Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
69496334ebc1485527ce6871532735c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69496334ebc1485527ce6871532735c8_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
69496334ebc1485527ce6871532735c8_JaffaCakes118.html
-
Size
12KB
-
MD5
69496334ebc1485527ce6871532735c8
-
SHA1
01ba12fb121f82007ffaf0000b7f109a4409bd14
-
SHA256
d76accdc2e4963deabb9974f2c7fd90aaeadce52b4d7b9955a1316e4d42f0c55
-
SHA512
aa592518df99092199ae80b17734ac8ab4677a80921fef297fc9f02f8d58b0dcaf3697aaed9b08c039c7dc659b7f1e4f001fb2c76f21de847eb6b2051419737e
-
SSDEEP
384:XNp9Vmb/NjYlHGg6A9P9as9Fj92eeK9VHg9Fs920ehDHHm:XNp9Gg19P9l9Fj92eeK969Fs920eVG
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c5cfd5b7a9389e77b4a4aee64a70f6330373fd5aaf675360cf002ae66c4ba267000000000e800000000200002000000099b9472730afa67612039befa509c49cf891a7d4a7a8e41cb772b593327fe2d7200000009da2a77c5d183ce4743f784347cd12567caf42aa079b520b523d624c62bc103f4000000068f5dd77b0206489ddedb1b5c56b16db61137e56659449a8c1a440d08c5bedd15f4e967126b25377575b838444baf3a3806efa43a1129b54d8615187520dd70d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2648A21-18A3-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303ea08ab0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2136 iexplore.exe 2136 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE PID 2136 wrote to memory of 2924 2136 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69496334ebc1485527ce6871532735c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3d153651a238db4980382ce4180b04
SHA1b52b73eb83acad3ed77592fc167f96aaba7b79eb
SHA2569156cee1332a984e9a9f2f91f94caba2fed54ab0792301fcbb8cfedf82e44f90
SHA512c08c93fd8d2fee58420b664575c9c50c4c8818e5fc33701ec7aedb7bc505b203c74bddc3a4778c63e3fc99017cadbe0b83ea125033aac4c457ac26cf6256c9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f94a8d97c0821e95dd8280ef70b207a
SHA1f19c179f39e46fba343847b0c3ffc833cc1556f5
SHA2561acc7d55ab45a0b9ceaa0cd15eaf042264db0f7f1b8ea96429c899caa731d0a3
SHA5126e7a71bafc658ad99ef01c1114abcaab1cdfa65945207054f4bd39145729ab6beb9ffe01f6169acc410f0c6e980986eaa983e8e36aa387d01b46439efceeac5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0b456787dd856862a51a509c273900
SHA13cba9b3e09fe8031a1d649b54cbd3e6ffb2e6fa9
SHA2562f994b502812add4393f479f269505d99ed043aa7a9ae857734df1d195623895
SHA512e8433c3f33727d13eaf238f4bcdb1be876ce21986db2a0710cc6d47d2f232fb67ae1f320d72a1264da85e3fe40df7ea7bf35f34cdbb0963d299b788b55a089fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7aab3b26527c167e047045486865987
SHA1300273f96c770bc5ac53bbfd7d680a3c3711dacc
SHA2562a351d9ac8ff914bec758bf2a821454ea0ac6c22d4585c7a4dd69f265cd8312e
SHA512e8652b2d27b280df85f5cf534d71f4bf8c5888d5a6c24252d9b92b48c4b206bbc6a3b97aada3ee5e75dfa184721c39b5da384a7661b33fcf6ac1e928b0a8272f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533e5f5024949152f75a2dd716e87607
SHA112269e0e80d790fc4d85b68d28804d1e086b75d2
SHA2569cb0c658e34cab0d96ba94043f5ddaa6b2a1bc8124a6b9bc53b0aaa5368e15d3
SHA512a48fa689dbad438f353d11d8b6231a4e73a83a15e571de3bb5dfa371f6e336f90a8802b2056b2626d9898938562c9fdf69e3121dd03457e170503c6c6e6a0379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a6128a3e9d4b7500ec669c5bf68a1f
SHA180835fd4d8b414b5128b4ef4b857018c2c9fdb5c
SHA256f9aa32162ba6fbe730c08460fc6552ecb0c8b23c91e95e941ff7223891e06470
SHA51204549b25506f7b0e54ce74d1751433dae2e07d776b64c3fff4b05df57c8f2dce3aaba5e58c41d7a655b56e8ee092e99b521b3062dbeff91b9227d3d413a872dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d58d87f804408949a61752f53685d9
SHA130394707031558ad782d8ecdac68032a0db92bdc
SHA2568cb8cb53a8115b86f3cfdbe239269f803988463f59bd430144faec6e10f3684b
SHA512d78d3a8604e87996a8845d97476dea49daf1c569236d91bbf75f260f1b5c5cb15a1e35aab06ac38770f6b1e23474de4965887627c18e88751cb6dfc044480a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd4d1b3c490570c3ef834232277500c1
SHA136cc2687ef4323cbfb3ad344dea68eb788cb2873
SHA256a420e9b10950a9ef502f545ab79482dc2ae2b071c14c27bc9ae58bb4888c9cdd
SHA5121ad49f6aa644621823f875fd0df66df8c257379e628d26c22b24f45334616b92987b6878491e4338a3158db2efd589301acc31995de8cf8429599fe5dc96f0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e0d78d2194e7229794458cb306b3f70
SHA1716515a3de5140dcf134d944201951e252d6ee3a
SHA2564cf1b02ecc7c6e961cb3eae6518752c28295f2f530ee0d28505161951614dbb8
SHA512561a445a222406c9177852c3d3d79cd69841f2dea2fe7762a2af4f77cd19e360a83b5d209d311f796a78e54f81418e87147c7fb3bb59b9d6829d9b01167d5ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080bf0676d4923bdab6711483b147247
SHA1651f48c65577aa7f8b075b64fa25cb50e51a5190
SHA256e9c0938c0feb211e16e84123f3ff4841007da192135839c0f3c7976864ff497d
SHA51206fcfdd80ee9850b2c363f52069ecf513ae3b15902360ade8ac23c9c39cb4c6de3cd516572bfea5019710fbb8e9e16293fa5aa00976abf01b4e9ec4efb87a2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cada6fabfeb6e5480f26902ff6df04
SHA1cbe50dfa4eeb882e369e29b62483cca5efd6f96d
SHA256b815d9c483a7eaf470df5f49cf83b6938130d24179e61ebbc78ea3d2461cb97a
SHA512f5f2870a160837b8b6b7e56d99bd47df023208377cccbebeb6de25d79054bcab7803efa5a32e710de9af8c1a30ef7d09d7f03f41feeabdf39d6f2e8bd11b3263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097cfa3d795efb134d08d3527e816bdf
SHA1cfa33d6e05b59ae18b676fc0c1d47a01be2a27ce
SHA256971210613a59f95653b77356bffbb658b77115aebc46155433306322754f62c6
SHA512ba5c94fc7bd439f7f930e3177cde9bd52a6aa5bef122024b85125cc99d5b0d47af2def1fe182bf44640565cd9f9582354da503cf1aded7c998dc90a09160ac9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ec6fbd2c8781dd0e391aa7d2ae47576
SHA1fbdae5310da88e1c14b0b32a1b645fc4e5dcaa88
SHA2562373789a8270eac865f3060a7e0338ee931db925909bb191084ea29951e6c41a
SHA512244789ee9a3e6235b9d23c4078f31b207f9b907cab5bfcb75d23178aedc286b52b4ded52bc7a443434ad637f725abe95e70040c0b59954557d953d3c911fd601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593aeb7a39a7d606fcd1315a00c441c8e
SHA1478c09d68c08d55a3e38464219ed26e1e8c354c9
SHA256de2069759928d5d7d3f7270943299364480f35c486dab1e08bc06ee4d6ca51e7
SHA51293fadae394dd508cab752a76e5f64029a1c323d30a6c97998bf5889110b20eba72695a5cfd0159f15342e21b3b2e758007def9933729e3d8eee0f462d237698b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e973008984c036341493427ea0073e98
SHA182c74bdfcd1979658e15036fb5722ba1fb2a61f0
SHA25644b9c798fc5232e8b39d57b87063eee9141230228edc644239a81cbca23d09f7
SHA512ae1f26ec4612b80932c98bd8c646ac7c4df1f54bd308a1322765ed53c34c664602027b7575e629f5f1a83ee54f5048db6cf4cbde6f37ef5d27e3b050896b22f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcdfc70151109f5eb3c5d4b5a9546c46
SHA1bdfff22a7d1d94b46885da311cdae618415dd95e
SHA256d6d32554fe337356e94fc1d5501918e53ae0b95da80be0c627ab7d7029b5406e
SHA512f45d6ba48ec6ef2e993825d05e16f059cd95f0a36377f98117bb29be29e39ec638c007785942f01cff426c5e9a5fc565f00c4e0b0cd9bcfa10ef376d0d2242a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ba4d046ab8226355f79a6946aef617
SHA1470d3dc1276db6cd35d9c23cc9f8ce2798371945
SHA25668ca32a2c2a4f8faa42061a0b6d1c426cc98d64a81610e0a615fef4bbc7ae8b5
SHA512f4fa6df4b44d1cf1b06fe6155fcb7bc2c063cfad57028149c8f7c6f875bb8f22f3f028e1e9006dac124956c14dfb125541e839d023a702d7e24bc366dfd92785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed74e316cc3ffefa2ec1a64b59bb6c8
SHA197fe75f088ea77399ca6ea0549b6bbaffc73194f
SHA256c46c52e01bd8ca30bfeeb19d8a66ec963fc40c13540a4769d13b63ec56b4151d
SHA512a272071232d8e545908362d48d16423efd7f439d149e03cb9e174328c37fb00bbe5788d21a5c49d3ad665590efa452a2aa1f01c6f931c66f2c267f042a21d583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a731bd2c25a3b1c97bfb55e2001b5ec
SHA1225c1134261f4c9bfbeba5e53d51897fd8de4eaf
SHA256bb2280e03a9fe7422b4e2df7dabd0d35344dac432862db43ea30e0360ffe2543
SHA512a54ccd554d334abf4e2197bc343d5b5fa4172c95044d427903755a69ea4ad55bceeaf2043f65a3bc0a5e55b1ce3ded7c65675cf8e3207f50f84b8f8a328b4c15
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a