Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
69221d696f2a08f32d7ac3548af9d1be_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
69221d696f2a08f32d7ac3548af9d1be_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69221d696f2a08f32d7ac3548af9d1be_JaffaCakes118.html
-
Size
43KB
-
MD5
69221d696f2a08f32d7ac3548af9d1be
-
SHA1
bf67b3169d380ae4e98e14750d73a53c01fb4e78
-
SHA256
afa8efd7d4f02653b8cb0cc42af7f817a01feaed3aaf99b7aedd1f2e5327de8b
-
SHA512
cab348e5cdeeaafa0ba6a63e92b373a66c9907823039d8a302e3517dfe876f1bf458dff52e59b851eb118751b4bd542e237cd05b67038ff58f8574784777ff41
-
SSDEEP
768:bI+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGD1bco6L9wt/wOenU6:s+vt+0U+v5ikH/iOgOEWtYOy
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1DAF6C1-189A-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d79a3ac5b21414687c14e1fbe557655000000000200000000001066000000010000200000001ccf31344eab725263d3e4ebe90fa26f2acd38c8865d40eb95ffdd5fa7f66f2f000000000e8000000002000020000000a73b360787cb415c7d4ee3e9a500a7b6d27baead284de7904e43553856d6c1b220000000eaeb85c5fa4d7bad1a418dbbe261109292a4c97e9cee1c053dd9dcd98390c1a540000000b80d9fcbca0b4a1e83c3ddc171da6062eebb8284f07048716cfbb0e51dc487713b3c19732e9f2f16118f861f9c004eb58414c972df7068700fb9885e59b6e477 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f4bec6a7acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2936 iexplore.exe 2936 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2936 wrote to memory of 1032 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 1032 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 1032 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 1032 2936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69221d696f2a08f32d7ac3548af9d1be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1376ef9522e6fc9e2cdc74432ffc6c6
SHA159253a43dfe0416beff7909b0f2abc7ec048e160
SHA256d5ea6d15da8a03cd2b8a34b65de70172043120a4b914a9a7bc022c3724444dd5
SHA512e4ed754f966f7017220a87255e0f984546497ad8d4c122e3df223f4fa96173122b16fd63be595f79450a04a8d68a2a72adfb29738039a6175652e858dd2dd083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522943b6cfc3647552470d228a2feb255
SHA18578191172ae8acba3f066e4cab536a81d97c9e3
SHA256c98d263c8aff25e467cfe77b6fa2364211a5560ddebf910017c455fe22afd2d2
SHA512e5c78873950a3b00723726448c7cd2f4c169a7c47e81c2b671e6cfb6f90280e558cf9722b7c77854ca2b3c051ee06d838f46b5aefd3bd55bb0884847172f95b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551518d1ed1825452d277b977a184262f
SHA11316954c81f8d71b48481d0c820b2162f25bd6b4
SHA256d44edc0c4ebe60bfe82f0a24b6bfa3d65d3b958d53aca0f40cbf6511ddd3a7c5
SHA512d9f2398be1a5561314107a68227850af0f89d5aa9deb0d00615ebac221453445a8060549e1a25be16065eac20c2370f2a462bac2f2409d8a694623d3e79e602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54076161c74ccbb63669aa847c1c702fb
SHA17000a516dd52cefddab66ed177a71c8e10a15111
SHA256989cb6233aae8e062e0043b5476694c2ebcbfa3547b82d0fce05bb5b79c9d37e
SHA51284dc27eab78d5681b2596904a252e0fc010f06090cf49acedc96ef1e6a645ef29865c06873895234174a6fadcacc4e1a71c906f9018c51bae1ead519d8bdd85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbb5a209adae3e5d36fcbfdde7f25aae
SHA1c78a51cf234896cf0e268af6281b0f02179841ac
SHA2566f07d80c54d967a363aae9201cf3b94811076202269b1ad240a5f9ba7031bb95
SHA5128461a912334bb5f2173300258f174fda45d826f41d915b7eb03225c9f0bce767143cef8247c210ceb4f8246f2f0a5ff2ede80ba7d0660412680f3b8548b13df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5330462c88b40f587072445f369e609b3
SHA185d1b66d4c9759a0ffe5a4bf8de46e4b1edda592
SHA256f359404cc5ccb4b4dfc7dad45a692a8744b5cf2d68cc2d2a8375a7fbc2091b2f
SHA5128dafff68fd3ece9f32029011f65ffa4724d601d7fdbc97756775a1c53acdeab4d109722804d463d848828bf1cb58ecefa962ab784ce4b1ce07c0e552d908f507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c64acf9d5fdd633372958a536704c8d
SHA184d7a973d4eb8c2644bfd6b316ba9469c9904b18
SHA25655b590c5701c7ee7861ea1ac7498e212f0408d3908231e97b081e00785909941
SHA5120847a3ea3bb07b6e64bfc7b87118ddf61eec16963b3d1335474c7fee4d768fecb03615f67502443fe0e2de6593803343317f5ca907376e715ac41f14aeacaf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9db4dcf7189b51b2b9c025e7eb6bd55
SHA1f3aa19ad2380eb7c4ecb58daf288fcf7722f9b3a
SHA256eda3c1ac295a0a9a7d37f1209871f76399cd6a8768d8bdb8e671deec9407e67a
SHA51239f7f403c78cac8ee52a9c0035f985d4827e35005cf94f0babb31ab3375d16f990ae27f3ffed85788f3e1e8e2e078945c6cb4432f5d5595ed7336286b5dd5c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e01c13959b42cf6be89f176beb2f461
SHA1ccef6d1176d2d9f3210188cc4ec35c6680a014fe
SHA256723d081ef00aaef2cc480434424bddea3c44b8e8bb52db01532bf3e2f30b4d1a
SHA512d5e55ecc1497e05dfee3381f1252d6759047c7866898f333a6b79801819fe0c5f4d5327ea7506a39c35dfd492f7c842218713daa4dd811a0c58b5c699d6c6b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58978296e76c15c9d95cb9d2f88e791d7
SHA1a1693d6b4a067db71ab725ad2bc9d89285d851e9
SHA256ea418f6d9707e6579350d8313f1fb5918f8019c5974e65cfcb44e7596d936f8e
SHA5122e57bd1c83e71a5436017d3c638b0e5a5f50a04761f8c84cfe595c3ccdf865886ccab0beaebb8a0a2e2b6541ffb5bac09987092ae7d3703a447a909fd3a81aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59615319a65c6aeb87c6924dbf1c1b8e0
SHA12c1fe479a4a87a0121d5e1230156c31ff20074d2
SHA256c5b243ce091649081c49f96c565dc190870f8701a64e9a783dfe6695e873f5ce
SHA512df5d2b86c9d31bb3baa474f6af7dba8bad8d6be71bb536e6bbdb18c34aaaa0cedae887784b1f2594c52c8c5f009eab00f1c46b3a99d603b893b247fcd7d775a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d411f95148fb3c67ab07fead38653e06
SHA162455d645c33a8569531ba4ccb7208e0a74049b3
SHA2562f50d59e895af4a84c1403d527e3a97469438b9ede6ab6c02c511a5b48bcd837
SHA512a5cf8365e15d62c382aaa6c37fa4e15db17743736bc3037abf172d9308a32d32d682b8af0ccf686222a3bfca3fedb7e6f426e7f3e25ebfca89cdc6436dfdac6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f08cd54f3c5aa108a187a49a53d5aa3
SHA1dc26aa5e8977db5902d2349040c83482e5575c09
SHA256e4727f6fdddf5d9491bb260ca0feedde6ba1c3f1f281c956782933de1a1b392a
SHA51249a4fa5e4c11143f4c27a93dc09ad911115844c63f9f193fa848860d8e3b2ecd609fff2ee5391c16e95bc2a68d5072beaefb8fc9e6b3a8eec724ec4e1329ad29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbbd81c43ea2fce2e092f788372b0480
SHA137022b8ea932d15383a08811d38ee75f40ea5003
SHA2561ed744369ca5b3014bd220a159b5d818c8c92ec29ce193e01e9640ab0d0eb6eb
SHA512b279d9e102741a21378cbd27f1392eaf9fa3aecd7abf37324206df48066237f3aab2bf9b420e6a304e6e99c689080bbb5e7446a07db344a3e553bb7cbe587da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2cf567adbed117903b62a946ad68434
SHA1c87ea344613b93717ebe0f9c38bc0c5ce1c91671
SHA25607b8b8a12a9c1584c61996269af7a056946d4bd782af559c3dd63a2b7ee868f1
SHA51287979aee148194cb6ff61f38c59eb538d7a83607a2adf93be5ac38017166a7082775f4a67b3b6ae55020623c3c766bb1f88fe421c3762b9c4045a56e7a0b1558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54832cfaae42332555d3b9e0bb9f998
SHA174a18a8b8dd23f5af194b0193cd4aebee1fede5f
SHA2569915cda940b164a7e172e5b24e1a4830c5f624d882a7735d03718623d7fbc908
SHA512a10aae26c7698880d1e7387c32b3b9eaf9be049752a01a6b1f56545e648eff41ba4845627c5d76388d7381d1750a3226cf42f2d817280746ff5ecf1db8c5e91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591cae385dc8b6bf4580874233aab5ab8
SHA121f3cb1284b1d71d43297d0878cf41dd61acb932
SHA256b6c48ad6b5457ab1f1152f50bf264c999a1f064c9282f37c13fe69fbe6e9387f
SHA51230132e077a2b8244fd372b89cef1e96a9f23917846fc1d4e375ddef10d4cf85e76da6fb4d794765f92b39cfdade2320871d81bc138b6f4aeb6c967f9cb42a719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fc012a719341d3917b1982574fe864
SHA10e16594ea4aa1c89f29eb49c8ca2de0a4dd3cbfe
SHA25682d13e1f412edfd7098ccc7025821b399edc088f9e377c1f69f15be952e676dc
SHA5122dd84a2eaddf529e4f82331476d834bf10cb38586febf7dc4a312b5c5b9d1b5f5b52edd28b17a39eb25a74ec33a2575f78a9c0eb42699e01a6819074bfea320a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523a08560b79b79347aa9af2de56f9dc
SHA10096989a8ca845b73947256b2bbf3873b6c200e3
SHA25617a494e7ae70e0b5f661db0fc5386568091d33bb339ae14798a1cf4e463f91ef
SHA512571f623940e70245875862cac5473c594e54607af334fecdc5f1179356735c3524a4286cb738b9eec4df7ef274efbbb0b6639e8e7ef99b6386c6bc73ef82aac0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a