Analysis
-
max time kernel
117s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
69396161414473b8611e538ad3ebc8c4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69396161414473b8611e538ad3ebc8c4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69396161414473b8611e538ad3ebc8c4_JaffaCakes118.html
-
Size
13KB
-
MD5
69396161414473b8611e538ad3ebc8c4
-
SHA1
fa26de0700fad4db7b960b159ab9fad1ac5ebc47
-
SHA256
9459834f77300b1e5e4a86d72fee73efaa5100aebb0522be7c05bc280842949c
-
SHA512
b4b193e341353a4ca67167691138a360e387c1bb6f2ea4122ea59a6d911ff532b31fc57c2829d46f36036b7b823532a835551c38a9a7ac6d19c9ebbb5c677f92
-
SSDEEP
192:1dyPxcxYMOSJBTwkh0/eqPMuLnNAZ2AT4WoafQrpVTSBXkjMK2P:1dLNh0/egBRAZIeyLbIKE
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f0c807adacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000c91839ec7de7c0a1fc5b47eb04db45948337ddfd17c45e2c1f1b48ada9bf309000000000e800000000200002000000062b945140771612c121b3e067cbc9b82f25efa1434010989caf8c9b610066424200000001c286b34558458e8833ff0dab7cb386d67db37a325417e56145f3d452c41240d400000008bc0f4a35f0eba594383791023f074f171e535c5534ba5230636a5459e998bf6a33eeae3e3b4b3e67a61e698e89f5b37826524aa92f24444b99f41d89434f47b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05385AA1-18A0-11EF-A649-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2424 iexplore.exe 2424 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE PID 2424 wrote to memory of 1824 2424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69396161414473b8611e538ad3ebc8c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532393753f36eb644d06a7095b0bca008
SHA1288ea68bd5a9c41ec6b18a05fe6c58875b7197f9
SHA2564e842bc3b046767aaf95a238a39c28ab461615c6fcb6abe5cf641a48a236e2c9
SHA512411219a666f3d53ec3a2f0e2d48fab7f1bbcc9510cbd3772bfe4fa6f7549eea772a2e3ebb3f1c4efaf92df3081d4f7d6eaf57e6a71773a397584df0ce1a260e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff40ed27268397a8743c3d7870052db
SHA107b2210342c6d90dd1aeb6745b229045c9b3c8e8
SHA256083125d3481b1b8e458aeb5d077eb445057bd56fa670548b0cc2fc5520da274a
SHA5121658cc6c62cf670f1dca3b93f631d87afae4b53a3199911a586e4d4ae98a393aeee2275b9337a17cbbb75402c12e2ff2640ce4a83245eed9e5471f3b745be27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf9f3a956a983560b2302338ca54246
SHA1ddfb1f0c7ba4858ab1e13307580dd93a728b2305
SHA256419eb6995dfaee19938e04b342b3abb688d376332dd921739dfecaada7a21868
SHA512ac8d1427ef8be18942cb3bb54a3026739098f4ac157428098d1af6b29366f4aad8fd48b648052b4773ff07794b5fca893ff00f6bdf9a320294a68b9c1c9dd791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ea0efc464fec71981da3898f986dc8
SHA1caa248cb4a3d0510a349d610ce9c763186db6dd8
SHA256bee4fa709dd10dee9d7138c6d18ebc0d97cd0a25703d19b814570a08cfd05e33
SHA512fae272ebcd3df7492e821e08b2fb7222bad1175aff3aee5a63f748f1b7c6638ba71cb3756b12e22e10c57f7335e9218edf572d64bdb98ece325e7c9ff9ea56ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42bbbc529156f0a1d1b1c4c0f447659
SHA1718324b68d41f668bc99ba9b04cf09acd50cd4d7
SHA25684a9860ea4fa7a1f77795f4c94ddaca42a42e30f4e77de9fb44f4c5632628281
SHA512538bc01904abe1a368802fe3d824fa820bdbdd8501d6ed1979d86bbb1af9b8e21f8216b3c25906bab5e2ca28ad77c22d34a676f6fb0a2bf903734416d7eaf731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6bf53d1e8a17cb2c8fccd5c6b2f2e5
SHA1cc45e6ae260de91ff96a130f8ee670d90659d26e
SHA256a276d8e183f49fe1f1a1c284834e31c2717f6c81180e587c49eb46199ef115f7
SHA512f4c0df78b884ff55faa844e3a3eb5d04c58e574643185a3f03becc8ffd847ce160227420e3b8aa056ea8e7a25fe49f892a60541dbffcce5f8561e68a44881322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ef1b4ad8a09fddb0ab20556611b43e
SHA12b63b9c2543c28b13f52169efdf0d8bd962d4424
SHA256fefa6b2a1610d267cf0ff40e0f3e721507ee91250a2f502e66b7a26334cf484d
SHA5128c4c3faa2b6689d754dcb87468c1fb30ef2cea53bd1fd1f1ba2c0a7f3a79abd6a3199b702fb3cc1a19f1db85a6f7d8df8af80ad7c08f4e855b0add6bef2bf5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9bbc9a3262114b974972a336e6cfa40
SHA1ca0dca725fa5abd19f74907410a99918beab0972
SHA256103672e6599153c378bbf48ed6e999efc81b3fe40b55fdac57c6798e16644d29
SHA5125fa5ee31c2a015433a89962ad84d256d4537a67dab14a4aec16ae1307a927b05d35091aa98dc61165bcd1b612fffbecd9bed2e0cc33c85156575a52cabe5a0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d544b4b9a566d79a85120cd8816bd658
SHA19632e2a2454d3dab1b07694af04a53e81b7ced7d
SHA25633ebc313405dfdba8622845463fb037af569edcd807a9232c69880ccc701088a
SHA512795d6747848ea5121dd8081fb98d5e9fb876b283529aa01541bfb2052abdc1b4e616e6781ec395181f4e4ae24529ed3fa012058df4701f90f74d0edc008acb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e556d4f2e5377eaaac4017e4da29ee
SHA1b101f12820cc6098240aa9f88dae79dbb1b23a88
SHA2567d9452d45d242d47b57d4434d888b020f45c239604762fd6f039ca3f732bd71d
SHA512aa846a90d5fb9ff11c884428279fe49d4234b2c9b7c7174610cbfb8218e67dbc8ee7810552d3f7fcfacd25c19717521eac9a0e397ac9ffe54ea2941422f279ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51614110bea8f6e1d62ea117e28466b62
SHA18e2ba09c80118e1d46b670d1076c58dae15b6cef
SHA256325141125b0437a91850183d6f4492136bb11aafe46583f24ee94833ea36b715
SHA512f312820a341850ad641315a09413b91aa7a7335fd78e8c7ae78d9701d5e1d1e04a1a80bf647b96b21cd7b017d8b37b714cb5d4cc07f79731099a7488baab1ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5042efe12b8ce4fbcc5445f797ac0266a
SHA1fc4e41e6f5b6985a21d436942f66a2508d8e6586
SHA256431f9e90580eb05f5b75489645b4523af496f7002d8c5c7bf061c7db6704d7b4
SHA5122863b080204eeab48e2b35904bd54957b096b6feb8b06cd67222148a169d4ef06456786c3c023bfd998b7f254a8c87db3991c0dc4294d6ea7ec2a1b45fcb2829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdd0f9d8f567de94b1542dde6930e769
SHA1912c07a7b28501263c98347e98d7b93d992df6f5
SHA256f741df8e4294bfb9309f10d7d2799339e0be8e30c2ea5ea24d634dd89525aec4
SHA5122cecc6ee09b5bb09a628a9df50d97d013fd1d9805c28fa25d50c530f39bf07900f17992ecf3abc9b453513ef376fcaaa7fcd33ee408fff89b3756d224fba03c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775c950db67a5f9108a0273d51ba7b4c
SHA18e4e80d451d5cad8944721c950fcc96c11131680
SHA256c2d99ac093bb13e0df9909e06a6a9c72dc6eafd85a7137277b0b753f015c446c
SHA512302329d9227be23381fa312f847b083265c7644b9e4903b3163b7bafe052ba8a924348a810afc3b9fd4c54218543346332654ea60cbe1fcea336225883857877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602629cc0a17b845d69bd0772ce8f1cb
SHA17078c6723806be5ac33615a5201df5840a961a09
SHA25640650246d50a679d8936f413b865de2af488a4df46ee154327c2e6711d483625
SHA512e8ae9c9b6bde96edacef191c2357515e76e50fd26807d330809a8d51aa33932466db74a1088c1c650752fc8d6d58fc193c971290aa07abd0c2840a11320ba083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53daa5b81420b10d16a0bb030c25e7d19
SHA10160ba7b1aad35d486a7fcde00422f6bec820bb1
SHA2561b36e05dd2e565ca2b91a852277f91bd0a9cfa7878c5ae1e05c334f71f2b407b
SHA512a90adb8fdde259cc1cfab4108ab425399bd9e358745f834769e20d6cc06aca278f1d4e1002b98f3585a810f2e9d21f82220d78986c8330075483b73d723d3fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d7122cd83c8440c482d046211a44c8
SHA1a94bc5f9e8313b744bb4db6400893b123b2ffa5c
SHA2562001d274fb3c9b8177a126e8d99929f0b7d7a2cf21409f01ba5988e5318ca758
SHA5124a008aa22c169517936f36a7415bad0438cfe1dd5041bc0489dfd6150d4df21cd4ad4f12a46356312f7ae9fb34dd8cab36586268a7dff1cb3b8667b66b52810b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d2f2b942d74f1a6a39ddb69c2bf9a4
SHA1d678013fd674e7778ea95ebbb059db595ad2fff7
SHA256fd4ee196ed8b7c2a9f966bc6507bfe11ad9ed0bd02987d1e3033d5a44c960749
SHA5126f06f1337741560bb37edaa577bec90894a06472cfc7033c214dabee644030b64cce52612512951b22634afdb6b58a982b7b3e1abb9d4344aa6a75ae8edc3c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d15172addccc512b3666ab666341ca7
SHA1b18807d467119199031c2a5374e5582188fae826
SHA256066cc26aebf8fe8199475973cf0ec04ec18d12aa70fe8eaa72563becc97a748e
SHA51265495fc22fe141b12ee9a7b0f930807796a28725876767644bd8cdb8170ab9e7ed3d70099fc6f300e6b93343190adb68291af66909f8febc543ad9ae1aece7d3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a