Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
69468f4699e5d82da9c5ab0f4dac39f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
69468f4699e5d82da9c5ab0f4dac39f6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69468f4699e5d82da9c5ab0f4dac39f6_JaffaCakes118.html
-
Size
67KB
-
MD5
69468f4699e5d82da9c5ab0f4dac39f6
-
SHA1
b290e68a409797391588e4d1005b943ba6ab08c2
-
SHA256
dc300a4eef131cfd008b3bae8e5d01f6b1632d51578c1b447b207307edf13929
-
SHA512
e9ec92965285dfae131cfc142cd2c915ee159d7b9135e73a559d6d4cd7a7b73974db3a78799463a240bf939e09bd6827c2858fdaed99046fc35dcbd10269c2e3
-
SSDEEP
768:Ji4gcMiR3sI2PDDnX0g6yiAQoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JitTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c229852a58267a409ae6bc717cbee496000000000200000000001066000000010000200000000d57de035b787470e46f7bddc6540fcfcbc8d26c50d93f37ebf566139619696d000000000e80000000020000200000008000ac7a7daddfd5b4fc69a33b6ecf718911ba0bb49f7005bd49e357e84460c220000000fd43237a65e6e3dd33309cb77cdf0fa7b2e46170ea89532e5164418cee3dcfd240000000e88cfe87f664b8172e1d696c767a7a497a7d740c88da6cc726a233175687acae47febabe884c9e6e46374799314716fe55d9bb0414c70b21cd3146496649fc16 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F210401-18A3-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0045d4f3afacda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2792 iexplore.exe 2792 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2792 wrote to memory of 1748 2792 iexplore.exe IEXPLORE.EXE PID 2792 wrote to memory of 1748 2792 iexplore.exe IEXPLORE.EXE PID 2792 wrote to memory of 1748 2792 iexplore.exe IEXPLORE.EXE PID 2792 wrote to memory of 1748 2792 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69468f4699e5d82da9c5ab0f4dac39f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c481af43343548a0d5ca337a17d5283
SHA1bc62e4ada0f1572c860086d94f265516ddbffcec
SHA25655ccda8c43cc3f53d54f2d40fb526cae010c04bd014f6019d73e38d7af769cc1
SHA512472fb342eeda62a4cff8f152deffd928b19a084d11e46c42246770831b8462a5a429d82c8a377223263e989353b1d0a0b1fe1e514f4714c39b020d5faf8010da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a65a6a2117d6718feaad4d8b407e0ad
SHA1534da8d3b48c36b0c618d413285e3a1d11394162
SHA256e5880fb068bdc3a5b2e877ab37b22d9adb5a65cfbdff77e503833483da2d01eb
SHA51213a29cc31db518e6658ebd1f1f10999f82b1a656019dff0e981dc3b4da0ae8e71c48575ff77a6ac8aeea254e9e4b9732837ed779a079efa04ff461c934924fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97687119b9db46e64fe9d07aa34ef86
SHA1c747bba267f9aa7347fd34f6b502c10ee48bdb5d
SHA25698606e368131fdcf34d0884e5ddf713f5997edcbdd20e3636327c14407efe928
SHA512ba4f93fa1ce32ac7167c7722b3da0b6e75a7c532eb098ad89f0ae6b16f3007dc094814c5e470fe6e159cba099600ae14772445b3e09ce7fdf8e7b0592a5e6820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bfce211adf29ccc7ada9e3254875798
SHA1be294aa6cbaf11b145a5ef8921a3691c74ca03ff
SHA25629fc5c2d705a5e280028a97259c72316a64dfd28c2645be6d12dd7ab5733760d
SHA51283e58fceabceff61eca430b00fc14ef35176a1f3cc5f89b3813f24c576c3d6a40ff4f5e420ce76748cbe186fce1e3fee8be739656b0658cf61514ce8e2779819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525100f2bf4912aeac7c9c63729613209
SHA180d14a302f99ab562ce7bb0191d79564b61bc036
SHA25648622eb3c379dfb3f4c79f29da44b3d7d58fa72ebc7bf6946f13e91ed11069e9
SHA5122118b85eddf3c4658ea01b8475fcd05a25672cb79703abd3efecfd2d3ea52d1c8da99ea1b761314e8b7b94e588c4521772b302b993488dd96df12e3555bebf37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68d5b29f7ee23297cc77955623eaa90
SHA1b4b9c3edaf2f11a4653618c3687fa56cb87aca32
SHA256743d82cd5ca6bc77c192249e975a286ea53e963cc7f680784d9fbcc7ac305187
SHA512e6181c0f5bef20693445a37a22ce59d80048b7073a1095129b12bcc36c501a955f94da795ade7e6be04b305254dfceb024188b080cd948a7ec77aee023b17591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ff657a2c46b1915021a26f5f99d4ca
SHA1f5fba8565f5d488cedf836bc8e6d01e07599dcf2
SHA256bc48eafffd17f0a77903dbeabc67103dcdc00f37516d4065b088709ad9bd13fa
SHA512a8be012685535ddc30690f6c68bc81a2722e7ba3b2aa4ecabacb5516a35437fbb3f13170152bad9bc297a75dbfb145be5306792d465eef39215a31a9c360b843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851382d6a4eb711dc4fa111c0c41bdc7
SHA17b217a0fc233693bb5e786c8d316e7f5461599c2
SHA2562c10cc2f65f2aa44b10461c252132a5caabb0e2996d69e0a1a470dd20582dd27
SHA51227eeaec2850e06be0471de5758d16a79aa8fa7536c7c66865f4c331649c02d9a3d01ade124d5db338934234461bbf1db6520fffb3342893c41c69c4936deba54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6696fc1b75ec8a0817720d6cc8ee224
SHA113c0838f3eb784267e615a6d50a5bf2d40667b70
SHA25679cf1c6e40198fde1e1a88dbcb98f5507fbf4016209475f6fc5040a192ccb9eb
SHA512cbf37d7851d23470801c2348f9520b500d3567e361d3e150706d9c7a81b54412f125384f737c389dcf6849c17c080d9c246a8d59c44c04252395da7a933eb9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d034ddfd3128755903cf12ec317a20d7
SHA125089eeb041b73fd94021b73a90121159b157a8f
SHA2561b00770fc300e20c7031eb56515e795e546657507d0e7e5c2b2636dc5a427327
SHA512f3a7da9439e21a9652f9bdc1bfbad39705c7eb2c87435e5795afb0875cd116c4c36af412ace6a5107e948b155d837a23f0e99eacfcf987f4dbf75777f6b9b5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ebc4844cfd734c43c298437d26d40e
SHA16fdab9d8441974b32ec5277421e093a8ee7d9502
SHA2563077b4497e833fffe0dfdd8b8211eb2efb560d5e73ceadf578169e0bb39d763e
SHA512f27974da051caf0305709c3faec767854ebb0dd8e569128309066c0419e6ce3d0d4d0bd76cb17d84a80b907e46a906cc4ef2dc19e22dc5158120e4def857cb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296217947247dc4cd76f568b5bb62e18
SHA1518412c538ed3db9e30550b3438c32d6535bb550
SHA25664b35d0da7ee11fdccfcb667996b1ee520871f23c7cbd0473bf2f48e02f7d857
SHA5127ea636c36b1e5bf6fbf23f5391085d09c5d277a4164d31f358063f8f72f08ba9ef26b56144c48b27b5e1538c669a3a3c15d854fec28e47bc0a27b8592655819b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0e99c5a2e1a48cdb2086e0ccfeaeca
SHA1648a8a11c5d1c3d4f703715a6f1b17fbadf70880
SHA256b4ac3f6afa71734f6306bc111f4eb03c4ef8c63c57f7cd0053b88e1a08cfedc7
SHA512b161731f2319cda87941b9cc73e4a83d872d276ff973210bd4d3c47356abedbf03cef995b7fa38d0e129c529a5704939fa0d4d14ae2b9c062a6ee8bf85c6f41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac68d7146643c044d961caef6907cdf
SHA1f89d7b7c48d2a5a81fab11d46cce981d50f0f764
SHA2567fc650eef2e79243ec4836eb90ad3926ea933e2cd71abe723afd4804b469c3f8
SHA512fe0d773087fc7fb7d73fdd91b8bbb5aa3b53bfd777cda864d5c836c78a10ffc2a7b882c15a879cf522cf36be29959afa1809e00204e11225c8625512a4ffe1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e57c798e578e964a8db9a72d9dd1ea7
SHA13b9c8ba3de5f2ddf785331b52f5baae8e83efed2
SHA256bcfb2a9f74bf23a27beec5a891009f4bbcb4780e7084a4ccf2d798a2a406861e
SHA512e97a70691ab86ccdff2550070a75c3aaddf4ff69029479e6f70e3c40d79232e47dcd2a741af61d940a171cfec78822f425e3d006dc5da8496a651d20ff29c3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54478ab5a8177c5930b3c12d68bc5df82
SHA18eae76538fc960bea1cd632bf9fae26dbc15b101
SHA256a39eb19e4a89218007c296b5698c15a64e7529d7b0a40a2434200257c86c36b3
SHA5124636e4380beecbeead3deb3ec472dc373c870104529741543c198b0534e9670140500dd5283f472224ddd5a75c81671556ae841d339953cedba96ea88bf6e28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547b889d381f1394f7bdbef998e58e6c3
SHA181619ba0d4013524d0bfb1de46c06b64e77fac00
SHA256650f934849e345599becb68574441dde123244f3dc657c0dc23296b6d29bdffd
SHA51273acf1c3df3e474f10584b829073a94ff73a9d3bdd9deb24cca35048c1b82312cd5dab6686e847d94db313148a7057bdd66a16a6a97d0cbe7c51529ecf429acc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a