Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
695609d46dafcf65c8c60145ba64f210_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
695609d46dafcf65c8c60145ba64f210_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
695609d46dafcf65c8c60145ba64f210_JaffaCakes118.html
-
Size
460KB
-
MD5
695609d46dafcf65c8c60145ba64f210
-
SHA1
046452be42195ac2f33c98ebb050094b57da9921
-
SHA256
e5af859944e090fb464fe47054ca899005359a0a0647c8506659b4bb6aa137ed
-
SHA512
9cb992b36674b681d84a023a7cbc651b017ca05a83f73ca4adf0190d689f49b46a467d96f7441270c7e357e179eae18c3f1a3e6cbf41aa9d18592b5f6d6e8f0c
-
SSDEEP
6144:S6sMYod+X3oI+Y6sMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X325d+X3L5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000135b9829b58e1e4ab3aac45d0191b01500000000020000000000106600000001000020000000afd778244448badd575b15f3176ea3c8ef9894dcde48823d87a4563f0aefe802000000000e800000000200002000000067c759ea88e746ae860e1fd0d0059820c3925ee6c670a02a921c6da98192de8d2000000096332bb5c67cff9b3a69e8bcdde3dfd7ed3c8d017909f93b4a9ea80dc7df96be40000000c0632a1f65254140a7a2d5a2f235b5c439925caeeecd26da9a111c92c0d261072fabbdaea7ab0b2000c5e63b44558de2a8bf9f667062cac5848b526ee8ac6f30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c43b28b3acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FB93BC1-18A6-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1040 iexplore.exe 1040 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1040 wrote to memory of 2944 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 2944 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 2944 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 2944 1040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\695609d46dafcf65c8c60145ba64f210_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b23cb84cfa2e6ca56c8004658b9462
SHA1c6b1ea99fce09f5a2643d6740bdcd62ca7c786d7
SHA25655acd8ac800ca185d2dde36599903c7a22787cf6bca060501ac71083ba703803
SHA512d3b3eb65c53382d400919e5a321d4b399387c57161685df7ce96a63a7ab226d5675baab4d12137306dafe082bb75b413310ec727abf4d58031795c55a37731ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6e390574c54163f5a31fc84a700cf4
SHA1fafcfaf19806a50fde60bd0f0f0d7808e146f345
SHA2561f2289fe912087f0fcaa11ff886f193aba9c4d838d249b4e3cc47c9fd2460311
SHA5123ed031bf75cdd7c94aaa07a88a226b1a02249f7f0c51fcc48942c4232877cd4640d15033ec62273c08ae6f164e6257769bb29326fcfbc806e96d937d2c30cb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfece3481840c06b5ff1f666b535686a
SHA11cf403d313e7e186dc37670ff276d19eac682db5
SHA256ada060ddd5e3e14c9f7eff77a87e5c74dd64f815218eda01bdc78258ff0db9e3
SHA5120a05f3d7848cf148eb9e1f26b3cd3e61bd1fb98c0b2423fb8dfb5f9a0224986e01a89c5be829929d9287e1c41d03d4afb9ea1e71cf5d7b2334c1f0ed02782b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cec9efac1352342b7c75b8976c3541c
SHA179f29e8abddfdfeb7ab3382af20fb6ee4e134b1d
SHA256cd9d3ecbc75c46a31ee1a858bc0f9184eeee37150a50143d6ce7d2f029c2f638
SHA512962d2b2f8d02f11803552466e26bc587c368f71b8e48ff299eed9b8a6d3a7eb8139b99dc3dae2f8509f66d5cde88e6aa6ab9c7aeffd825d839e956bf68fcd043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574e89f3518a16f3e320906f4a25281a3
SHA1ad25944cb9544bcec1f64c6a064c7155b3a0c061
SHA256b49b1d3c32a34ce2d6cd6ed68c7be40ba891a4e81e8dc49b2f2155adb90f1085
SHA512ccc86837dcf8525bf2e66e0a8e1889605afff6625b1ba0e952946ce1aed8abf7322576a80b36bfdc3b6b830cac73958d75691ef445c78c3de079c24c729be0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505750b836ba7e6ff1b98c5d49a0e1fc4
SHA175f3841a5682703080016adb8bbde98eb8fe7892
SHA256d1c9699ae74a906f49d4af802798bdc6221e6a03602df5874d7f21727a3619be
SHA51232156349876c508c675dd7dd9b1a67084fbda81d0fc896dfed6f5767de7da201d1b61d8a9ab4b078d104600a2f82d74f94fa374a6f24aabad65d54e3503bf691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545aa3bb6cbf00974f1d0ad34a627b0ea
SHA1a3c195351f16a468eeae6349380fb530ace048aa
SHA256c9def28682657ec9ddfba278d734d1775a1fced601223dae3b4d824e642e62e7
SHA51282c3fbac2c9f37571fb397aaff7fc20570b4092c0569284d1f783e7d58f2de07c772bfca124cf1b26d492ca28fe70e749ae64f5fa1c9d6d8778ec28eb4add229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075a887e1fdd210c2c9e3d45054e7096
SHA178e2dde2b22fbe838866c7df0e80efb464b2a190
SHA25642d2efa8278115cda0f11b13b8614169bbb81ec80ad21811633fb53344a0e011
SHA512aeef2b95f6d679b45fc8eec6b1f1b269a2b7a658ce3e5a452dd96eb856de94d4abbe4f6f24f0df0cf99bd03ceb3b0e918835cdba6a15c0d16602e6ff5910c5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580cfd981cc695f6a917620626aa52781
SHA19a104b6b221c6cdd57716b0bcc3b10f0e5a1843f
SHA2561ad9594fa3fc1cb8503fafedc9d627e5d1509a582a34646659d8732e68546b0c
SHA5128dc0b0e3637ff106b45437128f913a17063587cb28ec9d95ca8c6a70b1dc90759c33998c1d1f6d7f112bb69ccf341ad0f390fcba6fee70f7c7ea7591be24c15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea614cbbc545386eedcf04618f9f36e5
SHA13dd9605e2940531e3e954f9adf214cfc5b1a8193
SHA2563afc0939039a22566b68b868590de6749483d261fa23842bb29ecee5cee93a58
SHA5127e3548fcee5a6de20bc630e9eec1cc1d755a87709f1cebddb2383ee428897a90137c43583bfd9b17ad1c585f90698852a531354c0a27fed7104a6f29e28fc9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d48ce3a9acc835bbd3c040c795c11d
SHA19452ba3345bb9bf30f7403e1b72e5b86fde8cf22
SHA256ca3b705164a7b09b10e60c1a2d482b70d0740071de8c91f8ae635b8b82142e3d
SHA512a4724e7492b5ca01f8ede9d2b6761c52d866c438d7037ba17155a075aaf76c4cd40bc1ab1db6540decc434a5066e9693e1a604ee2a317eaf28486ebf0283fbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3308cc5f7138a66a54f7d752017dbb2
SHA198bb4c9adb0ccfed28739cc7a49a23bd02ee3078
SHA25635fd6b6f8de25db235c0101795e2a57d887d3f1b296e6359fe893145bf667d85
SHA512bb3541dc32f92052318d28892ff7f959fe30f73df5a8894d6c57e767f8b57053332e55136890fad1d95dce422261a1fb1598defa6b29470440c17b49c6baa535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f7ca3dbb4ebf2fb0b5693ef0f4ecdc
SHA1cec067a627ef97929f87b5475f86fa1ed21f61fb
SHA256006e3c3f1b3b2481e018257a44ff3dd9cd8de34b56653162d4a9080a4a0d396f
SHA512fad95d7affd80c410aeb0f2f0685f4fb5d469a727f67d1b2200786b50ca577e458b1e134cfab064faa6b6f8409ccc858151877f4f3a25201ccc15ac03128b382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52966256ee90231cfbb0c36d2fa047782
SHA1bc15617dc639380acdd57b42d923455d0d013043
SHA256e122c2d757a95eb5b3df47d6987dac8aa93e3f3f051318cea1785959a7e25fcb
SHA51229d2527fd49a6f588d5bf5a1867247806f7c3eecef8934a99f5c76175ac29e4e4ce35140a0cb3a53a6820843b82517eb438ab01b5dddd125992101967ff31366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03940be01ccb5c98b78c0e6b205b7de
SHA1a5f7b43a46df0bc40ff0a8be27fd0ab065ecaf1c
SHA2560e443bfc3a59623544dc7c6b1a3d8ff5b1609018dc50e2038a5a70208ca585c0
SHA512bb52e0ba910846199ca30ef224f21e5924a89a2f1d8c0d0c75670575d28689590656f71f06ece645415261519a09c6314ad954e18a077d7b2e2b1aa998a7c1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a511daefd593b4043aa05ac3b85741b6
SHA14da82ae7f591d90f10a012480a6b7985bbe6b718
SHA25664c78d4317a934017925c1ff3e1a02e2cefe81edbc53b557148026faa854e13b
SHA512067167f2c9eaaeeb1c06f7b5e68005c5df8744b80a577faa193f8d3cb68f99a97d764382d108fc9d65c3bfcb6eb3a266f7cc9e93f0790930c9bf1d9ccfbcb4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb3b4d4076f3100009c0b2a87874b0f
SHA1e0ed41cae65cb137b826026fe98325e5e7aa1636
SHA256418f97985ff0ad3610e8e630436496b06de513289f7c20311e14b6c9422c569f
SHA512a1303ac1ddeb0f82765dcc4b768836a5136ee32737ea5b44f5c1ddca189d476686400bda910b5dd9983b652fa1caae0b72b83ad54ab83724b59f6199cdec81da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c43d7361fcd0a49c0115d76201ccf113
SHA154d73e865ebf80709b9889bce90fd816fa735280
SHA256f0335783d065aea97ee58bd14570af4a453a300ff8e9db432e7788953981f192
SHA5123ed2c8f7067bb1b3fb34fa49672ccb6a62e6268014ac62df70058bf3c8c63dc0fca862e98e55ee28afc425c84c46a085cb435a08ea828a3664d688b86cdfd5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56865742fc8bb2e9beaecd59219663a48
SHA17a77db7a8811e5e74acd15fced7cf8e05925a388
SHA2563ac69a57fa63ec9bf38609954f98f695653b00403d155311bd3b97ab613b28ee
SHA512be06ce2e834623b26cb61e9d2eb1403bf7e86c064018444c97d29fc1ba680b24ce9ee863e4bb68e872166e43140210f880b7874d69302484afb52e727cded67e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a