Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
693e7bd0a8b4aea111bc6981ae43c95d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693e7bd0a8b4aea111bc6981ae43c95d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
693e7bd0a8b4aea111bc6981ae43c95d_JaffaCakes118.html
-
Size
56KB
-
MD5
693e7bd0a8b4aea111bc6981ae43c95d
-
SHA1
33e8b0100fbb450a6a7e829f3c9e7dc39fbf95c7
-
SHA256
2d4a331e38a221cab8bcdb93a6fb59e30ce1486141e3d142059e8d302b74045e
-
SHA512
3c4bbafc88611283945b0ca9c9636841606dae22a90e70c92977d0af1d17a0e4ae515a4414f7fb4a5272d8fcbe0b0b45fc0a65abf418d4763740a84601c8be03
-
SSDEEP
768:S15OhnJXSu1pYEWUXm7tSGdJsF7S8mX7EPGP+i+OY:STsnhB1OEWUXmJSGc7S8mX7HPwz
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d9ca33aeacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422588445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000025caea1c40df4581aa74a7a0743b355955a2f6becefc29dc5a99b7a52e952d20000000000e8000000002000020000000beae00f29f5c257986105aa7bb04291fb93dea73d21e2c34886f5bd0d3d465d6200000001a31dbafd5d0192b8e812475b5c4f4c6b6637c796f045938ce3048ec4ff2d23340000000a576d6eeb65705b4a9924e731caf766945d2c9339dca830bad275cc4f89befdb6f75035a7a8975ba04c8b29c45527e8b953a8263126088f4401cbc4a63fad254 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2059AD61-18A1-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1688 iexplore.exe 1688 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1688 wrote to memory of 2148 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2148 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2148 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2148 1688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693e7bd0a8b4aea111bc6981ae43c95d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc38019bc13bbd1bf901efdf31fb2a7b
SHA1c398bfc16aaa7652a8ec30a153d62e3b12113b87
SHA256240cc23dddf163aaca42c9a36d9b8e7f599a7814d333bed4e5d8238bf501101d
SHA5122f350b90710464cf92fc9bd4bf855eb4e58533433004d3bf59deb1d24fec3a47f77041f111c98a9bb303b34290e5041ccff7d03128507e76a03d482a31de0da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52baa9c62099f7d39d735144ead5de6e0
SHA1538fa984f96861bae12497ba63b1776b231335ab
SHA2562139e0d36d4bce44a20bfe4426de0f963a82fb1bc5ac0303734805b3d8acc973
SHA512027b15fbc70e98da72e469ea8e5631d14e1c17a268eccf3f617edc4b5fa10c67b505460bdb0273ed5d24783fe7aaac40943e63eb97a534e157990c71721ca17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b516d15fbd3a263bfe14252dae5db59
SHA1fae3585e895b08431224f6f8e8fca8ce7e9382a1
SHA25694502b5f711da702935f5b7933e65d116ad5e700edaaf31aa8e8ae58745897d1
SHA512e8c821e925e114eb6a1fb3ddb7d6c697243f95e808ebafb4d3426f22cf9d388de1edc5900b82fc4b09052485b5812f994cb5c12b66565b62048b7f1e7a3448fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c962f46e067288cc28714c86f217419
SHA1bba78372a462386e16e9f19ff5d80952f7670d83
SHA2560df6ba0dadb3eb79441d2cd1b0ef5fc31063f139620104116aa6afcc5e533d51
SHA5126d3f09728556b94b23825ac679c3cca2ca6df13b9ce484837f956de3177325a69d4c236df9aaed01e7cb1a0f390a694a7fe8625a436b74efd4b04015cb54d0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bddee6a1d4ca1397f7378b33d3714a9
SHA17fa92e26cdfe1e1edee0132b8e1872bacd6a781b
SHA2565c49397d10b1f170fbaa0995f4b564be3bd8d5f7adcfec222c60f6cca292088c
SHA51207cb1d99252c568ea0727ecb654c8d3d26fdac028d012680adbf8907a56bc609a85e45e1b0864f933d46edb4f74488709cb8b2b834137ed78cb42bb1a93a3a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bc435ba1580bfba5c0c813e021e8192
SHA118772c07aacb6d6a3c15ad11d741d19d1d14c1a7
SHA2563d177ee891c632c7f8f49966666439b385fb060e3282f8a97026ebc71890873e
SHA5126efb9f1fc9c745156234b89a96443a97047a7214ad3bfdaa587cb3cb5cf804df3455a1fb28639914f0f0cbfcc024c1fa117480406b6505551245d40668b3f172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1cda9b54082c113e03244325ae8848c
SHA15e61867566494a4fb51b0bbb516f33f75e16be7e
SHA256a572d78c35aeca6dd476d0772e6428730bdf0e14ebbf3281e4ef4af4d6f6947e
SHA512b0509ce304e09043a56b35f2b981f3f3aab9ea92b711d92282b6b8b84cbe91e5013e950e3f5f7677afabea387caa875b21db4bd078400bd0f67a81caa6c30cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde0494217a7bf5ae2314527aecd25b7
SHA1674d418d59672a43c223dd503b0e0492b8d04033
SHA256cf54d1cf77c002443694e7cd7d0eb513718a209c2cba33162b8ac0ea8e0042a2
SHA5125ab338b2afbb937e54855248fcd5bf09e521a8fd8439bb2fb5fe8fa985e83f1074c1d5d3d25a86a8a98ae3405edd99ccfd252cefe361fa97682013dbf1ee945a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573286dd04419f8dd48abe65352d59212
SHA164c0cb754568822157acea8e914da97b251f8e4a
SHA256d30be4f94ad8c39b6c0dc3ad555474c28f9ed50b24c840cf8ce792fc2ea6311c
SHA5121277d642547b91b11905563cf977c3ca7333afb76ccd89f7d38fd869b48adb6d3e30894eee9b0a1d389fc7e992b8123cc8d4d0f417c4d38569204b49721e928c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d0da0659001f9622e02c1af0f9ef75
SHA1d79953ecd0c1ff572db0dcc34d24aa0de73ca7a9
SHA2563bc53f8c60128402db9505680e6df2046e4f1c341fae755c9cfb7ed6a8143fd3
SHA5121a5e0b57f8132c4cabbde3815ce1dcee71cb367445a9666a75ab02e0b28ae91b12ac58b6c5c5d6ede658ba5616a96b8700ad44095f429ef70483aabc1f6dacf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ca689b0479561f0055c7b3f5d42e82
SHA1b38fce20250938ba62bc8f74adec316bae86e62b
SHA256dfca6c096858d45303984650d87b5a31511010eca6bde8da63c6796f6dad74d6
SHA512b00b13051d9c9b338d5a7ca952cbf7abc2116c8d57a76d5f4219b1b73d425749cde25615f858ef59dd231cf43f055337c1b1fce9a4ac669b549f082d62831518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53207e4f9881d7f8fd3884681732ea5e0
SHA1889826cf6b2ace4d7f14bb6759cdbd6b91c14a97
SHA25670bf2bdfad21faf270cdb1bdc55a6c1d2428e78761dad75ba2e3aaae88a42270
SHA512b3d7f911d3a27a393c8504e4eb7dace2ccc97dda381fc36de8d3ad60a5e4359cde42c8188e6ec9ad0bd061ced4fe53a214f243a9f4d9cd5fd86d31f9bf34a47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506bc91e6cd90d46777d13a2db5632983
SHA1645b237097bf8b8bd3209c5643b92241f1c3c395
SHA256d0fb678ea55483100a896fb85dd77e9beba1d5e1bbb76d96c375ba9d8d7b8252
SHA51211732fd460179b4aafb5e4095b2e1f04d5ebe8b86cc2a029ee450774f6dc97aa7151b90929784edcfd0f21956f1350fcf3f9a2aab9349fb7f06f15ed2e2493d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551bd1166e2802ae06bf47c8b176ea742
SHA1b24dddfc04aa0677453ec7be0c819e7ac9f72668
SHA256f79711085151b99ba9badb56a639fa2b7943b8819a31e8236e6d7c941b51e0b5
SHA512ca8c3326a50258e63cf83b28ca7c8dc3131f4a298c0e70ffe92c584de71f558e495a5009fa3bc8664a8ec8891b2c682cbf47457d5690323be07e2e8b52ab84cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54377f67b07458e1091f950ae0477dee8
SHA1825a46efbac19809822b47d1595cd94586046b87
SHA256664e1b74b3d6a1301be50a61ca6cbc114c50dd97590fac15da90598afba0ec2c
SHA512ec818b8ed4617cd571ed98b0482cdce6db9765b1fc60b01c7ba81b9dd72dedc9dae5ac5710c5b4d717befe5f4214fa14e3ad5a5610dda8517a9668c4548a0e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e74a8245a3e97edc58eddc065ee203
SHA18815ac645d10326d090c97c7487dae3880da9427
SHA2568be7c3a1aa9b407169d58768964521dbeaee78f7366477744c17689192458eee
SHA5127adac37c56f9abe948871e3e5b6ea77e0ceafc379056259f2bd46a059392d321f4a199ad9e4a405c7f3b638820f4b32265ab2a378fc96b0618882be5a2bdd75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca0e116023d0d446878f6c7956c971e
SHA1a492cffacd8f1358eed96771cf3140626495b18a
SHA2568abf816df81cba2bdfdfa2b23fb3e3b23f0d0cc5469aa135b976347afa614952
SHA512728af0363f95b1ade56f3b2f6d5257073c9c502c309c8a1f7365bf2b900979e24e45a4e0a4da996982f8412b0c42f178978caaffc5e293104d5e820cad837317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541384a2e33d4525c59cddcdd7d64dfbe
SHA17cefa50cd314028ec788799189b61288a5e15f39
SHA2566f9ada81b23afd5de5161e6d65e3b9c4a54fce60cd494695df51410c76b784d8
SHA512421905923480cbbc77c1ed9b2a1435a19977fd303440e81200874adaa619af87322827dabd5f93677046d861b6783a9b20e41557512748171a3dbd701f354e3c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a