Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
693788272766d8a295a0a233cfc541a4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693788272766d8a295a0a233cfc541a4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
693788272766d8a295a0a233cfc541a4_JaffaCakes118.html
-
Size
64KB
-
MD5
693788272766d8a295a0a233cfc541a4
-
SHA1
6e914a12613ebb0c0e40af48d9430247cccda294
-
SHA256
0d63a4ac1e85a323494127c368245f5ccf408efab8fdec6c0892aec80d384d9b
-
SHA512
e3cecefe5c72e5559ca7beb9a07c7ace638a30eb6a554e894c76905a24960ef27e3a0a785834cdc38dbbe22a69c232119da2f200887f290ddf67783587dca68f
-
SSDEEP
768:JiUgcMiz3sI2PDDZf0gl6A61AYmBnNbYmBraoTynyCZkoTnMdtbBnfBgN8/oi2cK:Jyf1ZDTSFec0tbrgaMc7NndC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000695931650cb641ee92c7b38bb682b358e70048651843eacacc450292d51d8e80000000000e80000000020000200000009524547f8b541f2db2ab9ed572368c64ca0758e8bb93fa00b657152d571c27d12000000015f036977ce6886775bf19986ea3c98089dd07970112b98cd95ae91f705f00924000000009d366a07c011459598fb2c1cf20863ec8cbbacb57165914dad5d7073ea7da8efb967645a1ee849d75acbc404925d8e818a810de1df595dc9892ce4d7ccf3f15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c067a165acacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91030681-189F-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1924 iexplore.exe 1924 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE PID 1924 wrote to memory of 2032 1924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693788272766d8a295a0a233cfc541a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05392217f6bc81c683911792e3c0ba1
SHA1a964b839ddcda8854372da50c59f2a69eb049125
SHA25608ee8a04856c82d4214189ea8026a7b792cc94136d8cbbcacaffe2296509f6a3
SHA512d0c285a543994cd6d1bb8b58083d3599a08b34126afb67f3436b1fb3b7b3b9390ad2adaba66b99532e67d28662e643713fa92e5a7cb8ea0826e643ae7d69feed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ecdb50a078d1247a390fa66bd601c4d
SHA1746f607fd042d8a02767a76f208a92d1d6aa71ba
SHA25644d9a7a99dad6a81991d2cc104d14b8e6da990b82e92f95080a31feff9a0bcd9
SHA51227578fab7b88da1dfb2311f8f2f27b1e18fbfb9b4edcb46c6b4b6f6cada30c937bdf9571ec3cca4387d6826ccf7545014b2005991156a814719b2eaf5409528a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50062534fd7ce760cb94ac8c1e595c19a
SHA18c4eff6337ee9f147efd914101d204e9c24bcf7e
SHA2566f37f9612ab314dda0ea3735d35bc68a8b63bc1697e278f3e6b23b02088f74a0
SHA512e38df221f3d9996477982a487fafe7631a14c098d440116ef501bb584aa0436e2b1bd9d4ed15cdc4766d2b5f794e5305940f9e0ff5f62a38838b55e0601fa6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cc8e3c32d14cf223714d39ff8f1749
SHA1445b06e0838ec06d0a0e63a239dcd46b3346efe9
SHA25619af1fef00858af66c9a56f7c64cd0295c1e406afd33b3c3c44023fb7284a141
SHA512a82d2684e7aa833bfb78916275bea0ed872e908451726716145c45a7df92948232976a6f93c33128743423257a7337d12285ec3046298b6280ce3440c71e73a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d72702accc3922e4658577d4b787cf
SHA1fb879b6326f177ef646c3b7401116b5532f9a58d
SHA25660147e9e20b6b48c6afcbd3f1b6878ea917c6592d35442aa5b63ba03d600c3a1
SHA5129932bd14f7038d706a1d0a63f32083d5797864d40386cddcf0346e5ddef6a850396a0a8812b7ff02548d6c2b7104a28fdcf0159322ba24a221c93024f8b768ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580dfd8f5f59942c411a55faf9ea4f0a9
SHA1ab9221de4908aacfdd45bec3480294d03396717b
SHA2562ba3c7348f202d1ffb563777d2168cdb5a82d9191ce1464295590e4be119f7b3
SHA512eb6d78b95f21a9de62515df315e164e4eea961c4f912df238435a04c94e467c7a20d53d0e47c12cfbf3629f3f0f70e0e39b7d415d25d3481fc6116e2a4a9e5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589129f0f8188c65c77fd734706376d44
SHA141e69a7723d4eb91e03318d6ef8f69efac4f0ee3
SHA256ca5d62f0fba4a831a13bcc8db8255664d4d7595785f9347960b6b29c2f7765a8
SHA5121671a90f5a05488909165b2aa13cdb3bc0fe5a947c0fe8ffebfea82fbabde7d3bfe95c89dd986108f6ae4d6497d398641df55a2de62288b859857237aa7d2da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5429ca682bc1d7e838c5d14e37f00349c
SHA1e70f91153c756cea07e78f669bf5688960ec2e54
SHA256ca275babaad83aff94b6c049bbb6049fd1a3b9d9c81198020e07c966772cd07d
SHA512d005da7a3beabe95b01d8fa95123a0fc63bd238b114f67cf451bdd7c50fe8f4d9310d24a1a8e0cdd36802d2e562a88a56e50c0f91e2861d3dcb1279251736242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6748ce4f5a1aea3d60ca9ddb78362e
SHA128a30e7fe26cf6819accb9651f533fb8c8daa5d4
SHA2562ccc35b6f636d236d63ca8ea85396a163f4ee3d76520af56ebe92938c77e1704
SHA512706223bd2a15d97e6d4f8e6419cd0544cb0c7694f4b72bc0a52a54d57df38cbc8c50e7636e417bfe1cf4d5c5840ffa8fdf71e7bbd4d812115196d278c27b795d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d10ee83d562067b58b891205d59f42
SHA1475bd5d2b6acafab9ac94ee3258c76b92eb63f6a
SHA256d506b7f4a112300b33f30642d2bbf197d9a0b60d2dd693561e6bac6721d013af
SHA51252f12c20af9a41985a2b43d9b7239ca8018ab3b3721caa662045a0b1946feb1ceeecb2b2d3126c6f8d604ce7efffe21ef7591640d33f45f29e288daa8a8044a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564a119952470063f973aeea292b605e0
SHA1e0f5157daff005e94934d8ebb27964bc8bc95eb7
SHA256fe3be3c65263ef550edb135b100b1b30c9d54aae034e3fa703c12113f0395501
SHA512de203276867c8cea110f7b92cad7592c61a35b84877a8bbf9d5df9c3bead0e2bef5cf394a790a156ad2550031a33534d5c9d3c3492e0fe652dda83a007637d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a250393e409e1f79a5692a60b0c6a5
SHA162ae679740cb35a9f8cae4bc7e82d2697a36750a
SHA256337c49b4ed3c19a04ba844b3f2dc34665a5f7ca3ee4b12ed4feac1db2b821d51
SHA512b726e1af5247f13136ec7f756de092b0b5f129c989452b07f1bc07b162d1a82dbb043debf00906ab1d0dcf029a2cf7605466febf48f9dc16892670a7329088fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574608b2cf07ff2a33df0584d50381873
SHA100531fd34cd0cbdfbe07e18829e05d8139fbd8a6
SHA2568ac9d4aa7a8830dbd7a19c8509b6b6a9e11030dd90ab4430fda084c06e8ac818
SHA51200abd5a5caf746e911c956c16eb193f6320b84026fac329232bc350861395ba374f145e1d89152db7027a17724a43c381f2944b253f91a6d6c715d2059dcdf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5835dc8146085b085b6f774397a96a695
SHA1f971c13ab768b7433b90717f5c3fe684671ec3ca
SHA256d4cdeb887a230585aaed6db008a5d520c658d93cf821a8c3f59e48bfb9160ace
SHA5125364d0e2396c278c9bc9b4cb7027ec09acd7c42f503c30e8ea57892332554cd53e50cf3afb8ffa83e41675fe62c6b8b5585a63462acb0da8e630830dde3bb09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f505e0e8be967528712085d494a619e3
SHA16bbaab4394f8d8b06adb30d7eff1f698ed5011ea
SHA256a7aecb7fbc987431ed1b14cba40bd5b9866ea6f14d735c9e9dea3510fdb1350f
SHA51296d5a65814dbdbeda93515cc06e854b7a0aa7d9c67a75d0d41d773d6b0e6a7dc9ad840befd042c1e298244d5225131b92e0cdb1ad681128a91448bf933b2ab17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff05a8ea0121e95bce03604f83bc2e62
SHA188cb0639c1a348e4a8b65cdb54aef17c492c9d0e
SHA256dbee24f21a4ead7c4d2c0170a92cfd052633312d289b6e4b8e8e21500efb60d3
SHA512f770d10e5cb160616fb73b86f7286518a69cdb2726f92269640bc367512483c913d195fd87285889d0cb394178e7ed89004e2d04bffb4f03465f605e4e3ade6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d8b2e484823065ca995470eb47619a
SHA19909d2edbb27ee2b14707e9f2bc30929e2a54213
SHA256c9e2c8fe71aab2f7c251333532438a24fcd1569ace9c8dd772e307bcc41717fc
SHA5123928da6654f0255473a3efaf6701d207673c8a365588f50d2810d384893f885df085e370c008eacdd5e63eb0e0b4b02566defd9b604357a519ba5d42eb55294a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f5c6b1bc732e2cf9e39e89df95222a
SHA1971ae81c223e8848a3778a1bce9d985ca79192dd
SHA25680d2270769fff01ffdff73dcaffc8625d0f093ef980191386f216f3fccaaa9e5
SHA51240b443c3d57a92bb7e6327c12a0a871724c4ecf263c70c3de0a2469362d2f783193cd55a077be20539524cccdceaa70d6525c61b194f35d3d4756938a0ba160e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ccca747286cfcb310d8556db6c7f156
SHA131e8e1a8f3c8d067dd22e07ffe0909ccbdf0b1df
SHA25654fe7e2487fd5e8a73452d6c58696bb8f2bad4fbf7aecb9db06b6c8baafa3e44
SHA5121eedebd0b317c621918ae2e08408af91ee528540fc20b5bd2084324a2db942ce33554327fa5a0b96ba19a06857b29daba4ea8cec6ba57933f307802334b273bb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a