Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
69338bb2486e0419f3046ba5bce78aba_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69338bb2486e0419f3046ba5bce78aba_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69338bb2486e0419f3046ba5bce78aba_JaffaCakes118.html
-
Size
278KB
-
MD5
69338bb2486e0419f3046ba5bce78aba
-
SHA1
995054bdec18cd895fd5d4f57617d18bb21081f6
-
SHA256
ce8acda25ef98dc283f819c8673fa4a6fbc208cd92e5ee3ac2b3667a6e1516ca
-
SHA512
0f2ea30bc6c3e743ebae4fce0eeb990aa9178ba1655982dc423d9d4750754533f4995cfc75ea29db584dd587cf8951d8a714f2c14f2c01b9672e419974cbd1b5
-
SSDEEP
6144:nL56Ikp3Rzi0KYOACT/BthLPxZ9Ve79Qa1kSMXb7dr2aZPLIq:n43phzSf3TBPxJe79QalMXHdr2aZPLIq
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b5a2a8898123b91291f364496fa44e1ea4f1eaf0079d531643d2d51ca49b20d7000000000e8000000002000020000000d8f3e5bb84c6d5212febd708d4fbeeed0a8f936c4e0ed60008b29d987f7e7d98200000005904b384a0d1a14d6f5c02c79b63b13390c22f7eeaa71b5e1fbbdc2d38eeb636400000007262e556748b77365c6ea104e43c5e45a07d05bb1b4b9fcfca11545f796242f60ec039ede8b7afbc92fb9b40d595a88efa5851510e6fd165572c3c6f811b8557 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADE50EC1-189E-11EF-86BF-CE57F181EBEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e010e883abacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2088 iexplore.exe 2088 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2088 wrote to memory of 2704 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 2704 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 2704 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 2704 2088 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69338bb2486e0419f3046ba5bce78aba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df832fce85246fa96e5da5b0f57e1347
SHA1a98b9bd0c47ceb13620eb9297fd0a2e5ad621ba6
SHA256bb87fafbdd3bcc0f7409950be6eb158e37249fa51cb74bcb2111b097b9203a0a
SHA51275acc856d97e05036c2831de06e0c3964317ebf2ab5c76f3d59923892301785bf859b2785464692e3a9d2536b6e182a7cf1f74855808218f6abd6d08986020e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51491dbdd5c483d2a99fedd24e6ee7367
SHA162990025eb9034fceb4b28c6ffea8d7f7d28109e
SHA256d8bfb7445c032e4be5c2a75904a1daa4e6a331504b297857d63149be951f5ea2
SHA512dfed16fa16843754738cae004010bf048246738bb8d8b66279d8689a0db03a2e7cb7a635692e9e8ceec6816f02b3e537deb5394e08518e02e44cfd8f915d953b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb194e9f99587c8b02c03fb1c8d1525
SHA1023e8c024497f5083353368b9478e2e39e75da6f
SHA2567adf481846edf1cc57794e647e2915d62c9478536bfe9e7a272d7b2f55831de4
SHA512121f2bdbd178951fbf33888cc3cece74084d57fcee41f88a05be055e78a55705a84652bc05426b1affdfb6fd6e3eafb0c9191b04ef63b659d18cc36e9cf1b6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55657d4359074218c9aa7a247a38efd11
SHA10ba4f6b4e6e78fb1f214e9f6dcd683856ed284b6
SHA256a12f9870633b55b7fdd42907959778205b957cb3efbc8e84961a4877537392f8
SHA512c331a37fcef5b53a9156f3ee2ed01a5914e3dfbf3694205743641ffe57637cc4eb7ea9a2903ea9d3a468469bc9e8c14b6a4716774f3111af5a836a713b74b635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586c6c280c2aec5d818f6ecba68d2e810
SHA1484a133bfbaa63e22be8cf781d9cbccc8c628afd
SHA256e51d66e44acbd3d5415c09fdefcd5e9711b588d1b32917d8678bd453b1d40fd2
SHA512a0fbbb85d49ec8dd53d61b282855e59271e02c0f2cd493f1283df29cb20f6fda31d48232d43b58bb96f3263151570bf62a816d0b20aecc3d5e85b90a08de5c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a6716a5856083a5e759f0f6630a9bf
SHA18b34ad7f82fb17c5f0b65abfe5af10ed81121f1a
SHA256ac73f905db31952feabb8c36173975cff6d0f8b61d0da96e6365b7a865612d4c
SHA512955bdc4f27e832d6abda2fb4f5f47ea3a97ec16b66f73fb280ac67a8f9e9f04696f9cf4835e2b313d3bb113586aa1b624d11a7902e0203902f8d4db142cb4f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f45359ac596c295347ebca3e7f1e2e
SHA1c89a5988d3ea70bdbf9e5d700a375e4ee5424c07
SHA256847fbe16e85e3271639f2b604a63cfd90ede60a14fb0d11f620c5286413d11c1
SHA51231fec4d670509437bfda7766f6e4101c47ccf929380f96ecbc11951e2d363888f939e9597520b0e870c60cdd2c68a29330088f3d6ec054b8376abd1eb955d0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d60b84364b92106b8092def8675821b
SHA1df0d0e431b9480dd43c8a646687833873a589004
SHA2568538337b2b4801f384a4ca0fbcf47a4852d6f2253d5ccb21c16c28745f6ee59c
SHA512ed9b3ce60ff3a41f6469cb380a1e6e0280812468e112d8a355f67e3b4976de07ff102cbf67c810ab383ad944ab402bd46b8b7e9a54a34ba1677b215055f192d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53768230bdfa2d6373049f0ba2570750f
SHA15fe11291299193c1ffa8bd42098f527fe21c7eea
SHA2569b18d023921bdb90bd0e0cda538ef1295163437b57270fec6e8ab14fc6377d15
SHA512946bd96cb06627f00b0aa519a1755d7d34678650ddb8485ff161fa0869c9a41ea3af89346ddfd334cea80f05550da4363dc03547eb340acab155ef426f6db76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7b5bcddc17630148e6880f25e87c4c
SHA1f5d1dbb3a670238d81e84c68698a40b29ce0a71d
SHA256de9a47a92bb31d3b5f36cda0554599839b517ea8971fd79147f9fa497fe6bc30
SHA5122260a964b505b0440f66549128967d67bf4a7a3f920644e67003d1363e48a12355f1e1d87b060fe7cbdaacd8e06dfd9e65c04bb0ddf825a3adf90817cf203f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d383783f1ea7ab0a050116aeff7a2ea5
SHA14bdbc44be73f1a27d2c21b551df654574cf2e301
SHA2565a4bb7cc091867fbee34038d29bce2b4356bae81db7cda275afd8cba8a4e3aac
SHA512b8288a57019ea6787685041f7ec99266965270bbf4902b4b81fc3dd02dffbd5913c0d421f94005d3a59cd46dbf76085d8a9b1db1c36df37c1f7da9cb94eea24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9a3ef037390e917370c33455582a29
SHA10f9e219f810e352d1bcf520b802e553ae493ad72
SHA2567a5fa301ceeaf907a8e44a848868a9f3cc1778f26008acfd9e4cc1a6334e794f
SHA512ffed80781994906fe0d23dbe2f7be26cf601646630f30320931384833a19ddbee38d41c48d1f3f4f0fe0e6388ff7b88b4ea0178704affa56bdd9715663eb7724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59afafe511c94a4a040cb5a349233e98a
SHA18c41f01624224fea437ad2361eede6e6c2a70750
SHA25610b3c623263fbcc51223d3551c91a5b743c03440dfafd1fa1dd5aa4066ed23ef
SHA51262a0822e4b255d838dc8a048f60c69642c77e8030c3f82ab82449eb1472060d5dc0caace595e44bc5d0c538b7d31dbc9ff4b518bc46bdd87333654362f6bbd79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d3bdadc59558a0adf0b5020aa5744b
SHA1a2c9707871cd1efe74ff6bfca79099f533b84cd2
SHA2567d66453c830e30434bb45d23b28a6abea357c1f2c4beba943115824436c33d7d
SHA512bc0085df6a5c165d0aadc6e332ef49313689fa6e9eb2ba86527836d88db1297bf156b8f03a089a8c318b3cf9d1c9d9b0df2340983f626d8013de7b6ff72e6086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef65224a49cbe70182d2601c94ddbeb
SHA1ac720dd020978202ec872e0e0e8714864681fe80
SHA2568efca2bc605a4972d6bc0b01e517e4a6e497540aa75dd327d9ee3a56cf53c667
SHA512d405c3f2499bdf8a253ffe0585efb174e8da9da98c20492efb69806d871ae25a0a5f166c56cfd5fe038c5f523612d7d132f56cefdf5ebdd9e4f5a22c6ed19492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f32258e2c5b1639ad816d013ee53ba0
SHA12701ccf22e46b7c4c34d6a04c3b4264f6f8e878d
SHA2568aeb301ee23b4e47cc90a8ac06b1f664adc33058d8480dfefaeff256fec87d5e
SHA5128d5e5f34200294e258ea27d6001baee91f4e5f27b3026c3f43208e32fa2821de2084705f229a9aab1c76a99f235ab3dc71fb33a1c0503ece427b24cad9ab3fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552de0e7ad8ad347238164b480e3c177e
SHA1cd71636c5c8782e66cbe66f8abb30c26285cd03c
SHA256254832b8680751730fe9d0f5dba594094cd04f690b68abadfec17c18fbcc2602
SHA5125f0e05ed6726ae509436e7c0cbd415f7ef10184d1160740350f30a28cf44de09e499b1ed41dbeaca6ede12c976d604a5fa9b2ed365ef4f8355c0a66ceaeeb34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c1726af8fa365036de749199a4d900
SHA145e169d84ac0023ab035b2d1e02c49e66c062089
SHA256a432ea2806f9b13d5697eb15da70e984e078595a7a679ad916ffb1da26b85517
SHA5123e5a3b73befe9d6f723d875ebeb680585593b5bade480cd596601af98f59bea5718f6f0d6a96f9f51a343a99d310f53bae428b8b4274c113caf668b354e2cecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea94a37d6ba1ed8799b020a255b007dc
SHA1cabbf8cf81c7dd2a7501163f33d5df51839b8611
SHA2569073b6c6bcb14a172c8d10bc6d289c0db433941862b9cc43391835b0e741e7ec
SHA512a84b6a20df3be0d77470d29dafb0985bffc11f60533c352ceb3c0c73f298a199c90f592d979578385332279880fa4758d8d798f1532eeaf0fa3fcd86e785f998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b62cd5eb5209aedffea4d5cb300e1e
SHA1145d53e42040c834ea0e9273fc55284fbc6fda9d
SHA25620b05bf7eb2c51ed919e3781bdefa94910905d224d700a11371939634cadb168
SHA51213c27f26f67b58a5d6a32f525db9a500a66b8147514282504acb5ec83e30ecf2d35ad05798a5182139882e6d26ac34a4d596870f42c52637a63ffec98bf927e3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a