Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
693407bd06978adbd73548d431da00c2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
693407bd06978adbd73548d431da00c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
693407bd06978adbd73548d431da00c2_JaffaCakes118.html
-
Size
4KB
-
MD5
693407bd06978adbd73548d431da00c2
-
SHA1
fada887c9b979b8865ec485e0b2dcba15674bd87
-
SHA256
50bbc90cd8ee940f48a3eeac0285afb04e8ce380dfb031d0549edb3773aa675e
-
SHA512
7ad41acbacb3bd66085103a9937cac5425da4ac97d8241f7e680c45c59b31e389d452fab60ae2b13a7a4e0c7c228a86d3341b3024c05af7f6c105b52d0b702aa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oQnmQN1d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587438" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed0000000002000000000010660000000100002000000052fce25e04310a82d6b627985aac819fbda6cf2211340dcac83e1cdb71ab0311000000000e8000000002000020000000216f1094d3ae696cc03850746c0762ced683eea3183cf257f9f9d250a7377c6d90000000247bc21a08d0c3a730a82c86725450bd98fb3860bbac227d7d5468aa903b086d35f44698d9e292dd329c65546e642bd853b75144df44e91b295da8db5b27d80b7b5b360c33007914b3fb4c8a9d33a8c645fdcf91a52ec87f1f14c65f3dda66a4a2e79378900b2f3d649a6ba4025234b08a3a33b8b2c84ee5f72f524997b23d8d96884b58d905069b4cee473a125fa09c400000008a03f57b99d609f0fffcda942d270f7358fa0b5c8ec899b65af3335abb31acbea83443908812d8688660f2466091f814f1c49006708a5e0b0c6f0fa261f9f027 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e00fa4db0a1fb48bd700a94904cb5ed000000000200000000001066000000010000200000005c6d4678eb3fb703c799fbf373ea31f1fc3ce66e03cab3c1903734fb70836757000000000e8000000002000020000000d55d5d1ffa6836b21d8a191a79175546a7f702cf48b4c2a537b5c3cfa361cc8c200000005eac860d4a4b55145a016b4ce4629d4099908719b5489bd2438d073ee0407b2d40000000c4114da66fd065c43b75d85893c338665b1c6d5f7f35ee1a582edfbce195538db3346232f95d3bb7ecde176c166e3bf7691a04c44f96a6af5d70f306c1a8cdfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7884271-189E-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109b109cabacda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2920 iexplore.exe 2920 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2920 wrote to memory of 3024 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 3024 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 3024 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 3024 2920 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693407bd06978adbd73548d431da00c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588f89a0fe36b4c50d855f087b6114f47
SHA179e116ec06fec2cd7b58e0458d0407c65b48c93b
SHA256e34003a62d9a45749ea7f16ff60fb6db28c66a8ced6ad493a9773e8a84faea4d
SHA51248cc76e1ec44afae2b030afe7d8e18c546d2dd705193736f78f3398141e2bdf96377a48ba57c62e02ce6bdadbc327ab5f8a161b14108b04088de26b3a269fc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b6bcd8a489537275199fbb5b40772586
SHA16a603cc892a4d11b7e88a3964a1f7076f0b89401
SHA256c81219c9a74d4a633211c124724464f5b65f1bf2f286edebb325bdf8c0ee18cd
SHA512b56527f5b61d03e05cc79b4d12bb4968e3bf88133e19998409a314899c87b6ab0faf5748d81eb5fc36625bf18935d3ee997b1e2fc7d15a8fef46eadc5adc891e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55da04aa3c29733e66551b622e4c99f7e
SHA1fa79d1922dadf78700873ede69da05158a019182
SHA2565150af787d6acb88cdef6e7f4b7220ebc5b53cff61262af19b7aa701a81041a3
SHA5128d588efefee71849ca7f094e757d620c8e5a063386982171a5e71a7e495681b5f720a7379693355befe035fbfc790f5a10556c48b70a045288ac182bb1bf50fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b32f8770c1b188ea8deab37121491f82
SHA1063cdddf28431b5df4c8d9c8275b20c84e891283
SHA256c8ba08454b23fa852b2c35e219920ac0520353cdba52bacbf59c5696ffd63866
SHA512a25450ea923e5a27ce1a3bc8278ee179c2bb3736ed1f3d0b359daf71c969f15ec25cf185eeae75d58ff78c37262ebde568a2996e76e3873c91a3f0910307b030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c7bdbee0afb0dc9d3bd37ed56f56e062
SHA1f4f91d4613264b7733ce36b0821c0352dba691e9
SHA256a055d4dc197131437096a22dd0330cd58bedceba2abeb57a9f7fa1ae6c0fa886
SHA512b22c131a7a70c4e7e009d8e6222609038c227928f89c1d09f47fae34ea35f08d6642f5084d93390e176530323591d6fa59aee53d3f1d3a2e56c06307fd398c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d82b4764eefaeaf345ff73be7237f634
SHA1af5191b39232ab52d85e67a5c769f06778303e4b
SHA25652e5ef5c5ae245e7a6da53ccc5a350b8b43603f5bde7f00af5bebfd150467643
SHA512641459d3bb569b24199fa3bf846b416b96284cc9af3b657e51712e595a4dad8a8c8bcd920c2c0695ad204027789bdca47d971aa31f76dc42a69ed83ddf57c407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5978a819496a5e0e712c3f66f5d45967a
SHA1cb567e036c8a1aee1ed5484cc46ed1cda4eb11c5
SHA256313080013f9b4a3dd20eb728ed4df7f2bc89dd30973babd22d82209c54641df0
SHA5121687158d4f10a48e53d8dea5511897d396d7d287700bd60b31f35269f417dc986036ea5fa82789686b8e86c2300abfd07300507669f1556171f9594e751bd16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b8728cec9c923757b161dfdb4e3f41e2
SHA1eea6325a44a1d914feaf98e541c625014a1a74b7
SHA2562dbeafdb248a20330783186c40373d9d615cdb93d827cc20ef35c7cd9978a9cd
SHA512e71114189c1a8aa8fb463b8eff3285d63fb74f63026ff3efc2406bf7aaf086add502db3a82ff8c73f46ea586fc2613393efaf398cf8659ee6b5754c39606a747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b450f70917dd9615df9ffb1a39583260
SHA1f744055b2ad15d38259b53104bcee7646b935590
SHA25673fce893329fcdf72189457de52ba20cf04ae17bf045cdcdbedae39b9b0906cf
SHA512be8ba67fdae54a777e6a72caba25c01b2dce370d7530a765e67b0905e766d7ec7c3930ccf94dedc909fea0c9b2d760668ff8e1c500dca2206a619c7d79fffb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57fdc85fda9b856af3bcd44601466f425
SHA1948332e1eb1af2ad94259099d537fd2608df83d4
SHA25641950250039841205465853c209282021c4d8da57a99bcf6481a8f918c661d6d
SHA51219b7664e1a785d4bcc0db09d0584943cb0c428efc4c3cc4aa5bf025e045dcf0c98ca260d9aa626d0696712fe304a493ac40b4fc0bf25522653c637f51dabc876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD583e44418ff219b5f5b4cc59fb7d0f98f
SHA17aa8b480397bf56a754391bbc30d8903abf66874
SHA256e9980b6d9b3a6360d4394a49e385fefd7187aa7666b1f09eb7fe0765cdc86325
SHA5122687dba5b3a6390b4bd9c85c646eb20d5e12ce5e42d0d081aca1da6cae1432ab10b079ad1406df96fc5289c350864b089046ddaf2cf7d9995c2a6889bf996906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53eed7d2819047dc8453ba35a53cd7914
SHA15fffffe0f52d437407fc3d90a0279f273867375f
SHA256a4cca2fe134c43c5868be214d313b32815d55264178b45123ac4b046c5bea7dc
SHA512389bc7097d35749a643731dfd2311389ae02bd355e4e2ad72bf20f2c2b9834578a4eb7cf70a7fe9cf50be0261ebb7eeb1d96023e455b0c3a1094f691adf09c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d5893c917957885358d4674d570d8614
SHA14c876b0fd6b1aab6a12f27a47fd10d6fc2d755fa
SHA2565cc02df319d167dd5dd3c0354e0906d0b6e22cfe1969d91c0aa0632c58d55c32
SHA5120181592d5796317eb5c030eda737454021c4df7cf79154311ba39a56f2bb040c2b1d8f1c9f72aebeed4cbcb1f89e8fe9b0a6d84cc8e7544f6930a01e7c380563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d6ef5a5a33d2e5acd2761dc89bb1c0d3
SHA18395dfa2e84373aed11994d025fdeebfaf3df31b
SHA256e1fbc3d3efaf0405e6131715ff479982e1f980079e6cabc266dde6a321155996
SHA512feafc0afe496060b4e970ffbc7af45faf30c3a65b6732f8c3e5647f6fd6e3b1d950f474efcd84aa6a2ab72e041d34d4198a0727b351f808a0f410952dbe2bb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5547cad867220a3bb88efabaf319394fc
SHA162da94eb29f30113209a13e4eab8fc1895fa56da
SHA25625c9d353bdd269b16193fe7a57669cfdc784b0bdda8fadc23def0e8fa61d6bac
SHA512743e6fa7765b4e67212ba5945145e66295e91b32d14dbbccbe623ef5a7d88d35587b4011e058cbe497d901840b54276cd5f518bb7acd4ffde06956c5f63b1354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5635685af30a64ee3460ec23f9206c4d6
SHA143ecbe3752457c6afed98b47f58ecb52be440ecb
SHA25606b04f75132d873acd3ac20b5e0531896fead156a7b98fc49f8a9a62bac1211c
SHA5126f26099fa555a9d8857dfc9c03240b175d219c3cca5829d0f9ff2e18851e6ce5543d3c7e0d952d1cbbc987b06f8957f445cadc2f60f3a768ccddbe2abb7e7d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50361e7ea508edef98cd516b1ab7b8e1e
SHA1cd9e8984a90509b203d7a4c24ab3eaed515a06d9
SHA2567bbc791b548c15f02c6c83d0e2b1572bfdf2a4f6551cbbe419ea13d68cb922a3
SHA512258c169b04ab529d76a509c860ac28dbfdf7b67af00880ad90094645487e8041e3df7712f24b93d220c78ebe2b0a5272a17dae42e4508ef4853a55668cb2a0d8
-
C:\Users\Admin\AppData\Local\Temp\Cab2B38.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2C48.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a