Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
69176472c524213527b027ac6304c7da_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69176472c524213527b027ac6304c7da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69176472c524213527b027ac6304c7da_JaffaCakes118.html
-
Size
65KB
-
MD5
69176472c524213527b027ac6304c7da
-
SHA1
f8594294e28e8e960ab25c7da30e47653e9a1a67
-
SHA256
88aee7c56da47a557fef446659e7ae14532596e10a7e89361d3896d977faffce
-
SHA512
2f7211b2d53d8c5223013cd9bf98f2cc48cb2e692da525db6688daa3d6b753d1832c898a38b13c51ee7e866730ce55ce75fba74d3e9c4b8d93c8f346897227df
-
SSDEEP
768:JiFZgcM0St8tN99OIsH457RQ7XoTyFhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/IV:Jb+LScTwgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70876601-1898-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584714" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000047c1be5ccc95644a94905d54e4c72c1a00000000020000000000106600000001000020000000966e9cdbd7f240cbd7a6884a354f80b3c7f7195ee5c6baacf0a72867cbf28e98000000000e80000000020000200000003de5a1acbb6200b1bef7b90b4d3d6ee7da203dba34680e6e9af79099a8957f002000000046fa080ad3660a7ab593c8ee6211293a24648eba5431df2c414e13cf44421f7c400000005b692af48490de816affd2463e9152b7f50a2557085dcec9852bff734a371b0fef051129695d3f765b7d6136d30656903124a5cf3602002322258d9f5c83e635 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004c5e45a5acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2844 iexplore.exe 2844 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2844 wrote to memory of 1188 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 1188 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 1188 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 1188 2844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69176472c524213527b027ac6304c7da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540dc5c2b4eb56ca908ca1442e346f487
SHA1bba9d0a86f7b7d8d0651a3353c69c2c0c50f1feb
SHA2567d25eb24f535c5881418326ca7bb3da20afab2306e775070d65ea810e50dcec2
SHA512573e45286b64313824501af69572639372e189f0aa7be54fc606640907fb96ec4285de2ea6d46104c00499b699c7d5e521e630bac5f59b7a8dc5664980ee2b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acea446c3f05e99d55c35403cb39791a
SHA13808ae6daf1d606a8db04765d40b8bdfbb68ebc9
SHA256e9a401e194a28217c9e9013b18bcaf7502411e131765560c2871fd7a6a76fddd
SHA512622fa15323e61d1491f45217df73c862dc2dab414066afed5393ce41610b8bac37a73df2fe0baae23f266f836595676532acb34fa060e84d0088bb7bb15f6ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b37712c2a228c9d4ea7d533abcda18
SHA17ee8ca1390fc2e37acb0cc1bf3b2f493c730a30e
SHA256d7e8ecea00d445b5f935e0c1739372cd07d1bcab48d79d1ed2e33a46f896b831
SHA5127055846a6268788aad4cc8399fd415234f37bf7c89dc38c42db176b77b9b8bbe5314be6023dba5748339db10fc2af81a437a51ec4dad7148aead3e086188ae81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702683fb70881f32f92e35ab4eb36799
SHA1c39d05230bd4f30f8bcba134d357c117d7e00aaa
SHA256d5c1cfed9c81d39ed8b5acbffe6fb5616021473e450bd845730f0b0f9b5a6d95
SHA5126864959e5e42cc9b271a5e6c3624b12cc2ee48dd6046d17da59a43f73b18d66dc0d01c3654901a6f48850de51be3688d3f059e475bf288d3ced8910e457b1d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcbe57698f8bff4a93dd1a1ca6cc7818
SHA1d9c523841ee3aada7463bfd29f116e2eb4cdf97f
SHA2566ed63798427cd6287e9ae414981dc7a3747a2c15bfc9290ef593b9394f6f7035
SHA51276acb4fae6ab9ecd59cf17da6943e66c4d39fa3e3f269e55bd30afc197f20154ee422ebde634960a65e54aff112f2551c8403da0898ebd010c7e02357127251d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b583b7855b8328626ba69ae0f40cb12
SHA180de51659788370363976c6d0142a61705aa3ee8
SHA25607f6f353402639f25e620abd7b7446616dc81169922d7cc5a08c56d1ef065369
SHA512d93127dd8d36866279efdb4f98f201c750c3636fb1ff8ebf0ed63e9a01c9e7f5ea6eb10bfc8f846d67f003ff8ea8f61d2a227628748ea7c6fd213b55a86e03df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed4a171353fd634e579c6f34ab0717ad
SHA124d79ff8db5a7c0feea6eddabf9c3aaa335eaf78
SHA256866ed915c75a0af381c44fc24903e6663a06c0689099268129a0fdee719694ec
SHA512340478e3b0019364d1c4d3b9b6c1f152a299a4c85573959572eb06173f97e37c41895e565e25836f9dabc9be2a7669225b0292c9a37af6ff74d0c263fdf9dd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e668a5a8cbc3bf76bbf1a46fcb5f1b
SHA1853901c6592dfe729586aa8063dfa4ea54abab2c
SHA256e1791e8dd762423a595a91d9e9f11417594758863ca64d0912e0e7e94cab6b8d
SHA51289c2087126ffeb24e065ab7e2aee4876486300958cc2573679135e5b787ff2451ec82738982ffb66319072ed9e70e2dbd2092d612b9958cadf46ae3e789f0f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6aa07bb0e90f48910249b5318c344e
SHA1942af77947548bc55666d8729d15bb5aa32f3f0a
SHA256a032d40fb0585f2f4f4b0a9a29eda6ba787aec60fb89cadc53fbc2fd85bd67e4
SHA5129e18e39dfb5760314c330aeb5cf8d0e228bc7efdc345eb01e0a464287faeaf4beede737f40df4eca09a663aee4b91de278d4f77fd95b1de8f946bb40a361ea9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59224d965b61e500ab257f6192becd6c3
SHA1c030bebaeaaf21644089d215e328f63aed0885fd
SHA256e086f570eacdf07c8906f6dd398ced86a33f1ab7182203b28c47db5b85695326
SHA512168c5617702313737d44a31ea24fb5b8acaaa87c0f38b5053a9e1c67c05e049f1cecba0f5d62af3df127baeed928d7359faa389a485160ed057b195c0851fd1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57393853d94cfd8ca4746a6b2c4a83f75
SHA1dd2f280bfb7075724982e60b821193e257c073aa
SHA25637b1bb9c074b61f83246a3bbd33ac522066571a0892e47d39582e3548aa3e34e
SHA512ab1ea34539e083ff0e4c1f31a889e61064c975a584f5fd8510347fb2adecb7ed38487dca71f2708d4904d0e189c121e0a6719b0b56e28adf9660fae77a54bdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c942494b3d494c8c3f3fc98481bec969
SHA11658206cbabeb6718d523824d9957a28c94642af
SHA25627c3961713e244c7e6f72956696326d8cf8d6811b79ee663692800c0e3b7f4d8
SHA5120ffecda58f5c2877b2fe1b24976dc9fa27dcc7b331e19cbf333d3e924802eb89781db69cd0efae3b2750e74aa4bcbef0bc2ddf30a776a96b37c426c1602c35bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565698233046e8c742babb0789a4d5f81
SHA1bb4566422982b44aad07d1d370ea4db58219a6a2
SHA2562a424e2002c59e414653d9132e5861ceee8e64db019a058f5421cf82ee306d88
SHA512cdb4f40869c0aea26f2c96bb9dd86e18288b2f7be32887673b603f3da5a17f7dea6c76aab974b44aef21d9d83c547045f08ceb07f4ad09b356cedea574837324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e991ee38214ef957840118cfbf76baa8
SHA11ffa8f82282534b39f62e27ddff4fbb3ae0531d8
SHA256a6c8446af35315208b8b290108f4dad1b0679679641bde5bc92358fd9622fcef
SHA512f27d54d91522d5e790cc4b2f859869f5dbed7bc4fd70318b30b32e822a4928fa5b0890628d7ed5323da5a25ee9bef4d07460c19566975d143e7c6174b8ddae11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e09db44b69b9c4f91d1a9d94f32dceec
SHA12a0e4a89644d939dc0e07c2abe70e0d4f4bdccbe
SHA256585143e3a3b059412419e71cdc70b671ebdaf9879610911a90d11d6977eb3f8a
SHA512e88e0046295c3a2c74cba86801a3883ddac511792b6e4f54a2f46f4da0fd97e7c73efc4c98056d27b55c6c146c497b07e196a0bbb14ba18d7032f0daddd5e952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b749547fd0acdab83a919f20f1373665
SHA1fb862d6d739e491fdeecfe1844e2117725a21c21
SHA256800a6c6075de1cd47ca1d24177bb3be698d83fa08b1061fb8b9fda2149b72c84
SHA512b9a5d46f98f2bdaf3b3535f3ae8fe0ca0c05c4d26dc029d200bf488436774758e61622d8fd16b0186996d1b9467fdf84b674c6b13c5583c2ca2c053d28e11a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578dba6a038a734cd460f0aebf1f50cab
SHA1d7d9adcd05fd7deff4bb5181fb6e64f4a6b183bb
SHA256341659b078e3ac87e6f349bb7f1ee12337b70bd23f6cc6b9c2649e46eac4276b
SHA512b31a294fdceab5a8ea5070eec2f42fce38c04bba04c6aa00dbcc3e941e11fe9c90c13b8edf071f03a6d1a9fe6feb62cf80cd5f9e90d2c35c56ab68b5794ed557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97cfec9512fe959a5eba047effc17a8
SHA19623453cae29f231d29841ae434a7d0ddf928a96
SHA25682381efe3352af19b4af916d4b88233909421ffd60233c4035414eda9d44d684
SHA512cf76072826a49bb3c3cd96a78d08e0652adfe1a8431d136ecb38ea387e1545dc50f34fe07d04a30c6882e224f6ff527a07a2a6ca7d29879e602557737981fc3c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a