846771d2cc6abe4c6818e8002780df95b3
SHA256f929992b2db0be2738883d4df0520089a0babbf1c2e147852765ef8be042eb45
SHA512313944858703f552af73d70f202d4e344b23335f6c4fb966645a6e376ebfda41b2eb8d02e638caa0fa70635fcf965700ec675a3a5b365864ec9cd6eae65225af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568192aee87971ed32b835b03f9b0a22e
SHA1ca29c27bc14776d56665d2cd422bb40d75327df6
SHA256e3d5e3822b5610df95b3e89b05fbf0d0045094e2199c6b20ec88a16916984ba9
SHA5127dafb683cf0bc116d1594d58cce2b7db49c9f5631a7ac93677b28875c706f9bed48cfa3869affeb1dba3b724c81753228d4e8b6d473838ba00e92eef4f747f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59271e369e77041f65bbeca71f7571fbd
SHA1af7851470c2ed75a1aaa67e738863022de3286d0
SHA256f5a953cc1aff4dc1dab43d55edaf30a5135e6bf8a8557818b51dfed7d0944ffc
SHA512cd5ce0a1240a24a3a3c77f5b191bba439441eea23b1d078737d07311491f62378538b490fa6e2888f8ea8d906e094bdbf5b9ca747c45e822e87e91c10f3c7ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb29582b56e775bf81ecd44ade51e019
SHA1721e58fc4e8e0162510a9af676e17c62d7432183
SHA2569e8b4409663aff39a18c390979068eb87fa471122f0a7b08a5756b3a352a82c5
SHA512d33c201c35acafe07a025fb30fffb1ebefe5a227f87c19efb3608607b3164a8b704b9be6ceda469acddcb58bba2adda7d5899466f27301ae2b5b84f98f24fa5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714e171f6ee2df57cd90d8e241bb86ec
SHA1fa155dc326883f425ee1f98aedbf844637855817
SHA25685d42389bcbeee15b88d655bce704879d281c3d88f120287c542918a86ff3118
SHA51279736b64373c1f8543861d542e78879406dc06aaa9169ae8cf134c502db1506fde0264c7ba31a5c97e5ffa40c942abae2a52277df43bb8eba7df4aa24ee3e07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f094949a44ac21aa5287e35d07d90f7
SHA1355a88fabc38f04253ce8e8a36c6c308c49b1f93
SHA256886a057abd092f4574d77d1c6120daef9f24128a2bf0aef88db4fcbfe4018fac
SHA5129c442a25051be8592b2cf0ccc38687659ace818a6155d57fb595088f1fc756f0a24f31b371efe1e84a9d7f83aeb0332e5e3e08ebf4630325bcdca32378e2ac66
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a