Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
69557334b56753c14501218d43640760_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
69557334b56753c14501218d43640760_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69557334b56753c14501218d43640760_JaffaCakes118.html
-
Size
4KB
-
MD5
69557334b56753c14501218d43640760
-
SHA1
645c09ce948f25755224553f09c85f69dfaca5c3
-
SHA256
581892c416887d19220d58afa5b80e4003518173fa2c7c462ba3f75fed05d6d3
-
SHA512
c13b3939323d80f19721f3137e8176de51e9c363198740b2f3886de14bcbe3efbcf7f87b4a99875c9f8a449410e27fd15559532768fd66b1d26d05f4fd08adea
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ocjQy76E:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDl
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000020c03d0122bcc4585c0f763e28241aca77b37d419cdf5fd5bc54b022991e524f000000000e80000000020000200000001a6f262aaa9ff2d3c83be61c15e8e5b83bbc2816fa7eb29fc4dba8b0e4942a30200000005defc864aaad6ff6e4a9cd7b04c25ffff39d381d852fd344623046a520bd9c07400000007ca6cb864652b87a77caa447018bc1d15e34cbb77ff4314ed5c8ada023da54681102b4ec2354a952484f8bccfc27db79f2b3d6be80240f924316fdf14f80fd10 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590594" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909f49f5b2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20AA82D1-18A6-11EF-99B2-4A4123AE786E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2392 iexplore.exe 2392 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2392 wrote to memory of 1276 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1276 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1276 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1276 2392 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69557334b56753c14501218d43640760_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176f2917e97b8c3624de12fab4156c42
SHA1446b525804a1640fc8d436c51af7c2ce6bb3f12a
SHA2564f7da9543d386c9bc3c3722dfc76a9840d3eb7a0220d0f272f9d0f66d2fec0fe
SHA512a35517e670d94b124089b6dab20fa322160bd067e1df8678ea0f3b99a81e236c5467099b2c753a82f3404cc84eb3904c045652fa50bed51f206c52d86b10bee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee45139a0d72bc66da2358aa588bd42e
SHA18e6e0648db4ebba0cd80d4b226565b1b5f20931a
SHA256fb057962a625cf0ae5eb40bcdce71c22ed9706ba00a3f9029c93b4cb33c20cb5
SHA512612d5da86c5cd44623dc2bb1bca84f9f6dae25c4267b680c073b1fcccc436383a57a94003f394e64bde60d6bb639dd4e197a5258820a0405707b1644a38501c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5e400a1b79d04d0cf7422a7e96c71a
SHA17db28f1ae14f046921e0c1deeb8251f3c15bed77
SHA256b4f7fb6d34c05d321af9d1a821060f0b02f8ecae0db5b55a6d3412bebb2f10ec
SHA51235aec4e9ec6249c05b2aeb3dd4305999f2f4ac6149566028135ff08f454045a6d43124b399d750ccb002de09deb1108de2458f14945b34bd7b2ecb4e6359ed62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a726d6584ab06ba1b94a693e0787020
SHA1bded4938245754023deec03eb520faab8441b53b
SHA2560d122f9c9f9492b7509006a4deee8fd16e82d61e2e5ed608815b114bfb81432a
SHA51219edd69fa3fd2b31fe80c59839b22f8c37d4aa8bc1a0cdaa98a8ccdcfe6e8506da57e52f58f03b1a278137679a893e3603570c83aa248442e967e3bedf73f253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7427e6728797f0af0cb95a45b12970f
SHA13c3271f9c9b5f14255f26c3c6237c60efbd7598c
SHA256d8ad1173123bf202923df959ea0992669ef5e5f1dcfdfa752ae093f363118332
SHA51259a91c0e4617effc28cc6ed71e6420d9ec2f576e3d53121704d8f0a32c8272bdc6e1e1a5358132111a7335e9a19417698c0807d248a2817ad4e3bd4900026f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5eb8d9a9199dd84610f564cfea87535
SHA199f70fc29fced16981fe0de0a6cabc30a5a2d411
SHA256caa59aaa090e7c318b53e524dc2840e4dcec4ae84bbe6cf07b3da3ff49d00de0
SHA5120699095692075bd3a6010f87e12ccbad9abd627e7fcef934d8cfb370e26df7906c47d703e80a0449c447870d8d1226cdd591d579320034d53cc3a8f76675a37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ead11f36e8552fb2f6e8ba92c799071
SHA101bf74cf4879530c20d212dea3523cf960e96e18
SHA25674af386ac7e75acd7e8418f865765794d124a395ba9592d82e8f16bbb9cb8d29
SHA512e988194b70d7a42a7ea4c87ee54be76d2c95113357defb6958c3d99c7c4ea571eda607e4036f92285e90733b671e03d2bf501a826eca578caaba05aec76d849e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799c1ceb7d02cea043468139a16efd85
SHA1fae9918884364f7045262ece0b125c458112d176
SHA2563a7344a441d9e70feb807dcbcb5ede15fc19b5476c4e91bebf534920ee07bd3a
SHA5126ac0f2aa8d37fbb4d044f44225441b5abdb7cb919d820bc0fad26dc5148a05465fa5e1307624c7e63fd84ea825c5f1e42cc30ff29631297cd47baece3047f6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5926d1af56175ab4c19f832f025685607
SHA19891b087010f72d75018fcd0a6415519e67c0688
SHA25615a87e27c3f45c58ffcbaa6354120bddb017d059e9f815f54b77863ec9ba897a
SHA512440c1d69ee8f5dc37ee94ce881ba63c37d3d97548ca7e8ca459d4b500e1080ed5141a0ffddffe3cca47bc8e89b26eb6470fde7f90389947283a335391579cb89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d28619034bc70c0b6dc7e8dd766c2e
SHA125e453a7be168c1beaa661e1713677f6a911692b
SHA2562df7eefd2d32164c03f1c91c2834dd513b8262bcbf88a5ff7842afc962ff8a65
SHA512ae4774726171ef8c2be9f97b46c77ad2f7464c4da1aa8b3e16065807c3118a417573d8f6d3c57837f00f1070d41191ba994cf3b36de6ca4f3695d2fcb39cf7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af37a4c7c8f367277d013b23ce6e36c0
SHA1baba7a25aa4d38e90cb095a9d7f524493bed93ae
SHA256b20b3408032006a773dec442efba3d4a545cc691ec3bd415d8f0ddf5b05cc62e
SHA512e5b3467eb3947616ce5ecef20d0888687ed86a51107813fc537c72c25cf9ad2acc333c376374748992f115bfbce1dba118b20f493e35b138b3595862bdc34427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569363ee7f185dcfa273af4cbd33ed0c5
SHA1a4e2115e98db5d754e79e450a1133659657e7dee
SHA25653a690a74e465149f2a06a652294b1691c9ab08c752bb4a5d9de7f0765c1f4cd
SHA512e1b814af31bc78fdf5bf96bdbdb153f2cf33463a6c7bda4d45dcb7fc3de1b59b6f4135e59b482b625b3e10650af1275d286b4eb1dc07dac964081d906eb783df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d28800a90df7672744ed69f559bc6128
SHA14ba4017a9a42c4bda1d6c81ad8675e82ebb9d30f
SHA2560b32c8e424f277944a99e1244452628a56d22df3831f63bda7c3694b6d3a9a83
SHA512441c58b29cb751e75c50e75edb114716b06e6d0850a82168bea6757bf42f3338c00eb63df56fa4835e27009c9604add8cbd87be76ca4066e5380cea802e6889f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b84a33c179da689f9f9376beeae82508
SHA189d06ee96001a5ca28d6de74f46720ececa23394
SHA256e97a1b8b8efc7ab4392cafbf12582570ba8d87fbcbd279fb40d68cc0ad1810fa
SHA512dd361c565299f55da9b3bdc32ea1d209e10af5676c47a26c91a475e39da15b31a3c8afb76d8b44d75a8db9fc2b6e05f7147a8da8b6883e176feaa8c00784c97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5917888e1877cfcfedab8cbb00961ec29
SHA1d6f15963f9a7ebb900d3c1e83cffcc1c0d254a65
SHA256002df5d55fcef294413662083af72af7bc9d588823656fa95f5edf11844b4dd1
SHA51266858d6d144d452af65e6a42aee3fc49511cf86eb8f9fc19449e786d85c24a2e9479522448eda48194717118e7fa7fd1c029ca79864cdfaaf9ac4f8430274112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d35d84923d6155a066c3e53136377d
SHA12c678481a7912dac7a7a13de4b79829d1ab972c7
SHA256c0da64881b2f4e02372e38548910af1c85439a67c0ef57dfdbf7247e86fa336c
SHA5127c54a58a6af92b452279cd5f8730086e06c46d9e90ad0ef4fc1bf3bf65f800bb32da60ec41903960220318c512942b8839d61d0ff0f6f0f598dc95cc8c4701ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7eb9607037f5ed3ebf6153fc4e0aa7d
SHA1eb86b01dfe8c03e5fcad4d59b5f993465aff5522
SHA25659dd176831257c43bb7cf9e6e85a6c3547f048be10cf60948402ae2d4ea8f774
SHA512e9d5d97a4d41cad3d54d55cc2d98d0be5bf820b8c1659b5a053080c666c31a330740170141f7ea2103daab5c081dd25c770ba1065a6659db9e32bf6a5166108e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d6635eea5364f7c5ead186f8e9c5b3
SHA1e28d2295d3927e0fb4351898c29ebc5a4b01147b
SHA256ee7e77f7eb15269ebd40613d4dfc9adb4b014461c43b061f9385d4ad0e5737ee
SHA512833fa521ea43597cea24864bd21801aad33b390f0ad75ef531203bf9e1b30bc9bd13e417ccf2a6fcf9b2e0e7a7891c9c58c4723b0c20daed1ec9e0e3f3d78493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3246b02be11b9d5ac38c5e3a4bd4305
SHA1b112420176e5c3ef3e027df21803eab7c450d373
SHA2562e948d9fbada80f024b9831094946b37dd611c2091c01ba83b4e5a4ddb0cd36d
SHA5127b5ad54c45b41861a164ffacc91971de7062a61a409f5076f8f90655e4be19c6ee0b625f7d3d805f3130d738eff8781f3c05cb2e808cd58f8fcc98d96cf3feff
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a