Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
691d0e0ae8c2e5bc007617fa177de85c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
691d0e0ae8c2e5bc007617fa177de85c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
691d0e0ae8c2e5bc007617fa177de85c_JaffaCakes118.html
-
Size
744B
-
MD5
691d0e0ae8c2e5bc007617fa177de85c
-
SHA1
b3657ffe0a3635dfde73b2b641ab78994b163498
-
SHA256
e2f7c6455203b991637a7e8b6d4c75b39d12fa05f867ad1e672563279e368d5d
-
SHA512
d5ad17465407eb53535e242c09ef38d500483c31de5e3a2de7189730c88eadfa647dde4554c5f81a0157b7744f8d794347e1b9267a440f2deb76220056733664
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585298" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBC8BCC1-1899-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e7f13541df5ddd4b9b6f569e1a0d9de700000000020000000000106600000001000020000000cc31d70b212622106d000168032939c2be5958dda7c88bcc9649738a697eb4a0000000000e80000000020000200000005553e6e624511d1b5d5b3326cc981fbcc70c029cb3996da21018f2f54a958c83200000000eb202031b84410c624025bbdb664f9c932acf30ec99c61bab1de9708cb8e24540000000c6af6f4d6e732de3387859d9cd029a539238448b546a56342085d2f3f22cfdec0941a91537cfa8ac0c7a0187d195172267ea6e04d982a72660d54dc2c3b85660 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03bae8fa6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2068 iexplore.exe 2068 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2068 wrote to memory of 3036 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 3036 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 3036 2068 iexplore.exe IEXPLORE.EXE PID 2068 wrote to memory of 3036 2068 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691d0e0ae8c2e5bc007617fa177de85c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7716ee5d7deb397e178379aee00eab8
SHA108486a37821c19636ca35d5ff1304f8637fbeec0
SHA256d3661b135554160ac758d39f3224f77b0f5834a3a3887fd03e670f4ed7591abb
SHA5121aaba975843bf27f22a476ad2a1b9d31ebc0647cd79b1ebf482b3d6cf0f992f5f939d9f16c20a1fa91882774e4ffe3119c28c9382cffe24cf50a99953f9a442c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d8fdf3e99dae79b6c6ddf15d916420
SHA109d0bdbecf6ce3696d0afaa2d2276090e0de4b06
SHA256e3818b2363339f7bf13e7661f69909b1332bf1696f5597c099136f0e9e59766d
SHA512321a7d090068282f0e57df7c420204cfd2222ceded3e62f212193b0b9aba622f706cfc4b063ab9badf417069e01492558ee320ec2a5ffbfd5114e9268dfecd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3c1abc70e46c50ed4b386217593478
SHA1b800a070a20a79d5af6ac87f3fb768670639f2d5
SHA256d89c8fb09d98ba1749ddc30d2141fab176faa47b6c682d5b11502b3e2c53984b
SHA5129c0b77ce5c1036f3eab7bb4c2901082e908718aa2309aa069b2662008307324d44fd4bd80b84d853c8d084d864828e31a52dec360ed010abeb2f0bbebe53fbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525296808e5a2048a7924ca697849ca84
SHA16f56cce2012dc77c8d2f3b087cb549be7772b4c0
SHA2564ed4c782c990fdbd507a331ac60ca36c2024e4214ba69f79393539158cb59482
SHA5124b5a7a520398a152d5d537a59f2178b657c794ae4a6c644622f69d83da14e7977555f19f4bbe47389474ced9a3aa37ef48dc35393be9343669b4e0a70782e574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7bb6303da5072d3eb9fbdc6ad27b325
SHA1d7838eebdd25b4934d0c46b1f301e6c5b2f391cc
SHA256d0813d19cce0edc97144688fa29b835a3384b194121cd7f6251aab65b424c15a
SHA51280a02d3f8011e584c436b66decdc5fe5289a9a93614ea31ff9eaadd0a2e3486c6eaa7087d57e4f79f7a26605575a797b84aeb3e0f08ce03ec673d745603d6bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c834dc1c5effc1aa53c51d2c7adecdcf
SHA1caac6c6bde47ca1696c65ffc19d80ad94e925c96
SHA25628cf2ba312124228b039f707a0945cbcfe68e155ee4333995ecfd7d35da8068a
SHA51291d09b8c5d087e49543a37bc6f29de50dde32b1ec967d6d569afd6f77ed67822d708701f7376f2c06128e3f080f59efd318cecab2e448544d06905399fbe1a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c847638e37a2535b103b499dafc18d6
SHA168bedfd31219ce71fb77cf29018867c4f8333e06
SHA25638904853cfab72fccfd676f02c57eed2aaed0441d08cf7723169ae40f53bad93
SHA51224cfd7be291c36ada7abd426842261ca578d2fd098f8b57773229b434ab6a446f40bb74e9d414a8e2aa977ed4b41c4d44504cbc40bda80c9b5b5880c931de25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d03c0aaf985a734ebaec845e15ab058
SHA13ec81ee2d8aad17469ebe022e6083ac3bdde7b8c
SHA2565fdfa565b3ea2ca3bbe81c494af8ea4f2c1d2f3e2f325d660d126a8e99334ebc
SHA512e252bc0cca162df5be62bf1b57df48a8f7432d481b1599fc7e7035da873dcd2257c9c1af7666d5214e0286f7002ba363817439e4640dda5d754f857aab2e416d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2494940ffed94787f8cc2bb01204afc
SHA1d6f8009ef54fc0c4ccd2c4974c45d9cbcd4b06fd
SHA256a63982fb87e18c887bc4c92c482d8d2063a46a86e4427d86ef22a26e80af540b
SHA51298097a012785566e5608ee42dcda260515d1ef2f6ccf8021448f9460193a8fc10d9a471beda6f83c432f6dc393db565c0b41deb285bda793f7ccc564c3251cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5706e9b096ef4aef2cfb79ba08b538c
SHA1c7ad1c5d180759f1b7e6856bd5c80e1228652b46
SHA256aab6906a2549c7bef58fb31f93df8e12f98c7c039b1146a122f374e92f4a4dc5
SHA512753e11922a3b4eec2b90b0eb0635d33e23c10b3b6ec7f65d76573d62432c3858f813f88eec72899f61bda46eba98d2ea470f5a6a34e8852036a9995e5278a9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b45724d9f8f4d8a5f7f6914e110f0d40
SHA11405bda8522e07e005289025ecf927b78c210cbe
SHA256e681425db94a1cb2b3e626e58ecdcb63ff05e9089d3b27b3ef4ca57975a1c76c
SHA512dfacaf517bc22ccb383ddaf7fd64c4a1ba1fc93e1c171c444eb8d290e2ad7e60f2a61829c986941b4d396c1b5667118a3a526f77ae956e4770be5fbd84724bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa479cd7e0df98086d4b9218f1dafd19
SHA1431d75caeeeb7303d1877c4958e71adbf1c8084a
SHA2566378f99ff65e3f85df8c97def77ccc25de5a22e48ea65062a227e8c72f559f77
SHA512719faabab6d2253bcdd44ebcc5d4ab28f89b8da268dfd3816bd25f78ba873edb8c48c5fb22f1e28ea690e1b142a1de5d696d1b1c88922e09a5c86f3239fc4431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc50a2946f5c49f6d676372086ff6522
SHA1ee0f4036edece8f90fc9b815f3749d0b1d1ddf30
SHA256c193019c8b0d9aee3608b3ff36c4d2db66bc50a8cadf49651b27cb49337396e1
SHA512bf4735b7825b815cfbbd6c6a2e6d0896cb6cc32e272b6c989aaf536bbff56dc5d6c62410f09f7afe06e7319139ae05290447615da98dae31aac6f9f5f29cbf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcecd70588d299530eb45e2c819388cd
SHA1835854844b28a34516c1c7258a1dd9d6df1afa68
SHA2567d4a9eb229871cdf8f713a97a7822389701a01553c9990817c7a42de76637885
SHA512e250c16b6ae99e4b2efb0d77cf54b308b4d4732abc068bb2fffab227ab5e74f2d7a3539cade7a3232dd7a34bbccf60d4057150dbc60ed4c9bfb0db368a5724a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a76f8c5c370c338d83235f54a17b5d
SHA146967a13bbcc9ed278cabdf8996c64522fe619e7
SHA25687118cad119397122f4f45e090d78a8696cb108b71f34e26de40b095dc543760
SHA512fe3a4aa4db517035ba3dd6ace9d9d689b9d4930c6de274d569cfcfe49b92a0f7a685f1db06145dc9c59e34f50004ca9f800a298a582524cd97503a7affb763ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2c9f03734bdf315b32ae2417b5fd4b0
SHA1b343a5ccf14bd6c3866f6e09de142c5f8398ed9c
SHA256106401349e647298ebbd3a3e626a2ccaa4868969238154aea7cd61eb64e597ab
SHA5121f75478a314bcfe32918496088959e7a2cee919150f88072c15ab6a9d7d4de72e70535e45c681b07f8cb4e60ef481b7e2bceb0c6712889b9b62bcf7e50563e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f448c853cd5970fb4ccb3d65bc2edc9d
SHA124b11e03e8c245d1c7f75ab4bed1a5efb46d3c5d
SHA2568721c42481b7699aa1b0907ee2136d724bc0069094e7491eb0210dc139b09913
SHA512b33a78915ebdb02bfc94d89af6a41c74296637a4eb297cf6ee1a71a1aecb9e049bb46c066f04809f0652c69998726fb3272681eb41a0a2b5cd72e96cce928d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19a7802a6ac2af907f75660b9846b09
SHA12e1da3383a782a840a2f8eef64fbdf6e679dc895
SHA25694bf7e2628505c302b6936fca4d01d7e71e7e7089cba2d794e82ecf0aa54bbe0
SHA512804a5b8becdaea8b90d7a5d4549933d6ef6d4485119459c273a09b67cdb683b048ed7c5e3d7e58d516aa4bd268d0bf7025cec14c5a5b5c39ea4cd623146c3fa7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a