Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
69383876dd59aa4963f4bfd3a476b4b7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69383876dd59aa4963f4bfd3a476b4b7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69383876dd59aa4963f4bfd3a476b4b7_JaffaCakes118.html
-
Size
19KB
-
MD5
69383876dd59aa4963f4bfd3a476b4b7
-
SHA1
f72be4cb8c5a68d7dc13dafebd1ea407be891e84
-
SHA256
47ddadffe598a9457eaff373a8f02300894e975409c977097beaf784f6d52a19
-
SHA512
7704118f53e9892032c28fddcba221db373ac69fb22ebf2d185dcb39e5478b7cac249def00cac747347a6164805fa1b62604eb18db8e6555b661ac4e369dc8d4
-
SSDEEP
384:OP2XipT5V/jIBJvgID/kZywjh6HQdd6nOdEsN:OeSV5djIHWzh6wdd6OdEsN
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005c65c848f3fc5b6396318e2620eada01c4001294c14c1a65d386e626459002e3000000000e8000000002000020000000ec23ddfbeafd7835811c2a25bfeccb2746500303440f88ffa0f25a90d35f582820000000e27a13df61a87a9ff746a734fdd520450dcdcd6f65327e1cde04e2317d0e89d14000000038e5eac18018820fe3bd33cc60e526eca715644ea9095fb10dffdf41c0f78bd17b4a83d8c42c87e2c94833b9fb6252b3ce60eae1025fc48b339ec877f3a0c7a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C30E4631-189F-11EF-AB01-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bacc97acacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1532 iexplore.exe 1532 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1532 wrote to memory of 2904 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2904 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2904 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2904 1532 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69383876dd59aa4963f4bfd3a476b4b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0060a48353b662880a78a248bff7c25
SHA1cc62678cd971fb7051c6da2dd83820d88d463de1
SHA256431a1ef16e15a492099c231341caac4fcf2a59d26c8dacf3437c6b4656dbebbb
SHA5129ae6c299680532577e988d3b5c5be12a7983b4bf3ff225177d3177911df2606530201c176aaa51891fe562235ea065f593fa86291fb6a5a05a8e0cab251f015f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df50c4f5d2af69ade49caef171df2563
SHA18907536dc6e7984f7d67a0d6b20573de4434f93b
SHA25683ec2e5265ce288a94a4f90276175a128a2b49934751fd4fef43bdf4a509f9e2
SHA512794fc0b9e2905e6c9ffbd41db6c28bddfea2b36eab374aae512af7b2e38d9a744c00311b578af11e515e12e4bf9addd76d3e3641a425b966e762354ce2836bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13fb48825ddfef3186c4f16638cb67b
SHA1fda8c6da3094eb3adbb88b350d79400dcdacf5dd
SHA256fae61d0175ac6fbd0aaf594716ba886c482972c9bce38bc51e7737c5b2953596
SHA512202febfc08ea01064fc74f265017899f83640fffbda12cad11515afce5a81ec24ced3fed7d1c8d8d8d9b820508ed50eae1fea9761c0285ef37a75ebaa8b1bd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6bf8e196c97d05e3811cabac4abde0
SHA1e17b58412e2022f4b6499d11db46cef48115c8ee
SHA2563d27b483359f609bea8a319cfcaeb69338208e9e204e65dc1c0bed4704dbac02
SHA5122638e2659eea83f4b6375c8b7a42db52ea3e1bdc8426efe334ccb60bb12a15aa38b707f22d73f67ed8bf1488853f40eb4adff79720fabcb746f3de4dfa6e3d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb40525acad7e485256b4fdd2eaff2a
SHA1ed20f21ec17c1e6b95a6ec3c9babc1700cad8e4f
SHA2563d04127dd50337673d3b5e640d799dca8d1758792e2de3a2f33aac2b7f97bd05
SHA51242ecc134c644b8d12793ea127a4e52dd99b0d4199144d13c56400086d5d733006244c9e6a65d2a407e108141083204653ddf39f976d6339abe1c2a024bfe71f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514576ff07b9b82a0ed8a41883031381e
SHA1b6b31330e8b81be16e0e0e0995afb0da0eea58e8
SHA25682d8162412981037ecf3e69be4b4e8135bb3e4bbabf14e0f111dde7bb858113d
SHA512955eee0febbf87f75d20bcc1158b1b2afcfb97886655ed2291dd904dc8c837d4cbef683b23f6978c9c4ab7bc9892431d64365d01a94c6ad1d1f4d83d05663b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdfd07f704cd941cc972d7b311f77dd
SHA1da924a3d841ecbb7a1ccb8b25415a4029bc686b6
SHA256175ca029f8daa6358745fff583a98deb688f4b12868e0b77759abb56ed5a8641
SHA512baafb94b2c515b7b392d9efff1fb60770ad6538587d42b27e5396dfcefe6ac38a0cccc1af7bbbc33d76d116268261664f149aa9c1729d2a81445fa8922c262d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f66e37a2469953a2ddc7337b4425544
SHA1159f662fdcf35746e05e64712b628013f66cfb0a
SHA2561424c7fc629f55c54f8e677cd625c05dd60f5ac98f61772597d0bbc5a44e36db
SHA512bd3645d2dabc6d8d8e89710a400488a0326df210c8755ef8339d84245aa496447b0b98fd8068fa07a731eb31d84c9c24ddcb5c960ffa75479de56fd6488f558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565b7661494a92b2b149453ff29920f7d
SHA1d7823aee91eb2957b6f9c1f89c9f623449290525
SHA256af090d3a281f943f61c6b9e6be741ccc7bc9d8f9463df75dfbb8e19e802784e4
SHA512dfe423da004fe7bf21ee57ebdd06a72c1459c83fe077b1c16dea277b9fe0c5ce1e90be443957bd9a2e352a93db28cc2ff00e96aa4229c4663367d9503c2d7e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1dbeedf0a4d41c000fd9ca6e491dce
SHA10e04c794839f5284d6461a6a360c4ba9fa457de5
SHA2563fd777e74040b65a24899c530c0a8c891600d2c7abf4a77c7b0396c04d57cd42
SHA512ac573c5a60de892706394f115ff45773f37b34c168ecafb38d0c61f74137fd879a6fae742cfb83b16968909f79cb02a62a874ddab6aacc71f2b48e379ac4c07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab4d546de07854580117c4eb9d19a4fd
SHA170337e2083a316fd46ee6e7fee8945ea3f739f78
SHA25674a9f0c779b791fc2355bf7db8f6f2ad701ac0def870e71a2bc5315d34f55ea1
SHA51286d1308d1bd7d0625a289f8300600fe00556a523ce6725497fb7f4141f3d870ec626f6a88232ae29ad2d9425764b5e74b042b27d284ba6722a046bbad880d9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5808afb67e639f1a49468ff93feb8f0c0
SHA12073d445470b841d8366054c5244995e7ad7b5bd
SHA256be50cb506e39dc2509541c4b54d2043dfca18540afd39c75a78d4d302f8a29f2
SHA5129f6e8f91d625db7db0add05a2bb5ece3860cab40f42764a0906d4998e328437c12ed68f1330e93e6195dfe09f85f6f8ac047bcbfb492c39b9a6a88641e5b6c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae4db13a958163efe3ba6f90cc58625
SHA1f914cc137b56dca1f2ccb2368774904acecfc90f
SHA256429ee377a2c433547a7a5f1a50869a7f3c6c8662de86e7c25e7c00365bfd3b4f
SHA51271010b1b7c7eddaac5a3230f3e71fc144cad10fca93710b0f329e9e1ab1dafe66d692bb167ce401efae2d80473f78d626e70c3f6f43c8916d5aad2792a96dbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529735822f467207c3eab2e9b028fb2c6
SHA1c4dd710bccfcbb7ebf16fc77ed996ce1741fcf63
SHA256667abc78ef16863164d0d5f27a09658a5f0d45aaa16068f3643bb60d09b141bb
SHA512f39bd18b671f9ef2a82ada6d50e3ec439f609f78e94cc6a973cd1fb5ea188b34452604c9c33e192838e1260615ad60105fd0bcb6d7601fddefb84c7c2a88d399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d299597b7b0712b5ce720981ad0a6d9
SHA14e211cfe52874dc5f6834c37dd36d8a05ea6c702
SHA256438baa4bd0b83c16bfec8bd0005274ac459e5626711ea60b4148469a5dbc72c2
SHA5127fbae1a702498c8329c64e3beb596a20c9c689523bcb66006816cc186dd4afc5fe1b808b08c066f72b0cef032c1b6a2ab0e9c04f8dccf931217524ad900405dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc8f0c762f0e4251c176e41295c9d7ec
SHA1e90343684fa6c450f4b6ee1a4f9f05bf5af27714
SHA25620696353ed114c2dfb89c997ef38f1373af29be97b5720ffef7c152131a4b198
SHA512dda9acfc3d36a82a94a6e40c6c0726a6ca2465a53bb46bd2b0fc05c84189da500a639ce6c24f29448bda55a3f3a719437b67b080a925c0243b90efaca8e623ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51303e79a7e729642c68d8d3de94c01fb
SHA1da4198c0acbb178daf23f58b5ad4169f5ee48208
SHA25634288b5a4723559591786c540567714bdb144e865a6c69b7c79fd4e8104169f4
SHA512e24329971f3c2023ef123486ac3c4f16954a93d1b010667212a8fd2c314c337cca66cd67131188e5f892bdadcb37685b921b344a19ae02ee95c0e286883fc499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587401851aa5484ed0aa7e65bdb172b14
SHA1641b6bd14c70e037e69b97799d43341b6ebcfa38
SHA256238e57d239faadf11295e17298850faea4bb904ee0dca12fa0b3d224fd859d10
SHA512269d52c2263be652dd05fb32370df42dcd2bdc4caeb333074c1d69ab197fbfd43734fac28953f4637f8b8bfd179c103a4de09e30640039cd491dd8e88342c466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587a4cec99da04ca29bb29583fce6bcc8
SHA1998cb669ad3493aca273dd1dd432cc189e93e00c
SHA256211b403970845f244d236d0974aa641f11fbdbd7644f8d8f6a59a2c4919dfaab
SHA512148532e8dc3173f8f3cab58804b8b5b5d265327574b5366191eb3dad015b3c967210218f6ca18697c3046ef4d2c8dbaaba3368e6147f960688445d57a3ac56b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575cc847b8a629f1af9f09ba1aace27d
SHA179f03996ae02efaf706a4400a21991ad0b1cedb2
SHA25613554c29d0283cfb6720b52354c9df46b31dc21115fe8c5ea5e6582dbb962399
SHA5129429adafffffad861f87e1e9979437d52331e9a2eca8ae79b305299924dcb92ab5622ee7b7133a1ac8257b33c7c7150c3ff4fe7332fa858c65c20f8e9d73ca00
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a