Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
692fc2a810c39ff981fd4794b446ffd2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
692fc2a810c39ff981fd4794b446ffd2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
692fc2a810c39ff981fd4794b446ffd2_JaffaCakes118.html
-
Size
16KB
-
MD5
692fc2a810c39ff981fd4794b446ffd2
-
SHA1
7fc386459290e57b26ca8ec04856e08970df15b1
-
SHA256
8cdf2da2988c94a0f11bea38dd26d580f5fe6e1e9076f122e7c75619937537ca
-
SHA512
59ecc952f7ff71a4ea54165c27c137363f4d7610d9dcfdbf09ef40abde43838a9a8eaff91c04089657d7d427d11ce80d5fcce5375848816cb3f680d22374e6e4
-
SSDEEP
192:rdCHhx17FvlrlUHdWqhl+6mTVQHNp3zk2GX2PnJI7Fhbz6FudMP9nebM:2pUpw6mIeLsJwz6c+P9B
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023bb6587a03bcb459d056b490b563c520000000002000000000010660000000100002000000037e42aab8654a3afa41599bd312c1f141b9348e1a10b0c5c083c5853cfc47185000000000e8000000002000020000000c5fe4ae50717b9e76db7571d85413122fc487e081994d59ef32077f845949681200000001c8d070984459fba3478dee4bee71e7e3c5701b194c6bbc4b15ffc7fbfb0686c4000000092d15d4e5836b4c74440c12ca667d0d4276f11614d48c312c22f731f8e7afbb0c45cc4420eca33a071a4131785ffcc0e158ebb278bc6fa1291bfcab66c8cd43b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C416DEE1-189D-11EF-9511-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b68d99aaacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2008 iexplore.exe 2008 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2008 wrote to memory of 2252 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2252 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2252 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2252 2008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692fc2a810c39ff981fd4794b446ffd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf7f79bfc5b86d41598c926f3cac8e8
SHA1d2e7fb7250261a81c69dfaf25f9af8aee8548438
SHA256f6db55e57eedb813c5c2e1b9f7e8244b6648b8afad5f56c2fff0b99b3d9b04ac
SHA5125d2e4f7924189ecea4930cfbb4b445820e72c9ecb78edfad1e5f52e9396fd72cdaab587b416717ae06179821e67e939608ffa7468ca4c9f05b2871807230d8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0723a8a176df814bddd3d5b9f0af2e0
SHA12396eed2a6e89283663c9a11bf72dc0a0c90dec0
SHA256a72880cee18ad13251d76fb73a70da90c3965dae5fc51d92dacaa49850941596
SHA512e1ba95d05b8f848ee51d75b7197db2c6ea0d7f4b8af3398a06e026e283fd6799088cd3f2659b0e234bc3b6e5b416e42b1197c571f9d81632e7f53f9dd1e72dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dee3c4015cf3ef3e14ea9c4d487c6c7
SHA110ae8a854f2bebabfd376927284d54d8fee70af9
SHA256d0421accf06edda05184864e0c90005c789cc7dcc0c2e5ac85d13030bea46172
SHA512ccd2da46c66fce9b799164c3f938e5a92abe506e4c90eccbccd99b2454117f5f61cb79c228529109590a03e2627879399cb14ee208239ed890ad31fc463ccac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ed4c5d3d2638ffec2da9f19afad840
SHA1ced2b694091f9c8ac005641114dd6892f74c511d
SHA2566d667e904e5ffed3f4add7d4e3ddda6586e4983b4328141b7deac668bfe4b2fb
SHA5129bf7b0cd7b700e918f01ee59e5c2bd70a184c54232ceb68b3b0abc8fb14f9de0d0a9243cb4c1949488c11218ac879d72739d8046de2b3d9764790fc90cb09814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427318908121ff553b6078faff652155
SHA133ed539316b5a685c47b960a41bc4d3dec8bac87
SHA25628bd2e71864605357393a13eab4821a1e85acfb66a8e5d41185d0762d907396c
SHA512a8aadfbff389847d5eea8c76d51695ddc98c4cf66d4259a79d5a631a7b92b58c5ede8594b6dac139dae4fd5ab222e8cf710a804ba5138f7e41d6b9d0b4f468bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6aa9ad8e0d5345a291e735df24a9657
SHA1170e5f037c6c9876f806ed46ab30bff75d99915d
SHA256c891c4d7599d494509158d81031a6e731b0653db7240fec7f28989f94bfd018b
SHA512b28a6382b0cae3608a27c79840e78999f0abfa1af74dac3e4143b4eb83baf229b1c15c26ad848adff932df3a4a50f4734570708210b464b8cd2e4f423cd45d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585cb23563dd9e92dcb0677c78781242d
SHA1d38c1cb5d0888a77a075ab29588eed21ee467f63
SHA2560dd63abf68711c62a5bd1ef16d5f55bafd44e9eff78d575c62f6d8e86ccf8873
SHA51238ba6f841742734ede36a8ec819658a0bcae4d3a9aa26826b8f982c1ce1c27ae9f3945b90b4f929a6b05ba32a824424f78140fd456d786e678a12ea2c3eb60cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d60b49058b2ee6502f9ebae7c611873a
SHA1f7d0d94f0c2d35b491ea78cb889c884e6fc0410a
SHA256b5b046f209187e5613e31068b4404b0a795d8cb347d7f36c9c85468d22b79efa
SHA5123c1b0610af8fe5817a12c0e7a6ea598ac54ec13fc9cf9aa1c0f828292c74f79a289e62c88c0f33a2c1657a1129cb711e5bdb97dc9a935c142cd12048fccb2abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581747aa76bab0df71881a83718d98236
SHA13d96f67792a884f8efe88ee513883e1d1257cd54
SHA256e6df7866e707a0ea6ae47ab38bec95bb362681cab5a74b84e61869bc1d7be290
SHA5125027cea9058b55e01859f6a3c6f90322f89de5478abf1dccb72428a0b37334b93b95a2f196d8d7da11ea96a5d7baa37e33522ef491bd1518836ffbe30b1070b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168d181d69d6585fcd67b79eb6618d6b
SHA154e6caee0f6562c023e5b1752eb882e5b3bbbaff
SHA256432ccf604225fad930ede09cbee6701cb232e5f9861c18287da1420bcc2bcadd
SHA512e5c15f435ddd697f24f5ea15d5b0db3f50930cdfbb780bc1a9227f503cb733f3a25cf24a8d3ba2f3e5fce79af4e8859c20c93b9b2b4174c06c0e6c4f59630a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b24f612c11733c1bf3f89c7f74ea6c
SHA1b47ced8ae6ebd8ac274ed70380a3f6b049738f2f
SHA256352a58276bc874b5dc0e102b8ebb40a69815c9ef10f554e9da7a199c26a94807
SHA512a0fe81366e6062836983644e75dcdb8ec1c03deca011c4cee615c038ba19730b2ef6360153a07385cc838ae325b6619835a09dc2ed69a2fabc5e8e0af955cd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59325cb87f1ac5d0066deda0952606034
SHA122edd8db8cbd20fdcd4df91eb441caadf3cb3239
SHA256600ae6f7ec3f992f9d8bfa551504d8de9194107ba36e0a7224a02127f3694963
SHA51270b0fa0c7df03cbf80f861630581ce8e5b1ff455d140d541a1bf4364abae787000ee161f93dea934a5b97b4be29cf851277dc320d4c8648c313aeede91e77349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9139c5192ceeff020f24104bf49192a
SHA11e3a3f614b9df104f9483cbda65f15c138ae3af7
SHA256793c4710226b46bbc8d4bcd1ee0b4ad5ffebe25411c149ee7a87506eb6d301fd
SHA51261d8285243bb9efe0b68dbeb1f0adaed727ee2913d2d081720c899fac8f7d49c4aaa09220ef1533cda52f548d3309ed34adfe4f914a690d942aa6823b776c983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f3f5320eb9ab1eb7e4cebea040d39c3
SHA19a923d5faa25a88f5ad06991b4f9c97b6764bdaa
SHA256f0a171c124ff58465d6a80223065650d9916897bdf0b35688c0a5db6353277c2
SHA512f97d22dbcd30fcdd37c59db1cbb87afcdce130e78113253fd50a5d49420ab6c5cbf8885e330f551f7b8bac7654faaa6d80095f826e5f7b6491b0daa9f6a881d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca84a2c5cff892363cd8ab06e98318e
SHA1ab43e60b093c855e03e77afb6d36ae4bd380adb8
SHA2564392ed71b775f6c9e07a2ffe908e6f5c68a5c4008f0f65c6d5e006c45e8c8d40
SHA512032a1f0ab9066ac133845986ded58b37bdaaa1f344653e0db5ea3c0b0328b33e025ee42f891c3fff7e509694189544d6e9f75a0127df6eb86afcec25b9f27cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c793e98d9f8a6c8ab709af1343cda8a
SHA1fbd078074841741a6908e5647e858652fb8ac31e
SHA2560a1452a07bfa117c22633263e6d9177b54c4456bc008774c2d1e05cad9592c52
SHA5125fd93271a79913f302a604027f47fd95b393cfd1fb110f800497008ab6a7c468db475df7f997d16f715453946391354d060b7cf2c7f7e3a32d8d2560ec14e0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fcedecd8aa41874cd42dbfbf913e5c6
SHA1b4a96ec3fb9dcbf308be9975740ea86463be9e6d
SHA256411c08579edd43bfbaf248e156b479418e0dc1be0c110c012b769fddb4431e0e
SHA512d528552d0437b97b6aea2dc0f7a5f09c056510b3c127e88b768ac67119d0b482767ccd30dbdac1ac3db73f48cc536b9af74e39c744bf9b56babcbe314ccb1c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff96c4784639f9a3a4202da870537dbb
SHA1b1857dce31f1bcab2b4f0709f4168fbe43fb5426
SHA256475f3f6b10091e8f565619253f502b64b89588ba242e9b1e1e9156a89546422a
SHA512897544b46394841543129460f757b3888cb7e5320e8e458d91ce8bd5fb58887ac5649d7fe68d5eda88e05bb7454f05af4093f2d7525ede9b72c1df46ba413138
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a