Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
689352447f9ed7220b191b840d90d9a6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
689352447f9ed7220b191b840d90d9a6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
689352447f9ed7220b191b840d90d9a6_JaffaCakes118.html
-
Size
63KB
-
MD5
689352447f9ed7220b191b840d90d9a6
-
SHA1
ccf9c0fbf0d780cfda2ad63c9cb6ac8c274f2931
-
SHA256
1746e85b5712d324e5a078a8e3e16151a505a8b21b954f8d42a6bf9098344020
-
SHA512
4d9ba58fe7e6df5d69e9facdb955f23b9abcb7edaa658390ced2d001393d4960dcafb87820cce7679f4f7bc9607083b245782cfd0dacb92cad0f2ebb6497b0a5
-
SSDEEP
1536:SgDH5wkOF97asj3mUpGj3wBxksPCR275Pe/7r3p/7T0p/7DPF5nstm7ZgootNCK8:SMOF5WUDzlAxSnr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4036664389acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6783D8C1-187C-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005c565680980ee588319ddca0e8881ddcdb50af80cd45ab9d96ee71c3f454fe21000000000e8000000002000020000000618f52b8efbf149fb7968a08392b32bf93462d864bbaaa42f58f6075eb854705200000004a1c6609c858b722553e4edbadaf55d5c034e8056822684cff299663defd360840000000949a3ecd6ca9f86069fd520cfcbb377d92910874200c7522bb3f721fe65edec5a1b2a88fba504be6c13702ab4e6a24bc5cf899e537e61df06801e3233fbac3c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1676 2840 iexplore.exe 28 PID 2840 wrote to memory of 1676 2840 iexplore.exe 28 PID 2840 wrote to memory of 1676 2840 iexplore.exe 28 PID 2840 wrote to memory of 1676 2840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\689352447f9ed7220b191b840d90d9a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a51be52c1b6ac695b5a1f1c0c6339137
SHA10df5b29af6e90180704dca546ce29cea0c23f3e0
SHA256f4c1fd8428ef6fc92d214289e54f518064c98dbfcd1d84e1fdec9416f42eb48c
SHA51217e8ce3bf9e9c4939b3282afa62e0a9eaec7a9d672d5ac9999849c1cb5e5aa059e860555745bf1e4ec38e17b60b2d936fe6b6794968ca14718fb6426645bf8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c60ab0429514f9af4f327102e573a07
SHA1be4af1960bd42fa6331f0e6f257b464f2d1aa62a
SHA2569ef6f82ceacfb721fca6f3d5d6177f6b00fa89812616f27073d0244dd9420c47
SHA5129519176d06a5ae7c4d58c32dc56d0301f615a050858e62745b3269bfbe8d2b8fa2ed08a06d44125d63d35e755be49ea57a7f7046b1eea04f50450551e7e85f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af11b2e26d63804841e5ba20146dc7e
SHA1fedc06333fca4d082bd56bf8708c7d1128952ebb
SHA25674d239940bd8b81ac2404f5261d8b2f372d922ef501ae3fbf1586d18194362dc
SHA5122a4a411ddbcd8b3c7fcc0f3985da007d8290594cf56951cdd1f8f634bf424d7a43d24398c4d433a661fc41acce51ff6c7d4465d83526b046cc71c3e42432a413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58448cd86920eca1f3b6e0c9a775e2ced
SHA13b66cd244a86e8d74b13e510fbe7ba38c1fe8578
SHA256cfe915fc99e7ef481192cb860494bb36ff3670c1ab75226bf09dca81495cadb6
SHA512ef4bf203a114beb17005fbe720611bbb0b35412c22a15a6806773af5b9a9b9e7f40f8c10df3b85a1a71269fe828a0ad5ceee4f2e4529e49730e3a887b39cbeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7544dfaca23288f59d1c094237e1190
SHA1512ae64d013aefdac23735301ad037c57283e2b9
SHA2568d184c1cd8dddfd345cf9b85d4e804b5794f80a3b177bf2068f55d4d1d808afa
SHA5126d1a5c811d1e98d94cddcf3bb95777089afbe823e6b8fb4d5b66cf623aaf2a2f918ff3d67dfeceab726c2032cfdfbeced4b9ced2b36540db40e2072912fc8754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c38705421ca458de521444b1430c34f5
SHA153c058e2e8ae41a5f16829e1962d775315818ac9
SHA256d7a0dfe5553f6cb846027e23c4b9bf0a70d7fc97d152a0f34ad881b711d3a85d
SHA51289faad9e2e44c2b6ccf971511d4652cca8dfe5fd0631ceee08174ebf2f4a3784fa5482bca59936c99c8365e3930234372c917b17c7d112e6b17ac7d5cd94b809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af90806c371d20b499928ea3b25412c
SHA15655d3174289279b28e2cad29a371274b2e696c4
SHA256318b23fcd79d0efec9831c50f153638972a1967d538c433e1bd4366e7da92c0f
SHA51287326dbc6b8485fafdf552e3c7739df57500aa543eed1f14fad79c19ef897fca13f2114bafc26f235405d4610f7d52344a0cedb781b8d657f600073e1af15f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf946081502147f482bfa7a8a7f5412f
SHA150e9dd2530f620b6d74a8c13305f5a892011c550
SHA2568d2a28208338d5dc1b45ae790ab4c72f36489455326d5933bdcfa1b49ffc27cb
SHA51200aa9789de33f4e9eace623ce88d28c0aed3df43ebd6eb0cd070d6616ed2630fd2bfc765afe327298d354a45e909112aa40082f6d70b99bd3cbb82ba7931e6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591db183c074ffd40f0c1bbbc28d90c04
SHA1af74e9443c3437dc9c1fedf5d9431a20b3f19196
SHA256fa0745f6c3edeba5cd104892d832596ff8f100060a5c997bad4f1344692bd3a9
SHA512a29a05905b86841ce234d8d4bff64a383a90f1ca8b12825ad2281cc390b03507f21a0856d1eb544d581e361adde4256d58353593c595565416aea3019ca18d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357c905f7db4010de3a234aa01b6c39c
SHA1665111eddd8ae9c2aeb7e0f7843180d9477b9df3
SHA256c4be11749037f52643775609e1341843fe93a01c5bffb4ea1f2569a5c6fd41e4
SHA512bcaca1e172ae1674f2f005501960303fea9c67b35a98fe748a1b233c62457f1f7d48c2f1ba1302c3a1f910bb666d6051d53bbd9a3d09fb5d3a009fb6508a0c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546fe1ec97db6db08f61c4fc0dc4f0f9c
SHA132aed417210ca1d4060312d8a84bafb44a8fce4f
SHA2560fe3fe6d60d0906ff084437af033af31a7f90424120ccdb2b4a527ec2e60fa3f
SHA5128c409a39ed42a0193a5f28b11df62e6c94d92772745755ce293b445d63b59bc9d5fcb2d6898565fcca812d53fa8adab327618f420d2370922ddf4842008460a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501b095491113e574f63d096183a8efe9
SHA11f4cf36fb602849a732964ccaa1710833604d554
SHA256c3d3b10ffa035c72fa1c879ce9920da401ac85b09fa03122845fa77c39e302ba
SHA51207a0e5aec9a0d79f515076f55d8242987c9ee5cefe3c5e9953c5eda0a47d897e9e60e2286c9813e4d0ffcc8f3dbf8fe93963ea4ca04efc2a72fabb4994471cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c249c3470914fee20fe9f77f748ef2
SHA18dfab18ef8b148810500e1da0d4b8aeacfe690fe
SHA256b1d3fea1ef37fa7de09ac99cb2e33743749ad659f6ad37aec57a01044903a5a3
SHA51246aab20f5e62d7bed721ffa7066ab1d29542df327bec871bf5ffb33b596738799bc28d577d05c0f82146f12a732e9e2b06938c37495ae57539c8789596505b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bd2fc8f799751438cbb71195309fd6
SHA1b3f1e23c6bb1c28e8f78458232f4875a33d7a4e1
SHA2564cb922e7ab880c1ba28206a7e6858dd820ba8f22935c092b2ead1c216f7e45d5
SHA5120db7025ba4214ce5939dda99abf3e0f20322537f8f53ea520af329b6afbbb43b83eae2aa1683869d3b7943154bb22748f50def6860a6d24fefa1bbea6988523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ac290ef50f2b7defcfa210f8a67df2
SHA17dd81a02cf511c86bd22d5298f005d7313b15763
SHA256345d8e74533c00233c02da9cc8fd1aed575640f4093e9512bd6718f6f8a8e381
SHA5123aee44f25dc7a088af80c0b1db6c282a329f8377d5590d84895b2c60338cdbbdafa956eeb4556839afed3fcf59310a2567503cda953df3bad93d5ceacfab39df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf790dda990b768655cac21bda17f04d
SHA1182895caadbadd8cd773e10c2b70f913373ab16d
SHA256135e1429f2a9177189aa1d5ce51aa03a3410a2a8026d354d5bb6c17b79fe72a5
SHA512e5b20ab5c78317feb83497a61edacd4e87e2579c0366818eddb9c75ab92008a7eb30117cc5da466971cc9be61a3e8bf160566af3f5e1580c6e0bf0299b9f7625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad1f798a43efef29c9f11f1af996ebda
SHA1992e5c4cd63260a4b6f74141355aa96095b1d115
SHA25630520f2638d7191a42f8a548bd03563bb7d4b61c0601b88ced91676d68042f56
SHA51212a7f9e0924d01c0fdd174480ccc3b7e883492f1ced924aca12ccd633393d10df5818ba8392e0b229df6c18a6f7b58ca1846974db30beb75f76cb3ff55ba363e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59322e23795c955f1fcf2d667697b0b3a
SHA13f11ac6382675eb8e8692f9c43e327df914851c1
SHA256b7fd52065ef52896492b96447f7c08d662a45eb70b3502254f6ef7a6ccbdbbdd
SHA5125150eba057b3217b29802912527e2adeafe9beb94c8fb5f3af38c10cb8a7c7db09155e7bb0bce377c9d454e27d11d47e09d7e5cd72f5e1a6dd952d29f7e26f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f053635d03e43de36de2900dc822489
SHA1a0a4f2ec4ac2d7ffda5db88ae48c7010541cc420
SHA2568d28989fdfb4ad9b210c4aa0e6da970981faa307adeb54ec110777c94d0c77b8
SHA5120462c9632b699747870e32243d6f4719b86945f2d9175786a82c35f99126dd65f94c083fb63cab67d4be893726f6abbfe8a55e1282013d93cd778773bf6b0cc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IW68H88T\frontend_default[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a