Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
693857d576fcdc2209ddf3b4d8342b6a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
693857d576fcdc2209ddf3b4d8342b6a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
693857d576fcdc2209ddf3b4d8342b6a_JaffaCakes118.html
-
Size
51KB
-
MD5
693857d576fcdc2209ddf3b4d8342b6a
-
SHA1
f7892ed1f2d2c917301aa8e67b270bab2156a2f2
-
SHA256
5fd92e4c1b8b3b1d848201ce35ccdf3d3fefa963e9ec445180e4284381394b35
-
SHA512
7110ec7609b8a746a4c0514ea4c5c949c7062bf3e9dd492bcbbf3046e2f1ecf6cbe1ce76aea31c4a56dd22867949ee0348a3ca73755f6c8ae4aeafda53a7e8f4
-
SSDEEP
768:S3XYR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:SHl9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000034d40a65516ec87ead6aa8cc7625cb01a62aa905108d5305787fbd86d4b584b6000000000e8000000002000020000000a791390af874a1962f9ccd0ce82b41612143be1958fbbca7016642bbe955276e2000000072e4baefe7f75a6cd544acb5dc24829408789cc7b0edcf7571e76f1c48cad6f1400000003aea4fd7bb560995fdad944d50abd70496f3a151c21b96500dcbd3936a2cf6de595110f9a5a16651dc845699bd73af7bf7a2812533a033002dfa14009fc7fe4f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100a5592acacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCA2C9F1-189F-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587876" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2460 iexplore.exe 2460 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2460 wrote to memory of 2480 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2480 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2480 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 2480 2460 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693857d576fcdc2209ddf3b4d8342b6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc4717c1af99a3a58298035a79fd549
SHA1dc2d80950962fe2033d1f4a2402e0e1db4b98122
SHA256d7628c31a1c7f714523f39a1d9dc4b82d0d2f9d4b4718de433f713af697da4f0
SHA5124fd11f044b12b7227bf4e0af12313a2cf65d1070ac59f8802d272edf89fe4ba6f2a9d034edf69880d6184460dfb48072ef41a9062edf9d402532183a7625a278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a491044e5cde47fbdb289bbdea5587
SHA1aab56dec90a5d5e4533545a3778c57bb29959eae
SHA256e52bd135253732eadf9c82dde1ae1e617e38138f3c3cbf533f67586d73c57010
SHA512c7686f8d3ce617932ad2b6dedbded30aa476e682ded1c606096f631c08dc88ee61bf12b81235dfd88d7c82c6818a24ba2e37dda1ac50c2e173a4876d837c952c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5765d6a3e1e2d64c7934b8643a8787fb0
SHA164c27f18582cf5df5b44517de99a7cb157ceb8db
SHA2562f8bc70777f9c419d4e9a422ff5b1e7a356819de4abb492e9f5b6bf102488253
SHA512a57d7b716b418ccad88e042d02b385bc60c5eaf1ea52390b3741b42f11458bbecf62fcfad73b0ddd337b6ac64a2beeb4577f2af5bf97d5e746233d0b5f2025bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f27ab77df91bfe98283eb818a3b5e1
SHA14c34e7d3a13742004e525d7d7acbd3564d66e5d7
SHA256b8704b60640215a43e6b6b4032beb787a29e17cdfa02d6112897b4de91183073
SHA5125c0f5926cfc251d9f2323f0296a3be455ae9215558be75fe35232cc5f2c1fea1da5378d9bda79880f1f93e41c0558733af50395a1759c5c16d407ae3d9c8a19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d925eb8a46d678b1925a4137d0ce753
SHA1577eec684fa7725cd067cb4e9c07241f3fb49ae0
SHA256a79187a7dc329e5d6e0bb75ec69b7caf9237a78491ad3d5b09e1a6eb864c29fa
SHA512568a5e9f81a29109bb098f55040d8f07f103104c02aa9110625f46794edfd4bc89efc096fecb2f716e5b95561f02aff12db41ef780ae30d085434467a8f6a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c526cd1c7d458a4d606564adb285e537
SHA18f69169de0ed583050abbdd3c458f59001be38f8
SHA2561f2380fc0c9b7a661d6bc283afd164ec7e6424d745198d36b8072d6372a7e364
SHA5127083945f5261e167801e2be89166eeef04a71372a11c5934512bfa404b81379d6d7c5f9cb55bd91d28da2267145a77b612604bae61614418638a794d11c70afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f715d5cc1360317b5e2db3552a8c70
SHA187974f7f1e95eddb2c11c6f1d5eac7ecd993d360
SHA256ad3467f2d1c7c37fcc9a66b5f387dc418b27323d42a493236304e2d085de72ef
SHA512ac73e3ce70e46df77958d22ca1f842e0f26f9d5090e672e56a11f30b071cbac3475390b078388a219a2b8c9efd9369a0d02410995bc8377bd4fb9aea86dca370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511fab24fa3a4ebde9d00c70a5ec95165
SHA15907aa64bc9999ca49113ec79bb21056f94c82f5
SHA25662aaeff3fac22a57e556879ea50f796b9651d8ab1e57a33a587c50ab115c1f19
SHA512bc121c25c949168bc222ca9c4985e3982bfb1852d016a1b01ef85031db3bea9a6898406c042b540e2be3631f1a674a14f5bea05a61dcc57b998b3ab4319df6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7b4b8e0b713aeb9e08fffb6b31328f
SHA14e0430083bc8524ffab41acc503f29e10b7b71f3
SHA25632592d02d9ea3fd7c364dc8c4bff0f523619d043a04c5086547a3092ba5992c6
SHA512fe337ab8f4ded4594448896ce36c943c54affe0a0716243df6a91b704ebf3b23a37b5dcd991358aff7c187b704c5aaa25a9f5039844c4822bee7540711aa279e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e72b7887a10eb35efe323bf9c7b929e1
SHA18956ba4ce4357392d46a62a2fd7dec16ca1c27c5
SHA25693dabc1f755c17d9c10ea5bdc490555467e0644e08dfbb8da5d8e2316bc5913d
SHA512775d4135f894db8ef2e54f253a8cbda760796262746d72020a5cc71748faa975ada78c53fff9d54eb68b056181f8ba464830f3b5bd4da027b423aea4fa0dc2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5c922799a31bcbd9fd315d2a8199ce
SHA1aa57a4ca688351ee367dd02ee7266e72369134c1
SHA256d547c1d9d467fcf6a37634f40d9dc36480ef204e50b4de43f58e4ae80881659b
SHA5126f2f03aa74de46c98d676464b8005b2bd83b2c5bcf2db27993b45de62cf80fb09109a3de53202e65d587134da45ed94f100d23ec5a7afdeccb30e7479b0b15ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddfb4b2c90b6b08ddd284817d2f66b5a
SHA16c7cf6df27514c20fb816a9c0482de55f86f7ddb
SHA2565de6c7b237d7899201f75ac3ca8e6c7a012185a7b774bceb770c90b97793fcbd
SHA5122a50363fbd21d94f7bd0bbdacf139e75a2fcd7e744a8d3656505d6348e0d989de29796f083fc1bb691e20ceada6eeef09ce025dd41d73accf70c428cbb9ef1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391a9aef8151703cf19ac1d8cd78d4d4
SHA1d131753c4c3ff06b5918762a7f99f2dbe046109e
SHA256661160d310fcd8641b53805f66761974c6df772f7f7efaaf4ed5222cfcf9d407
SHA51224a4b464ecab7851e09d02f13a023ec311ad9ad5e05f5df3c902d9f2f1caef56f52675e58381d78e57b9c43451bca7a25e9a29cfdb0c268e53e0ae819bc05b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b94cdbd8a55bf1081f7cf277459e4e
SHA125bec8a34aba5594620a63d52976075da2050cfb
SHA2569542b25bd122e532cb810288ece126b30375acca3521f22ed2d37ef6fe0522bb
SHA51247e3c283030b41fd6db18fb8bf63d91539c5fede2290a594624e1fffa462ec6c5a1fbdabf3fdd1b944779938818d4e575a271e3b1d8a63871628b8d3410bbc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dcba0555d67b92dc5fe5589418e9a0d
SHA1566d0504ec0591da3cb882fd34e21542cb6179c7
SHA2562d800b91cfa5d5947f8b77b866f61702cac8a61e6bec7bd1229706cf6d31e2e9
SHA512b8bc73a6d99c96d4e7173fcc9943c38edbc73e0ecb2ce01f658abee15dcb726d5c6fcb123eca35197cc15bb25c2b64b5c0d09182a441825ed42674b07c53f5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f50e9fe4eed77721f3257462b9347b9
SHA1197b6b766a0866343d0207da601797d00875ba83
SHA25667feb9ad0745e54e954604571f968adf9bd829cd0c747ed411320d0b7aac04bd
SHA51283ad351c4b7ef2a471fa1ea450e0c9d46ff1bf318748b6df8acced636bae51a6357aefd42f1c5338c8f5d4b4558843732d943ca9666b42b11482a3e74f1e91c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b74755adfded63e876f114ed198ba892
SHA154fb1828145c921897455cb669d73b8970089612
SHA2566b9b0cca0ccdeb4f641ef5eea3d61f526f5218f5c5edaf029afc0a4a99367758
SHA5126db6fac12bac435e0d8633d519f31ed7ee6363903f796325dfb8613b08d9dfce316548da732050c977911ae0c21a4a669746c629dfcc6fbc4cd6a32cdc39cebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2c1b428eb83ecacda200ef145df3fb
SHA11829853b34a1b2483463603568297c62591fc8e6
SHA256b8e461c8aa73ccb951627653ef32b5a2aa0161594332fd0d7e8a058900c806a4
SHA5120b60a9c994e69ff7b6d1ca9a16f4b4dafaabaae9505b8a4c07f3106528b367a9dd65581dcb684b6ca9181f6f65960883597e33b8dbeeb84ecfbc2f0a1a61826a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519becb85f720bf3da77bce03c66e9365
SHA197ba2de2c37ca767694741eccb6e58420ad9ac5d
SHA256615ca25f98717c23452f100f1d18a8da3a7418444b1abb83863d077d749f50bf
SHA5127ccecaf4454bae2132f43e41702558612e28caf296ac04756b6a1b52f696472d45854c8cec94ad26522ade8fb28906872a5362bf2cd2d24a22e6066d600ca246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8c9643e51245223bd08ad3d8fda35b6
SHA1d43c90c8ef5670f361c647d6db2ffb8df8287117
SHA2565545014b851582082b482399da47875359a253edbc884fb4b65250517923725f
SHA512ec130a7ae866a8aa3508b3bdfc7ae2fce7399fc90d79b8a45c104a10473ac756f0ecccbc011165d9b2455b238c862d0d36126665bd1f303d2cd34c06c2ed8e84
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a