Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
691b74fd6044faa730c70030625791d6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
691b74fd6044faa730c70030625791d6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
691b74fd6044faa730c70030625791d6_JaffaCakes118.html
-
Size
68KB
-
MD5
691b74fd6044faa730c70030625791d6
-
SHA1
e0bef57464ce8adc55b4f4efbffadf90b7318f94
-
SHA256
443b6c6536e4ac0c0c755933a176757075c194d5d9b0e271325d1d8e581ea349
-
SHA512
e5c759587d8e7c72b4fc809e952bf995d37d52a109e18cb66a0c239c13434dc30d8d4b101917f0195fc63f1362e48fdc1e358b6c0da8ea786a20a3415663f0a2
-
SSDEEP
768:Ji5gcMiR3sI2PDDnX0g6d+6dtmvHHmvIoTy/ZwCZkoTyMdtbBnfBgN8/lboi2hcc:Jpi8vHGvFTaZen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406e715ba6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fef3091b96e7e44ab4a5d785140ff787000000000200000000001066000000010000200000006599dcda0f6456933e24efa6183412e4580e8e6977996df1e3a381b43ac1bd28000000000e80000000020000200000006b6177badb42aea6a9180c8f4310eb9678634ac891cc073513bb7c7fb74864cc20000000ac501af68d8b00e985b818c485f35531a6d4e8f5e174471b70b986312db1981740000000e865ff88977d97f5e57e64c0ab111f761ec22e3ef5d880deb25a0f7cd6e1377053bdac1dfe441cf2708d8ffc8b84943f9051e04ec3566f7b06e73b1ef7fac190 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585181" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86D8E901-1899-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3020 iexplore.exe 3020 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3020 wrote to memory of 1032 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1032 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1032 3020 iexplore.exe IEXPLORE.EXE PID 3020 wrote to memory of 1032 3020 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691b74fd6044faa730c70030625791d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2bf69c3e89a5f9ce10e611121efee48
SHA1ba40b43cdd7ab8d5fdb76f990fb8f3aeeec715fc
SHA2561b7c294c7cc5e2ae9ccd55566eb8e93de59940ed364cf73114baec4317c06cf7
SHA5127a95bca8f48a74d822a38c87f05bf8752c155e7c008e255a336c811648328a058ca04b98739b3947a2e44cf6cebcc29641bb902ffb08205cbb0ed297e88d6ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f615ebc09bad9ebc2a3b1843f74a6ee
SHA1b0ccf65e81e0390c3b010fba2484029d694fa14a
SHA2560f29ae277219ad5c792c68c3dc48ef4ca1733adb2ad798307aa964e422840508
SHA51209bc7e9f0a4a328a1bba3eca9eda2dfd3c76726ec3dfff6d8b546f865a805aee888367b56682e376b7ec3fbfe603a599123725bc29f03289677dbf292c8bc3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c22d1a71f0339daea4280bc64b787d
SHA13c883fac7bd36db1db2b8b907e91ea4b17698e2c
SHA2566d651efe8413ccafe220fbbfa9118800e9ba254d770ce19f9aafa90f53724bb6
SHA5124b105e77b962fdd672d34daf837b58c8b2d1ef1481d58532322b0d2004edb00a6626c10f31fbe577e255be34133046943507f719ea18dc2eb0d0fca7bd6fb5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51581d7a5d3f46b605384e6cb50412aa2
SHA128aee5161d9815e6bb0954a40e9d94a9147c1adc
SHA256dbad2a95f79d091ef89c38410479e12bb89156fdf5cb2430b3ea6b600718eb24
SHA5124081415b02a60ced78e8a3f3e4d31c938bd72fc9cd8d012c0ce3ddd39764dbf5ac9333123ab3ce3a519b7c912799c9bf9a48d857a25e2f850b0c76ff7595bdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a6c96e92e784ef614bd61ef422fd00
SHA1ef6c93e88003ed137e24f9cd7453312322088aef
SHA2562e64a8f54b945990a951ee3983598c07025648f403c508be3bb81cb70587c0d0
SHA5127c408619ff8984c336773be87f9a0a2ebafcc6253f2b18302e975f4f3366fa986ae70b9717dfc4ac7489189375595e550cd9650e07299981a30a796c030dca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563b2c3bed5eaa65f123a04914edc78fe
SHA1d60bb33033de8647c83e7ae17d90154ce46202c7
SHA256361a4d772c58a250c2de133e271d9ef84984bc9e2224b2e8937306a298bd2afd
SHA51274ed6fb56931ee95874c24094a398e32fdab3a15fd4bb894c1a06509562dbc53e7d0ebf4ce15937d2ab2787cc92366f739dfa14d180fbf0cdfd05dd5669c6162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ed9ca51a7dd8af9cccc89d373f947a5
SHA1506a59f54c53727fe4f53baab6c594287111fa6f
SHA256c975af67363e69664db82965b0be7cd2a1112a772ea95f2d1703a826b1e4dc52
SHA512b8846defa450135d6f87dfcc2a09744a27e9d37ffbfc76e7f5ec4f965679be39fa235ceb71f0308def22054e976c3a0f4acfb3e52a02ba1ffec86d10a00b12dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d38c0004f07ed2a9c43818f048a0eb
SHA13b82c1e535b329a17f6c6420c0d71f99260d1806
SHA25644a38331de6c31667e74bf9c8dc4e1140571f23016053a1c17e48fb9b4bbfc5a
SHA512a2645c77570d5392b4427445f3553b7a78f2de54e67b17f4d91d24c388bb41e9694d3a368d32e84b98a29c35b159b65389c1c9e27f74bcef9e40d0971c3f1b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2d545dd4826217d9814787d3220c8d
SHA1c99d12f570ded1ca3aa6e45e77e37219a6f6bd26
SHA256e77ae0bb0fc6a8e7814f4bd7530e5dfbab462c0d050ce758487c4c2752a8d009
SHA512ed252923848bd800a1c1ef077ed651bc9e98421184d762239200f1eccd4636f1d6c113d18e081b04af1807fc703dc5a07c9e4b696b562b2aca39e7a6aa86e8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa23b76f107d6e73755b8c363c4c4a7e
SHA1b80864b6c2fe7d1f198a0ed076d8dcd34956f821
SHA256cdcac5b96bbf11815ad5ebad31c8a8e4e09c98962a0f74040fce43980076aa6f
SHA51241e2da0094bff1f373ffa96404958a096fd5853d5017183629816455488b23a3e7d998d8a36f4bfb1bc0880f66d080be6cd5b960d6338366d71c8755e354dfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e1f6928c70139bff9a0844e64c7f9e
SHA1f9581799aa699b97a001c12287f5852554553758
SHA256a510a76c8de444bba874782ceeba52f26648aef9242eec3de8003a383f11914f
SHA5125a44a6105a185a9c79f15304d6dceade41882aef0a37061ed51e73c92e501d24c950c47b70e644f2ba0f97ad65b10542aa1a930b7a7da7185b0b90de81a54a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e1c8322379781e330b65c428fa3f7c5
SHA13e80cd44cfe9bbb52d5229e63a3349df437a4f4a
SHA256acb454f2ce1574b8f18f21500842484c5d68dbc4e3584060401f5790ec924116
SHA512453839bac9c6671e6c0d171be7b23c0967c54341995056aa8e917778c1bb20c95cb685f6163620836eb5263fb7a61797d6c6d1489b9da33bc4e4cd508de5713a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a6f10f7fdfa0cdc0bcef096425e2ac
SHA13924d9f7485364e47a43257fe0fe76ef533c971a
SHA2560ba555d6f313f671beef3bfcd0c062a28127f373155470862949a6b97be4ef20
SHA51282051505e1c1ee83fe324ed3ccf2ee70e50af215d2f536363e701ac822766d58197a3d961eb6c37520b3cf8cde487a4e3d17e8b9d5630573851336a876dbac71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a91f910772538bd4057921e730bd5a8
SHA101edd66fb7779f58af287d99640b9e10326cd252
SHA2569abd18f52c7a8aed57bcb06ec5078c68eedfde3f107c202f09f86f33adb99f0b
SHA5121ae1c2d34b85c583ad5ca750140b41be36a9d4203e159cc9e49b36b17722991daadb16303ab187ae90282b0f3f472d8116dbbf81ad6a643cbb1f622103271668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf39523cb66fd9b52a0be2cffd2f67a
SHA1e94a2409d231ea364f9961bc22cc0b85f9a0aa85
SHA2561aeda0640c09e62aac49058b4f13496f07c233d6da1e2b2ea5aa84c9075c5586
SHA512d89bb4d754cac8cdd0e84a0e4d338d62a2a8d6148758e6613dfd36d67bff34268dca5fac4d6fd44596a9e9c77af76b7f4d81578d593961b04ff7f7d8a4e78f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e8ee99fb9b4e81049d8ccde07558864
SHA190351951a8987a6101fb2cfaef184d1fbfa6c8f2
SHA25625df1117b2c492dc99c5d2a895772f0ee29838b94149a46c2a168ae09b54081b
SHA5121c9ed30d7e8e5f32bc6b8c546bdeb041d466dd054846c2c80deb58ee02b89e5461d114cd5394cf0dae9f52094bbee5b5cd8afb356633bf07826f77b3f22f05ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc5039d501d5582b5205a0dca7fe42a
SHA1541f9a9be3979db5559168ed800688cccb0e0650
SHA256efa5ec39460c83c164ffbea4ca5d58d6cb03a6c3be68ef8e1c9ea6463807b590
SHA512553e3ec744fd432edeba034e2dc91cad72d03a6a72d445e586576f15ec445657bd647769902463681bde7b7147ca47887bdef78682777e3f1c692019a3001284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5547e8b314603565e72f19e1d002e82c6
SHA128124067980a0ca67436bf88bc501882a10d642e
SHA25682c2ae0c7c4dbb9c319a08b116dc9387cdef8c16308f00a9fc3bc37e832dec08
SHA5129183c40c3c537a9d59e63a99082dcb1bfe9171b375c0f28e4f15801454f186e6c5057ac9401ab8ade14cb2df1cf0e74d345531bc38b20dfabb9161e66f2d94f9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a