Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
687ffacd75a018e6d117e0a97199b8de_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
687ffacd75a018e6d117e0a97199b8de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
687ffacd75a018e6d117e0a97199b8de_JaffaCakes118.html
-
Size
375KB
-
MD5
687ffacd75a018e6d117e0a97199b8de
-
SHA1
d62148efe1e4cf43f6f5efd49addf058b4d55df9
-
SHA256
3afce29b4cd76450ad1e23994997236e6be087bdea0b7f882533410d3c90a414
-
SHA512
6e30a8c19aaddbd1ca15cedc8aa3cf8f1832c3da0b6c2675c74c10288b33ad18d7f8606e2192eebd962da4a6a8df85b5c33b7bde356b5fe685402a92ac60d007
-
SSDEEP
6144:rh71hjRmiOmxab/zurgCJ5xaGEnfaJxQwxePrY+DWzfbkNDbl/7G7doR4FA9/ehu:rh+uECZaGEfaJhirYNz0upea5obiO1cY
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d325266df9b99432daeee23f85ac5ea6c04989a5b514ac2d8e6f5975011f06be000000000e8000000002000020000000a5b6f99ec385ca9a8f9b2d88d38d5d7ecd2e6983fd5044557d4c01424d5b3759200000005e24c6a7c1558f8cf895ec29c0176a7625da96a41b59d1c0a237458a9c71806c400000005654dde838f29327f1c61aff74e350003bc9decef1e8fe97900ae1551b46183e9455374f0b8348a98542405e9f573e4f19301e6d783cb79a818bb29ea99abd41 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ce71c185acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF34E8A1-1878-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422571137" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3000 iexplore.exe 3000 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\687ffacd75a018e6d117e0a97199b8de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54cab4bed18c8d896f95de4db902871be
SHA155c95a3e5a716e7a2ba75b442091727bf1410783
SHA256fc0a97009fb579b6bad8b9e7b46d8f0946d4030dca5b2be2db36265f41976382
SHA51270ff13fb6d0854d5dedfc78b8858611a5b31c998c3ffe66de17cb43fdb6644291cf832fa43cd98c9bd5e2448500e35ad53576347d1c54f217692e8679211bb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587724c4896c046459c0716697cd7d0b1
SHA113be9a261219d11addb21ee3cbaabc8a63bdf734
SHA256767eef4f4133b4b88ccf6490aa97b9dcd54459b5908b7173c5b05ea4108c2834
SHA5123d272501694101a91ac7f5ef1cb83a46861f215801d0bb4cc60e0b6c76f907bd6d0c3f5e24bcf3c7689021e450c9686ba4c3267eace9d76749ccaa27d6368324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572fda7be29e5f38da2905116f4b596c3
SHA1964f1c7d3308a50eb323d909520607c7005fb2dc
SHA25665f926e2d1eb074f6d1d819be033e3b0cc41c2e33dacadd4ae948a3b51b51d79
SHA5124d361f8b4e6e66875227fde27aba33dd0bbc7c0d73edbdb7497d62a08248dcc1f796cf490125c4c1f5585bcc47a02a40268638792a14995132fcc5ff35606222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f7c619341e11f37337048070f2fb70
SHA1c7504617688f958e3e4c80914984a7ab2d7be0f5
SHA2568c5f747c50b9a0b7ba0471858825ccfbcf7842c607cd66506ee168b758c762dd
SHA5129c5261f23366c638afcf9739c1ecf0d6e6f39912b23f8c66793438bc8730e9bddd50af67ec06f40e832316c64a0c5945847c624ffd9292d11c605fddad25aa47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e74c265167807690fb1ec41b30cc15b
SHA10c55bd1cd09c3891eb9a8aa179dbdb05229f7d50
SHA256bddb803aeecb421ef12524da01fc98bff72eb8b4427ab18e43aaabfcb54b010f
SHA5125107479b04eb49c353cf9ef0d49d1072b8a0e4337e615d3ef21bf96f3730eb61f489ab4a53a9dc7e1d7597925e3abed3234f9e851c1a6135af0b7ef46afccb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10dfc3d510f3ae116f1b83551c605f0
SHA1d6a750e4f675628e5269f61a7f96871d3e3d631b
SHA256c0f3006180fc59cfb05e365a3d4c2022964f8cce1fe7e91b2db81a91b8e21d04
SHA5126af46dfe2cba4311c033f9b94f8860102d3f5d0055a747a7f188da5fc4ed77e01ca927253543a1aecc5925b85a326d4dc197748f486cde02545994d8ec75559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56527c19d6f504970a848955404a41bf8
SHA1000ff3a1d1fe487d0c2599e6b62fbe78c3154c22
SHA2564e1a24d0c1281975105afeb49de5d459e56877cb31f6e4db0d12ded26431dce6
SHA512901864b897e0a30ac8298b11184b04763377a946e579c0d75c27d294b0c73bd5abb0e14b1f615b3e7a6c1d478946520813185a8e7a84f70ed8bebb3a8d251e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5620631c41ba1a33392967cb24178ce17
SHA1f11bc587708771ff9586621e43f3aae8d940f17e
SHA25674b6854e7c37ef6cf534cc607ed08253d157aa919f7dac34b05f62d7003684c1
SHA512cce0e53b4f32b62c33cf2dd39df40bce324395c44bc483fd3cb80c833bb0f0b667f51cd9bf0cf7c79db4a570591cef8e8dd9fe67ad5a4d421a9dc5928fea451b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554b9424bbcc5179c9fb7c6ac2f0d21f0
SHA189c288e773c5a399c0b18f087e1e222d66a31318
SHA256912ba39e3496c44707db4de221310a130ee481fc67e2c5b5d50755b6b0d91df0
SHA5125f8f29b95618437c31eb8b9f1d280aa2a802d3ca4cf36a52eb162672c9434d44846a9cc7bdd94afaf34a6d067ffd4e2373556dffd75e37c0ec44c5be0d477c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9ce88459e83fdca04c5446340d01ba
SHA1d7b65c0973a947b20a7dfa99e376793f1a718989
SHA256034e25c68cb6e01ea349c741b44a0a28c94bc96aa9c6d47adebe5be1bb56ad44
SHA512a95f72df042912b34198eee9d73c79e87bf1820c8a343bfade60030a8d6e20ce09e6832ccb47cf8792e9d67a8dc29ac9bc8da64057b3c8cbb94e7bbc8148796c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57063889a1a4db0cdcac305562775a790
SHA14925688b6dbe4a008d2e9a17b654a8ddf01688a5
SHA2563589322d1498abea373775e2f7c1da3dcbcce5210a4e977788a08af6b627aa0c
SHA5127f9ea9ac3bfb6da9cbbf3eac103704a542c78a24dd9c32e36cce6f3dcd664c6036c5c0df4cc8bb32f78520e78d90541a9f1bd9ac6cff0acfce93fd551d6ebd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb123636a13ea4394f1e2b560ca4309
SHA1b4482e6226c19d122512701b0a03eaf33099eded
SHA2563f47877c9a3cb27c6dc31327ba258bcd7f1f8287c2549f824551da7677416833
SHA512181935f19e579671f91a7a3cc9fa250e559fad4b5a29612936a3f32ff5a3d92e1e7a061a3ac580dd7f32c0e26d7344408305d18bf421df23fa74a287aa9f8e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c64a01ca5ac885f9211c3376b4514dde
SHA1c7c1b7496e59e987e66f3dd1504bea5508ce166a
SHA25610354b5fb408e4f18f926c79654580b703fce41ed2fb9231da79e29bc3d0826b
SHA51232995f345b8047712b106961995ece56b0550b1ba6dd595e39bc019250a3b7c0a7f335eec3f090ed85b7b4a1fb316cbc43a0545341bff25547c9a5c91c4496ac
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a