Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
69311950f488975791d8cfc193f56dcf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69311950f488975791d8cfc193f56dcf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69311950f488975791d8cfc193f56dcf_JaffaCakes118.html
-
Size
3KB
-
MD5
69311950f488975791d8cfc193f56dcf
-
SHA1
b4920ec1889c7d4d16b26c909c8e0122b72a9959
-
SHA256
46c82192748f92fb799eef353197ad55a49c97d68af7116f522de2f185e7fcc3
-
SHA512
3be05d828af4fee05725438eaa0c5b1489aca1d4c73bf57f6f21f5ef4ba6e1c0a2dfb727d01aa2d9d2711f5705c9c262d9d257ca344bb17d6e8fa81753c77f15
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008b2335881875dc42681aab1d3a968f270784cc941d13e3c8a6efd85a2de99fe0000000000e8000000002000020000000a4f94a28f291a2a0900a74fa873b3cf1b01a8304a09b909ab93335ddb5d933f820000000c35cf83b6fbc2c46280a1ebc16e49b77c7cc9ccce927483fc5712052da717b3840000000d0b12c1efdc0142ac02013a41d4d3e7ec45415bf2904c1f687c1f25f7a324a3ba0450b8e01b0cb6a01e802b29d9c0c26b69c1bd6fa0efd35bd6b03b7756c18b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f433f2aaacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DA99881-189E-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1632 iexplore.exe 1632 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1632 wrote to memory of 2996 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2996 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2996 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 2996 1632 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69311950f488975791d8cfc193f56dcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5f260eaa733cc27f5f8e3ebf5b305d
SHA15011e8c2ab3e89be1e2ab59dff4630a20047819f
SHA25667ae41640d3f9c2b59325a98aa2eedd19c5c3adbf026eac89ad25c0a4eb594ce
SHA51232964e2fca5bf3ea8454e699eba88c23001d72e1b77311009434a27bb9b48b0093d05dbaff2dbd2e86deb710d3cd3fcc88e747fcc55c985e041fb5ad3188a2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd9590122e986f582120bd83eb73ed93
SHA16ba9f222c8fed44c8b39d126a3fefb8a7f75abd5
SHA256dfe3796c5ccc11e3ef8794cdeb1c8cfd4fe855cd3752ca2dd4ea7546dbc6d25a
SHA512b8f858fb8761b9957b00eb15dcead587b0a6e9795960635a849ac363bf7ede185970613e0cf0951e75c5521159cd7b6c128803047ba4f9604e20698e41f63d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585cb720353ee7ef23d2a23d740e07a65
SHA1b0ab613cab7065fa7fa86739d77a05603c5aadbc
SHA25643b2cff006b7d8469fe279f06c15a7ac2765ba811039c7b0bbd5d16712cfb800
SHA512b2406ea9b278e26b7cb6b8759fc864618d64fa25fb55d500befcd0acaf9bb9cfbd246e08c70ab7847d235c26ef4f4dd5dc57e4cd71e31dba4668343f541b3215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70526e1cffef0a517c9751321355b1e
SHA1bfa30dda40c0c9fbc77f2441c4f6efd2fc7ccc0a
SHA2565c3c62e4db42047d957e4821f43f80e869deaa6a7ab9dfa750ec2f2c5cce7e67
SHA512d6024e99f7097a23abbc1ecca1d635cd701ad6accef6dc3d234af4ec1ca5a44e3b3b1fbd5fac68c37f38ad037c59a0dcad5dd533e1ecddacb945fd16b890be74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8622fc4439ff81c2dcb10a3c7fc84c0
SHA1868c4a64dc2db2c0a0b3259d6176de956f1cb087
SHA25698e876c33bb3d8df2489ee563ee221b18606ed9b0cffa8d76d7a64b6705d02d0
SHA512292f6dd1189b5183e003d498882749e0e29c079b4a5e7a100cc0a921928856d5aa90996f25601433f24269eec97c85d476662160d768cd6ca8c99adced89f4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e1002d3e4c4f6dd3717e2862cae03c
SHA14df4f86d1c8131cacbf29346e29f5378b171bc49
SHA2563c99914c0b551c2011fcb244c1702b5076a1f59881fb3ae1e311684aec006c2e
SHA51245f4b11fe5227b72bbc278aeebba61a156c8780eb9e894ee0f47a8498c47be0538412bd3a2d73ed5d9e1a6b071512598080d9636c44b5b83d46b1c6059f75d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548c79d4b84305db69dcdb7750e6f48b
SHA1770dfe932582d523878c64b014aa04a6934f3292
SHA25640aeaf402d313803727a09e231780d980aebcf75202070026f728ab79483a71e
SHA512e3798ffdb31815b3cf735e6ac9be5b73d782fa5ae3dc6718bce30811ee0d1624820cf841b85428ff67c3cf27e3708ff12bc3419a4fd36c8341b5b8863825e8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb4b8f23fa551dfc1bdf3a2105fe3aa6
SHA1decc474facdcaeccedbb1cc759f06f8f12385aaf
SHA25665dc823eb4dd96feb3eeffe84ca351ca8bef5e0c3cca8221c84884120018e0ad
SHA5128e593a61c085ef57ba96ca2ac77e4f7c81cc712994954b5b701a11b8e33881fa0541adba5fe0dfa692465c2d245b3fa973de8771df4eb80b773c61ceca9858e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb391fd2cf94955835e7c1a4cee5dfd8
SHA12425fb3c9c70bc896aeab34030a5e91996361d8c
SHA25627d9c3681870b43c39f57ae003557ca3a0f4f8dc02f75bab98e110cb47ad86da
SHA512d340c98defff60bc95f0d12d17422653fa57d7ab1bf1c2372b63e0f49af28e395ee9a4a67b51a4137c5bc069fe7bfc3333cb5f7f2ae161d2a661ce317e1fa2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558394c0ba4fe71866a9d6b6564b90b24
SHA1bd522d0b62bf30c69e8c8efba69b0cce19eb74ba
SHA2567ad0bca869c4fe64035a92449682ccfa26d269fbc825320406bced6fb8e6694d
SHA512437806af04c610e5f8b8f16d7c75ce5213e541d753bec1a2318d40b81a9ed8e67cf21fa2565ab968d6477b912a7a9b5f6e22f13a7a59e2c613f396973aa57468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a46613a0c3b80d7475709af49641b8ca
SHA18f243ba96b24902e16568b8725a1ddcd931b5722
SHA256ce463f16f8d686f6812d95de9ff2d6d921876c7ff530c31b31ab1f015dee2fd1
SHA5124bb4cf6d875404304fef33150a976d2031a2f0056a910a7543c2b8415e9a5c340b815505d4cc5f1ae144d9d84e5a645d1093c8dd9946d37cc549029ef60609ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8aecd62408177cef5b0a9e336bb3b48
SHA14fa37edb77a38fef72ff05033cc26746b101cf92
SHA256e33519369c232a011b6178ca538ee218952c846310447c5351a726b154b2144b
SHA512eba072ac46467db2eb6a72c9cf53f108fd98bc9f4af357cbf8b24b0b2a5c14410bed079ba63b7978e89356de5148a5ab5771af4349ce803ebfebd24e23264740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c245684b35b2b67e0ce3e7e31a538c17
SHA119ffc2f330878c23feca8c982c66d3150941e297
SHA25627e46780d96e06892cd6c3e62dec6be1b276662385c4a1a396f00a7773f30a0c
SHA512f436daa01e43a96f5fd195154cb9238ab63d9a354ef78c019386cd6c7cbe228b841fae2f9fa88bdefe333ce977086643abdd6cf35625890b155ee494ae09ba0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b2d5a619d44859b4e13c700e78ea28
SHA15ff23e0ba6b99ee77015c49a28cb19bb1178a08d
SHA256fd188a73133aac0f82dafc283f711908fa43825e490b3cf9f4afae1dc17a5f53
SHA512d5124630eab3d0c7e23a5193607714f175ac4390301cf0c7b06abff429512c05152a00abffe6f1c986ce47b57b3d8fd7ab36248b6124afdd76f4fc5a8d520cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddc2ef19c0be44be49902501736fc8df
SHA15dae61b22e355773f59541f231623748feea98f0
SHA256aebc19467d066d22b76790d584774c314f7be003200000a61919199d0db20d7e
SHA512c2e16184a73597501cea2372653b36252d35c795131a42132e7c8f7d35d0d5b8cd716edad5c96918b28d74c25b63951b2095774597762d6c25daacb3a09c777f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58111d6c11a9609f009b14d609bca9c9d
SHA19a35d0a3a043407f91aeceb5c9ca07efbb6729b0
SHA25639c0b7dc2c442370f3205e4010735119bac14d8d5544a7b0e03c5f7411910633
SHA51285a822929c7903f7d62d8a2f78e564ccd498c9b844a7ce4497a9af847baffb624c4421fafd977b7674dc5ba665db4a2589627fc67f14520a0c3576f079d3d7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b0c8f7fbd7aa19f4b4a660dc878ce5
SHA1dd2b3c036a06859e6b3f7174dbe5d983c859faca
SHA256c2d47a4b51cc8bba90e9b3c99e8607ee66895ac008ec862172b7fdb80f994f86
SHA512b0b024eed2717821f0e38f7fc41a22ede4cd0241678928901a68c13be6c94158a21292faae799770fb781dd72d4aa6e0529e756e5f7679e40f6843400873db2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5666a8d24a88909aa6b370536f8095684
SHA1b62b936f57098bf24b5f8b9f58032bb5deece041
SHA2565d79831abb0939b3017c725f17d252705aa8eca5aed9e1860e0034095f609785
SHA512f46888ba5cad3688875cf394c3439cdf629800292bad696345b9a758d123bc8a6b87477511931d8e53053afa64d610153a5aba51cf508fe8249d5d9d1ed8b9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e66c9c5eddebda7ced5ce77eff420b
SHA1bfacd4672e5c70fc3ec2d9653a8c6b2054d08ec2
SHA2566474f0f2864c9094e502a072f66570686f4bf870e98d3d99e10cf4dff77ebc12
SHA5121f4eccf2173396d68abd46e9329b3b63a1f0f6a604a06e9b08acae2cc012c2c0286c1d6de5d90fdb5a092b7772990eb73754ae8ac9c374450114c66f33bb3076
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a