Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
686acc636be8c3d19b4d41035a2f5f13_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
686acc636be8c3d19b4d41035a2f5f13_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
686acc636be8c3d19b4d41035a2f5f13_JaffaCakes118.html
-
Size
19KB
-
MD5
686acc636be8c3d19b4d41035a2f5f13
-
SHA1
726583cb4a7d99df1b244c1042406b33648fffe5
-
SHA256
40552b5c48a2b1ba94e2afaa675b00914c1634294ac8c5d5dede194dbb6b3380
-
SHA512
d5be93ea2d6c776b8f0f5b3fad352b99716e8e51efe856060c002f6b29f3ad69297e7480fdfc24aac0243a39c3940efc5621321535ec9b88552b0a409adf10dd
-
SSDEEP
384:jilKhJESuVBD8cHQ3R3kn2KdLTXZcfIk9xhe8jzVc9P:jiJSugcw3GzdhOIk9e8/qP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000249008455c17a04ea69775707bdbd51800000000020000000000106600000001000020000000ca7695a399864818f68b5baa15d7bde648f83a19b45d1e61f8e9b0e25f246207000000000e80000000020000200000005ea29179602f51e88e9692c20a9c44e59e6208edbe3aacbd9670bd30f6da11d02000000041fc17e88226f9180a09130e56f112e823b2561763eab843bddf3a01d8873f4e40000000af644dd646578f84b89e3c55456e8a107db5d8f98a30a07474771affd790bc65c052e512503451065e90d52ee2c9c6dae5d7cbe61765a95e68161690c88f1093 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e007219c81acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C771AEE1-1874-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422569399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2496 iexplore.exe 2496 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2496 wrote to memory of 2368 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 2368 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 2368 2496 iexplore.exe IEXPLORE.EXE PID 2496 wrote to memory of 2368 2496 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\686acc636be8c3d19b4d41035a2f5f13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a707de5f3440b2f2836170c593f16013
SHA18c82c35952816f4db22946430b0254a5bfadc235
SHA25619e1c5a2483f0d314b1a3ade056a07cfe9a25fe6320396c49c8de58ec4cce65b
SHA5125eeaa5351c5fee219685f2266ef39410855b4a0dd04d87f0a06b935b5412ca08e63d854731d22c05f5adc3580e38c4b2a6aa9286f57f5b43df8d43a08444dc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dec13630585f4ecdd3f8e59c05a709a
SHA1406f0a863880e8971d4e1c1b23f06f36b4d8906d
SHA2565ffd01859b894ef106cad967ad431da576fb1bf312a7092e727c3f235443eb27
SHA512518f4164e5c0f75217c4375cf9d965dbcd0bd73495eb2da9221790e0dd29b24279080210800b3a2f9d36b1e1cf97abfb02791224e2c915a3fa4217c028b3d5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca088e112de37d476770014b8b6738b5
SHA1ad596a7fe22e437dc95c9840573e149c0e51415b
SHA256c1a63de6d4ae19dcd9f12aad3101dc1bdc0e4d498821840c925a2ad2c83521f2
SHA512f8b7c440d83e75e27cff41cbbc986f09917f36cd813606788009d0805bc23164206ffe38c08f21e5f2a8b1215e779a768fd6217e221b7d440440a4145c062546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52870254e7611b0b84099c0f4eac3d4d5
SHA1a8b1478e4dd29a45e0f6e621a9f27ab2a4c7e136
SHA2560caf14c63679baa3b03d20f1ac3f30d5da2fefb2ddac8628d4dab098f0ee81a4
SHA51285d4a4bf567a184e6a6b8d657e86ae142d0794983135a36e9fbfffc982eb1a1e84bb4e2e883300beb5fba3f3dc826e126365cf9a9e1da3d00e16175681d803bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52768ee945f2a8929051c35320b2d21c1
SHA1723562e751bbbed6e4ff10bc0126ecc034760052
SHA256ca8e050c68b7b03c623900b41285dcc53a58b3883369c69f0ae5c18b96c0ed73
SHA5129ab3a7809c01bcbcc33af52291bde90dc0d3695306e7ba3e40d103ead7ae91386638ef47158bb8293f80633e23898c3f1ffddafa75d6289aef4dbc77bae6aac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550df3752bc5b737b2765f5fcf9fe7eca
SHA1dc47e73cff9cd379ee8af27aab7eaa60a9729597
SHA256d913eff7b5406f59a8c4dc1cb75dbd16325e0f5e833e3313fc4ba86c99622ccd
SHA512cf464a8d09db69d9b3842af58272050a2173cd4e4786309704066f71fb1f5f22475f2c6fad75cb1165c31c5bc359f17ef9dcf44cafb1830cdb75757ba6c31398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab3e2df9b691a8003f1b04e78ff55a2a
SHA1d4035a780e6b827de6b2721f08b54e0dec5aab4b
SHA2566536aabee1e26bd588a93b35adb47aeaaafcab410b1124439976dc9282dec19a
SHA5127a405bd8dc1cfadedb60eb6174aa79a4d7ea96d143287c03b0509337d05adf6dcd2e8a574f8a2bb28c44f776842359ab64ada9b987ec6f42b3e30529859e6a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a395f55f8067d0e5f53c69c8d4fcea20
SHA1c410e0055be37b08255b589a466ab01fca1c9b1a
SHA2565cb0e4b7906b4eaebe50981c027ddc39e077cfb0ce0b3fad8c94863f354c7214
SHA5128671f48a73aafdc08c06248851c9dbb67be8b4e70c11fbf7e396906b6039023d30154e07450eb0c9ed814167d85a19b4602acf4ce8498a4b45487404b6dd0a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdfb185043dc906a5870f990d1175fc8
SHA1bf62f5c52288f0e627d5b3b81ca8c50fd6430642
SHA25608b32d8cca0d00f13111bf47bb852e4df8bbfd4c0f68aaff50812d95d2a69ee8
SHA512e9462508383e154d5662d6f672635a0c590d20f29353fa99e5dafce231dc7914fbd7898851e34b94a5261126c609296e5175aaf608ab63f7f5aad68e78ffe4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec073bad021808c9e6a8f0f21617b8b4
SHA16e6b71faef853754d6aa973a2d525a185b5d3c23
SHA256e63022bf83cccefef9184579c42bcf7d95625d248b9d069d349846caed013c2d
SHA512a73ef56534a30a425f04b5545958a3fc2fdf85dea880e86b6f1b45e3cb5ba8cc2981cefa1b58374ce931a5d2a135cc19cd04a884f4bf452ccc704cbc6b1b5e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52228d338dd7ed57dde8379777c2ac3ac
SHA1a82c4d632292965475af853440257fe99eab2ee1
SHA256bf8cc76c0c271975e12bafab2161e23197b42973aee39a2697f5d28f156dedfe
SHA512b551713842c9c2959819fc6a9e2e84f9c71b61efe70c32e761c3273b7eea4ad1efc1a462e7d273c4bbdb3a439636ec2b9c1f42dbfa1cb490a8734c8f81ca449f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677a49b94eb785b58e0fc0f212573406
SHA1bbd5d4373fe6cd194c1313c3b9150cf15a3029f9
SHA256fe4a2ea5c969b5837b9d5240d153d409795fb3324471a1da92afc6973c98ab51
SHA51219b7f2e92f5ab67d98b9f758572069d9ca266afe934da22ade65b4a91955220b955d06b8603c84a9005eccc46345be12d5e291d105a417e1e1009d0402807d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1a9a3d7edfb632208349485461fb93
SHA189748dfb0375475299c567414ec19870b0697554
SHA2562b8ee8994d4e618514da7173f36dab0981c3c8913674f2961ff65bdd29de0caa
SHA512524ead7c71aeda06f7298ecf86e6eb2b245f2ce88da973a3fe5517b1e0fae52c8805390c9be02068585580f1e1ab2eb9fbe0c9ab81e3a7be8e19a1a7598e2eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabff6f6066a178a16999624a84b9469
SHA1e7e81a2c1c6429cf05dc981dea27946b8a313320
SHA25691e696bacf12e30a087747bb6de00f9186a3001bc8db69b236c1d953c6a0f961
SHA5120868190d9df3dc26befc0b2bf48c37f38977d4ac5d7e446e19cb489afb5e853d3ceef981ca79da2304eeb422cfc6451cf5f3dcc7f64d1bb605d58efa1bcb44cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b18758511d484549a396c73e3026e91
SHA1a246da844763264a2d5b80871d08e031735e5d61
SHA2567165cb1768edab22fe0b6912253e4f8b56fe2c9fffb8b8f5a6332972ee4bc0af
SHA512fb7d09f738aad0ed1544cdcc932b9a18e99416dd034ccfaaa4d20c73d4e0094cada40efcaf9101ce20d4477b26787873fa6900157f9cd056b09ccaa8e757ba02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd8e5c8b13a4056a0f74e44ad98a15e
SHA1f3360aa53f179dbbba7d614db4c6a219858948f6
SHA2562bbd658a67f4acc0c874384b9a69cea5c5aa61b756f619a64dfb713fa0531da3
SHA5123132f5cbd7b8f221263ca3c3662d1ab0211c2b89a3983080767e2cf27df883325f46e3def8f6ce9a917b445cafecb06be5f2c4254dcd64660b9696802c078180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d00136aa4d3d621dbb9ff801f4126d
SHA123abf2d5f253f5b3bccf72a42584535edf87d64c
SHA2568ba0148a845e03df75bd291f684f354d3d90e7aa47a96f92302023a2082ef277
SHA5120267a8903bf3a201fc464feae7ea6efa6294c7288ca321ce9978b67da0d0645b2f83bfa5bac5437d54de6fbbcaeac2cba9b265aa5d0e86a2febbf29656ac89ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be103bf704f1a60f2c86861a718ce224
SHA177d36b21dc06ebdaec040125405fa0667af9b03b
SHA256a83dc3494c408357448b473618b0194ab2f7584918a5eea722e9fae45e626de3
SHA51299c794dddd817092fe73a04f68ee539756773a1cd1d0ec4ff73b8c9a741d733df09e242fec2cd97690257146cb9a570adf2c802465ec491228fcef3af0fa46f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f169c89ed012e05b684e21e4f3e2930
SHA162bef667029676afd038adee33c8e94737910220
SHA256f5deae6e541280926add1ed864b0e77b1286ad97100bb128d1e90fb7b5fed888
SHA512b064b012779038fef8cbb0f7577c94c53e24a22464d35976aff14fc767e28540d431e6f851bfc02f8c782f71311d164745ae492da8aea25c04adb884bafd51e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a