Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
69316cbe737716112435515d669e61de_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
69316cbe737716112435515d669e61de_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69316cbe737716112435515d669e61de_JaffaCakes118.html
-
Size
346KB
-
MD5
69316cbe737716112435515d669e61de
-
SHA1
870ee24e16fb1a0a5069fd35ab2d1576043410c9
-
SHA256
a81c2bf5ce4910c7a2769cbc71f86068e2af02e9005f2e9066ceae3c12cb2a57
-
SHA512
aff253e57225a09485e377f0e666579be2a847c212d6420d2bfe94be2bdfe9e39460fea3f6c3428761f8ca69736de34501c95b06cc483f08373b7f4e795e3da0
-
SSDEEP
6144:SYsMYod+X3oI+YENsMYod+X3oI+YWsMYod+X3oI+YQ:t5d+X345d+X3y5d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587181" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E4C33A1-189E-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c87ca7a9fb0bb24fb9e3a933186058ad0000000002000000000010660000000100002000000080efc5baf6e28bd8c708b84a7bc1183477566e11be416309aa4ec50af479e4da000000000e800000000200002000000099019ef9b0637f5123e38911ab9ad6c4997f8841d05f3b57839e03766b0b824e200000000d64539ca81b12578e6f76231dd0e7d309d04c05690cc0898c657e171539df9740000000e551683f5e983f93e2897c8922a71bb1f6ba921f2187d1a828ebe5e4541c8f80ce509a1b35f0d725869aba2957d8665aa5bb3b091e58b43ca6e5169e00204558 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0092b641abacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1844 iexplore.exe 1844 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1844 wrote to memory of 1924 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 1924 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 1924 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 1924 1844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69316cbe737716112435515d669e61de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834c339ab3482fbf36a1445b60f5df6a
SHA136102474a3c8dfdcd4e812eb63bde7ab5cbc75c4
SHA2568db49eefbc7eb0d0b7e0bfb4845dca92e02346c72c5b04bf1025e02c2b0b67d6
SHA51256802e9d23cf0ebdca4ecca1b8592fdbaa499b01adcf1c6e882702c8eaded26aa0f1ce5ac6ad45dccf572d0fded71dce5ebb204055dae7dd521f4626972d4b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d7bc8a76a07a3b94f13c89fb56d1b3
SHA1ab14838fdb3fc59dd2946d2f81dc5802fbba6b60
SHA256c2d36c8fb6ca52d39b742f7ab165082acb164ad8dd9e317c883ab9ce4d6c264c
SHA512dc25438d3e95f40f2df68aa070abb00406dae4c2942edf7a5bdd6a07229ba675cc9579c572803541870250582a9ce60c77bcced48b2966f7d3176a65ac01a570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a7d1577c1f2b4d56de85212d118436a
SHA128f06d66ecf35ece0e1a6c6c2a8f8368106ec4c4
SHA256dabc91850329da961dc2eae1a56c65418e7d0fe9e6e5f51336936c8ccb6c2aa9
SHA5126744e5c965d0eac15fef6ade7598d26e95685bc784cfd41a332012e571e258b74f0a43f544c90ab976577c008864e9e306dcdc4e3801cd8cab521f7e0690dacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda1ea9337bfb706fe765f5ea17f58aa
SHA13238e3af40f2d1898af070960b06a4abd439b305
SHA256cd51475ab72ffa63a94cee76f0d7da98388fff03ef7e947739336671119ab685
SHA51289576048af305d8d8372dd6e84ba963a572c1beb34dc81b5afaac8629968c3e95d0301e7a1ebc4adeb8431ced64f29aabb7c85116b189824cbad581dcbf6691e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbcaf7b55e42600f3d45d1f3a038c507
SHA1f1dad7a51b1cae7e7344f546a23825974ef21842
SHA256257c8a71845c262d1a91d388a3fc9e67a988a960b0cc913a0590f578616260be
SHA512745184b39faae653155488e41be1930d287840d7f6aaa767ebab27701e7d1e1d53a8ec90603c71df121a9e08c8115fc6bb2250cbbac425ce649ab6487a683a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5241c1543e9eb183c0c610b034e6c9468
SHA117fc680dd32b2a0263b5fac1467562b16290c461
SHA256e1440f45b3459e7f1b74c754ed27fcc9dada22b79396aa602c89de4280b56a0f
SHA5122946075d42b1d81dc1d6eafc800128df5559866710a3e2dfbed7d941697ba487ac0d5151f8fd20e076dbd36679f114936c1cebfcd7007dd327d101b177a58187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e1fb3bb5abbd528f477560bc843420
SHA131b30c681d1a1f4bcc85c322ad2b168acbc16887
SHA25653ffb496389270e4785e5da7497ee70aa72bfa5153f3225f6e97fbcc831eb7ec
SHA512620601d0b4a4631278f6b9717ea1788a4535a5194daa6b0fe509297afb5941c42a3de392eda15db590235d761946ce7b199eee68f17cae777a9c5ae018f2c940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eddeb5d797f717423b8bb3b44523a188
SHA17d9894422aa686e16bbd2a284d5a6c7d81baf3af
SHA25600c93cfd3f6f4a57b79b146ead3f23395b32c044e31df9fa2fb1503f5835452a
SHA512c7b0b2970719ba72e193145009e591726629bfe9f4060be887996e2e64188d5621dfbd7c08dc581ce03a8d84fc3c55a697129fca7e320edb8b6898df120dc6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5392205cdf58fca3a2ff4f93be4dc8d7c
SHA1a7f72acff66ebfc1506cd91b74bef542aabac681
SHA2566ad803be3081b7b987fc3a5a575fe857a66fd472b30cd2aa59726434ad2340ab
SHA512b2f8740ff501a5e6c57eccb96bdc171d15db3d34b35db917966f3aa20a7c9941fec2a6bd040544d65fe6a12f22d6000da5f37d4e40213dd2c60b6dff2c2f64b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a8f482beab6b85f1483110e003257f9
SHA19e60783a7457cd2fa57e92c1feb034ac314788b8
SHA2562626744e33527e644e2ea1a35fb29d9450c03d42e71d4efd643bf1d718a9cf6f
SHA5129f85df302e33952f8f5768984ffddf6a88ebe068c4ac9cfecaf16f37f2f13f29cd2bb4b22152409317b6d3931b21054f42ced30bacc7c2b8feb6c037ffc5cda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d56708bd7bd37c0e0ae2c7051967d3
SHA1d0bb4146a90f654a6dcb9f67b2f8d05e14846dbe
SHA256d57e96bdc72c4bbcca975e59b2b027f46c188427b0ca54c9673f440c1dbfd580
SHA5127f4d9536bd01d5799a80d80f2f59dceb8ad091618dd9fba29ecf79314c4f1cb497161a4b013a3d47b6e7be14539b63339cab722e2d386b15ad958b1505380c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79c8335a6758f587210bafa5fcf8569
SHA1e7c125bd1d334337e776cbbff8edd87daac50466
SHA25669a0dc6f9cbd2db873625c24219c05fc9fab6aa6e6525ae42e730141a1fedf9e
SHA5129fbf50421930caa3f9eeeb65f4e0d640329a9c1e7b259a5d6395d2a3e88ea3b0baf34a91b583520755a71f3186cda2538991a4cd812dde34d50ccbbf93ff06bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d680e1070db9090932c49125263281cf
SHA11e2ee046f3e12860ce73019a7fcb38926e886f7d
SHA256432d1a17e9e0066ca2664c7bb3ddbeda68de11fe676ec98408f01b96ef043e88
SHA5127669d4dcaecc9fc3c6d4b2c1c678c0de0892e8f5c5f027b91ae5a470581ffae103c42acee05ace660d0f238a1879e35acbcfd71eb05557bc2cd9740e6c733d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b982637efb97fea7f92c4859c225f769
SHA13f97d72860c39b29a1acd4e847b081236c902f1e
SHA2567bc73dffcbfb1ed0df80193e8ff7a55d94a8fbdf63ca8d36ff5dd66b28501d8d
SHA512d8cb7ca7a0548d5d645a45164cd966d09b41a25ffd566d50a9b01dd9b903d57041aa20aee12e1e58beb7d518e6566921016e19ed27ff95935919599b3dc1a112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59075c6af1bc4af4f0c251f81d678cba1
SHA1df31af3ea1aad5fa183ec1632b2539aacfa88ead
SHA256e6e98da0d1f3382a002b4f7146d38fb6c7a64ed1c68d6d1599c0d76eb4b70f81
SHA51216629c15f4f8f2ccaf9a8dcf6798b1a41739cc4cd83f764d5c2075d40bac20f1a4b8aeb7e7ee390e45b9b138b5899301bc19c5f7a9055e9ae0ae2c5b6e185e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242d193d00a3fdaaf9639d5dce386542
SHA19d96d021681b72a864b4de66613f569230018d55
SHA25671880d9f84eb08422ada0a194d344e28462dc15ceeffe53ad43330ea059c171c
SHA5121f083275ef9321b88d5f73e420392a229ec8478e290f2e9c7b20c62d8014c5f96c9f219ea092b0366a6b8d606618645783a6a49a2b11e39c7e1a6a1f704f7da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52975603598c09d2af8a42065da46501d
SHA1656c81affa1e770712b3527373550c301684f59d
SHA256c0286fd934cba7704038ad3fbb6250b9f009513753e458d155c39b952ab2ba52
SHA51286e5fc2cfe090a7d24105f21018c854456690ef9796d3bd59f4d1e8efc0e17254ddfe3b4b380093d8016b98b5bfe477d701bef0086e968a5640cf188631ede31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5df1788d4dbd97604d9d56c66637b72
SHA156b5c7a13e3d933a9605d1f1fbcd459f69c38c83
SHA256e372a8380d9b0183761ee58e6edc8e634c49d57004034e193309fa49977298d0
SHA5129ca80c59804ef99ab58150a198484c3c1e94e7f9abe4e3e1f6d843d65ba759f628f0989c169544d204d9460a1187d00748bed884dfbd5c16ee47be64f1cdffc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfcd3493da05077a43a0d89b931b991
SHA1903791196d6d8522455651f62a663027ab74d5e3
SHA256b50cc8c47b3515993057fc945816cb2c2cc5908ab4252217d26bc47398b55e26
SHA512a3efd6e428f0cdb52dc75dcec866f7f68ce8f5de8583a128752e70bffdaf8d1df53e8a5d02adf87328644715661a7fbd8eb58f8f902e19a4fd439df851547f24
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a