Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
693ffce5d0580b0c7c7e3b4bb0676684_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
693ffce5d0580b0c7c7e3b4bb0676684_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
693ffce5d0580b0c7c7e3b4bb0676684_JaffaCakes118.html
-
Size
4KB
-
MD5
693ffce5d0580b0c7c7e3b4bb0676684
-
SHA1
5d8266f2be2d25ac7abe3674bb436655da00f353
-
SHA256
f0456e643d286389b630cebf8e70de8b8629f545020506bc5f0d72a3720bace4
-
SHA512
39cfe5f2e25b38c6efed6d4ec280cd01eca068937cff5ec40a0fc7d7bd451ff85aac1bc0324eea9659638902b88e892c9ad1a63c2a96da54192ebbc7972e71c7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o74OtFd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008575fd6eae838741b65d95741eab8ddd000000000200000000001066000000010000200000002c2f5a733b295e3ee6878299f00b49f41d246a903f355c4d80bbdee75f53921c000000000e800000000200002000000042318ca04eb468c5de050895c06351b021bdcda3642b370dfc2f8481b08a432620000000b1d47349b0425425704c98dac65211454457d22b24e8415e2791fe8df74a1b2e40000000b488a22052de17fdc7b6081e58ac231580c2f36abea238504100faa5a9eb0cc8212ce4407844b8598e7bb598c26392cadc2c24765740d110f4d04d7c9bf91616 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B859501-18A1-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422588598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9051e24faeacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2064 iexplore.exe 2064 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2064 wrote to memory of 2148 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2148 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2148 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 2148 2064 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693ffce5d0580b0c7c7e3b4bb0676684_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5da3bd81d008c847bb685395979a631
SHA1f36ca8083436044451503e8d8d7df0bf7e4af8d0
SHA256c5924a55ec62904964eda92cff76ae07066584b28df4b002129fc0f5298c4277
SHA512c22d60e0bdacea32822e44b34b750ad3286fa682efb6f0c4310ed6a207699634a48a1fce332101b6948df53cf913534806dff21f3a6636a09ed84c1348bdaedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ee774b9afeb5e9a3cce79cc822bd2a
SHA16a2e31e3ca9736bb947020b30687b98d52465262
SHA25655f5dd68c889241ade684c096eae7d1817582884d63d2e9a6069b80cf1e6ca2a
SHA512191637075ab1f079aeaa42394d489f5550666c400c638d2c210c654df0306f3cc92390c48d2ca5a0ef925224193cef7a0d0ad8edd879ec038ba8eba05aa12b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4a8ff36b34e5303ab716227a37dcd6
SHA1e5b6ccd02d07054ae1f6d596c8c3458667ee44fa
SHA256a325b08e73eac0b53497146b7387db9f941939d433a9d5278c3f80e44534ba7f
SHA5121e49539754b517457e747152fca149cdf25fdd5573ffce72107cc498c68b04d33b804eb244f3808282b883dae37182f1964817b553e729fd6f7327cd3e44798f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a42c5a35ef6429723d8d1652070f50
SHA1054c558dedd5dc7f75e4777b6bcaf34a041d5600
SHA2563faa522d3fa4c1d6bf59c526c41c46938ad6c3a9230436d00a035470f5c51f87
SHA512fe7577754b5b466a5b101a0779cf14e28d58a5e16c5ea43b52869b47af44148ea46c2ec74699a0eae0643793781b66f2b2460354d7c8655a04e3c7b9a5a3dd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544bcb033a254ad2f1d6473fe7ebf45ed
SHA1688a87d024b4077d377e047f1c72d0a0e9e1dcdb
SHA2566e4c403a07ade2938eadf57f2d5163bf9ca3eeacc60e07b8066cea63c2933c42
SHA512ea3c2b423d80653737debb00dcf1b1c025b28bff9cc9a854104da13cc540c3ce37812d2ef7610a722a118ef413be994adfce6b4474e12d9ec640177c4d0ab476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046936d3333c6edd9827e4c4696190d7
SHA1b3cf486729aec515994cde0858b586a652915823
SHA256634b5518560febdb122a41bc52e9af6034906ce905a5007db473e61a0ede1fc3
SHA512e006a786cedd8d9c36c35b36624e6a6fee936950772a67d29d7107b7d6e22d20c3ff1d2697f0c3501044c54580796225e20005258fd41f6768bc0661e743cdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e030ae60c538d6646e5df11ebd5e6d60
SHA1625456e2a6863255e21445a9a820a63df259eaf2
SHA256d06442ca0c309c9790fa9a029b708f48b2fff495ed052ae72b78624669c89018
SHA51269353378c0494fa15655e3ad2c555a6396745052ba61371292ebde69fd09b804711bf76acae8c18899ce1b0bcee7599cfb7c23fba6fa96bd5c31e23f02b3dea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9eeb6e2c68916e6944c08eff2e4b51
SHA18d73a72946c42062d1cb9d9d9745833ea3df1481
SHA2567e7ddbd8dafe18e61d8762c3381a5fd8ff524070822fbd2555d970d26bd5ae9f
SHA512d90e97e4d605f445b9c9975abb4cb2de6f3a591ff435adfe8f1d8350d9e86f4272329d707ae4ecbd78c446ddf9e26f5387e8b88b24960701b1c4dcb01ca89c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587a486b370a7e3f6447331ce5a7ff9f7
SHA1821d099812088e4c2ffd12fc08ec88a898b4005a
SHA256fa180796248c5795d13ffb5d58ba9e95dc0ccc1f813af725f2e0ada707df0792
SHA512a812a9bd217ff3c851bdebba3622f3301cb66e0bc40b9c4b91f48705c6eedb052e7d2591d3eb3c018817d3e5b9026e9dcd46f4313fb85fbf82e0dca3431a262e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964bdeff671abbadfcc21947220fdf04
SHA100ca71b5797edf6820dfbb4b98fe45ec48137127
SHA256bccbdc6e8d7f0e05a0372e826858d2d70b4504ae8b0ebe806898620c13a2a916
SHA512884db721a1f25a91784e72ac2c5e514a480bb87da337c3394e605df8f893345fc259be8424d51f03108252d97ca6c6a960f2008841d57008310263b8972c18fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1949291d0927f88e7859d51af554666
SHA1120c23439d2167830f851fc4433c161b3635ae78
SHA256c719796760ac4d6da8a9ac552c794887c75e32a6521bea1ce98764256a2b4fe0
SHA5124a6bb1006bd9a7491244d1085b41c0d6839e9718f0cbf3959bcd690734560f094089445fe65526af6044b451d31d9318797a52fef2c582a7724003ee06b4c3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d4ecdaa1a7f47453b9886847f31b97
SHA19ee61a04d49a2c9a933bab0dfef604a51dc72829
SHA256fcc1308618ed784ac1b454c25f2a3157d60ea1f0ed0d6b5745400d6ff37da846
SHA5129e142300fca0bee0fb7b44e7b879c06dbf95e296943ba013be8a48d4d37d4f5cdd001627e10f549cd681f98ce722cbb9648039e402c0fb65d03a739bf9b29393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d8a53ddd8a43c5a748ed124f8551d7
SHA1aa354eb67c5a3a495853cbab56b741a47cc33840
SHA2565fcf8dd00cc2a5d796776e0c922cd13f7318469cdf246bad12cc88e34b66fd4e
SHA512b6a813f82a7d8d3c650012c47188b16c800fd7baab178bc5dfbb6c053538716a6ab3bddc70c60629d9d24283813f370ab2381cc6822ef1a486203ebd42e543c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced53ffb651bafda31d5ab6945072f93
SHA1ada7b8d64b56e46007d53e2ee0d061f10a014a8e
SHA25655ea4aa00f3977e6c4261b687a6c994226542dff8bfb5bfa1e8187d5a6899855
SHA51229768f411808115c8c082b59b165afe684a9a974d8c9f0a85cd04672f0f44d563cd4d69bd9a1a5e56a08ba76e65768df25d32e02aae3086c91545005ea6bc760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d662cb128e49c62ee5574384807f9ca
SHA1d14076937f3d7b436f221be2671b8aaa55c9c927
SHA256aa2d02470ff16cfeac99016e9b20b27979c34ea34fd8142bf43a753cf7cd0062
SHA512c68cc1a1eda11f3726c10c4434a2601b0902cf873b7c2388b2937e0617ce0e4f0f9344f9809ad40268ea391c8eba25762d5dff931db92081f84df8a518e44467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdeee4019b5e9f87bdec222eb751a9b2
SHA16bc305de9b84fb1e9cf44aa5c836648dbfd581d7
SHA256fd6070bbc108e0447425240bf6cfaef3312e18b7f75445908ea6923a4b1807a4
SHA512f932726790f72e4caf0ab1a5710ce5512f78dff60197c6fb54170b5b162a4acd3993035351648b2609065c2153a5e843d4fcfc680643dde1aaf26d06a73fc693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504cb6d4e03f68bac01479c10365e1743
SHA14eea60ca8564935934abd8cbedcaa6f1a2539215
SHA256767c1d82e50c4bd47dce3bb5f159f1f466b4a37054b2050e7866f2b2ac00d634
SHA512625905135c34faa577daaaa66e408b6ea1ae6396af20d60c03aa85cefea49c1dc491f26c6ea2667ebce004c6f96032aac27c66d681668d357f34adf5b1c09752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f5024c895504689f3ceab6e797ab3b9
SHA18d9429284f88ccf34203d28ab81edd1fe944affd
SHA256e37abc353d5002c9f3a248eb14114e7e3b9d0dc8d9f4a5cd17fffafbe0a3f03e
SHA51256e0eed64246afc651563acd97412a1a5dcac214c158c53427117c5f3147dff009896247909f400d6a1ab63b4e91fde68076c86adbd4a166a4af89de0f87255c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae05156c8ae82720b2d4c18d6eb0f020
SHA17ac22a59aae4be1da0ff02b967514cc55f332805
SHA2567cdbe6c519a876c71968e18bf83430987050705f5261cbe0fabeaefcae9517c1
SHA512bcec519a366e81205236576b90bdf40579f8dbc2b7e269552bd20291409ecbf6cb68f3f80d20f19abda04c2a6c92904dbf4898e624930bdd5db0d916e484f5fb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a