Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
691c9f80f05a438ed6e36a8b1a942d48_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
691c9f80f05a438ed6e36a8b1a942d48_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
691c9f80f05a438ed6e36a8b1a942d48_JaffaCakes118.html
-
Size
839KB
-
MD5
691c9f80f05a438ed6e36a8b1a942d48
-
SHA1
1bbf75a230b30776c68e40510b8c5fc3bb9d2306
-
SHA256
5edbf7c402cbdad92b9743b82d5cc3dbda962b8abdfa2d507c11f69610bb9dfa
-
SHA512
179cd4ab4145e5bb83566f09352c0a0b7f4ffcc39841c162691d5c58c4ae64aa697cc6e68bcbcb00605a5d495dc57ae056aa2d6c6d68f0b91a109b50472ca155
-
SSDEEP
12288:Y5d+X3ZrscWy9dHhXx5d+X3ZrscWy9dHU5d+X3ZrscWy9dHv:S+1jFXt+1ja+1jb
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07aac98a6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059ffef61a95cd4489bfdd30cfbb50c2c00000000020000000000106600000001000020000000bb5f49351d3aec475b29c197a0d543a1f0d486849c650eaf1ad7a7e1a762736c000000000e8000000002000020000000a97c8c737fea90ee4838dd8d99b80b36ef0f97f48c4a52b223e6e750c052099a200000003cbeaeff3aa7f71f0eba548108c8a70a9f49292edd62dedaafdf90c8a0ebd9e540000000c97ea0c4bf08406daf5f9a102acdd8f149fe545160807fe3c483399be75bf967e50414882b7a618ccc4c68db891012862d82b4b2634a5a8f09c233a0c018cc8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9891371-1899-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2368 iexplore.exe 2368 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2368 wrote to memory of 3000 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 3000 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 3000 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 3000 2368 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691c9f80f05a438ed6e36a8b1a942d48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563885d0249105e29fd8549f1c0ab2386
SHA15bb655f60df6e1230eaeb8800cf81cbc13f18347
SHA25688eefb70f7001b93315d98d506fb60f3c5d1145b27679698a33f585b9ca73349
SHA512717b1b0c440bf262b6bebe8d3d00afe298a0ad2f58bac1f668d83aa3a92162961befc91018c52fa293104ba34e4ed6da352f1e05c24d6538867a0ba82c8b9d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac38a657f1fe86f96456a963992fdc4
SHA16fa7ba29b8579b0f9dc7be08710aeebca7135627
SHA25604c38c37c9da9984ad7f3a4e6177cee1828acfd87d30495d7daf3e71a0506546
SHA5129d9e0764a0dae541f163b89d89aeefbfb07d35d63eea546bc22c6b0a5824602c0a4e27f54a0d5b82b247f4838b4c02dab7873700a6a98a14d24fcf47f456ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb529fd8f42477465e83c49c9724a78
SHA1bb6360ee32dd38ca024c61791acc41ff03df5c4c
SHA256dd9eceb069f3a55bbd2e9ea9b7fc8250e3d08c2c9ac29794129cbc1e7974f7b3
SHA5123ce72ebc8014830353a67f8e96b34e501f6afddc6804afc181abf4c92ee52d6cb6483aa63700090ddf78a40e39f1210e0bdd36dbd8ee85ab8251fe2809337677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b101948ed3b52e0266b6805534f6c8
SHA11725781440d3e0d9716eb5947daf6dfaec37dcf4
SHA256ad4665205c0b6d09a0a448f7661de28724be21582961fbe11dd7e8849b6dacbd
SHA512f7b19c0f8dde3d86fc4d1cfece42e52ba535987ee44129141b22334e815f9d4bf1a43458584c2a2025079b5e5b9e854c9e259597cb5a8a5d95864f5357ecb7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5806a96d58ab74337dcbd1aa741193763
SHA180c35ffeb120c0c57323f6f76a0845555e6a9071
SHA2566f341de0f5919b78daebb19f28378819c5e771c3231d4263e6e9094d8a01d68c
SHA512339d96dc1d50a303bd34ecabec2a1d9678071eb8619703f9b38735dda394891aaa8e2a3a1350f675b721f56fa8a3c474714d7bd6fe3edeaca1e4f2b63acd806c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57977392f390df8a00f92b99474f26421
SHA1bf05d8cb3c8fa2505a111e9066dca8585c3d8476
SHA2568e61bc96a414757344af780000ce8e0e56d8f07cc4a6471ef7f297540fa96c62
SHA51295d82ddf8444d2b350b711f3f7c0f662c850fe03c86e5453e099709308a1eea2bb4e2b4a0a6016eb4d83c7c65cab821c516cf85b098ecfbf2ef9c227cb5f18ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc63f5735e4b62d43b51dfe98066e3d5
SHA13912047cf5ec3805a23b924d900edd5de9a824b0
SHA2562d20857cf6d2e49e70be9af989ae5f7d07669c66850d8b2ab3473969cd80c7da
SHA512d266a403b88a3796027e0e8d1642568c8cfa726f06849b38322c0ed759435fca8b22bdfbb2ddd90520d11770713e59402aa97942dfc2b32f8c40efcefb5cfc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec948958f067cb80bcd8790eabe89e9a
SHA1260f6d0bd14c7eb14a71565e101d5b118d89a38b
SHA25600b2f260c5c8e1379a48fb0ed177975510eda0aa188d64dcc41cc016f5ad797f
SHA512c52528c857899eefb296dd02d57108cb19fa145e398fb21032c213b9295e7219a1eccb8f3c2bb70a2cdac3c4a9778536075e07052e1dc38f6013f3e8d0347d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6cb5ef560dc46d47ca5b3d78c8a70eb
SHA157042f3a4cf2021e4fa516b94273e9462d275a8f
SHA2568d0a02177dc149a297b5c6e35be88c1060cb3a9f9c38d6e39b44375d6bfff911
SHA5123303d7ce5252823d191ffee0e921118150e5d1774a691aadf513371b81a77718dfb9ec1ed1762808fbfa73138151220cf3036354cd4a6fb713c5e05487d99770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbd26ab247ffa269d01bf6b21475dda5
SHA1736e3f73faddcbf6e8c3a271600359258271939b
SHA2566299e43424338daa6c38adc837fc6b9319643a21bfa5b7c5aebe77c2c135b36e
SHA5129911b28fb1213c57dec624ddb4e27e0e9eb3bb23368406e7cb93ad8c4e040077ae8970c9da39ed9ecb73af4a02b4ce7acd5e36bddfaf7968ad63e8a46927cd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ff7240e0ca0ee1584681af736b67be
SHA1187d7df5ff62d7136974e6ad6f4eeccc4559eaad
SHA256846c7458b9ab35e64b81dcdbe77cb02a2ec4354a34dcb3e8a5d7c42c2874ecdd
SHA512a97af5a6608f8cd812a00edcd2f549ed757a3a310f7b8038d643fcab568dcd24219e6424b89153062fdd54dfcbf8c753fff3ddd771dbe06fca7fc78eb446e1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc3a801e0563fe7faf5cfc4f7445ede9
SHA1dc7af7c31c3320ba3d5b70dc4a314f5460db1b8f
SHA256ca0483479ae76b54a99394f0a4a6e5fc3615446850ee469e5c8a60507935cf46
SHA5129e65fba43172e32e493875faa338993c7e5a73b47ec6072d63c38b6f209807e4c36b14438d7df8f1539061e4e167f2f02dc5c7e70957bd6b1e6859c11d20e965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7afff7a40b579e391e8f83b51a12e22
SHA13804bb80b5ae820f3cec1f12267a3ab60bfcf982
SHA256f1fa8b4d97ecfbac930b372383a91b1e617ed79364daad27554bbfe2894acbdb
SHA512e4bbdef0aa1f13733030f01d4613ddb675d95703914331a8ad21007de5fb95c34df0e3ac5bcd0be249e539c171e17d44d0a269f011c966a9eaaa834aaf5802d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57942df55004b44f4138bc742fe834cd4
SHA19a81067d6163096de74752d5a20d4f937e67bb52
SHA256b283debd6628ea139d7d46c76a67a0b8f1970fe2476c9c72ba4cc6542bb618ff
SHA5129d72e143ef6af0041dde0486ae39db2e6a7c98bf49d1c6f188cada02e4c3e1477c6e090dcd3e02e84244a91a489c967444ed92329fca06be6f48563f3db2d17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ccbf9f2dcd49e3e757fcdfa8db05430
SHA1cd0184e0ccd882bbabd6a8ad674f6d2a8261e6ef
SHA2564090b687324694092e604426ad4719835c680692ffa8477fafd4edf364e7b389
SHA512094abf9b4942e313bb063047864eafa02de58236def95bc642fe0fed949f74a830915732bce7d758d2701a207265104d2fe42075135325c3110e40876f62e231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54077a574321b42f0a23f9f9122df0ff1
SHA166e775d33cabb457ca241d8bfb518781f587623b
SHA2560fb03cae810412a69d0d39cb1012256ff9e29df99443189ba1edbf9c2922c305
SHA512c0043f23f81bbf6f440b1636f8efef070949fc78353e0363c49be08e10c448ca4d00a17df3fe8c5747022079ca9d50e229e4a66681afa32a185f6cd2e00692d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411ebbad1516d28ea989c0738d1a0cc1
SHA1732c9e868daf097a66c853c6f3927a66e9dfa229
SHA256b05e584af8c6565d672b3a54bfff6d6fe2a43e011721a161f6e6440e8eefd16c
SHA512125f37c83e44df48d483ac1bd31b354df589b9bde56bf287d2bc6683425bf1cb7073ce989a486722c4db2a94f2d8bc29b32a0e0e1a74bd23e72de00f820ea5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae8faad3da327e607379436042bea68a
SHA1c500eb772fcd7fcdacd6726731e9cd7cae9c6c84
SHA2566ef62f29388c8adb1248fa1bce51b06f1d167a68cdfac22a1b05ef78a837c180
SHA5125c63f68e0d5e95b16e7745bb91e0f3bad638e57d9d82115903010fe738c5ada2276a255c98f57e8be36cd0a326360c4817acf00340596d93666d3f4d30cedf59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a