Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
687416bf4d3e5bcfa5cd18a301bfe60d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
687416bf4d3e5bcfa5cd18a301bfe60d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
687416bf4d3e5bcfa5cd18a301bfe60d_JaffaCakes118.html
-
Size
484B
-
MD5
687416bf4d3e5bcfa5cd18a301bfe60d
-
SHA1
fa555fb381656f34cc878e12b9a02e4319fd788e
-
SHA256
3b5f5ed31543cfdb9b31a1df69ae0315c0616636faf6697b4001eb0ef147ca30
-
SHA512
8de5e4d5a99a9fbb6ac2544068d5938c2b2856023cbf78d0a18f301832d1e1cbd4013276dd62c2452bc7b178c840b4f49d5499761d049c84558d41061aa1bec7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30db266c83acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{955FFC71-1876-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e6b81e61a1771b7df405e927b055da5b498cf9376d66a6a15d678f50e4db3b3e000000000e8000000002000020000000fbb87e75ae705ff54a5da7a138fbe2e7b321a4d6eca2af678e340c37192f92da200000006066c1c5c6f092878429c23e1d8e84ea03403cef9e2b369c144dafd80b78105f40000000b54f59bb87a4e31d588f04b82722d0ba37dae12c34003d7a1f0ab02e44a730f2d606092c0c3d4d2d33a8c4ffb3d5937bc9e76b58d87db1f5e698905430f58f06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422570216" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1916 iexplore.exe 1916 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1916 wrote to memory of 1704 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 1704 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 1704 1916 iexplore.exe IEXPLORE.EXE PID 1916 wrote to memory of 1704 1916 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\687416bf4d3e5bcfa5cd18a301bfe60d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d9f462407cab06abe1d78f907889ba
SHA1477eec2ffeeef2cadeac96f3713ddeec9f65eba2
SHA256cb14782cc7a6930ca0923a08fe1bbc1ffe9dead23c215d9badca33a797849feb
SHA512859186b36ab60591951fc3740b89b55e715c8115fbd5081d5c0030e003d6ad1b5490e37db3bf59aed44bf42483f1021955a3c5b8e5032319e6d53cdfd6964a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6ab101ba864bfc4cd649c8cbb0c033
SHA1845e8a66d8b63fbdb6ea248abc70e695990e5021
SHA256dcf1c282b00e262931958e907bba940877d4c9063a0dfb94ad07e42ebcfe2f8c
SHA5120328c9eafa53e21a36140f2a5f89c6010569140e0ff9b161643c48e42123500cbc4114aef5330c8e085649154cf6755ecf7375f65f3fd319c858fda1cbe76708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53721f023ac982e3cba691ac2ae387d93
SHA1580f76271fc606d2a5f8c77870340b1a2a8ff369
SHA2563a2a9e41b98f994ce811921b46598c532dba976147aecf78c0a5f58c1fc759f9
SHA5125c0d50aae719848a852cd834adbc74173cfb229a4f0dae7a93887f03fc1826bfde9f98777938c7c980c0f5838ae55eea45500a8cb931462f4fd05dd86ab95a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db830fdb7823f2cb73e2b818548141f
SHA14adfcb07e5c1c39a3c92325e92c5a37f3e3d38bc
SHA2562ce279951d52fc5b0b2603c5b7edd13297dd287e85eca89e510e21dec5668619
SHA512e2528c29daff643cebe61e1616c97241e538273249bafaf3512e9d1b6bc8fe136eb9960d70ce4c01d131ceb3093564584cdcc4e5c2c94c76fb12c3544b106d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53069f1132904052a1f6a60137622aedf
SHA1b566dd908b77d55e7038520fd97ac6b28291c736
SHA2560882a21a86daeb3f9527e962c9cc8750db78f64fc8ab3319b4ed592d436c8a00
SHA51202b7a5698e16ade967d2d8909016273985913bc83d8612eadbf520380b204f694c9aba6b7c503d536926819b06b2003c7948d14b73070b43aaf812d592a68ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca7b2b6e50fa2b6c2c4878187222a1e
SHA120243767f747c31e1925bc82d7e21ddb9e8287dd
SHA25607d7da2a4002ed6782df58650b4b6864e60ae1bbe55fd10e14c40ab06de0f503
SHA51250d916f2a20ee0fa4c3f4d95730dba899d6c9dbf31ff13bf579614aa03567fd15a2505e79a051f7218a351f66447f0212eba07a3daa2ccbedaa2c11a185b8069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589af3b1bd6448b24b4fb3057282f2d31
SHA11d6c00c55a5b562bd6b0194d3f39c6f6bff8b308
SHA25617b655ddb935f498ec47ae73122713cc9c25b7806546835f1e2b2833292d4b16
SHA512f9123882b9ae36dad1d9a00a8e0afea3d1bf7e35060f4ba5af6f05c1fe3d038dc1dc5365a59d23f87bdc8d239a6cd0460b4d57d5c41efa2fa4cf5dcff1aaced4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a50ad0eb84b276d9085759bdcb5c90
SHA1a487f1c897d6db99d13d6ad154e5739f215df8f8
SHA256a687f838f740000995446915102c4e0ffff3e0343a9251d8467ebcdc05dd7471
SHA5121cb5ddacf5dff4d0a7a189ecc2b80744c9b892878ab70a9ebd88d50cd9438150c9dda19b846dba265d0b507be3b260a4e4d850a2e1e6c5de630ec22560e2df6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51598cb712f97f08a5c446298f16c6412
SHA10044cd2fb4905a0638064b127229b88023120c1b
SHA25697f8a48fa1bbd2bfa0618a6e167561c32df6276fd74657d7b25326b00d2eed87
SHA512fd8c383185c453867b1a7c179a6d90bbe5c1357fe0cc84fbe3c14ce1602c42b40c5fe0e6515ad191d9d1a259290d8b44b4cda53cb8045122864901e6acd12cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55721f6be657d0fff677fb8f1d3a3d695
SHA15bf5d25702ab1d3c6f1446501ad67286666c99ee
SHA256f20eed4b6a9256c1a64715f97f5bb5fdf7bf072f6b17492b6dac08ceee2096b6
SHA512657895fadbfdddaf1f173448ffe8026cd00a7d0cdec1d8f5a4ed07df411acc059963d47a8ddb73f57d53a410c4cf81a66d2eee250cd04a490db22cb2c5a56ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53311d7a0d5b3a65f2e249b674d39535e
SHA121e3ec0b61158dde7c90aa5b8769ac69753da2a9
SHA25692e8cb9ab08b047f9cb82920ccbfa82cd8caad8c9546698247b168dfbd3d009a
SHA512fd3d661bada885c42fb7ad56607dfeddb6e2e2acb2a9b48b1d3cac982482791646c98bd0ee3bf2ee571392ae05e9d60f556eebbbfa627ccccb2551e0f1913f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f07c79a101116cd0bbe15f9e2e1fac
SHA1f3466be8e3343df62921d3045b54c363375ab991
SHA25683b801c47c6095dcb38268538831eeb040c65e2bcbc674db349129c0a0ab5f8d
SHA5125c3b9d28266ca7339f1bfc450b17058f02f662373b08346dc2942a5456005c406686ce21b5f0e692a95301edf2fc48bd285cff7e7108cc84c72fd21aab3a45fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58269705bc832b1418642b1f3f743bc50
SHA122eccd8cbf1c2d8dc9800a43126c63e62cf862b1
SHA25654857129abd13d11a1d840aa853413a66231304f7b18dd8218e04c9efb46b4d1
SHA51259acaaae5722fa414fd587a871b24af50b664e02a52072180d3aed963327cac0f48c3aad8d3730d15ebd4377e4fab801e34cbd0877ab6fcb706f38d158599c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8ab68904ea0098e3279d6edb75d0f9f
SHA1f826fe4395cb10d2b7ba505937b0c151efd69d5a
SHA25668fcdf5697398141703b3d185b7e9c763110997e54934058bb5b2066fe78a59b
SHA512c8572f2d23d3379bb3b86816a1c432f6b933855005222203d09271a55bcc9eec1f5989dd3d02db4c83bf9b12a18f8828a38642e6c732018505ad35db01a36726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b20e9b25541cd0e0b2a94d558b9f62
SHA1251d6611911b985f472c82d647eefc43b9f61452
SHA256a45ba1fdda4cf177e50f43db01f432022d0d61a5c68d2a5506b9498af014eae6
SHA512c3365de3eb3ed44809d938404c1439c2da34889951800dbfe6a92a8984ef4158ade654d0a90e103007dbc38e4a5faa22ea7c08f73b1f8ea3014ea7879f798c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02d30c0aa9de5a3d0b578c8c453d5c6
SHA1285213407c7e45975239a45fc1d12e86d306b029
SHA25623d9fdf39277e6c291c704da3de17f69f679f91ac08c075576fc59d0d1c52295
SHA51223b4335eff30a17963a53bd89bc366b39b9134f23885f206983c3191d6de6aca25c750b2fc6ec36e0086dc3584ab247ae686b40478df244b736cb0fb745dc342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ee12e9996cb2a7dfc4cfc25758f3c52
SHA197a60cddabd5196b4d5f540b01e1cd6ee3f104ba
SHA2566f52b53c9f849c940fca132c48dce469d9a1a258f8c4aa3a7b665962008e8cb5
SHA512e2e82e2474461e1e8751a6c8d5c507b07234c6f570c427a020296c0ae695db206d3c5116b2088019e71a7b6ff4170a418a34af550fcb8e2e0fe34360fa671baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585db107283f2891cc7cd11f0cb349660
SHA18523f7c09c2af1899cab31db0b5de12c26467c51
SHA256cd1a6e02ee2e781879e0182720e615047cb49cd443754a2acf0ce51e66e27bbe
SHA5125a5b213c9e5e4919cb3f8f4e5a6da5725c66ef7ec5f905730669dfc392654b86fbc14463a40f3628c410419bb278131e14861ba4fc2abcee201f9a7e957762ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519345bbad8eed332171a04d519fd9ddf
SHA11df861cdcb24c4c24e4a26f913ee85f816a2ca11
SHA256ffcde9ab710e8f3f2723aaf48cb4fba4be12bea6a70637ef3e9cd33aaac2cbbf
SHA51225018a16fd4c77f8ab1ee31a349c91e08d5211078c65318312302b37fe2d50f8b92631557ae92dd786284feb8ad996cfca364f3a784a408527024bab73ad50b5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a