Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
686b008acb0ab21cbec2dc1612444afa_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
686b008acb0ab21cbec2dc1612444afa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
686b008acb0ab21cbec2dc1612444afa_JaffaCakes118.html
-
Size
94KB
-
MD5
686b008acb0ab21cbec2dc1612444afa
-
SHA1
3d5d3c8c3dc1e57a9ee408b474950babb0790bd1
-
SHA256
6ab8242845ed1f7c1553a2692ff38e001750c918adb78aad70018fb0dca564fd
-
SHA512
220d663f6b977f419c4184f0bce8e9a68580d059c8887b0270d957a99f217f04c7e813c9362d6730b38bbcd2fa121d80ec2c9da2b2c2220fabdb91429f2b850d
-
SSDEEP
1536:WMLiN1/GfBFLDfC5raQc27LTrPppw4T1ye+zZb5BdkrY8mgHC+qpEyW:WAiKN5BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2C66101-1874-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500246a881acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000072deced5bd94ca410b31eddc512506a917e1ab263e41e76aae4c421936fc9fbb000000000e80000000020000200000002e7aec5c6ab8ee11167cd9c60cfea909180ee3c155d3aeca0ae5ce30909855f2200000003093d23c6e37d25e75b91ed87cfdb0588029c365c60f0e88dd4dff73aa2b79a040000000a82b8393f685ba1c02473862389a4855200448eae9e1bee8bd5de5ed435721c874d3226b83d7a123d0705a118badc35a0068ecc9ee86d37e37f892c715fb259b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422569421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2656 iexplore.exe 2656 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2656 wrote to memory of 2628 2656 iexplore.exe IEXPLORE.EXE PID 2656 wrote to memory of 2628 2656 iexplore.exe IEXPLORE.EXE PID 2656 wrote to memory of 2628 2656 iexplore.exe IEXPLORE.EXE PID 2656 wrote to memory of 2628 2656 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\686b008acb0ab21cbec2dc1612444afa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05726e68857f291265f703671522243
SHA1889ff8a254fa05c2af0bfcec42e05c44c5639a23
SHA256bcda2e631c3e525aeb48b53c029a97bdc8c9a717353259981562c006b0164a78
SHA512206a2ae20c17cddf9132a03849d3c474d2c80d5f5f44f36a044b78fc5cff66a6bfa7ba512079d76336dffd355562990771c940b079a17f8a7261ee5ca00c68b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d079ed1e4382a1009ab0e51d878ac90
SHA16b20f88f70162ee2b5a8f4e45049241e08c9a2be
SHA256719570c11cfefc64423de615cf6835c03bf7a8277d77da402f460c626fab74af
SHA51221349205a13d58d618736e0a92b4eb8db1ed692b6baa07a1f931ce901ff5605da2303b6c1d96038433a6cd68aa8682476e9919629fdc8bbef0141553c1b321d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db59497009ace0dfaa78de655cdec7d1
SHA1a8be8a494713d9a428d6850259d0daea16475f6d
SHA256b9566b0bcd1b96329e5fef800969d45f945e4c12dd40c0d53f850991e5d0e4d0
SHA512e3e1820fa1e77bf16cb7dd7f0a7871b4e0de776121bcdc9c6bfb3946467d0bcd1d3c1e313cae58316f929715885259ebd6703d247ba710c013bef74a3d17e8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54964028ea3da30f2c5d518821eff25b9
SHA1451ed45e10e6d64514d0b126b8bbeff11fb7c0b8
SHA256d93b9eeb86973f00202d9966c67817f8fcd0879d518b1f647ce3be36c38a9845
SHA51270f94a314b278afbc3cd62501208b781796c28e613226ae89eb69659c955da3b094a2329393928d999e1c46dbe4f2a05122b41d78ae96ee183c4d8051470d8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dea9f68bec54a82ba8a06277ed19c8d
SHA1c9a6bbcb1611be1b34301b37c00c79249112fd63
SHA256ffdceddda3b0adb1d465fd96c1a0cc964c0737475e3f7d57b002bd728da8d998
SHA51285d16b63715f6caac01dcee84cd2577b699903d17e9a2a5a3787cc3ee297a61e8449391f5bc9b3c9ed502a88db826bef9982a483f0dbfb8b71fce930052507f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8eb38f936bd3be750f3304db63b049
SHA1c6f13ab31261d1226ed2a1f5b6838503af1cf1cd
SHA2562a6de8eda7823c43540674572dd4f631777453e21e2caf51c650688c2338c2db
SHA51212de7beee8b2132b17bea9f07407afaad68b4cd0881c7b9094ebb387b60a172f4b693d0a7bc4677c127123c9558e89a949f9c7feb455679d518bf9d502b251d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77e626b65a15834d4776db2bac46efe
SHA1e95c225eaf63987d5551bb0811df7bc94b0beece
SHA2568f17c002b5e35c6665ccaa7169ae5f23280ae59749fddaf5f596aabb396df502
SHA512b2b2878f202db14106a869c40356db2c69573dcced0e63b64b5b5814af7b9857098b6ebb27263e0188cb177677ef0d940a3366e76ae51a20166407c60d0ea864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536a0a4f7f1c504040cd7a33376c057cf
SHA1bc12404f17b73a4449f86a1e952697d6f8012f60
SHA25641589d78020252e40cb4d991f0b998aa0840fa859ae6f2db6828a76ab48759ee
SHA5122305a8d1f83077c704b1d8d2741116f29809f26bd6985062184e4587e8e95bd13ea18e2859378e6d98472ddbc634d11216cde9c42e56aca90dd0d81731ffdf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9e6244ba2f452669ba511a489e94ad
SHA10a19d476552472bc9184cdd6f25f1a68bc9c6092
SHA256903d1e2a109fe00ef5dcad06a4ad1ffd71e7dbad970f56091da2df7530efc8fa
SHA5120cb8cc34e41a80a479c25eba7292215f5adc3021f13c67bb51135c7be9f51b0eca70af9b5ffadba6e9b1a06b9ad933cf51f33b3d6ebd14d9b65baab0cacdcb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691b7e718993ac8e2b5fdbfa2042a551
SHA15b26d3fc66fbec6ec6ba75d120c0eb218c0c1b99
SHA2562f20b7d87890a71ea558cfd65303750e6e38ecdc75622403ab0f40b73f15f28c
SHA512a97acb863f42d0ae2f25adfffde4da565f560c6b2015829b08452c4609eeadb5ffdd2e5e9dd2e5922c5d9570ef8ca2b9ed58111e7e8c4b67cbf9932da2eeb76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6797f6cef2b5467d02bae9000b9d449
SHA1ca35b548a2f0a02d8de1a6fd3c21ab2d428daafa
SHA2566b0f0d60ff7348a36e0c8140ac2be0be9614103fcd1ab13fdadc8fa97034ca3d
SHA5122651e5e912f7591983e9383cdbb1f19b7456391a66d9137ea1783716481a22b5b94f2a9b956c589418e74b6ccf34f847765362280b9f297c8783b1f13bce4af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f628941a6458232a23ef71219f0571d6
SHA11a1d999d149ee42a06d7366b3a606bf588a7ba2b
SHA256688cf45de5e63102e0ad5d136d49a7190cc89fa87275000790e6e8b214a8d354
SHA5127809ac1fcc20ca04ed0081a3328d1d632a5961d91bca9c2ef2877f9f09624985d2f3d02ea119c75d4d3b58c555b40ca7590ad45778ef5000eec10275fc27adc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e705379e61db940acda0d43e6d1fe6e3
SHA19a82ac8f3a0cdc0f4bab6e730b0594195f7f60a8
SHA2560f1df4b1b7109b51b110657da4c2be0d16fd169d0ec522b9c15c2d5aaee8825f
SHA51227a7ee6c9cb571d94169173511877524c386d2b593dea6a33b403088edf9f8c3ccd5099d9c4535a719b15274a294ae9865f526e76dd0921c6dbc3a32f94e575e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515ec36d78852d4ff53e6136fa7524af3
SHA180dcff9c9abea0fac49e60fda7e5f4ed00cb538f
SHA25629f946459473f945a12cb15e77aff7fd5ecf1b43a035de7233f3f21cc747af3c
SHA512b4c9b295be998cc366b009c1d873b2591e9b0d742dddbe9093f1be0655afadf5ccdc5ca2b5dd634724ee652c36121ab749398eb5f321e4752cf0381faaa84797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695f154dad47f81e5d0476e63fb89249
SHA1e2b7b1c50af0990ffe9d021fb7c626ff87ddc71f
SHA256c2b6fb7397783d2eba58498bc6421cf7216ac224bc14f13b303af7c3717bdce0
SHA5126a4a664b23e8a9a02f60090af648d8848f2c34ad98749b18a5c7654fb9a8802f88e95d4f22d260f8557bbb0bc1f9da5d48221504beb2c316a85c8db0375f6ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cab50974316e4fe5c3a7a397579b9d4
SHA1ef8f48b5977cb4409ddc74e0437d75fc8b0fec62
SHA2563d389befeddf1a316423e281639ff181d8d46d3be5b75da6752f20cb8f07a7b0
SHA51218201ea4ea777b7af8c342a8320d7fb689f3a7f8e75f95090b115c66951ed6fb8b4329468807a0a4d381f565de7311e712796430d4a9a8dae5ec4cc3fe71bccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce515c8bab743ab1ead0b3830b061974
SHA1d7d9d050ef1b8f8c69e2f93d8185596a11a20f66
SHA2561867a4e509698fcaa81208f893fa976236706d9b07e74baba7208c4704e263f4
SHA512ef530aa41f6065763896e151552b6ae32af37d07c07317f188a7e2c4e8628293cced35d7bc5b3ba3671238af6cba00454ef963772c2632e88adcf83fe5f70f50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\slideshow[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a