Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
692a7a40bcf535b042e43acc00319e94_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
692a7a40bcf535b042e43acc00319e94_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
692a7a40bcf535b042e43acc00319e94_JaffaCakes118.html
-
Size
4KB
-
MD5
692a7a40bcf535b042e43acc00319e94
-
SHA1
d4b3732b23f2d8c6d7073718f25d5507b986b7e4
-
SHA256
e01aafd99261b821cf5e0a03dc072205ddd2f096b195e00b4f51c9e66677f658
-
SHA512
fd3f42f6361f2a06ba2b3c07810e18e98508c109801de700cf57e298960891744795cd1f179d99975b407bc4a3a51c584c8621d72771f9dcb4147c5cd9289935
-
SSDEEP
96:LAbWvtOS/uw3O1Z3ctAH06vVbACovOvZld3t7FJX5maTLub:0W19/pO1Z3IAH0gACEOvZldt7FJub
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c928f53ac0cc34db6f4820d23c278b60000000002000000000010660000000100002000000072a6728f5bc3e072ca7061b024b984072b9ab52dccee9f636b01a28eded13012000000000e8000000002000020000000eafe2cbdc7adc07a3c04078074e9b8d73a6ec5d0b9154e4f5b9b33a9065a0b5020000000fe3cb1397f193818b81f8c400e9778278a4b5bab85c601d4cc6cb5aa80ec97dc40000000492a37423be3f8eea74d7181cb82f8de88103f1f59d8d4607f5de985009e78997cc5a12b5d9810b6760485610c796ab8689ae9f7a472358e7d2074bc879ec675 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96A4AC91-189C-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70362a6ba9acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2204 iexplore.exe 2204 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2204 wrote to memory of 2948 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2948 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2948 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 2948 2204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692a7a40bcf535b042e43acc00319e94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502926ca28fbd8aecb47f7a4fe8b2e08d
SHA16d13acdcd3d560d04742b2ae2407ce83266a2a82
SHA256935f631b5286c7ffe2aafb63d21ccff34c2c2a1e32b618c329bb22d16371014f
SHA5125951adf8fb79c79f609ddb16dacb029f552880aa60313e9d5befc6e0cf0651887b75a6ec9b221764d4a1730b38d10820e1eac35bfd0a8e799fe978c71f01ebd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ace9d439bbffc70d52d27d6d409dfb
SHA112d3077cacc5635fcadb999c93c792b4a14167ae
SHA2567b909017e6be33901cb06425e4f236dfed1f6e95291b08db2eec65bf2418cf4b
SHA512c50ddb07825125db52149dee5945592d2104bf483e2e3fb94853540007e831c40da9f058e6e1280b3e884038bcda73cf6bd916be87ef9a010fe4b502e4e88ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f36af602446350d618ed2531facfc24
SHA118efe3b3e614355f23eefd2ff1d6e534cc8ad8cc
SHA2564d07dbd90f65b55a9ef63f5fc2a963661c0b4683e7baf7ec3cce920987bac4c6
SHA512f34a8c4611558488a5ee332d78ba56566b5f917be0b7bcc9936e8f08bc145b62db059a9c8b3a32525617402700447abd382bd16681ad67658cd8a8c4ffcc2fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c62d7642b8e622090f83c529ee2fbc
SHA1410003a708c8de3dcb25cafea1f5cc6066cb27ff
SHA2566cf7591a7c5a6887caaba5d764bed2287086205a11e84ba9404cc5ff2c65613b
SHA5127ee921e8505db33398c55cde1e0b95d6b6f0d63ab33696f2f022973cdd1527029723e310a04ba9dd92c1d35b0c47c9bd3ff803d0a8675bac323a8b24af2c233c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d17d20344684a7531074e6a6c1f08fc
SHA1f46da0c8b754929b5b589aa5f2396a5693e85e7a
SHA256279cfac276204204f6e5fdb681495997c8a092ea37dab20f1350f5304f7d5d63
SHA5123d9b2d5b93c1b6211b827c41a2881573a8424989aa55b170d210d388fee833dfe1192ef180863a5235df941a223aff52c0a95e7848320f89b7023a4a322e3705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161021b5351c8770c96647cd061ee3ae
SHA117154cd9b90f51a896eeeb94ea2135723dfe54ea
SHA256bfde08919445968a641c940fe5e0366242e15235ae0962d3a58f7cb5cb4dc6f7
SHA512c7accf343c4a6173ebc918808c0d45128d9bd87fc0b3d5f4ba53068973ea40b65efcf78da617ca3c16f345a98f2bfe192dd879eea14813797a7dd819ad1fd6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57515a012f564a5c98951bf3b2d072284
SHA1bc5ded139e8eb717fefdb80aeae09c0f915c4786
SHA2568dde6900ebc1f1947fe43ab398294518b2761f1a55f82af45ab1f6fd36c708e4
SHA512b17dd55f4817ded1b2a98d793996eb98000ce763adc817a7ccbb5c3cf1a47f63ac44d0073b65f2740d404d4790e347184ed93117bd009f5986875bcf3401f893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c542c18bd0ee3e410605875c6cc408
SHA18f807d38301ab8b12ae6fcc7e0de26bacd17a7d9
SHA256acfa1b8008ef9996bc174d1b50a054709ca78bd84dbfa6adfa487e96b2eaca9a
SHA512544f52b4f5b0108815050307a6386609d470bbe4d50f4da5bf224dc2b7d6026aa1f18c9410d69ea32e0bf576638b67e30494b8a07dfbd148ca926bc8a3ada52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0d431d5d066bb8f5d3f32ccd4edd07
SHA199e6db3485959c46380610e40f02a0699f9a30c5
SHA256ef60be62aa4fa6c4440dae3ade0357b91bbe87d38d20970ca84c1d6ca4fbadf6
SHA512fa7314d719dad63bdbf598e36c1759a0a139bf1c1cfe241fafaff32cd8645e2bd64fbcf4ea1d06651c4fe55aca4b01bd314c48f6d0c11a51a315d1c1b9dd2b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daf30da50ebe6a5a6cddcefe10bba819
SHA127a324b395ad6c9dda6ff5bb4626303bfb916000
SHA256a8bef813d2df5836f8a57525676833fcf45f986ed77d742213d75c926d9a21d8
SHA5128750b666ff6ed598d114c8866ed94df226d72afc2a5bba0616962357174aa28b6e81fec6855bab66e70d42dbda41882a8e2185d6151bc270195cecc4f2149cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5bb2e4a6b4c7de72cf69c58cadf1cc7
SHA10ecaf86f5c016aad1b08e17cc668b6c4e7ee7b49
SHA25665304da376719183c884c28d6866c80a2f9d5fb06b683002cc443f44924ccf15
SHA51273ace99aaff9a64de8bc64eb22cfe5aa077f4227736e1a064fd8fde76e43b99e15ce3bc731ad4a583f86ae60a3d1767a4f393f884e0aa64e403eee87b24d805d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa2b4500f18363635fad958e827607b
SHA10e824c18127325ff2fe9b1541296fc2e010e7826
SHA256d7f3763a52fe03f0493b18d9295352a040b2949f04f55aa98ac8b98feb9fdcac
SHA5121cb946eb291785d91768848146283fae35f0ba793e58761372f7602a97376cdb35886931221b4bdd5191cb9cd82dfae129fbf9c31f873cf4fbba5ec84dd5ada5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c16950e8b3637f5f4c7305618841bd
SHA16409fe91d0fa58f815eb84f3d54aa400a5a0b256
SHA256713a848bb0d8acbd2d1dac7506c588f04c0b80aa52fed9fdc850be2064907bad
SHA5120030e380a79fbe37823f9378f9bac5383215a40f6914fa32170c70b611cd0e047e07bb31bbc89f09fd1bb38e1e4b1ebe9f8a1c2e2d9c779678e2b39311976590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55caf049563dcdd4e52096e73a962aa01
SHA12bed8b54bd9f5002d489dd11c986e75ca4a51955
SHA2568cbf9eb14c82b6d124a23144a7312384290ac256d76a79bce9287835c1c8aa97
SHA512e7d0735573905d4497695e21f78c4139217329af8c2ee0ea340424df5e759dba4d7e1e443fc39673b30aa958fed0f12735f322430aa8bb9afd3d4e9f10def48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59db65318a883dc6c98f59465b8f17f76
SHA139042ded07f9f627d41c0021d3b3b5176bf47caa
SHA256e4718c4cc0d253a1249c557fb3994e6e7bb843adb6eeb68ae60d194e202dbe33
SHA512cc1cacb840a8796ada283091bb6fc9bf28237838cff6748b2d0a0f0e668a48cdfbd0d6d477f1ad1f92d650181fb665408f0c319278b3b5030a906b029bf8aacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b88ecde4de8c7d67be626af28ab6b21
SHA1e8210ea7b6fbc839a8950366df40910474012953
SHA256a4af08c0b33b996b6f3f20d3c23dd04dc7b06c690a81adcdcb358260cbed06cc
SHA5127ac83ade5691edb85d3e2db98eb6488a99b479154057478820589a54924e15a9ed74acc3ddb4d2c7643f657a867ff08c7805e65f0564ed07975341bd236bbd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658da399166d2c07eac5786f9f1af403
SHA1d8b1d79e9fbacc2653dfc9c015d6cd8af17c444b
SHA2564ecbf8be5e48c719930b83a7637ed5807df69481b3587dbd6d57c4765d285cef
SHA5121a7803aa83229de7f0666f593a7bddaf57a67cfe007bbb5ae0853b0a0aaaead90324a0c411ccfd64d9c0b7bba38d598557b31e75e4018e0c5507ea5e37edd3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee576378d4d6a25b2849b9fbc908d45e
SHA1a278ea1714e864b6f3868eb24c08fc60ecdf8914
SHA25692dfebfbdb328bacd5c26b6d5f31783a3a6febcd1c5cc038423c516bf57d899b
SHA512da859b38e104ea03cc75d576b21e939891148f3cb89e6ffbbc886e68ac9a8d0c8b1f9c5ec5eac1b9fb3a2ea8b39866a1a69e2488114e0b194e8742ccabe747f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515bc5ad5927f65cb3334ef8bb1c90c42
SHA1a020bac0fddc4784deecbf0a3a236898dd5a245b
SHA256c1797a6ca9d76c19342d7681508adb77e33d015af7b836461855d4a30854d0ad
SHA51276a20b78e8c9c12d4992353a92af58e99c20088b7ce3a784767815e29da1b630bd0040eb78f314f6a34621b69de8d0c13b0fe6c70a3fe6ea7bc2c39fd53e794b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a