Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
69763a0abc260c8f357ac2e76f3468ab_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69763a0abc260c8f357ac2e76f3468ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69763a0abc260c8f357ac2e76f3468ab_JaffaCakes118.html
-
Size
4KB
-
MD5
69763a0abc260c8f357ac2e76f3468ab
-
SHA1
4b302a413222d56e104686168f32af2979bb723d
-
SHA256
3d1e908009a668314350177bf56bb17982f227ee46fb346c04055ba666f20022
-
SHA512
9aba14b5ce1160f9cefdaaf02b00ab1ae06d623d63a14b95a04a872a6c70925efa1f31e85194fef0ea828788245af78b826398d854982010bf90197494eba1b8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFcJMDd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008045a9a4f319ac84ef1c0b7705ad6a36596e50782efa9196da32cf35e8dff184000000000e8000000002000020000000a58825b0612d4427fcbe532f312637de0372b502b2f1bf6fc5ec4dbece74c23f200000002db3cd0136536935afba9a9224cba59172c171246409058707f11c01c48fe73d400000005e2b6de897b46340f83ffee5a49792346e896b6161ccc1b80437acf3f3124b8e79df7d1f89af4f26eb871c5c999bad5736e9e98cc410f47bf09a3df102244a5c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f262c3b9acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEE281B1-18AC-11EF-B3A2-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000be13ef4627720c47a3d1f96869873fe75cc088645c9b297470a2ee9f9bc1ef39000000000e8000000002000020000000277a18e501d9e770077fb27cc7d972bef568775bb33b57b9eaed6add7178c7689000000085528372f4de9dab17490b2142632ee12cd92dcdbcf5800b096b350209ad96923c7d23262a60f394c31668b9b7a47b51a97cc2088333b4442ef48fd87cfdfb9917f5fd73e842743f448d5acdcd65fe736bec534fb1bd838225265a1f2a2b6dc3e88ac09752be13061346e6f61f5cd1b126d555d6dcb8e9fcbd13eaf699c29687347f59003aba047633b1b9371e8861ff40000000733dbc0961bcdf5d98d5159463bf02320ccfb814b69d6bd5940fbf581f5c42d4c892d81ffeb6f5a1ea67bbb34196719c78a60de78bbbc758eec0e29d215b69a2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2392 iexplore.exe 2392 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2392 wrote to memory of 1668 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1668 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1668 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 1668 2392 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69763a0abc260c8f357ac2e76f3468ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD534a8ee5589b3b94545b608cd325c1667
SHA1a3c2572e8791874fdf67a9a482132729982dec14
SHA2565f46fae7acf2f4b6395ca83908405f50210d7137dd684bd8132dd1273c28028d
SHA512c9a8d207eadf073b1c8e43ea65987b0bcb48e312373cef27b6af89cb15af66b310a2f98b771450e8dff9d28553ec509ee0bf76a4eda8daf63175bd7c5cace5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD552ef2cc4b3ebc2b90acaf303fef077c5
SHA16247504e2834bfa2220ce54362c5a3275dc719d9
SHA256b4a7d2e74dcdfb238d382fa4264b59a6aa4689db4dc6552ecaecc00353309b0e
SHA5123f1510a0b9d94406f5fc683d099d7ccbdf191909ed26a97a063a405d075f4bffd8c28ba936f86974971a0a4a43a2c4afb76f72248d581ac6989702a02265e3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5408df6b5a8f88a643a9a83c850e23624
SHA10cfebd7be15c65961474e553dd0b6d6a9e8d9171
SHA2565e53abb6de6ed14071d16681beb5b8cecd7c9e059563ab5b5cff0cc2ced3a12b
SHA512a131caaa6353576ebe27ca580e7f773194347d57016169a2ccc9e6f98c7ea3b1f8020cfa22cf67b58ae3751188cb6bdab3251bd6b3e7cb56d936270cde4f54ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5edad04cd20225a3a036137bb940b9db6
SHA113602933de774a0dd2aa1ab7ad269ca0dceb4fe3
SHA25612ef55d45667555ecb986541f2d0515701149573d8230ee1f6f8ee4a18574858
SHA5125284b4f63764885ce8e929d64863e9c092a4237ba9d0b89dfe684b70504ff5957c245e2f786f6c6276d9817682f2a06a6f540d35dae32717cb26e39d3435abf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52325f67307fb176000bb5797b999fe1f
SHA1f5ddcd158d5ee3b56cc367a9b7e4e8121c9de2a8
SHA2565510fc2fd17c851868219b3dcb9e8a4a6123cd710e3e3897a727ab1e36f3fb99
SHA512422a10e91fc04bf986787d3db23b0fff8ed7e42ddf36e049f434c706c73661f0ffdec197cc24544133e1de57229a0e5c900d5e235054c25fbdfd2cc24cc9ee77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5efcecb89491a9db06d639fb1f142d577
SHA10fd0778213ed351f1230857635e4a7ac15914ac6
SHA256dbb49b05750f9546bb6c0ff15f7ea6e839cc37cd120dfa6e160b8c4e36de6bcb
SHA5121e68e4d7a5f0decda276340d6807d589d2955b1a6aa51760cda2b19ce8c9db4ca56ffc7493f10e383ff4ec384010ae82e648ca6477796336e90b8e28ee4abae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53219679d8f1b5ad004d8424e4048873b
SHA187e6116d474b93e87c20451b535d8286f96c51f6
SHA25641a1a3c91d9c7e2f11e300fd92c54e8031cb67b051425ae7aed8ae66243a6044
SHA51210b75d24e4545cb57508175b0df87758de67f6dce3194ad1f615105fb74349cc80de5d847e2a78841bb106cdf148338aca2121cbbc754f303326e707f93cd1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b23a6de6866c94be4cbda4737a9ff1bb
SHA1c7bacdb62615cec03fa7c6f74e432a2b03732c2c
SHA256e42453f2b44528eca4ecf568298321858b1c13ffc69efef80f69bb7a8eb85c9f
SHA5126b4a6a4bdd339502b8944c9b3c6e98908e13a6bbf51d2c5322974d44b3fdbce72bd8ed6d02c79f5ca830bc4a3fcf8d44772e239b5e4b8b8aa9661cf5eb714a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD513de457dcfe72e536e7540be0b70225a
SHA156db02073881f4ccb7e9673d8c8ca54481a90ee3
SHA256e69a68b140b6201b01967d25d2129f94aa8077f5ec050b811e96659488eccc58
SHA5127d9d0c89ddd7ddfe78dd3044890aa07c188832993e907d5cc3cd128bdc7a01477d6c5b8483e7eae88588700196d6df478fe92de8de32936af64ea4b567d2461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD554e2b1ff6e104ecbd7a886fcf8c9e9ad
SHA1f3be7de6ea22d94525aac01759a359a20ba41906
SHA256240fdf1b395b5a70e95abbf13bfb5e8592eae73998a836609e8002da158f1657
SHA512c41ecf41791dc05ff45f41f3ae7efe176f4a8b99626ef8084b8c667c0b9debf2558dc995972ae4380633cf8b73804d2db7310abab9bd6e1d7c07f11508cee7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD583231b69f8a4a403bebc748bcf1eba4e
SHA113e909a4ffa2fa6dd49da7f573aa36f105b72454
SHA25621e341c2a040703d768bdf50a0800a5691dc177698bc72fc92dc44d43dfc600e
SHA512369c4232b7e695c9efd42be62806f4e9dd242243531f4323f170f1218fcd00792d04e1068c728403ec42086b3cc99479f6c4e764b764229869d863a8d3157881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55cbeca9afe2c3ee96054e879fff01b9d
SHA17e4621931db9e5389e1eae72feef96b8b002fe17
SHA2561e54d6f2839ed9665e89ff5951490f0f708aaaf32fa618843a05134e9c0d9b26
SHA512fb0bbcbd393aaf7d928014bf0eeeecefdf3f5e8b0fc727d37968cf6bc4e111f8b748f4aca13dcd1144bf8d6090cdd3f9b6ac192baac92dbae18351a78c09db87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fcac36485e12d716403ff6d9a81354d9
SHA1632c40bca39fb34f47a602f449e83d7ec736303e
SHA2568ad14584453bda94e1f384eb97c4103efb26192908e24266ad547296a1c581e8
SHA51254d6b8e6c1567d53609323a3b353d340d2a92a5dc33ee2b4b6d152835d94f0b2104ee9f085ab30ad5c254122f61ea8235131a1e8f028146546746a7f62a4bc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c4f372aece208fe99b27a061626015c3
SHA1cee908487b373186f365c1b83126ef71ccbdb853
SHA2567beba47a53fa6c8e067d339a7bb51a18209159342f583465247b5179bf8a0b34
SHA51219526b1c4f1b17555e18e61dd781c75852ae6cc9e1b12f6059527e2dcf9691a4e8c6fdea86337022d058129e8a19135dd9773effd8cb4d1b33fbae1d8c38ba38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59332ec140ea512ddab4cd829e7fe3e72
SHA1fda25662c868228567fa0130289972735454919b
SHA2567280992be978d17f1873b15ea0efd60cdb1ca85e3c8a5ed5ebc886071049154d
SHA5127dcd9c33578ce2b3a19d7cc2984f18b7b78eee52ad73bd0026a26fdbb7d983b7cacb596d03b99850baea0ca3d83d63fc7b240fbe053f5b064802e491b4487ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD521a007f9cc883b77fad1f113ad05f82e
SHA1aa766e8814905a9ccaa4ca8c7bae684abab87674
SHA256246bbaa594e65c439aea8ebc4ae5e1aba85012364ebafac63fcc4d6eaabcae0d
SHA5128d220e4bccd96ce3ee0352629172e75b858e325931647056bd358345a7100982a990cbd95d47996357f913574ad00ba425e6acf5f359a23e3cbbc657b3390800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51de2301297e06de7c087473615be9513
SHA17fc3a810f727e82fa1b7f5076d2286c7c2e41ab4
SHA256cbff1573b5fb2356635dd939a842350278a9572879420b18b2bc952f8eb2b457
SHA51278bee857bf4b44ed4eeaa0631a29e7e9938790b460588cb5fc2affb55785a3ae5281b039e735914b30dc1fd651b641723365d8deb2fd06dfc7722b1653356adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56a1ebf496c5e9f8bca7729143de292eb
SHA1f77c190887b45046c4d57627c3ff7224d3fad123
SHA256f9bf37ed5555f933c2b6cb3d46bbcc9e6aeaebe42ba4e85d07cd4301899b2040
SHA512bfc00d23bce63c4bbff436deae908f1a02cadc63fa03a17212027c9c27c257d72ac61f990a8e54a3318b6fc2d0568fce54d7c0efad2a1356f9341f300b9a321c
-
C:\Users\Admin\AppData\Local\Temp\Cab30E3.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3144.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a