Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
694cac434ea7b53fd12020b6a6f87062_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
694cac434ea7b53fd12020b6a6f87062_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
694cac434ea7b53fd12020b6a6f87062_JaffaCakes118.html
-
Size
72KB
-
MD5
694cac434ea7b53fd12020b6a6f87062
-
SHA1
abb536a8a4d37ccaeb5d507eb6c6c16e126a6e9a
-
SHA256
1f63632e71676f9f6483ef63cdb048cf27e60469e19ab2c5f9845e0657846715
-
SHA512
7e8d6bd04019e2e3606386d87908ab4bf452891141686eca7bf1c34d5029f912673db8dc708e38cac7696cdec4eee2dee04f78256e249eede7ecabeca14e0657
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sG6tIhiVmEQoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3jtTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{504EFE01-18A4-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e4ed24b1acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ff70cdab83d072ace528b52d63925de8ea0e260e6f0cead0c3bfad98d8d4d50a000000000e80000000020000200000002063c2c0ab76b812bd882638cce677d63086560683ccfb98d6af1b0f69f0b6c52000000077377e15846a5dd00ed50cec86dc8282e38f0dfa18386d3be7792c6e960746ec40000000af977f4ab9875782ce349a74f98bb77694074207ba0fe662e6c280756cfb0c24e246373e1a77a705e0334f9d2391e3fb25edd3d63a15893b16b8cdbd93d67de3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2140 iexplore.exe 2140 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2612 2140 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\694cac434ea7b53fd12020b6a6f87062_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f69a4c083eaf1c95c3f5d0f697955c50
SHA1d8855b883885d615239629e05b6ec8e423fd3f3a
SHA2564861b0a6b5645a9cea5e6d99cb230116104c4275197f43531b2d61d38e1d8184
SHA512d1d8f6cb63c741d2f06120aaa0e30c7578bd4a6a14fa892f9d3c0d131c8de8dffdf386552714291d5c98e6b3fd3021100bc1eade1f3df61f82b73baf5c78a850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56235c167e6471fa2e1c31401e34a6006
SHA191080ae10dfb362a39098658dd859cd19ca090ff
SHA256d313a0e3e1f214425beec4beabe24a2991312c88d5786704cf03e1c8c560cf36
SHA512fe08fc8326839c28bba3cfbd1a1f35292ce83d83c4f359a76fb9e4daada12f0d40b651264917bf934b14b81a23092027526b9ad39f9bd838e54664533de0cd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966374013ea717058cd88a8185c664b6
SHA1b3f2a8dc89c69212b0041ab2b8b8bc470e849679
SHA256b0477dc68baab28d77437884b45163b73136fa44c16b152559b8c6e8b4363d3b
SHA5121520c09294e311f391e47bb837b09f6daab72d385e3ea2bfaf7111397bcfc4d922d1a8304cf72a333403c497fa63b4166b5775651a7c4988650e76dd15ce7df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab6e406d1156c39551528e1b01451be
SHA1e4eb638043d0cb97d7b2e2a321cd3074fe97e753
SHA256a42b74ee39cce9c1e7db1d3a7cc14ab94556ceb932932e328ae2ef1a9c2f3af0
SHA512bf1952278f9b504b3e1ae0b79f89a0d84b28cda5b42ed3ce2cec34effbe0792e93600a8db69f7d2cce030a6846d43838851a6832e7ff7de63621fdaf8269f169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c950b5ec2642a4e14a73a8127972aff
SHA1c7cdd13337de80932baa4fcef5078fc677cbcdf4
SHA256cf39615b3da66cff3d8f10938f6b5c71d69f2827f04803cdf6670e0e4f529a49
SHA5127961de79d07f8f897c95d64cd6cc29410bba3309dad18c682beb913f91030bf53230ae8d4423c7a830a5d99ff004ef4f5c74170ba52b8fb12be503f53da02b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d1871c74e550c9e2663985ea67f53d5
SHA10784f6b5c0cad0e6949ebf8aa98bda830d774b2e
SHA256e8445ca3a559c13ad2a18edffdf324fdb317becb6e759cf2dac60b96e5539f80
SHA512469d0f478e464cd0455d3f18bd0a7966d47cb2582d06fbc0c6e3226091a5ff1eeb97c08fc3c9c8e67d6e845e03333f008683c0f5979e51e66f2f7afde320c30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42c3b477096c16223e73045f7d16cec
SHA17fee5e23a8b6fdee971c842b5c68e359bc467f07
SHA2568d90f2c51a7221f1383d84e82bf003aadd108bb78451cf8ebd2f7cee6ec6c9c0
SHA5126eb1ae79aaea9fcd6d97b7f2de53d3c3d2449b85e6b2f1314c288aa5428ead96821ac287b0854e8c3bc4f592d0c8a01d74159418ac52935c8fc56de9bb0fbabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1645a4281bd50d2b97c7f286c33bc01
SHA1e63bea6e550a0889c8f2d2df3cd1e0bda88e8117
SHA2567326e6bf566f44e82fef82f519714111c92d6ea49d2edf568cfb936c7c9a92e2
SHA5125da027f9762278d314430ee7088f2a95c6ce4c9089372af4219a675634322d0065027d0e9cfc973d230c894caeb28834e7532a5f8a4271da8961e274fd6de6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59622eba122b86eff238331384cdf9a76
SHA1746e75181fb645cbeb978c8969db7d446a5b088e
SHA256c91a3dbe59c3b72d1b029374a8c916c55d1c56d901150ccc1ade755d276b3191
SHA5127ba37a1ea6be596c1f347c03bb79a92d8d762bef462f337ad61a3df662ef92289bb2d415525408658346d6b1c3159be859034e5a3c6bcf8c263823c1bdfa3ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf066673b74f8085a34dd1dfa33109ce
SHA13d6e656f135972b098e054423c6a8a09b5794031
SHA2561b1d1f1bdb83b82343dde6dd5731c34f422fb3ab7f080630cec2e96bfaf9436f
SHA512feb045144eccc6fe087bc31ca2a8e8f734546493f106a4fa21291579f944aedc035fc2bd62f9051d62868629dbf8f09a1edcedc37c6c583f49a594d3351d013a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5877644ddb0dfa823dc48bb1fa007513b
SHA1b821bd3794a61a4c64124fdae22e2fb7a7f6a266
SHA25627cab92536a74391da7af056334a2b65f6dc6ffa568b15756c3af21a0ecdc37f
SHA51245a66d7dfa08426f58804c06cfd1b6fa5929ff6bb5c04b842d06f53a64865ded83ba59e8b2924a557f4d4e7512cf1a59d1cee08e053acf48bebba3e1cc315ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e130a7ae0de4304477756fdc537643
SHA142c226c0ea04d0bf93d8854f1168c84259931d5a
SHA256393c5b0fced375da05da8d70542b5af225ae85bbca89a50a6e7f8113530ae2e0
SHA51206a22147ee56530d4d810b703d4d523c33892f80a97993cd3798dacb0d64307254a0f8623da7737da88730a9fefc7bccdc8705d7cf58f54aa9761ba356ff5e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022ad898055f00451e0cac8f9b3a5f13
SHA174c9a5436bebf4c7b44726fd830cf8337d36042f
SHA2562c1e5ecb1f16efc4e42d3394157cf1fdcaef018d8de3a534a21fa662a8d6ac98
SHA512a36a76b38f071aac13556a9f7878c575ee07ec916f61d916a52e5a5354b0ba1515cba0aa34d6b85c8820a81600e4cccb2ac1bd95a0501a7129c35f3d16abd2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd49d3ba4d22d77961a8c3273b3a164
SHA1638b30209e5ac6bcbdf4177d0b7adaf4d3281696
SHA25649f15a14846ae42ed693fffcf79f4ea0659a206e5937eed1179b76e7fe733deb
SHA512215383713ad14034aeb289c9e911cfe74ceda7c2f9773b8c9fcf641e7194b304cfdbf2d46d411ef07546a318d076a560f4b6f8db37818e87fae0fd1456e9164d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ff6060cd1ad176e9901713644acd84
SHA1eea8524028ca3fd233418db6491e97dffdbbf438
SHA2561c841f08a1fc94897e50706eb18127361c70c90affddac9d82c024458905364c
SHA512ff8d13d4b0fced64176fca31d72e0232cd0fa2970e5efba1c80f6a6d9ff9f1d97f534541c16eebefe95f97549b5bc356ea97c4ad3ccf4fe656879e98034612bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9dee0e21fff57b491a9d48f3b1d9cdc
SHA17426b828b3f03fb1922b2ed73ce679eb5303a855
SHA2565eafcf93fc8dc242c13693b386ae2257bd3588a3acf0840e568f18778974dc9f
SHA51203d02288afb6d1b28411a2bbf743a430c9453501a4dc9b396e9ac3d986593b2777238a42401b151e494d6ea30d923b5dfedc3b54016c98d21183d489368a43ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8bc1df199a90c2a3a2e3c173c09c484
SHA12cd1a28ef3a7b3b43f9203bf294abbae93b2640f
SHA256ba44001e9e9db89a45d8d19e35828e2b6720615affef71123a4431ae6701b1dc
SHA512419e6127a741129f8a662bb23bdd3e590b7b93944bccdf0ecfc84c3b1b66f480c3d943f94653b2bf9e4403030e99cd6c0a8655361e139f1df179fc958623fde9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559490a2072cb4458e808aa3d0818a374
SHA18ce9d8b93e00fa547337d8fdc02323e0bf38e53a
SHA256c2a1f4e1215f8d6a56b45d3c0861166ded9017a4691adbb6ea0cf3a100b55a6d
SHA512e97e6675022e798a8ffcab83a7a5acfe368cdb8e7c373b369b23182092a2b01f34516f308e84ef25715589e4044da8aafc835bda3dd1ead51bac8955db88ad3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a90845433375664f473bdf5a32f8a8
SHA1e1f17165b675ff2805553d1505a67a4a2dc5b09b
SHA256d51bdd71fccec77e27916f008a519f951cf486430002659a8f722481041ccb4a
SHA5124baff48834b7545b9997605480178cfcd570f4d37b5b73d15c146bef5e3e631f55ac84c83c6c240370f3b01257e2f942dbb297670bc08ce08433d0d44a5a0f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8a112f7336c43f70fbac47c3097cb71
SHA19bcb5702b1ef60baf04230dea75df7b970d71848
SHA2563c982c7ccf752ed0a3cd7b06bae4b7b4cc685380bd51fee7f044b5e7a13d9b61
SHA5127b22ebc2eac900e54a29580c62d68b01357c221846208d4a2ad76884b6f99103102a2b0a722232b1b398df95305f9c1caf283cb68704a98dafd98fbb1d5ab9b6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a