Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
69366c315106d6cde19c1a5bae5835e7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69366c315106d6cde19c1a5bae5835e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69366c315106d6cde19c1a5bae5835e7_JaffaCakes118.html
-
Size
6KB
-
MD5
69366c315106d6cde19c1a5bae5835e7
-
SHA1
1a22c0a9c0921525012b2ef6f37b11ad68c56ba0
-
SHA256
cf0a98b796d277de051ca293b49f0f0fae8dd2d4534f14d2795f1f73c8c20767
-
SHA512
07a845eee47c717c6ce8eba3eab6bbf2d6644fc14cd42d9903885e1ce36d6604607f5d90939a0a504560d3743d18a7b2e6388d468a2aea608f8b374fb7aae5f7
-
SSDEEP
96:MhM3sHf/GzAFASsXefEGemfsjGDGsXWhWJeIrP:MhM32NRxf5GsXWol
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f074d328acacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{543A3431-189F-11EF-928E-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b67282e5f517c001797c4792d8fdc94578d8ca3c003ecb9b98078e2059543f49000000000e8000000002000020000000d5be8dedb6b3b93690500ba856d2d99207ed76ad2e8a3ace71a683bd60cfdd8120000000d1c550872237faeb532a19ed11beb3815dbc7721583bbd956164ad2915d9052b40000000383597995d53eb0c1c67a8b67fdef1263020ba0731563c1584243f5e7b269bf57041d59c42e5bb91fc55e07978e5f405ab6026c3481415fc99842e735e42000b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587674" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2064 iexplore.exe 2064 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2064 wrote to memory of 2732 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2732 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2732 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2732 2064 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69366c315106d6cde19c1a5bae5835e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51161002bc3e0407b06837d7946f1e5b5
SHA12b7eb5f43ae6d166720a1d2f4164636486634217
SHA2568ab54d922e823044cec92612b1f4768eda5c769e3cb125c6a27826130c06f034
SHA5125f09bce1c376634d5bf3be92705d044034d14029f9093ec9b438e1eacb22ba9e9ba29e0150c5f04aa6df14b24dfd31502e2faba47a3a1e1776ead24c5a1b8e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a09ce2e7f38cf2db2ec426966493a89d
SHA1b52237fc051d23fb45e9dc8b83d61dc2f6dab318
SHA2560528368eff2b176de1b445d483285a83675a4077d30c170140babb13f3f7a5dc
SHA5121cf30c3d29bd0aa4a52b675ca8f1e9fea5b90133fc1d16eb366f30d41c251de569bb293adc35aee3926cd4c9278fcee7574f07c47328cd94030c50bd919edf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3b43a2270b54b8603d53a817c330c53
SHA1a1391ac43d0de5de6c58d0b8a3e460fc16aec933
SHA256425303a59cf33a3bbef97fa6c0b3da299a8f8932a55db9eaf23cd1d1dcf4299a
SHA512e5ac9cdf46d852370c9f92360937d40ade864bd72e653d58516aeab8b2e2d4862e806038bc47bba3a692253af802f8f6fb678a79be61f00b343802009abb65b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d013f2aa66b36c34ae6953e028f2b4e
SHA11855b5467888dfb42ddfdf4f877fb6dc209f5bcc
SHA25654afca5e7af17299f5bf42298280b7437ee428cd5110242285ac0533617ef716
SHA5124ef45332120142eb477334659e8ee037dd60ab300545ee0cdfe1d79bf052a95348b54ba47e13668d4b39ab30b218687cfc9f0f731388a38b7b957a6617399666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de2bb6d7729b299e4232de4dd4f9b5f
SHA179ab4e16bf32399b792894e91fb2793613c0d8ee
SHA25634d5bcf6ef2ab2cdab3b7bbbbd38560b7dc431181d5a07034ab83f38456e6dac
SHA5127de3d409073f36a6a8300cfc6877cb1bcca97f692cf468aa7bf29995fc38f7cfc426d8f24180d1bb61118bebf1293f78ccfa9af34c3f1d613e1117db71d103cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca6b8620b40be61c8148ae4f460a206
SHA1c0aa80e80eac64be8b9272e89d64a59ff3c42e9b
SHA256e03b4f1c6dd1692cd9f9f820e0eb47318ed6991302471975ba979bcddbd4c9fb
SHA5120e884d1f566dd69e32c9b01443f3b77469b58534b34dd7c4829a2a33c8d5579206e3a2e85cb653e7a885a752acb4a48ee18987d8a29617f3caf6d503d6c62e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c3e51b7eadaae8c9a73794b44a3bf1
SHA1063e14d265230a8b1100ea0b713a3a9cc68bbc9e
SHA256eedbe4551d328cd75a2cf121ccdefa756b7db216727bebbf1bc431182e4aea13
SHA512e580efa3a94b9e3f1c7b404939bffebe13cf294c27e31001829a76b5c337495c6ad87210328323aa3b7506852853baeef4d3191af673e6a855f706293d0bb005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec80069cd174a0cd897b58cb8a6918e6
SHA1611ed5c6d7439f8eb1ac3b3e2f6a3315c306abe7
SHA256228151ec225e55a9055afb15f9e74160fb9a3a37657ce0e3735315b4b4b74f8c
SHA512615b32c8f4fb0b3f3f7c50863e0b0851721f7a4704a90da70ebca3ebe66c1f33f54aa992d9724936f023b5fc4d0f100f4c97a3af909e382220a15489878b8aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e3bbb06243d570cb801ad0558d01d31
SHA1e4014692f18f01635d40effd981b613779e8cdf2
SHA256e6775af5c2a267a3c43b9c2bad4b3acab069e4f5252b33bde0a12781d44a2b8a
SHA512a3f24144b7e52ff950f4fa42bed02245bde383288dc71373eb0308d5b77de1bf219cbb18b2830f5d580d3bff7100464a7b85689414494e9434a5ec6708682019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2b0fc13ba5ed893ed28ec5e16fc4a8
SHA1641c04618964d7c231006432fb82a89e84621218
SHA256220b45c3724278c913ef6c877c30a3287e020ba4969deda253dc5470ee75c1b2
SHA51299b159e2b2309072a6e8c26b18b355a74419197196ae4c39b8b8c95bbdce4402390162425b8bbf3fa378c52cefdecf8ae795da623daebfe871a16e04d49fb541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557abd62e4963e36d081f08d8ff8cf44a
SHA1bea19b0bffa99bb0ee749d1ab132de7c4fe5b8ed
SHA256cebc1915f3e5691e58d1d767d5d3f50c77e13d24da3c03db3cecefef3174df76
SHA5127f870c639a752c28e2edcd26198b041a571aff3dcae672f0cfc6bac3c3dae082c58d54350cb93b2e3e006219466af03f822b85a1da7e4100b25b09980868d7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525965a48396478de691d2e2666e44691
SHA12e2fbcdcc260c46ab53474a4efffd0cf51b0d01a
SHA25668bab6372265cb76eb6b818a3174cdf671f79ecc98bcbf03167d371dff12056e
SHA51262d8f58b81e3521fc64ca782261c9510308d464dd50f21f6626e2dec16f85c7f5041e75f8494a623a9e28264671748775887ec4b389e37faafa4bd1b7020f15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55645dae5cecbb713ace1e891fe50ce0f
SHA1730e2bd0d24fc95d6d0a1eb42fd457f5c2fbd91e
SHA256c3d2a2a44af8803a8f83dce270028faf41bcac5f3a5382768bbfa976fb5283a6
SHA512307c50b1da2c0651074437b04226a98beaaf53dc1759157bc3656dc984d89a9ab1321ab42ed53788fecb8cf84a3f715e9ba7ae6f3c463d8cff9785dae1840374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3105c9d53c0572f9f314a4c8b8daf4
SHA1374476ae469578817c93ae1b79cc35c848536ced
SHA256aa6ceb1852062b16d7b7047b47aa6c75e8968edb013e0ae8f1697df5b761607d
SHA512c2bcef1cfd4d9da25f6c4147b16da7630cea0942816acc5b8204e3f978fb5506f5d3138e1255eab4aca5257e4b460569833831419fb87b24f2aca5b2c848a551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7018ce5afaa22124d1fbb52af6b0ab2
SHA1119be6ff87761696b7ef23ef9d62ca68ce9fcb42
SHA256e5063add24f313cab5e9aa4cd3196a30c7cdf539a8d6e903f793632d80db12c5
SHA512022e62e4f0f18a434440e810977d2070050f16e9a09366b9d378758cfbb46895cbe2719e3bc4757e88c2c16b893366393a40a4b58acf8751a05403050aee61a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b848cd16e4afdd9ff42ff60f1f69f7
SHA1f66861586e1c9d32957b2b3adb8243fa78481177
SHA256ca7e083d2c55d2f034cccb5efa3577d834dbb81e4348c711d32945269e5e8414
SHA5124995b2af5e09d3724e8de9d60af13d325effe0b44e52a11d16e00eab81484d44ca486993dbfc731558c7d5742c419fe97c4a647413e62d46b49768b05d12d865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4fcd7ebf05f8b4f9a667febf78d72b8
SHA17c2b5f4d421b4cdbcb848c0ec10778cdd347f3a1
SHA256f33f32e7d2f4423bd414d09835293fd9de05bc8646a7184a431e135eeb389ac0
SHA5128206cb2b8b2fc39ca665096148d3019b1a3201288797d5ba62f5ebe87ba3faf1b90cb058d9381855f8440be828bb4924ae50e4001dacf50be4a664a6f427f2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587018084946e3f978c2b980cf54e1f25
SHA1517b51bdc532d3234ec525f3b56b7f99ad9aa8fb
SHA256dbfcb921bba38a56d15483e3fd08202b4fa8bee4357e62a676da76628e93b708
SHA512d91f979fd126c39816479c963c8ae0e5de3421a184e0d7929b751e16d3d91241f8a7803c5a8de2e340dd7cef3a22ab2d0b2a572506fc10eb212b59a58c19cf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ca7c17f74908e482c8430c793f864a9
SHA1b6667f3af36089fcb2d07fa2d70a05e40db80eb9
SHA25662daf3fffa5674d10c857e422b4d759fd9a538ce60d73fed5166a74d456fff6b
SHA512eb89448ae5d4295741c1759c581de40ef6de504090b3aa145a2f4ddcc8be6ea8bab2b300007a9a46267723a34d3765eb8edb567329e4412114fcc436e576eb46
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a