Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
688c4793696dc598b1096e6292580637_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
688c4793696dc598b1096e6292580637_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
688c4793696dc598b1096e6292580637_JaffaCakes118.html
-
Size
91KB
-
MD5
688c4793696dc598b1096e6292580637
-
SHA1
1dfdb2f4c95d314a92208ca8285cd8dbf56e26a0
-
SHA256
639ad554118116a920b6943b7b7330c7159a8ea6b30f82867c2da9501ef5670c
-
SHA512
7751f720b98de1ed2f90637934e76ea16e0e57a6004fa99a75b921a3d75f6dccf6b86cd0175b3a327d378d6f4941fce9cd0d8f355445406d34ad7a34de97cf71
-
SSDEEP
1536:S6VXfbSFN7N2QXye2MxGsAf/hie5hNBe5yN0ge5Pe5JNjhfIsjNN9K76GqO2K1yC:SGXzKNyoUwdfPFLOexH/Bg8qD9y
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108bd1fa87acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E7F6461-187B-11EF-85C1-E69D59618A5A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572122" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000aaa639630e9f403e63b19e36c50501e84006b6d2f7fb62b8fdfde0ea6c7934f9000000000e80000000020000200000005f2f0330f23986a6db1a8e1d5f3ddd6db284e9fa0a062953742e4826231de1012000000080953e50c5f8c839a7a12856e63e095ee12e4bb632cfc29f4197f6b7bf5a882f4000000016da26328038e257b3093cd9c265338d8f6db7bae7fb6b5ebf08dd363e215849b6cd10904cf0ddb04d6ef97b5b8ad95625014f186ab66f6f324292b51b10f467 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2888 iexplore.exe 2888 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2888 wrote to memory of 2384 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 2384 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 2384 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 2384 2888 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\688c4793696dc598b1096e6292580637_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5efcab9c7e4f5a7fcaf7c823f35d58d73
SHA160b9e7856bc5f1d21c2e90b2f66ffed381a1a760
SHA2561f81db632bc1075952b65fcfd190523e8e81fed1dd6611a7447a85ce43f005e6
SHA5121185d78c553cb4e2d47c3151043e6fbc8b9e144b065cdf3c9b53a2b3000b97ad078080fd2741b31dba2462ec70f5c3178f5ce173ac914e78d842014295d7e3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD527fe7e4c322132a0706dbc9e720f2119
SHA1f7ac027fc5e4912ab77218f73d9e9a77b9b4a2d9
SHA25642e4c8153d150016a3fdcb77d85094cc644b0ff11eea9c1bee857a595fa29166
SHA5120dce72a20753a714c551b53bee8e27ad28f915394db0293d99595168cfc6aa903963295037b6fbff695d3a48684ec5ca4105b899e55856a6d73b76fc2c779747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bcd7e83c2a5602b2793cc60b31e882e8
SHA1ab0caec0e8228c6d3fefaa2beba5b6c2ff1366e9
SHA2568f8f023d88382098b5f9f76f9e670de2342195facfc117435279e4b692271dcb
SHA5121948f44a117d10499aa5fa489a6e97169f2a15afa1b9832db024543dbe0f2a7cffcc12440f3d6a8cd582981ed9f9696967a9805e26c39fdbbb03bcac9aeafeb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5641c650783252321047533022925be76
SHA157a303a222cbd2aab67eb7d86910c27925c08ae3
SHA2566b4d26301d69b08e9ba87b67c6697dc9846a781f78990bdf3bd0873a55e1650b
SHA5129b8333a6d66333f50011ff836e0c81ea2aee547b884d60e9c730d0ade5a357f93aa927608478ed16762e9404c1bd4749b646952878fe0fc0a64068dfee66e437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51766be98107c37bfd38aeff6381905e2
SHA128b82359b2ad3beefc6a03b0599ba3794d2a4922
SHA25652b39b0fa0b4f79f9dfc1146a2ffa2d8414e952393c92081c185fec5fefcc2e7
SHA512b06185d2dfe32d6f01fc53b2d1dd2bd09b63101165f5a83db574eb9418f44e8a21f9fa6ba35dedc107313fa9503ae271e8a6587ce66eb4f7e9a649b839095e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD563d2a3345ad07a9e006622d1f6c005f0
SHA10a82891fca0ae9bc9ca00142616054e3937b1dba
SHA25648b9d35c5eefadd22ea9f24763715022a4d1bef64cd45475ce1f4b8a60c1b3e5
SHA5122a455e0ba19026c454c3fe678ae4502ebfd81307db9985601fabb9b20bdf3986c4881175b934abd32f9680d5835d5f08ce0f82e291206f535a8f2cf544f0a95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ccbec31abe3b1411ba98237391d4e4d3
SHA18c02db12f35b7a5494f5c187e965cf7c600f4b60
SHA256b75f494230fb8f46ad2e70dc47fc767473a23a25471ead4d31e1fab098b8c071
SHA51265954fa2fcbcac33ca7aefc589cdfd93f1f32964c30bc0ca37af35fb787625f127217b0c16a0fbc47a4a1e09ca05fddfc8040d74ae7833a3cf197121d19787ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bfa354a9f1df9944a0690fbe8499fc2e
SHA1fd28f8ed3806ec6d3194557ffd76f3257ac3b123
SHA25675bc71715a359fd354233ebd2d3a490a6b3652a1eefc94eac8629c6147668073
SHA51228218c0e1831e72b56a3f222b160e4e1e2cdc96dcd68f6895616743bb7c8f407e45e1a4fd35076307719dd613a4c2c1d8522cd589f5ace43fe4e269a22d93ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b8ce3b472e08b56eb98f74356942df48
SHA119abce364b5be194a71f1482548a18390cd7ce6e
SHA256ed59fd2d0c3f8cc9108ba90671b554b5a0cc4e0c3540ea70f5589f818f7d6fd2
SHA512c40f7f142c486aba034443c29295f5719a0f451c60acd7acdad63d6f4a343e02251afc28acb31d1ca201a932689f64f15279a4b7f55734fae3bdbb9b549b16ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5001db76bb62d20ac64c50c674fbfd3ad
SHA1b6eb9fd7d269cf7f37f15b824fb5f1c66f55ae64
SHA256ab81532249e307e48c6babd2ce70da11914df45205fbc4473dbee3756e667bab
SHA512d1a4cd7461fbe09764b1e160d84e16e08e7c296ba8516c2adfe4b65ac0bbc1cc833db9307c5824f1e720e874e8dc664facd8d28f582869bc4d7de9e90a48e518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53dd0a594bd7741625f25a3b2355158a0
SHA13e40f251fb94dfd66f0c6fc7648feb082a055fdd
SHA2569222ae6ef6425c6e5ec18a1bcbedc748e7fb6d6d37eebbae5bead8940ea1bb12
SHA51206a21e62d12c654cbdc75316d332a62bd5b8a8a82e7a4181f1ea9632720726b0b728b835149f741321150ea2be2d6722d75ef83392386c34ce659bf417cf99ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD549cf836683cc33ba19264913a7ac5c15
SHA167659247b028db90ebc4791917432ec961b7ec8a
SHA25688ebb8bd8a50f653a2891041e4d25fad8410374ece499cd048b522bbedce3402
SHA512a3cd639a482b824561c0393146850f8644f4ea27feaf62e56eaf009e3de04fda23c6e018c384daba54a0731ce7e429faa9b57f27b419f99e95d8180023a62d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5042a9784c3272bf1649bf33438ac58ac
SHA1d6561a67236953043f9fd02bef5d8d0f28a5a3b5
SHA256a53a6bea2062e786a168900d4b5b7f41e1d545c607879e402aa082bc5162c4b3
SHA512d58e5a021cebc588bc399cbd2d9f1d68b97c6a5dfb3af1cf423fe493a4fcdc9e3ea720294b8ee47198043049ee2bc1fc28f4575a5a2162c0197485b3714dbcda
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\2567313873-comment_from_post_iframe[1].jsFilesize
11KB
MD54b769228ccc8fade41625c076e8f5f28
SHA116d8dd313557ff6cb67edb51add4cbcdb23d2100
SHA256c4c1b7760c095804a679a51b4c7f7d6138d6db722c4210976b1e9381f0e07ce0
SHA512325645526c0317af064a62e4493be7fcc2a04da59ea129aa319f1b23b178f1a62da931effb16d542be0295ac6e61f4a44eaebce45d49268fc51770963cd977ba
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\all[1].jsFilesize
3KB
MD5de293939e3ccfcaf6c1513ce6d677444
SHA12e82d0916438d160ea0dc0cc75f659ee88754d70
SHA2561edb603a5c91579155c87c7a7b3e63f93a4605e4ac875fac3a1721a94ff771b9
SHA512ba167b19761c98f755e1ab0e9b1bcbc6b12e86148460e555791b7a6e94e4f5c7387baf411d3b116f7a9c90904ac414fcd61dfb7a15568cad137ecbdac0167c37
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\plusone[1].jsFilesize
54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
C:\Users\Admin\AppData\Local\Temp\Cab36AC.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar431D.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a