Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:19
Static task
static1
Behavioral task
behavioral1
Sample
691eef8ebf6784fdd752e4197d8c9ccd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
691eef8ebf6784fdd752e4197d8c9ccd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
691eef8ebf6784fdd752e4197d8c9ccd_JaffaCakes118.html
-
Size
41KB
-
MD5
691eef8ebf6784fdd752e4197d8c9ccd
-
SHA1
4428c561ae5e3851e344fb21867ea50da87c9e41
-
SHA256
2bc77000d2fecc911a936a6a9273663a53b8344099a9739f1f690d8133ccbaa0
-
SHA512
1394a0fe5313fe982945656d6c9a334d799b5a5b017b6dfb9712c32a0bd61f7e5b65c7ce8d9e788ca02adecfe254ecee3e604655750436c79e048b4f7fa27a85
-
SSDEEP
768:2Gb/E61llXWoprXN4sZdpu80Qo8wIglSSG7OpAm3dcIrRAqF3R:2Gb/Xl9WoprXNvP0T8wH5zpAmtlAgh
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000006e59acd3834916bdef9e1018e02be5ea4a43ba30d347d31da15c2b56e0a01da4000000000e8000000002000020000000ed0f7cee19c1e83e072593221c46b3c55a96b138cb6d22dd0d5da0132f4d222d20000000df4cd27b1f477ef4320635ef632a037af04beab2346ceadcd8edd7083e25a7d540000000acd2234afd84643f709e8059775f01dec53c4a5108fdcd9ed9d03e27423eb8f0bd57faf1de79bf333239098e71455c0a49395a5d30963aa231cdbbb75f455523 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0810204a7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E5A8851-189A-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2408 iexplore.exe 2408 iexplore.exe 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2408 wrote to memory of 1308 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 1308 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 1308 2408 iexplore.exe IEXPLORE.EXE PID 2408 wrote to memory of 1308 2408 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691eef8ebf6784fdd752e4197d8c9ccd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b430f11f09e5e008e145e0982b5c7431
SHA1aa26af3a4de10dcd3cba8ed5e4798c879440204e
SHA2568b28538aab70e0ebc62f905f3272408d1e2a687fe87f5df5eccaa5f272fb003e
SHA5129fc8e1e4a9b49a1d407d082bdde7ba182e943d02c539d069c4d706172b60c2b9794c029775a64072806fe819826278cfd2b209c56d8e8576180642140bc17600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb53cbe1913e32b26df0931758ec43c1
SHA19996fc0ae6f49cb04bd7812f4e92c0216213d5eb
SHA2561c9ae0e8eeeb6e9dccb8216610885af50d18a8a0c2441232505918249138d333
SHA512431aada7db2aae1f4b13727c55ecc46038557def99975a64e7f13b36fadf14c17393d8d7f8481a9fd786dc0ff7dac054521756723d85cfa2cd93e12f275fdeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec09b12124d43019b887f487b970ff8
SHA12d9bfd7f5016f8f9a49de2f6e2dbe601168cb29f
SHA25676304934ed09d91b7b2d093efa7dbfc454199f104a36185992c333ec96b7ff55
SHA5129f6700a0f686d124e4e8f5d997059c5b2b5766162743c2926b2d2cabc612cc9b834a4f296e1b18ab31995f39af8a0dc5e836bb55a14225091bbe7bbea6252fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2790f83f93002ae83a86a3140c01247
SHA19d1c6afd6efad1674dab248d785625b5b650be22
SHA256a42b104daa7310b7b86223e88570917b16cd7d1fa05fc772c36707cd1663d339
SHA512551a6ca2008a95e5bd07f50f4ff287fe4fedc687abd53eb961c0c3af4a63e0dccf4e0809e1c095da97d83fa5e324f26059861dcaee0f0982e8d6ed678a8780dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1177453eac0d6341c9e96941b1d4424
SHA16dc9dfc90988c90dcdf7d1b0c648c312350468a9
SHA256562cb8e4becff0d856c6629d474999d7ece45b3ac7bb77d7919cf139994e1b2f
SHA512f5dab78f5e580cfc96ec10f3cb2191b815bb39c086b9b7dddcfee6d3b35e7659cec3adc09525da2e8617b984ba54a9856e91e4270a1dc74b33be7f84748f81b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6c5e6bc0b760c2c19f4471ed76db77
SHA170d43124329afceb13bb45d24dc6db7c2da33744
SHA25610cb0cd28324396ae6e01e601273784ae15b6a1820bff8ad30b9999227dd9e30
SHA512a80df4ca40bb78b18f527dd814d6426a72d5835d5021fdf931cd8c64f5129093bac39b2f57ef123dfb215db17915f2470e08d180f0bc24cfc8bf01f3968217a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4a04126148bb59862c6683b52ac892
SHA16ff1112adebffb0caa4a8469df46894e60ffc4ed
SHA25615632a7877a7c8808051aab989d65396888c1471013944e4ee258bbf14f72265
SHA512a6e39911c0619dd72440674673b72f979b37e473b1d6272c8aece765f859fe6eb7808b8c9a15323194f61a1975867a03c1d9ee614b42947576fc78bca3e1b723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8156cc4991c91f018bbc9642f5544fa
SHA166139412f6b252017487e8f32734336bee641ce6
SHA2560a2be1afa3321efe17a0649f001a97991465b65d4d23edb705ff44a7a436b513
SHA512bd9778970890f9b12422488c0a049f15aabbfb40e89a878c07a83c9a8a2ffd3d87a469bfa627ce91f348a182ebb7aa9a7262e0dd5ad757913e14b757971b6334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4d64ddec723994bbea3e60322aa1e8
SHA15b7e7b9ed85dac60e36fbcebe39fbf0c791f8bc8
SHA256e27d69655885470137dc8cda9e7b9e29a0e764af31af7fd3be4b02ef4a8925ae
SHA5129b7e6a2046947d2a28c8ffe79527a566ccc411f5a0bd00766098629a84b340d36882631f7bedb98ae394901b48ea26bc723258f85d2697285e4b407330550064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d5abda55ee54775be87801e623ffa3
SHA146602a3c6ea6fa3a1acc1418b0d0288cfc7181ff
SHA256d531cea4f73a62b628f89905cac7e5d3d5dfd77b3f8277ff0d1cf513b9ba1d5d
SHA512c1436f1b486a8d2ac167794b5c3de82e3e0bb4c1c5e43e212daeeb9d4e0a85a4467fcf3cfd3d69c3d182e392a09cb4aee97e9de6ed9052baf61902bf8b88a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ee7033cdcacc943a74ce3b3e3abd703
SHA196ce0dad29bb8e739b1dc27d3fbea2cd847024cf
SHA256adb9967ac2789bc701f5fbdabc0fde41f00b469237b6eff24abb46e948e7967a
SHA512243518d0ff7a46d219bc73869be9f8a0164947b9cf830f7b05f3e45d9b53a1d2fef05f3741f98069108931f6de2f8e027fcb81303089359b365a66f8b0827ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ec04de1413bdfe2f94e7bfec981ebe
SHA1d020694154137617d81b17a4eb10219353a81feb
SHA256beb4d0ea105b620a5068d3ec7999a891b08e51386cbcc6e69bca3fca2885bcd1
SHA5122e8a26f4aea57ee1fbeb7619b887413515692cb3e9a83bf2974434a9e02fd9e66c643199b1b7800773d6db6a5f1ae431024c46ec49489dbfa5df2c402071e895
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a