Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
693047f5546fd04e5a94f748ad31e84e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693047f5546fd04e5a94f748ad31e84e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
693047f5546fd04e5a94f748ad31e84e_JaffaCakes118.html
-
Size
461KB
-
MD5
693047f5546fd04e5a94f748ad31e84e
-
SHA1
410b6852c0576ac4111e076d1c9a9a067b98d02d
-
SHA256
6ef390d0a18cf5577da57da87a2cd9c801ea6f37b0d91e7a5b75ab32c4465d58
-
SHA512
0e7a9f165d98c61dd679c79a22dd1fbf75bbea2ce02bd0d5453f0a1e3660593998dfb8f8ee41f596141d2f066a37ea37cc296584bfa510d337325b673c5ccdd4
-
SSDEEP
6144:SnsMYod+X3oI+YyQmsMYod+X3oI+YIRsMYod+X3oI+YLsMYod+X3oI+YQ:q5d+X345d+X3A5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1763801-189D-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fd7915b68f550a8caf3359d95be4624548b08635db4073244b7f1ee3e053a87a000000000e8000000002000020000000dc9d73e9f6a6cfb55830a24a04890527b19cdf2c7ab71a9ecc9df76bb1d91d3d20000000ddc1fc6e950e62fce44c141bc9c494c54a76295e9871c4f260346db76d5d4ed840000000d19c3883894c139af00915c607fc4f17d49347733bbaeb107e59d195141b44e2d7a14b7cde1fc2a8fb7004a2726e71116c5808a2878dfa3dd7628b4df7352b24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20aa01baaaacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 348 iexplore.exe 348 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 348 wrote to memory of 2652 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2652 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2652 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2652 348 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693047f5546fd04e5a94f748ad31e84e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5961cf3e77133d5424e2e8d2dee7119eb
SHA1d75f03c2442559aaa3696966be0bcc340cf3315a
SHA256d35fda1fe7aab1cc99bbfa2fc3e710ad5e0800d1a72db180e0e94c3291d3a773
SHA512693b2dcd158ccb86ade30cdb0d3337c4dcb5a49379fc8608aba1830f2c8989fd27296eefe24974746ec78e57ed60e559d24df2acc7f335ddd5dd74e2bb8977f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ca25858c2e7ef83a9bcc8aacceebd6
SHA1c5e288cc604291c2266eed98e35d88704d1ae9a6
SHA2564e3991c7f07800e9d49b851824deefd056ad01d865d16a2b899e77ccd81788b6
SHA5126ece4f10dbb7223c61541797c25f9a524ee9c0bd0d007744f4f85da7d0e50e6e47950d3d9d300817ae7e7be75f0a80a21d6880787fa2518d65191c0f56fd7cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c2b1006dcedd391c09c16f2975171e
SHA185b8e2995b07025a0e05d98421d0cee88f95ee01
SHA256495877e98aa8d64f4e8c029c47c25c7de0813ca34eccc9b262d0afbb7ccbb11f
SHA5123b929b54797409a41148b3f162c99101ecc5ae6e9a670d44b1bc4a09bfbc31a4e1a9cf393a3071b06d822ca0d6889428de85ef07b17794e9b4f610063850f5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef5b0781ffb99f7f8bf7ac053f74409
SHA13846483b1a093d2a837502f4470a5bd751156c50
SHA256761e57f081cb4ad22a2590d72de3a11cd043dbcac6d91fa6ac395c1ae5ca6e85
SHA512a05dd354ccc1078b96a540a372bcc46faac12d6c0a6c171036b3b23ac681379d57341931df0c0d7b7fdb308938f7a6a58fc34904c1cdd5f30cd096012b2c103d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7413a5f38bd585a6b7e270bebe55aab
SHA16dd22946cc24b2df2421d219d8ac83216c30d730
SHA256bc3a6454f972c43082539835d41e935e9dc3ca18c9cedea4971e6fd2c1c7d857
SHA512d95793b9f810aefebeb0bfe35cf731e2eeb373a68b2722f5a54a6b9f2bc1252b6a8247c118a5aa85ccc7bf19e7225e23e710d7189bb816b51f191a84e2fd95d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ec2a519e60c12a84ba2c79ebcac81e
SHA1577346f34aca78160827e2b32ffb21b6e4895cac
SHA256230bd68e1db206e33756421240cc639f345eff2e002c53502563637cbd11b10c
SHA5121b2c5921f8fbb4aacfbab2b4044e8521e971cda2304a468e75707fd1c957288a5250e1b05d64ba2968a7922316ed56c447eb862251c278f75dad54f373ce9c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b36667a2c09f1db21e0fc32562f164
SHA1f669f6f76d371fcaafb31111fd5f1b3402709ab7
SHA2565671794f5eeefbf1485f6735516b7b45fbe966b7109817c3c551277770de38dd
SHA512722bb5045438c54f97576a51fc6f3931800c658bb1a5db27177224ed0d1a9f880de85afa9eb8c5b0766732e13c92863529647c0c81af54a0a1a04a2612685a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52151f6b979364ad1bc4ecd12162aca87
SHA1b778b89582efe005265a59f519a325b8410423bd
SHA2562d5180291ee4967877623717a4300b55d85d0e2f0f0c2925c1d52e55b22426e4
SHA51258cf898993e2c7debb3a8228c4df33ff529388e5593242d4ac3b4f3f0f700ce5ef328de47989e8a8f8cdebf325bd86f88dfd1cf9b12ad65eb0a9a0b47e8bd54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04df50b7f48f24336c6cc5f9eaa4976
SHA11d44ea34f25dcd329fd5a724a931207673e994a2
SHA2569e9484ada13880d1f2dc9e690e90ba978817812186debd580dc679fa3a9f2543
SHA5122c27d3ec579dac8543ff17d6084b0b8a323d930a1568c0a02fe5fa2fae94a2276d815ffbedb1d15400eee4a2f0a01eb8b4f5432f7a4fe423b2f360d6eed83954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ede477a7dffd8886d533b4116379541d
SHA17f62a20b4cf2893333635ba5bdb194f48f210071
SHA256955729b0a02bf152ff3f86ee184a3138c5829f31a20f33cad73cb438a74f279c
SHA5129eb21bf9065cde5f6e4f83221af595381652f72738b23de108dafcb540f9d1aeaad1043d3cc564100269317c1bbfbd9992e5d116128fdff761fa94819a3c4e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb48de4a7e603155a31d763921e356a1
SHA17ce1ea6ed4f8810834c8c8bf07056ef683d29c5e
SHA2564b29ca653e47f4c44d8ac0edab19d505b821c8feda8097758112677b564b81bb
SHA51229f28fd6ccac77a6e092d979a4a2e427d61bbac4915ec1af8349abf3b7dd72f9a17e975f4934703ce832a4b9eed8dbc0ed2163ce0fcd174e255ac6dea4e4e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb33e595d8583871a4b6ac39f10057b0
SHA1d659aaff209c18d45f5712e4d2e0c690edc14a44
SHA256b27cc1c530cad1040b5510ca027ed6f31d689a0b538ab8376a78ead140b50e60
SHA5127613173f614121354edc67bfe54f8c3f3e0625384c28c4173bdbb0c93e65da8858eef16065303892c93d0cb1ff4e036c45816df8f183debb2a8d7f582946e0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314b5cd3e95736830dd2afe6833c838e
SHA1cd3bf1d40ae67481b2462dc5e6797d41b96e0ffd
SHA256258622e0a2e3428b3f462e31397436a4e5c8225dc20367c2b5850a0147067f52
SHA5121c326abb3366e92eff177f8bb29daf4632e47d5afe8228947d620319362fed125bf786c34937650209056dee9e3029ec38cd5ff906289c6b221c83aa28b109e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d3813b3f0f1552a879198105ae33f4
SHA1d7298c8d77628d9ecf10efa504922041f75932fa
SHA256fa0dd9385ca240a567c2a8fa85e66980500e7cc2ca28c0492617b9d63c54bcd2
SHA512581fdbcc757b6856594fbcdeac941b014a3b330e932858f5753a63ccdb3fd9b089c42812cd7b200a390e7a042a977086e31f8deaf9e81be090cdfa970886040e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c93e1a5cdefd6630a43c983ab9e3c8
SHA1e861c93fb4563c5a36255ebf9b0df118e7d750ce
SHA2560b55559a920b40a068c656c245e00fd56d190d3a2ed9934a06f7dfefcc17dbce
SHA51256bcd76598c3ffa4f2ca3f712d60bcac3252dc0abf26b4a42332e4eddf8e9708af3342ffa552ee1aa4b61aa1f37a67932615de8f9e5d702dffa70e991c7f50a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53de0d9363ac1785cfff218734d933da2
SHA16046ca2d04faf4fb759b39879c6d61d8cfdf3184
SHA256e56091064ab1691a88f2b6378b9595004d3a4b365c8bd0463af7add546ce6b7d
SHA512a08c144e0a5173dd793fe720cbd6fe09700d104314b553a3db45190e6b271c1a206d4f79556d27649f2f1051f36731952008e3baf69b0349bf53850160eb74a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9a996ef9e213eaf379504c3b906380
SHA19ee41b789482063a4bc7fa676dcc944314eab3c8
SHA256eb28f089fe552b55c112360d9e1ec05b9c451938cd12c97103e22eb7d95609da
SHA512bf72fc0cf0f69dbc53593e698d12660a0d81147ffd1e133e2ab30f67bdc8165c7d3837511770489e0f0a85b76bdda1ac587f290e43cd63c2880cd57b88d1d149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f1fbe8e8a1e610870c4971e38a5a4b
SHA18072abe335052b94b5ac87e87cb7247e673fabc9
SHA25680cc540d03daf3e87df97a6f14010dfad39d259cd5e4d74feb67bbad223d8d9a
SHA51250e493f49644f581a64cbae6401bd72b58663597dde96b6eb542fec9a120f22f66e3cbbc9d06ea1871cdec0281b890913b570ba7d91a01119eeeb88a4a4c44d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b975f07db87b350a3e13e426b4d21e
SHA1ff279d3683a43e98cf3ccac59e593aeb1bdda82e
SHA2563a6fa34bfedf2d89a9207565128af8b6f84927bc94e9f84dd40a64041ef5bc4e
SHA5129af26cbab8e5baa9286ae09000b868a185a954954e5afab70a1032641eadd3d87e0a467926fd09c047d96d6a83e38ba7d63142677c3226ce53497ddc9a9b875c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a