Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
692a0f1ea82535644556b24b3584b6cb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
692a0f1ea82535644556b24b3584b6cb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
692a0f1ea82535644556b24b3584b6cb_JaffaCakes118.html
-
Size
36KB
-
MD5
692a0f1ea82535644556b24b3584b6cb
-
SHA1
a8c388cf0e42f9dbe828277e8b4a3e166a9ea9c7
-
SHA256
0e8d7ff245f1565d7d544472f5fc608fd77be5a5af5b6a19af5a7f13cc1f3893
-
SHA512
4b48337e8e188a9a6f8eea5262c2d9e3bb7a4998234da6b1546beb8925589aa3efec3b169e0c13fc001a21fc7589f562ca55edb3503593657f5c95fef0412957
-
SSDEEP
768:uiWExQjT98VGV8Rf08UA8md8DWb7Zn65XN/RmbPb7l5IOnsvMdA:uiWEW8Vm8Rf08UA8md8Dc6EbPPl57s0m
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703b754da9acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a979bfb2320ff779b1d191ddae7fa180e29bb265141820f23a26628dd001775e000000000e8000000002000020000000cd733c04fe5cf4c47a3a7566518671a33740c1026158d75c1889920d1f2e584020000000cc1e8094d9d75d4462efb3539c7e642d651ae2a193a4df955c9978b5c28259124000000096c675ff31207b625fc22fe945802a1bab3b26a076bda9ba73c898dcac6d2864c026509b75ee7b14a7d3135ac693ff52ab1be57fd30f88cf01ee4b78a0180ec7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78412211-189C-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1868 iexplore.exe 1868 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE PID 1868 wrote to memory of 2068 1868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692a0f1ea82535644556b24b3584b6cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f240810d5c44d558f679b590ea58a06
SHA167dea40c763b967e05c01905a7e435b37411c8df
SHA2565627129b825896f4ecc3172468ef401db45be3e37bf8349429857f8df3a32811
SHA512cb15275a6baa661c7a8cefbe5dbe07fd1e64aa81c9fbe262b32716ef49a1c9c0735b29f1134716cd898d5c63fb58b74034d48f96f2e3dda5d69a48b9f18d489b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546774493e9f0290c0a3f45a9e906b274
SHA17e05afe3ad1943dd298e405445e500631a58bd38
SHA2564068ce2bf7653cfa76093a495fac1be09723053bc576a0a2fe30f6e9b8963059
SHA5126ec6c58426f0853cf1f199d3ebe38e67212875a55d4d4606bc148682ec5226d934392ceed719cd9bfef9f5aa5974817fd4540c12325e53ab94180ce0612aab34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562b68e4dbbdab8d2d2bbf7c4f65a2c1
SHA1a77353f8a403f33f0ebeed929aecfb9337105e56
SHA256bd8f1e0c28c3fa2c070e0cf53417ad8db8a6fc4326fad17a7e1ae647ee61f672
SHA5124b4760fabbfd24a83146804bd00865a694b1b4c8231e8810801a32804a22567ec19e38b52a17371acdd7478e267804945b2abc231830fde6d6814a57ead3f239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ed9c5b9e3a7dcef7e8a914083b40e8
SHA1a8c5a71abba712ca60e9def81106c6df6b1ccdd9
SHA2565996df230e90d68fadc36e05a6bc38dd441dfe402c6a42f2eadd8dfb3962cde8
SHA512fb38f00e9ef355ef547183610fb23630ce92f56f3c74596027af9a03db891fdc5e91e939957dc69e569591efaa7b72dfaa8e3cd0f770151d4ec58d2346f22477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9ea41c14bec23d36cacc5224ad45491
SHA1a79038bdb969367ac70fc782237708ddbc5ba6fe
SHA256886e04493a3acf59ae19f7fbd78a65d25f92e287c36f493156769c5a4f8fda24
SHA512505ecf0acd1c4d8bae5d843aad6b31a8ffac37aa35af20449f05ce63a100fd597c9a0f4c5b3bc54a3520f3f7c58e3f2c59164107dab09d2c880d2079b484c62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c245fb8d7d0e16dc6462107a39a6c0
SHA1e8ac2d2af8ee02a8f4931a9bbeacab2d357ba4a3
SHA256a38b8e581d8f817d2609c58163a291e43eff36d57234c03ec48eb444406ca249
SHA51225a9a1c4fa3bc5594b116980afde5641708d21b415a83c0dbd463a8f4cb1e8cc286d3e6d003fcfc71614627b809153694780d81de9cf949ba1a61cbab84acab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282b07348ef1741475dcc77d99edc1f1
SHA14d5f7fb226202348f7f87e26b5ffa9bd5e817786
SHA256ca4229253e45611c7a716cd53e81c992e7db5b8dc97079a39ab15aa63a74dd71
SHA5125a649520aed9cc9117c3a74bb5f513de7cccd197d01bc8315267cf8991d2173b7e3b32dc5c79e2cfe47d9fccc2dff0bf4cb2d54470394757261a1c0ec5c9dfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597cc910cd315c823ff5671a482a591fa
SHA132acd775a5dd99c078d6ddf3d9b5f8254416c86f
SHA256cb40dbd82a37d50bb2ed28f15b4a377dc5676928c4298b3ba09b4fcb21d296d8
SHA512d8c180b289a61772d7c67ca28a289731e1979da6e5854cc470358711ad8801d1a25282141e8f9e52d7eaf40a11abad774252a5cbf1c4ea93b4e107595e6e4fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971c50ac5999e0de827aed8f3df9ca59
SHA11e7d67a70f8b794b2e0613ef7b693213bb28899c
SHA25616e46d71b3066d80750fa0c59ef2ffb43bf43513900703e9ef530149589e6db2
SHA51228d7389abff617b6cd08bea927e9a1ea8da742569efed110df5d1576548763c534af4e6fddc9b4751f38ba41aa605837a0f73899e25d9d2a9e3ed3ba5aea11e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a925b743a72d8c4c02d485598482eea4
SHA16b8bfd8cbba97eb25fb95b56e970c0de4940a060
SHA2560396c74d6ec906e83e86034311491994d58c94225f66def9c164e2a66e97d4a1
SHA512f3106d9c6896046b60d3a25026b427da3b08610e36b8778c2ac7b27049e9433b21f38f9258a3298a15625065c8801fcf50edb74e21921b0579adcc0b4b2eb6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50769d8201c5dfa6626e0bd42a46f5b04
SHA11460fb15a4c48444f7c792710c2416699e7d1bd2
SHA2569abe2deaa678703bba0ae483cc00dac94f105f8d34792945087001e6fc6d26d8
SHA5120cfccabea4b51e907b66659a391f4467f5b5503c7c5ca36a0f377f1d288b112516f9daa1cc171ff9382c592eb25db5c4a66633efb9dd1b18889fbcfdbeda05c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e23d4d2035d2c8352273f53a22624705
SHA1b95fd4dfdbafcbf46045c550243a7597ef7a4cc2
SHA25651f1aba60bdd0b0f7e46918f45dd24ef3503f7d7a2898c288bface3e3e372ca0
SHA512eef8075fbffe6554745a12f09510cdd1c32774bd5d673bbbee962d5ef8cf6862aa67cc8b51499b05494c0a65648f46f2046109f34006751ba6c8e55b0c2e051a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ac46d0f250d172db0522770fc42f615
SHA1bd3b5ec0efb78a6b99c0483c59e3117b946dd3b1
SHA25609c87c39229cafe8052e8a235c0632bb7055a92903a0ee8cf10934b9106414aa
SHA5120c67c8833fd8ef63d215af999f96b1c3d249dbcc964fdbaef21afcdcb421eb828cc9c21c045cbd7f66fdcb2cdc5fd1d51743b46b9bf81a228cb91e2aa4d3f0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5dfdf9cf533f70550081a69017efa8f
SHA13433b3e0a87b903a3fa9d707c47e064a5d412d14
SHA2567f902159bffa365de03398fbd6f97d8d7d8ae874bff5334954ec517d3836ca56
SHA5123e4418c6ffc4a86d938764de464e8f79a8dc030ceffb9d71b31f735c50c534997fe7b65c60f86232034b2e7e81714d0a27991747aef778435d56b8bd874b7d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee20015014943d8e90069ea9be87f7c8
SHA1cc55e39884d9bbfd16b335bf8e83b4e69e8b5b74
SHA256810a49ecdd4eb5bd57d2444dc29940d972a9bf22a166e9c336347a52f30f2328
SHA512276cfefc4f96c9dc5bfa36fc7bfbaa3d7c115714a535088f0f8567b7b0ba06580e430476164017848f0c27634f97ca95fb583c490efe5ae7ef20123b21cf5b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0abfb58bba9bedfe49ff18737dcdfc6
SHA1a9e1a2f9b7a3b05d8c77fc7f56720cc7ad406691
SHA256b747968263fdbb0b41d4914d05949707624fc5f0f2010469e276732d53c7a1c2
SHA512a88b717ad59a3c525746e340e976079227be8b0a8481e9e3d5740675d150dc1fafed8f2d50285f721f1ece196b54c22f1fec3e7c7e11ed105275377a80487adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f44ec9bdabaefbf5f497e6c70781a1b
SHA1617237da4e193c5a9b17470eed3bd9c66bb96827
SHA25651f1e1973051504a50577d5e3b4bbef9030927181f3dce1e9bacc7556ca2d11a
SHA51238d3d6a19fca63375566d3abb4ae37e25415fd18910f1a8532a7a33098cf88391d7e7369327a3ff4788430100c263b3b833a12f2538dc2f952df65352b26e37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d48691179f471798a23030052ecd065a
SHA124456b8b034c20a7543f915d37d2d38654df000e
SHA25655bb4e1be21ccedc8bab914091c33cfdb3dd4dced6f90c21e70c74d58fc7d57f
SHA512fa4010bee97d98e36bb61758db1f456e0f75ec5e405d726150dcdf56eef2c91e3520d941792bb81c8a1677d3371715a258af71212cf025545242212a4b9c2910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff45d552e6aefe9fd58477084c1ab6ac
SHA1faed10d5a658476c1c0a4877e6538709ebc21f40
SHA25633499e59299f4499c7d5514d357c2d40844b2efdfb8d78b0268528911efc4e36
SHA5123149f352750227d12146fa6fa9fc847db0066baafaafd834d5fe7387f92d96a5beb18ffa9e4820bc3c96dbe1d82d0231eea9dc58270c3878dc90351f9cdf2031
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a