Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
69190ead5c57d15e6b60cf6628fd077d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69190ead5c57d15e6b60cf6628fd077d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69190ead5c57d15e6b60cf6628fd077d_JaffaCakes118.html
-
Size
59KB
-
MD5
69190ead5c57d15e6b60cf6628fd077d
-
SHA1
319ad8ab25d3157cab1694602e9f9fd411d5cf46
-
SHA256
07d9a72ecc003a4f1d3c1e80f2bbd2516504461a6a034efc498bf27ded49de9f
-
SHA512
6ec7a9f341256f6c44c1687be2e5ebcce4fe259ed7dde738d0110356d0f43df8cfb01ebd83898f7c25b3c6e4b4f657aa17e387b156daea9922902091e1b23716
-
SSDEEP
768:WBKQIff7KCZAwTD9HqLJpVRlHb2L4hCc2i:mKQIff7KCOwTD9HqLJpVRlHb2Lc2i
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08421bea5acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E97B99F1-1898-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f89c1b3a8de49c4ba4d962ed94080f1e00000000020000000000106600000001000020000000b4604f5ec5322a11af8fb407f67aa6cdba3184a482f5668c295aac12b8a1aced000000000e800000000200002000000061afac1621114db64577ada7e23ddd8b530243ccae12e689424f713051611d422000000024e14da2723f4427b5bf742a17ac0a10f330c6c5bd3fc58069815a6c8599e08e40000000daf5f275fc9c50a57ed3e9ab16864a1fe3e61de7d301e56f9f503476aedbc6ce5c7724f826a65c0d15dfa810652cf2ad0e67c09425be06553112a855f35a703f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2848 iexplore.exe 2848 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2848 wrote to memory of 2736 2848 iexplore.exe IEXPLORE.EXE PID 2848 wrote to memory of 2736 2848 iexplore.exe IEXPLORE.EXE PID 2848 wrote to memory of 2736 2848 iexplore.exe IEXPLORE.EXE PID 2848 wrote to memory of 2736 2848 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69190ead5c57d15e6b60cf6628fd077d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522300b5237dfaa7522f204b29cd917a4
SHA145e678c39adbfa6d73c94962ca14299fee8a83f4
SHA25606a5d849bf2fc3a47a1c1c144276a8b7f2b25a901dd7191642ec145373360e7f
SHA5124cdf7bd1be18d6487d56daf411df9aae7627979a40999f0fa0e575dca566ec00c9dbbe7a2433908c867e324dfe615117e35d286c285f42e13b09d3dd78039c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543d6328f1a3e1c6d976fee9711489a90
SHA17c9ef437972f202c4ec0e4463bb77fc5a9a53280
SHA25634226ca9b3d35e6bff0a22af0fcdb45a125f10d3611cd1fc0efc68c4c34fa884
SHA51205164ec9122412fbd0d22bb553148069ac1e55f2017a76df19176a89dbe8c7c48c0db3940b7558b2e9bcc10859cf40631eef171ab7140b9883b6870058822b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d2209060d5ba5c4e1e394f3a76c95b
SHA1c0278e5961031ef03adbf1fdba7f27a15a5ea7f4
SHA256fdae64a4a9d279a97c1e31f05ba619679da250d9dc8e58dc20ccbcabe9231654
SHA512a8e2539319fafdd4d57fabf06b6bcd2656d361235004d83852e1f0f238e64ebc567caa439781da4015b9fe985b838bfb490a2b6be5196ac9493cfd0825fa00e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d9004bfa563e718045d41f1034f849
SHA1aa62337bcd2c407b283ddd512fe2c5fa76dfb500
SHA25650be1b65ad8cb4eabf2da700e12a8e7b9cec3108d047667f38efbe7a5280d198
SHA51291382c033fb06f4cf613a9968bbc529c59bf1bfe5f649991aa25b049149beb81c40662cf8b9f4ef712b469d104677c092c3ded206f3edfa49ff4ffec700e9fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd1a362117d90612f370dc3abdee2f21
SHA1834700d6b50e8becd101a10d387c5b1970d068d7
SHA25674e73f1b249e956375d3ac4ffe9ce2a398827ed475ab888fd3110e8c3011b516
SHA5124547c9d481ed91b49059b862a34273974c68aebee928910416b97b4b663696cb98e0ea93a82c242f40324751df8076f15400b698d45219f22c7bf0377ba422ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56894571aa167fe40df873eba2e4a366a
SHA10e36e45d0dedcae57de9f45e33f6d27e9db7af5f
SHA25628542facc881a1821c832a2065e736293ed57d3db60929ab7e3076830f3d222b
SHA5127b8dd546431721990d50b357081eea70d133fa23c8a7916d4b2cb9304115c2e70a7377e85efbca7143b2a5a780349ba48cc1ba188567d9b892d0420778189f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e58598bdab696af584e5ba6508138a
SHA1daa34e5d1c80e2d40c7711a328b43c2f2c807716
SHA256fae84b3c984920fd5292c409eca617af9d53df502936f1a8be6da676102bffa4
SHA512a36eed3406a1f1dda83fb9d5ef25898303d6d9035c9d307d733d5699753dc864165970cda1eda57a4d70077dc4865bc0ea4ef1f42f14752e83e4169280354816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ee96b3d4bedfd3023aa9d81fff4475
SHA1096ddf9935279e2c31982373f2cf0eb8fc313ada
SHA2561d7d24b3b71c7b4f29148a847b733a283bcf7154b11ee4d30f2bd8bfe4110bd0
SHA512231f921898649c261ef7267ac05cd07380205d0ee78e373ee0b69dcf0112d2a04d45f185136a7ab831fbd94869d06e2ab6701ad48865521a7a012b04d7fed556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dea888edceb6f2f0614f4298bb3a161
SHA1033f16e4e113b125251e9483654274c497be29e9
SHA2561e9e9eb2687bb174db532498724837bd0a5d5acb16a7df32dfbc7ebcaf0b5722
SHA512808e0143c448782a02687d46cfb482fd9d828833a91adb18b58a3b7a0307a4b21a421863fa33423362efacd5baa7c6b5b629b449fc7b43037bb798de975e5cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5580b20f81818a6fc83d88267010a1909
SHA14c628c6107948912ce9b6548fb3d245ab1191f92
SHA2569ed96e6e009644babd534131fc3bae46f99a2915b196473479f81de853fdb403
SHA5121f1232e3bb4c51b243ee3d23085d5674e13f407b1fe036b7a51e944237151a64e7816c57007ac21959649d9a19985f6a693a4e77b9707d18d652a97e421ebf47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e958805455b27e8022cbf09accd2fecf
SHA156cd670fe009b7cd6fc8b7d3a96bea21b698e67f
SHA256884ecfae784a34ea7e6cd2de3ebe09ba909783a37e530b52a2eefed567528257
SHA51296d9a31314c32628331d44755dd3ee9854329f3b82b8c55ba431037d372817291af87804c7bd17773b286cc67ec312b246090e22041af2dfcb8996f9fba03bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b730cd14e5d2e89b8c0a1d7f311b4d13
SHA1730a57d11bf06b3985918e2ff13148e32e42b6cf
SHA2568d0b0c70957e1c2bb3adecbdfcad482a168521fd6d68dff6a90617e65486bbb9
SHA512d65e7a944f809c5022b659f5a5e3aee9734779acf207174dd3d462108075ddcf4bee839c969837c3827f5aefd50a3f8f2d4c9a4992ce6d9230c5bccede9e42c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c54461101beeb2ae3881eeac1ed4c5
SHA1ec42a2a6aa34dc9dac9f46f06ddee6d037b1d46c
SHA2562fece142e52890649be683d817cb48679cc1fe575c8b78b4b1f20299a1bcf82c
SHA512cbce20a340c90c15089e4cd94b70ebf0a1ead3f87b86d48787dc0e8668791a108012fad962e9899f30c1c1d94dcdceafad9dbc26ba5cdd45de285320e2f5378f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a93aa471a24f31ece44301e0927a4bf7
SHA124a4eecfcc32fb025b61740b059a6d1a1f6f9819
SHA256b43590195063cd84ca00357e1cf570f34a2b795192794734d4a3385729feeffd
SHA5121571941efb8cf72a94eb16de4aaff3a878d8d388fc8d93c21404724b17ef730783195daa14d22c76dc6a2b8282626282d6ab4fdb253b6b1494fac630348bc426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578345d442a18222ad167670e322765e7
SHA1359bd5f59802a325e992cf38176b9cd983e27401
SHA256faf941c31025e57eba6db73d19c690ed1a39efb764d1106e3cfc20b15735d3b8
SHA51266918865f3b3fdc6b48d8a8e9f03b89410066ab148fafb76caee1c4ec9ff96522a16dd88bb356c29e7c8e5b2e6501287537ce2da71a160d0450cbca1b265a1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54348a297b7784c05ee97a1c9302faebe
SHA19972c6bf32c1890946e7486971e772533c8ddeea
SHA256c223b7bbd1b7642dbd3a461797a3671c400540daf7be0027c1d6b904fe5dd8d9
SHA512e7e68e4cf5f799f5f994c457e6a8862956df23a109f0cbdc65c6aa1d4aa20a5de321b2e822f74522ccb2ce210a39f6a613ec689df5210bce18df5f7038d0f8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58263d3c0d2a4b963311e441129156e71
SHA1c699edf0af032b7ee3320bbfc081e6297f27daa4
SHA2568eebfc6f6e4d39e62b02939181951feca11dda58dc6c4fbdc70e6b0f058c6a1e
SHA51266f85b039c50e8ffd08c1ce0d2c62ea4ba4008aea4d26f4622a2dfa6d686889746f542ee4541ea1b4eaa13732ba3d203212a02faba5aea37e6afc1132eba397b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481a0066324d37e14c8aa8660398a64a
SHA18069944ed1cbb8c80e6bb11f2570849257b03a8c
SHA256a52ee185e474796f245bd419cbb60b38b2cbcfc7c34f509df77b1cc9de88a161
SHA512f23565ddfcc628024b11478446e646f61dc7e19e86d804937bacfea0abd1fd5e6c2e9350972b60598dc18a808ce95b4320c029090fc958c04386d960f7f6fba0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a