Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
697b90c6ce38a2a60990b22810c40604_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
697b90c6ce38a2a60990b22810c40604_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
697b90c6ce38a2a60990b22810c40604_JaffaCakes118.html
-
Size
461KB
-
MD5
697b90c6ce38a2a60990b22810c40604
-
SHA1
42fa413f2e99936dc3a8061986f7482b925c3018
-
SHA256
b642441b842b5b09d7a92979e4652a78eacd6a969d61a6904703b59e9e799f27
-
SHA512
68f5f0af6c2c0d731a5a0e245f87b742f5533c1906bb54c0e7d5f5a14140bb64d78d6764a315462c4c713475eea890f10c998264937e71c5e4734e65e35fd089
-
SSDEEP
6144:SssMYod+X3oI+YdsMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3j5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422594066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b931c4eab06fd54d9d55de4821d6e80400000000020000000000106600000001000020000000b7f574ea6ff37be84c8f432ee9d9d2d7ca0e3db312298d69cc49cf79256e159f000000000e8000000002000020000000d9e8682b19dd6a18e55d6226801cadd8b403f4c5d90de6bc41bd361546ef4b00200000007229043144a5ac1a4c0fb51588b94cf32a1500f68a0b4fd1e9e5242859040a7b40000000c73e58149e6a1de7eeae3ad1662d9bd8324390df354e93312dc67a63db9e377a8f07497331fd9ad00726d171a8401dc465e42f490fc3c469b6d2050667c2e38d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36AFED11-18AE-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ba310fbbacda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\697b90c6ce38a2a60990b22810c40604_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57096608cd3c2b6483d02891910a3c334
SHA1afc3a27027ccd0f86fce8d373d469cf2257ab5e5
SHA256393f8923563bb5e31d4cd7d6764e3172362fcab39a25480f1ed1ce3d99a190e5
SHA512581a31f06fd77b4d83fe633e3021e123db314b8945996da61d278f8b98766feeb290832d7119312b51156950a9e7e33d9466caf6e9d40eea92b14120cee93bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f19582b6b8287223f22e3d7e8647ea
SHA1596ac14e6843bfa837d3d48a6b6874becd50eef9
SHA2561bf6b6d72fbd852e4696bd02b557ecf6db6a3c7e8ab509011ff4393033c9ab24
SHA5122ef18a2126d4441d264b3590f6a4129c5d0b695f65bbcb1c5a8cf2ec17c892e1e219078ba9debd31b9db5ab9638e3a2137304d69dc1f90a884366fa190eb7d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a619da397f2b65d085c48cc63910e458
SHA1c8ddf08a479e4cea95d96bc0ea28f388172f8a0b
SHA2563b3860f4907a038f00fc587d549f1b1ffc9597cafc65e0171016de4cff3c117d
SHA512bfd6185cab268b2a017ea7c407eda82436b600eee9c107b1d7dab0477b4b4b819e15b423397e2d0316687f28ccedae353294e35395f08c2a0adb0e98f01da652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036fbf736d30689b9578a1b1efc67c00
SHA1721c00bb5664d864db1dc901526f9342dab6d176
SHA256ae3eef5625a441626cbdffd9deca062159b4bfca79e31dd87a75584f3783eb3c
SHA5121fd01d406159040c2f9a8754f9cc069afae18c52414337f1eab639ade99928b916096ebd3dc91c467d8b23729cc50c188c1bf7aea9035f0bea3ac3cf992b26b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616b87b4104fc06afd8c02726ca81204
SHA1be8e0145d5d8684c104955d9a09382e27c343568
SHA256b64b2a4cce9533c8833a41ede1a85e34eb11531ca53894d8046db0ad9a744ecb
SHA512ade9771e907d0b473331797e041b64eeca4fca56f11ace71fb37e68c3aacb3e628f2bd1d77488c242b082c2bf39bc061635b1ff085745de547c482bc721520e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a066c81a256422d52e47462699d8ac
SHA1c8c813e40919edac22fe8425c4830311ed70fbb8
SHA256b1ff277cc907b04de5f88861bd7af9cb96d95044c2fd03aa2b15d996d3f168a5
SHA5122fd992d7b4155875081b48ee631f81acc3931187cab72cff88ae11fddbb8abb9a2d54b9787b42949fe5f88b3c193c3bec26edfc155017e026fb1786af48c0def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da6c82b6da6445125ec2fdb23bf7c20c
SHA196923a3ad2060cf3f0db0cd896423bb8d3d92495
SHA256eb324ac0dc95844dbb60170e75df773393158c30b211cbdd3047a3a06a45a346
SHA512768df1b9c0fe134ccea0f44b0f7d3d98404a70a1497948982e3f2af6955f6d379dd67f54417c403c120229c884887f517f47e6a50ba38df50db98ae3f4da3176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6dda05623e6558bef46f34248e94b78
SHA18a44378440f6d05fc880110dedaa91ac0e00e85e
SHA2567b1a400c271fa1f12580c17141ff9952f6d92fbc3a1c4eb186461f5edd584df3
SHA512738907743f1138701de816acfd00a0c65fd9380acf5ed36f55596d40279020d205ea2af84f31cce5f7618ac37ab36880d965cd134c9f1990c09e4be318308d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525f3711a6ef191afce2d54062e76cab4
SHA1ac5ce252e5debe4ba1b66aa60e132b3da80a6ca3
SHA256223c077719cf6a21464b11fe140bd12f6f37c5beec283204457ef101264b1825
SHA512659caea3fc7a450c99edac4a159c5011da5a73abc3ae7f51a1bda2924ddff452d8b9de21c4cb45f03a3f5c866b3ade7434e24ffda8e71219f8bd7575abe96bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581bf87189c24fbff83ee2204f5148767
SHA1d0417cb211381f637249244fe74cf6f1861f7a35
SHA2560c1bf45a6aca01843e4c51be1367226a7204424e784ce96413a1858acb9d75bf
SHA512c4fb1cceaa6f0889112f18d17e4b46a93f0ed2ac49d18f9e0a0205c7d9e0ccefce3b9751a3aa1bc7b295aa64c7bf9c182bbcaffeff20f6062d5174fd8c8f7104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1ec0c6c20a440463eb2266ea1cfb71
SHA1d59c39d874b29b92eebc4bc97dfee7081b4f8de9
SHA25687b2835073389fc0dcbd565374a5f8e670cd91799cf6283593aba3a20ef15bdc
SHA512aceec376889d35e668c3ff834f4b6a118017f54e581003c46e17a1988ed1695c2dcf8435a15d48ea60e07e5ab6fd9272dfff0602b07177c77c4dd92f860f2a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebc2775a21f065cf355b86e9d1587351
SHA1feb80657dde561041cf630d5ae73c3e9282de56a
SHA256cfec4f9a8e7d3da83c81adf0c73a14d4aa04f18d876408cb9ecb4781798d3a19
SHA512550d3e56f7198dae1eea9587f42c632915e5da6c82a8f44894f1367ddb85c0369b033b4dc784c6c87dc5062ca980fc4ba08f42af6132c503b985f15eb8276eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50881af92baebd8ce9462736f2d8b7e49
SHA119a8fc7fca9c8f5e12da15b34a4c696b2ba2c95f
SHA25693597bbb8a27c2439e74254b4fdfefa6467d0e0d7a00cad8ad48939a15cd77f9
SHA5124bdad09efda7912b165855e3029e092474a2a6e8c9735ec961b51110fe2bd68d4f97bd517e0b0070aac6336b7f25e5bfe886806388235a0b2d2b6aeded97ccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e41dacd026977af790d340e64fac35
SHA19431b50af81adcd4a901a26b706f958003cc3068
SHA256a2047c4fcbdc776ec057f2d7dcbb302a6d9db1c43cddf8c4e429fe0f5a0e29ae
SHA512d12c0dad5ac5b865b33f200bedf1c7f4f75f82958c79935843b0c8bc0c53179ba78fa222a838fd37ecc52b09938f1d7a8270d3b919297131a3062a92fec67006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a9f54195e09daa8c55c95f197cc0f6d
SHA185fe8a56b74c66e80fb7e5eaf6f3d6b4dd7c939d
SHA2561af71a6dcd452d560bdc4b5106e1f86172d46fef3e042642bffa4fcd57991c0f
SHA512cfc9a6cb47714ef4315c7a304bdb482c2d7df85ae247338f76c3ea790b9e7aee880f180811d6da747156aea0a8881f33ff794cf74bdf4597fb61249964a7a88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700dc64a7f5e7a28aa45872aa04602a7
SHA1c0410480f270da74c2b2d2fadebb9abf94d04eec
SHA25636fca62176637f76ef56d2ba9c66558004ac3d2e3ff59141572cb7e5821db0e8
SHA512c8b7d18165e3ac74f8933bb935085b3f4f4274d9709e721a7519700e559f7f1e40ea4cdbcaa74a1b75e7be7b3843fa7675a44bb5c05fba45e0cf2967d87f7986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd1110ae8d762c70607854e7f4692bd7
SHA1fa9b43d345a66f04341c37b9ae0b39346e3bea6b
SHA256724db507cb93f273ad6c9e593604acc031962219c4ade4369e63db287f5ffab9
SHA5128f46cde1cd18316900682f84971efdf14445be51c3a097270700a45c71b11b269c1a21460b7d73ba39402b53c05cfd29f9f26b9690636171ba227fbd04e9f9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711a72561c05cb6adae3bd40231d2042
SHA1c10ebc6dcc8c6a602c33cfb136b3a04593271907
SHA256ce0dd9897b2ec2205c05cda3a20d07c3dfdea657208e762a72f57c08d53c9110
SHA5129bb6a23d94a863cbd12d97f3c7a7e7f34009a934c76915f52c854d144f87bcd5867cb3ed58bff31d69a093ce63e1f51c68e75a5f5b86c50d8ef4dbed3aec54a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51335592990ecce4cdefcce93ecf99ee9
SHA19446cea4d571c282a0223692953c7ab252f0bae4
SHA2567a28dfeee916ea2436b12cc4433030dfd542af0324b2758fbf7a747f631feaec
SHA5123b0840f013d74f4fe6788e3eff2550ac84bd3d0dcf01f5dbb59d9ea2f8c26767707735b3804045d495f15f59d791b7953046c143389b505d236f8ca7399a350f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a