Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
689c3f6b568213e60cbb1aec30667e81_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
689c3f6b568213e60cbb1aec30667e81_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
689c3f6b568213e60cbb1aec30667e81_JaffaCakes118.html
-
Size
53KB
-
MD5
689c3f6b568213e60cbb1aec30667e81
-
SHA1
0cd093658073f78acd35ea8addbd33baa484fd4f
-
SHA256
537b646da5cdb7ba8dd683ea310d87ff57496a4a2e21bb3b0bf887db3ebe5c23
-
SHA512
00591ff9e23b7ecef6ea2cdb685d72867491609af103efe193799fed9b033787b5117ec7a8d83d71c65dcff43c43030f54b68ac199548cb0df8cb98bd064f159
-
SSDEEP
768:NZFYRkofTqmUfzg2gbrMR5MDz8cWGoHoDkvhXyEVUrG:9YNTU/5MDz8cHDkvhXyET
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{052D3751-187E-11EF-917C-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009e01db30a37d02c8a5f6d494d76702968a951fab7117a9858750a2ecb51efacd000000000e8000000002000020000000c54264de834d043d031e43d92080b6d212ddc1cf18d3a2d7ed214d99d677611c20000000d7b049da216b4a2acf00c384c61f3086f3b1f63231f8315b73465635fd5d502c400000006e873c5169b003bb603f778f32224369fb68007bd8a536b805b8b433cce6d1dba37c93a95f0b81b180430aad6bea55186e673294d393c746300964aa5bb5e9b2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f017c9d98aacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422573368" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 308 iexplore.exe 308 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 308 wrote to memory of 2168 308 iexplore.exe IEXPLORE.EXE PID 308 wrote to memory of 2168 308 iexplore.exe IEXPLORE.EXE PID 308 wrote to memory of 2168 308 iexplore.exe IEXPLORE.EXE PID 308 wrote to memory of 2168 308 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\689c3f6b568213e60cbb1aec30667e81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1fa348b56e82f073d4496ed73ed9051
SHA1885b7eb9d5ef02a8761101d9f0e2111ba9fce236
SHA256b7e259b567531f74898eaf2351ba01c3afd7bdafdee4d54919e7a8297747196c
SHA5126df018b3cc695a89c5282b134ed560e84a45f5dc5ac8def2505b3922668aa4217e51880327f849fa6cdbe399875b0166e4844087b3a9ced2bfb8bc5d1c376d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2ba40c6a8c19bb2c2b29430826e093a
SHA1b65e2cdf689612fa21e81df5153bc7b99ce63f07
SHA256c4a5f4c60128e1cd8fa38f84ee6c0c45990484073059e2376f603f5d9a6fa80a
SHA51268e41024a450de342db6d091563a978014d62753e64b84784a816313138abe7f0852466ed543e3e346b53e350b4f535cff3c015c1cda16521f964dc8fc8f81ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f35b687a668140aae36a56b0401afab7
SHA10857344d2623097c014434a530e2937895c9504d
SHA256fcd3628ebae55742691bdea465f860bbebb7b2e23a576cc1b0b2e9ebd3294e1a
SHA5124e668363808f2133f1eadec5ea76b171551eb9c94f48cd527ca2648b27c6c7271dbd9b69ff7009c6ec59c10e5340362cc6048afb23bb218294fb641de426b944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985c729f83cf60d035f61039f7d4dd0b
SHA163f18d1e99acc88f2c2f7bc245847b25adb32716
SHA2561acecf1bcbc562495c18e92ff0165516a0c7f8ab0f94056830cf33eea33d7aed
SHA5123d5b74eae13fcc85789bd32336ef62350c8d2dcfe64896c18bd2ddd0046f9be35a840fa85bca29ca0fa3350a0d6683161c78a4e19b2224f696830bd5d8871415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1e5e24bd4fddbdd8db7d375264dda8
SHA151dbf09cc7b788cac41d195cb6a87bba76c4de47
SHA256ec19d7ff3063cd0245ea87a45efefa27f549c698959349f7d68b6b1b283e7b49
SHA51253b6d3ee6b1fb0415102f0497aac8dfbc0ddbf458e2c29e2568fc33ab21cefa746af67494a061f3bfeb448ab0908d2ac9c1ff30f4b5e0afe1620b13fdd699dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bab49d1cad62e7bb29f13863814bf8e
SHA1111a69a5ad7a2c7efd094460f258b02adc72111b
SHA256ccf0ffdd5627cff3c99fbf2b648094f84917a773caab6e913dd124394b0ec7da
SHA512812987ec73cc1ce392c5bf81c99e43fbaa2dde3d7f0ec5bb780550aca26d82f7bfc090e7a62b13ac5b941c400452710c6897cdad00bd86250e50fa31679f9513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c6a5e256a1222a1e9712f7d9382b96e
SHA159dc8a04ee00e422a95a06260f82223eb4e176a9
SHA256c2c1ee817abe8f7aaf102638716c4469e21db60aa8e3721fedfd260eadd07e53
SHA51210d68d958cff5d9087a187e441b9af486580453f0e54fd12dde6008d69a4e984df41fbdf3a5b0cb2b1dc4c533f3d9318aa01ad31a2a90a02fef42bd8c8a0bb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcf85be485f31a0a4ab68ea0151ca567
SHA1b8e5222ba433fcca62ff954dfea7bcfd0f384e8d
SHA2565ade54c2b1931ff7ceddc020541c0d18a85c989e36aa4113d42d3a6294cdb0bd
SHA5127530c8d33701f703edc837d4395dfb2543972937edd72b596b5cc39523344d426147a29115fd869797b0b76ac8e4c15be355dd0f62b54a28f78c3c7ae41329b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd1f3e56b6af2e6d844a7c47c2131d5
SHA1754d9a4f8faa33c1faa28e305a9635fc093f0c68
SHA256c58f69d8431e4df793c0378f50941e79897b9899887d98873143ab3359ac3b33
SHA512459aaa67893ed49d3e9163664c5454b8c9e957f567a4eb548c64bd1a69d30ab761c3ee0db67ce827e0842cc16a74248d13d4cda26ea1e4f0e8fc72609165069f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8fea91c6973e8e2e5dc3140bc102d96
SHA1ec2ebd1802545dbc68397f2dfc621f16bebf038a
SHA256c5f333ba6bf01b99f03206096e1d2e616c50c80568bf32a8879dab9ac98b207d
SHA5122265b09b43a542656e28ab3c1eea29bfc14901c35fcfc2148817ac4fd159fb5a08f5d639f8d72c2d17e7814819c8b91e632c8b791acdfa149fa46b3c1d9715ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a876cad7d1725940fe18dcd5722bb39d
SHA19eff960d71948602cc0a1f40fb7224c1bbdc0de5
SHA256c906ac3e322d163faa08f68d3835e69dcff82e6158e8be5a284305896b6cf8ed
SHA51207005d981dd5e047b07bb23bb75381f6e29c4d8479a74c3caa2899ee3983ae17dee0a9f49c626f477221192a2700f6d6de2c0caf2bad5905c241c86a19bbbbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e3f7845fd0760e0a2476fdebd8201b8
SHA1464663824a59efb5b43073c4ed8df0ae03cedd75
SHA256023591cc382f44232cd109d07ff011520c20647683e7891871550c049ee8729b
SHA512da24d08d981276a0c63d40306d2982065d3f2a5e83770bfcc769c5d9edfd8f7510cc771efee860039fae7a21598d36e8067ef207a8a0ff73508f6582a33c5126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259d72f406f8d98a24fa47f28e0319af
SHA1d8d311a04cf59885904d82aea166c68f3eb76087
SHA256271efe3c21f2e4fbffba613324063005fee55bb2c0a72aa9b7d525fe3e515d80
SHA5128b47ef76f0c9bb968ef2f2ff89cea3ae6d1022ea43b84fbf725edc8ed672a718971b794dc45dc92132fa06ba5ae3b37a78ebfff02a0f95020a5bb63167ce42ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab4ca512e5eec87c503fbc5967dc9dc2
SHA1ab8b02cc63955d2bc9547f36c1a98f4c6a75614d
SHA256744c1682ae67709b768024ba9efdf468c7714bf75b824463ade3a0912e2223a8
SHA5127a81b23d146d575fb12c7ce15801f6cb53a2454c08801c5524f4ce4831041664f8fda036442394c29133de905d80c274075c967b9c1dea3fe91766d378fc99ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db49bdf3803ea69e9387eb65153b7ae
SHA16d87ece26ae6697d2beae35ddf697df58a045827
SHA256b3d463e2832b79dc09dec1f03c93300d4361e2a60728b47f7362f0cc04974fd0
SHA512fcf7d93d97416e7e06f2be4d6886e60bf8099937235650492f05b36f23205d6308111cad3a879ad84b02ea5fcc9ed7167b8b241669fcfacbe253995ae8e6117c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be30511675c99d96d22f1074999da71b
SHA1c89159f3521209ad780799c4df130588c509136a
SHA2562d794492d6566aa58de26acfd7f7005c88a8ce3ea4c8e94c144010e0a3e76b46
SHA51234b8db83e5e9f710c8c22aae482175d6c24598a703b0fa349c1e40fb9b468b0786ffddc34aa315d7ce4b1daf73fb3f7d7a759f5d60f941a6352eb517451338f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e5de7d7696fb5aa1973446487f0457
SHA10d5bf1767ddfc18a59250d2fe2c5016233eca679
SHA256a3f60f950fc8c5e9a8e5411b8b8153a2bc7c78f21dddcb5d0c768051ce6caafb
SHA5129e35bac2ceb319b23771ae0f5d96538c48091c4941d322dbce687e646259a4e9925ec0a8b3e880bf541803a91a32ebd0ce4570fa4b96c2d8adddd8ae067b0f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d3657d43254b2753277d07c2f31e47
SHA1f25732e9c68d53803b20eac1226a243c35d60482
SHA25630acd33fe5b409db67a54210bad93ce8f20441a21f68e52210dd20693343b49d
SHA512d2925029519abd6a21e60b403ea0529882835186641dcc6a0ca22f33ec7beda13358060ed3abf01ddd39b8c1b9d76615bcb4b3c86c0191e01bb546c25ce1600f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ac8aff03adcc3dd8d0acccee97fa69
SHA15f7d0fc09e9233cb44fb9c10c97b1d34363067d2
SHA256cbc3acc9ace556c135b8cba9d977ddd6278132ed26e4b9e53aac2abd200457b7
SHA5127e933d2717ff0487133249e8ca1aaaa781f51e95864c9347d936a3b0872b83b56679541c8c765fbd2932c84584bda7e9979316c6a37d8e0cc6cef4c8b7fe2023
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a