Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
69332595668d52a2e5e8183bae6f6e1e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69332595668d52a2e5e8183bae6f6e1e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69332595668d52a2e5e8183bae6f6e1e_JaffaCakes118.html
-
Size
4KB
-
MD5
69332595668d52a2e5e8183bae6f6e1e
-
SHA1
cb3cfcc6bd4bc6c84e6f7299a03dc52eb684d7b7
-
SHA256
3a71eb80175b5e81f62b1fa4fd2034335be253f9ff64d760656aa4b165d09717
-
SHA512
3098d3eab871cda4f7aec3a1af06b1e5c9125fc0d2efc159a03c50fa041d3a3eb4cec071b96ad18feac588e81f39440e3b652108815d45766af3830fd4915a1b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8omtYfo8D:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000009dc052f606b59daf3af74698ce242242e0183567ff5a899c7919b3ed5b498a60000000000e80000000020000200000000d701dfc439953ed2ce34163a20a938520599020a1cdb078a814734ff2fb3623200000002a985e6dfabbfde771a2cf725de738d968ba6377f380eaeb98feefae5f92a148400000007f04b2f44fe3fad8bff07573e0dc43a427fd443a8bc1b133edc57c6f0afb83d14fc6d414238a5f69b037d7543c851ff98e38418fc824f4abaeb31fc2ee6f2dcf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C0A6101-189E-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f69170abacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2944 iexplore.exe 2944 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2944 wrote to memory of 2152 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2152 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2152 2944 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2152 2944 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69332595668d52a2e5e8183bae6f6e1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0d66d529d2548a023712e028494d30
SHA1324d7624a257f18d1e34fb45621789f6dd976b06
SHA256de07ed4876e77eeba85b1a39add6d46456228c926d24c5b6c10c0b1e6f098754
SHA51289cb80788affaa499f1d8cf5e3c0cc06b09e8288b6fc6aa596b77b0a6e2af0869b1895556fb33858fb4161253bf7e36b3a4a0c7ed2ffd6fa0fc447ecde0905b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50789adf052b0fd4ec70460412a506915
SHA17f72513ab908cea6ea40dcec7ff1334de042fbc1
SHA2563eac1dc1c361089e1a98b750873fa1536f94c0a5bcd8cbc1ceb28e9479c6575c
SHA5121e296e374754bccc81b2d3b6fd3e16c5d19f1e464d09643dee6050c7206d71fafd7a22fed6bf6932c44b53f137fb13007520df088541d061d49ce0dc169a7668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5507e30844c9951d382f0273165016d7f
SHA1f77936e3ff9ecbd49b84d8b2e48a7ac9ccb4b33d
SHA2560e2466f2e83931b1397f0d331bb9c40dfc4e9eba68e98609a02bb33f4bee5d3a
SHA5125c3b744f6cdda35694a58aefa951e667c6eddf11a27fc3fe88445056da0a5ef89c4bf76297680e3b2d61fc529ee7fe39ae14ea07a6e8079dde463c8c5bc5d27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ff8706918677f7ecba27ba15851f27
SHA143bfd258688bf92f72cac85a096d3fdb952f9b74
SHA2561f133046c56a8876d57de576667e0dbf35a20651c3d599dbf16de82c40af3f70
SHA512ac58916edfdcfa85be8a92a29de0a2c1464123d9cbb0a465fd661f1753730c4c5375d0901b91d1673996cf63095301f3f5d34fa87b1c660c105280909bf5c9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52df9ee7112f8f1eb0e6dfb9cd199788c
SHA1d5efb31fb6929ce2afca5c8c1f584ae217df0154
SHA256d8142e50d1d79c4ce4e8a83c01206890dfbabce48e42db56cb37d49807d54668
SHA5122cfe46d475ddc48dc8cd614b0141c441f54a76eb771cb9b03a7a88940febb1266f68524a153afa7e06ab9763f376f4e3ac6e5abe79ff0bd8feba94cc1987a9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b3380bfe12d504841613b5a78f4f9ae
SHA110938d2b5e1847b34f160d5f2ce4a6e7240656e3
SHA2564a9e2af4110a415eef50dcd5b420967c213753daf769992e2c94c2a70f495211
SHA512cfa04675081e4218e4835b395e6cac89b21665eb485db1323d827515472a359394599feefbcb5b4d692526451280931b07030eb742ac06d71e47421bb69f4605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ac53d635c8d5355abafa41fb2a3989
SHA1a3125b147688c5934c5dcb116fa3c5f5eaca354a
SHA2560d3e3797328a23b62eaa4fff63b9399eb8f79a7140202ce720775d5e874f685a
SHA51201dab188cfd105e3260f85d1adab35e6ca6474bcb1899f97f73caa142ae7d4b415380741175e4cf70b55715739096be627f3b9f078acad88e4122c9e5d24eae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e726a6d789748c008596e39f2923afd7
SHA1e60b6d791105d9a1736579c3b4a04b5e87b3d5fd
SHA2564b19bea873acf24e46e05a78cc309fa0220a075695166b3a7702f508c98ce6ad
SHA5121ebed47720a3ad30bfcaf64bbff6d52a67a683124fa422b17da2b9d62c462deccc439de56ba22fc94ca79af7d6c0299c232a9fe0b590fb1c6c6022eee5acf69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71be7677f63d1e36384523d5dfd6528
SHA108f6111e420415a20a7067ffe981366d17914d9e
SHA256b62bec5e1de898b2fbe058187eb42add9baebe60f5e417f3644a8e12650e47d8
SHA512ad1ee118b43d80ae9b43caae7c471ac66afed4f89ee61ad071b8135c77ea67570e6873047b201136f53e1dc7c1bbf5808d89da68dc50fe684ad98f1ea693d4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6c40155b6801ec0131c096f37e21406
SHA135172e42e56fd892e3202ccb37d306b2d1efc2d9
SHA2562f29a05bec5d4311e363e8cfd97e496eded40e866985b8eac6166fa3250f6a6f
SHA5123d3a9cf4aa3772ae20ff15245967f6cb63c6695eb672c0ecda4eaab807eac3e07b1774a6095cf8fbbbf55f5f9d592716f6fe9410292fedfbc3931e2b6d988e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6b38cac38d95974849e1512a980716
SHA12a20375c39b2fce4e957f97aefb6b198d4024959
SHA25616417a8304297d667c5cd167b69b1ba17a38e8551777f7c093fe65e0a6017977
SHA512def2f33806f38f9bd39d4bba284a506ecac1c8a95453b44a69418814797b1aad3576e507ef40fe04bf8a2aae258691f816c53853f1d57655a047c71590e7062e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dfb0facf68b8e341dcc34cee01e4374
SHA182b9be9e3b7caa20955eb27208c9f4f3a2a98b20
SHA256c9d57be79b4be1a05a0e72a61cb3301e4630f2a36e1e795dc884b181da924183
SHA512c6b008568730bcd65f9a493219975e908e9fc7fed4f0068ad5685e89b01a98cd03bbd6ca61cc388b6a91f68843dfb405d19d2d6ee36614a3a48d2944c19606ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a84b9a22af2186983e7cb11b9d090308
SHA1e4bb4d72bc55fdfda07a24a8a49dce6cbebb850c
SHA256b04be299e07b5e07b4829f7f0edd8a3f32e4a28f50f473a1af96ac2029ab06db
SHA512fe354ee42c201eafbc58a5227a79edfa6bfb09bf2520e0d8f641d5de3623ed52f20e170eb10f688d3340298ad7c858006926cc5c716b95acc3919508a6505269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff56759d19e1004053100e1a00980719
SHA1e4ef254aad3b37223eb056f0a5ab14ce3fc3457c
SHA2567db5959d187313a0b664afac378d97d678588cbe8a5861e2bf3dce76ca5d8e11
SHA512a4fa2a531b09160b086940d5e7c583e4db0161fff461d0a9be137fef39e6d0d25e3139c8acab4954739b32775e5d9213a2a16b871ec4c60646cb0c6287d78122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59509bd1011c60115369aac3f78aef3cf
SHA158d39c84fd45ea0596395d4462078cacfda2c822
SHA256f81de251d9e043d4d47b4918353bd7f242f1a5f95b6b78a2c5e83fbded5ce5d4
SHA512f8a7435a583f7cdbaa49535b5465383911333f2978994c3a8d1c6a7299d49ab78514b0dc72376093eb8792d0a15b654cbe70791f9f66f8d6618ed9e861e75e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ec825573cf1885888c601cee59c3df
SHA1efec05829071e77fae95045171db44899e6dca53
SHA256a3ed78fea64819c1bfcfc83d88956ea91bd09f1485b7af5a3bba9e5887bf20ca
SHA5129bd2cdf340a589cb7d95cf2779c6b75944955393631e61540f9bb72b6ec19655218c326fd554f0312d9445ebd3b6f12e0e1125d2b906ba2d96bf7c10dcea6492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339fe47a2b0c1be5c6951146a617c5cc
SHA19f951c3af2880798b2c7da465aed37c7f016e036
SHA25626c26c7efec144a3f65b9a930eee20d65c67e8b0d4b032d92238683139044cba
SHA51292f03f916774aca625ead4835643cfc9d44ae84b323b61586c8f8df8201f413f09fedad90d2b498ccf7da6b0917e735c8cdb271b789cd06cfd084768013ae804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef0b4d5dc1c3a0ec55c6d285e8b40e52
SHA17688c7b989d0a43d177db74b9b7b448dc5e8bde5
SHA2566748e4ffe482c19654b8d5716ee7806957bf8a25f37c44879c6a783f22a0d48b
SHA512dab33ab465e574b1c726f94397187f9d7dc65701a6bca9d6d7ba4a580a40aa7aeff95abc4a7c18eb45eccafeaf7d061a81c3cea6e8c70d104318de272e367f05
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a