Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
687d110dd4c2b48e721c653658e031b9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
687d110dd4c2b48e721c653658e031b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
687d110dd4c2b48e721c653658e031b9_JaffaCakes118.html
-
Size
68KB
-
MD5
687d110dd4c2b48e721c653658e031b9
-
SHA1
0b81bf0989d0b58684b9232d4c7ef46790d6a687
-
SHA256
c254df1d3d54cedcfe198e35fc2d7f46a76c96c0db9e85dd816bcb58beb760cf
-
SHA512
c21c4eb3888e9dedaa8077122409f7617be2f42446cebbcd3976f1f752034f07279e5d9f84fbf6d49144c12b46e40881d9109c490dde18a4741257719bf5431e
-
SSDEEP
768:Ji9gcMiR3sI2PDDnX0g6rAJdEvk9qoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J/M8pTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AE6B331-1878-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a0ebadd1f814809877030c40da3420bbb78e840a51ab8c619c611324e0f627ba000000000e80000000020000200000008587bb43f93a3adb5fce905f1b5e6d12c43592bc10a6c19b341ec735779cf87520000000364a257dd94beb556af5704b17fed61e5c1b1be528e24bea83c9ea7f07e1df0b400000005f39d31dba8c2b927f7adf7df93ce8ac5f03d7c029028697ee0f14cd46239469bbff73be72270b376ae2b5544a19358285079d77ea63f25dd6bbe94d47b1daec iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422570909" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603fa11f85acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1868 iexplore.exe 1868 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\687d110dd4c2b48e721c653658e031b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bcba6aeb0b460fba1c059ac183d6376
SHA15fc1187304d0268f5b3edf54b965612935609523
SHA2568a8c0dbfe9e828d72dc84b145785a4486368c6dcd0052fad149dcf801e79e882
SHA5128663e38b9eb21231ead1032955a17e08c34f7ae649a8b3b0f61731d1279c68eacfdd4a6489b24b457b65f8c72c63f556cc20dc5bb25920438eec61708ce7c15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1757601e66c19f4090abb733a17a39
SHA1b692a11b7a5957b6e6c5ba3c764e87c8ee13a916
SHA25671306faaa55528d73e2bf0c60bb8fb09be23756917eae4795a411fce40443357
SHA512220126e99df5487d4e93a37dd67e5800f52e5541093d96c87ffbf3480423da31815f9e8c1b92a89ab9906464d9ba913bd2a7cc03511d0efd9f6b00005d2146ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d17ca270aa08800059e351bfaed46f1
SHA19ecdd22af3df3ff5056a31ba2cc52d9973ab5fb9
SHA256c215b235d0cd324255869dfdb5e3e8fb8caca58b5290e801c83e53b68dceb5fe
SHA51218e847cf3b203da65f04c92b79f8e57b2e8c1977fe16e8abc4f918c0d3a33da211a686cb3a5263e31689808c676c2938d91e1d9aedefac9cdbb8020bd2904716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e78626e95a1451c4cd0781cd61ad89
SHA155c68369d192a47e40d9f1449408230f8518af3f
SHA25632d1f968dc019a93e929252fc400f5c30eef2103eb6ef1d7dc79ef5784c75916
SHA5128976a94f3f61550eff08354464ea354c1d63c2c72cbfa07f3a083b9d20744c5847d92d8fda97892521dfb0b9ffd29128c9efbef5d9e5508c26e5b248591eace3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64f0d453296c09e0c7e48962b18304f
SHA1396e41f6a1f735df8d4515d9e5ef7fe40ff49c9d
SHA25654da48257c74908f3770543ea2c71623714be6668588687a661fb32d5b4d2a7f
SHA5129fcb1b455c7938d376cbb5858fb9089933df171ef8b7ecf51a20746836a3b3567bfc8a12d3a27f8aced673758fe2a0c97dc04677331f680c7b45b59a643bb06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500566f3d2552aae1c162233b04bcdbb1
SHA127f498f347967b363e343e99a5d686a14015ebbc
SHA2563c76201140cf21037cae035cd8643a78ae8e0754cf46343723f89d168096402a
SHA5128119150d35d76ae3ed78bdbbce14e8c429a35ff9110d02b8ac95584feb6b66c5fc7dab8c6a818e91097f1d7ff11b2e4c79d91412bd16a694980f18ad115f5ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d75d1d575e53992c87e541f02a07b62f
SHA14c6de4a5eba59ebd36853b0d5af343cad44dd9d0
SHA256888fb634fdb9753c40ff582417465e9b3b6f15b95856d2205e3a22229caf9cee
SHA51273ca5ca306f3fa2b35c7b2f281e1b4f787cd7e883848f534dcfdab255f993dc14807a96bf7df72f231c304ee75e2b96b52c424dfd7485b503c728193ded5a7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc33c11a97ac3b57340c6f59dfa0816
SHA1ab90d7c3868b7fd295e616349361e6f7da259560
SHA25615d405c4ddc13e5b670210ead23af95a4a9efca489ff8821034465f81df87145
SHA5128400c291559cc0556b9a46d4b6b6f5a64a36cb335ea295af8393b28fa9f69538025dcfab8ea3ff24342eab1a38f000f7452cc4e275b31bfede2f3458842e9a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c0653257b3e98a4288186c45f0ca343
SHA1deec3f2d75c00f8f7f69b545033678ead8b05db8
SHA25671c68e4f99e4aa51ef412f0f6a1d9c841a8d2465bce47bde21a34a28f3183334
SHA5120ceca77d78709be4ca6d9a5b2ca5fc0a55c8cb4f8b6ec2191b328df63414c9d5a3649c27cc0ce064197065a0df9b7bf1e0e4586dd7c0ecb02920c79cb6203801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448a3ff571d1638004a594f540cf1ecf
SHA1ff5f31a2febf654bdd1668a3877716e82c17578a
SHA256566b6c9490013b6ce28ee936ca6bf03cc1a0e5f8740fddfef67062d7c10ea882
SHA5121df4b3759241dddb56413efa3ebe4c40cea9490d086c0610d8c6621b7e3d4e4f1a6f7f193f66e97bd04b4418442ceb79e680088676db73a4c31f279953ff0ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557eb0bc126c9abf46de958608130765f
SHA17dea81b1c3a5fcb465edef2d8af099d9e23c72a5
SHA256eb06f8050697f2f1f221bc77f5616a834348e0f098a874f84723664d1587e59b
SHA5123c324ab7daff5311fd49452161d9843123f35de381dbd3fe5b1af1054d2cc83499ba3935359585d8edceacc7a9ab846e47e24d22eb6e6a40fe18756c2439cc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c29d535dbbff6a86236034fc0c5464c
SHA196f476615cb14cd8a993f90122532cabe468bedc
SHA25666ac290d37c62cc8d15ba6f9a5a955f95dddd49d034944eeb437cb0902399f51
SHA51243fa39f3f6e765cbd82757bd5efc3868eff95f3d94adf3ad4af5ff2c89279d32261aaa804fd4640cc73e61c5e73bdcc68eee02384cf71717de25f53461cce866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cde12ff063e82f43ecb67f4d5090aaf
SHA1976601534b0d0e78a5437727b5da3982e3fdfe20
SHA256f3d8088587faa71566ad22e60728b8e0c89609b1bef6624881f6da91640772c0
SHA512de4a9db260ccd5e4ae1392e9536981efd8bcd9e2a5ad70d9f00c887bb1761969cde126c5f397b9ae785b3a1443586c6da26f54f19324864436dfef631af76203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56beafe1659208dc038e41f8f7c770c8e
SHA10f6a54e30400f6c7b1b7dbbf2907dbf6b3cf0c13
SHA2566addcf853b1aa5353908505b520928d3ff5d638a379b328aa4fdf9b3adc50556
SHA512aeeecbad1097f18a1852edc943967e996275357e48ce9703b8bc8025e043e275854806fe3b1184b9b805d20d6ef077a5ced86b3166ac4267836b0871e2b91726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778806ba4112c098854a28b239e0b3d1
SHA192deb536b3aef5c524b4434173551144850720eb
SHA256c0627d0f584de674eae62613e7fec430e5aaa82299effd2b1067d20a423fbc0b
SHA512fd6fb07957b41824bd7107df88221dabc257c3283f73fadcac80f464846ba835ad56f559d567560393d0ae342fb7fa96af43398251f8b2481e86da967c999fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc2e1de3575d9b57c09d1a8df205c9fe
SHA1adfedcaea1c467ee491ff1cbb490b0e190d74d10
SHA2565cefc75eb22febac15f1965856e4015c66cef75c54c1306b73ee6bf3bae88f62
SHA512c4eaae4373cedab3d1584bc604726e20cc9973f0edd3cb939134e5dac18bfcbc06fbe42c5d0a36d6bb9aeb6a0f6c028a36561c9900da49843174eb03621059ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2deba3a76a32bf732a71e607158ff8
SHA18281cb20daa785574c3ab1a23356420025f6f752
SHA2561a7b6fd0ebe4aa415693a4d66f6cb08f67a1d9cdae265f676832f0f544213057
SHA5123724cd80a5b9271f19d5dd44eecd4d2c9a60f4d3652a0503b0ca89fd8906d49954ca136d0933b9d104c32450b914557e2c2af10d9f109d0b166d5ede6564e26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48046538990414aa561bed25b21b4ed
SHA15a16b9cbfe3af34b6f061f768bc83fd086907ca3
SHA256230cd1f3caf98ff85acc602c9e31d64f25866a7aecd60731e39a78bc88806b46
SHA5122faa1d480316fa80c9ac7b9aeaaecd5a29543bbc6851ce9c980a1afd07582e88c737407dafe8c79326f1add5bcad6eee15d241944bfba999d36ba2ea7bdd80eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fabcb9acd11e228828b027c5379f5852
SHA11bf9cc9ffe8b3aad1e9eb1bc85858329897b85b1
SHA2568a8c5279c20566ea66d55036b587a8056f3b0e554f0b145e3bd665bd8ea59387
SHA5124c660248fcac6fe40d8a55c8dbd9d037fa3af419b8eff51075e8861abb2f48526cdc4fa4a4d0dbf0905d8a800e0846eb638bbf2145f5b77a68314bd7cc0e5108
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a