Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html
-
Size
23KB
-
MD5
695cb4f0358f49775afc1c34f94d2a95
-
SHA1
9f3ec0a717dc0757e39c137ba8652587e488964d
-
SHA256
e805c194f8eb92dafec9fe2b123499f815867a0227b306b0a7d0fa2a29124834
-
SHA512
7403dc2fb93c81251277ddc07c091407497be030edddd7acb804100d3b4a29f6fe66912ae7de5f4174dbb56adc51e36143a7e4d9be5f3791de31fb4845fddf54
-
SSDEEP
192:N+6oG1zb5nwnQjLntQ/rnQie7nPnQOkrntpqnQTbnanQ0anQtQMBnFnQ7XndnQTg:06oIhQ/V1
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000067df79f9d06b4044a80f868a855861b40000000002000000000010660000000100002000000011632359459c2ce13e762be6eaeb187d01b453bab7463fdb36ef56bedbd0ff9e000000000e800000000200002000000082102b89f26ad2636fd80cb15d620a60e1f8f2888c0d8df9ba4f3b51f5dea67b20000000e054a210a22a184f7441f3cff5162dea7f695b1208d409aabdd7860099693f8640000000fd598eb2c9d06032c543528c252dc4a0538849248a24c414f4c317419cd4b7d37982fe73c9dd25d479f725c7564c573b98b75e09506aaec7f73168c6045544e7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00eaf66db4acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{995D0531-18A7-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422591226" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2108 iexplore.exe 2108 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2108 wrote to memory of 2456 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2456 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2456 2108 iexplore.exe IEXPLORE.EXE PID 2108 wrote to memory of 2456 2108 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\695cb4f0358f49775afc1c34f94d2a95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5195e7cd90daa05a3979550fc6cf227e9
SHA11d765010c5b5dbb6bc5ce5990b464d1570662b10
SHA256f4f6e2c58e053d12c3433cab6527dda317768b17433a0d81be4641452f8955f0
SHA5122d6287e41b35076ddfbfa43508e18d76d64a91cb3c04eb593f5c778c1a4291521c68fe332d77b0ce2fefa44f162803d814c422b69d03f178e4d65cdb2b0a00dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae4ca80b37908c7bc39440ea453d462
SHA1b949dcf66739ee51cf1cbbe34414f48f97036c12
SHA256e0cb9a86bbbb8c239668bc82efaccb8f34f2c97b33070b2fa3016a33ce9991fe
SHA512449755e3c480d0cac7b44959fdb90a99768409ed7fcc6e804f15e260e0b0c4096e02e59a6af8dbb3cc3bd94b4f670f198ab59238fa4d8ce5509b3d229708ee6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5023bf1c0d6578335598bacbd5601cd6c
SHA12e2635969d6c3202c58a8f4e3e9e13f868ab8e27
SHA25658fbf91553c59d94529543b41e2b06b8850d6e0d1388ee34bb97faafe5da3b27
SHA512c7b393cd55f946a5768810e05a896e54bb67b1a610e4c30b32e5c5c89ee060246acae26e3af68627f52c2ee00e53c9e8ead53dd76028a37c25a789de3131c8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5306089fe751aaf88e91c15c3074fa970
SHA17033442e01cf6ed09ea55fc513f581ea8c520722
SHA256611f26372d4887f6192d86551d5186da42fa2c67d9bb3308fad549a2732227b2
SHA5124c3ae958f1624ba35bb91823ca6207fbdb5b92bb29af7f42014bc6712ee6348030588badb96c232b4a04cd392b457776a1fe4c0cf9dbd07db06a6c3090f936b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf4fde3fba6726877b775297bdd6174
SHA1d767210b340fa3a679a7dbc40b8c4ec9ec8fe698
SHA2569d04bcee466ebe8f34474d989507eba56b1e28b98900e3e802701b1f5c778c1e
SHA512e18e09869cfb7faa892b6227248b05e978ffc7135f8320d8e310e4f34b9ee77f0ca31e3a4071072fa79bfbf6ee44f18bd47fcd14f41e3aa2a547782107e6a741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a331bb5eab8e2971158e0aa269cbfd
SHA1f139382a4d6b23f703e0a42077150b445183c722
SHA256ad7239a9efb0734a0056385bfa6d342fd04a825a846c68d66518afbec9f732d7
SHA51275680eda6a181506f7fc64453c2d40f50a7d33cebffa9d398d39f926dbcf373e3548c9b0c806c102122cf0d16162119ca5a175b1f93f76cc4b5898683ebf3765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbb549f1e7b74e25f6af0caa237cd366
SHA1459c1055221e6d1e674a4e4026414e962305157d
SHA25630431d3610b5827dbba79f6dc50f3fd127425975f6863037b2038f56c65d875b
SHA5127f92ba7f3001223bfc09fb616a5b170e6f10c43e59cbcab58603185c764cc1dd0464c304ad520b8fc3dbce366abcaeea6603ad1ac0976c28369d8d09cc7cbb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a3c786056f9ad0ba27d1ad6b210e12
SHA11d72fae76d521acae6b60fc35add6b91533a4293
SHA256912a9d64d7a6ab7c26c23a02251a4b045f46f0e8ace32cac8d273f0934b17ada
SHA512757e20f1ad6848c2bf0924616dfde9e90df7d3aa48f74d13a6e76f8a934ab1816d709ebb92855031351261101af280289849745009d7e89e19ff7f3c531c1361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22be0095ce0e4f0e240fd769876f491
SHA13bf8a3afc9cd7bfac7956bd5773ea2b9ae72733f
SHA2565dd73493e58545e251774b5a4dde641ff5305350254ae9d67b337b4c3dd6c8db
SHA512f8b265b89c0a7f626a12899d4885b41aa7b9c8e04c2e5cc38554f4e170c8f8d897e0828dd072ff5e2ecdf68f44e7045eb4a253b1e01e4afc119afdea23bd09c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30793251374887fd16c8312d62f3ef6
SHA15612d2dbc546e66ea89d5d7207745a7813506db8
SHA2568ed6c1580d6e83c0c6a45a2b35b9c17469efa219dfd8bed11ac1417f317d68f3
SHA512a5a6abfbaa627b9057ce49e763a5e274fd852a9f8d9f0be5a60b29dc779dbb04806be938c677e01fecb046caf9eff215a4c1758d7309131e979be550e98a97fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7a1243f12412a529f9da2c912e4c49
SHA1cc4d901d1c63f33c2043c68caacffa5cb6677139
SHA25652236903ab4ba91afe827b466f9d43de0945ad62ffe8ecfa6c6cd5c74111b4e5
SHA512546d5cd938ad269d3fd0c739f19ba2a36dcb83abe61b96c5a709d60166883bdd650c5b3b75128cc6f8404535dfb31b806349f4d742684165abef7e98c95f5861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f26051c5ddad206f80c374c532da3704
SHA1d28b4d87d146b95c1119767c0a7a04bb10b08ad6
SHA256221d3ad8f1935573642e363329a3f20f13cb249270c838092648bf48cdd69864
SHA5120efca5e8405cb154cd2bb04804138062bf0362a94dc633252e534a8a6b3a3a4ebdbb4c3dfd4ab8c41e66972c2f6443a27e0186ee374ef3fd1484081b9be6a556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5324eef205bff3b9da40596b67ac03f6a
SHA19c584256fb24c1f3f445a15edc3103315515ea2c
SHA2566b780c6b7977b72b497aa700b8c50859d281283ad47cca40b482bd814eb54bee
SHA512408a8c0e795dd2e5e6300ebb0ece85bfd0ca8fe6bb3cfde2ce10a8b5d7b207f120b34163499de789a59643cc4bb6d66a652c3d78341e48243b3f1f5c901955ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f32cd4cb6c9b5fb7e686949050a0b7ae
SHA184393c49b013c2ecc20f84c08d199896a50d8064
SHA2568475d54321bfd3ca86c62ef2b1ba2454a7bde42fc504ac4361b114aa682ac03a
SHA512b721ba7e8eeb836df157adf7dfcc7a4175e640832175b21f78c0856a1a4634842b5e337a966f7439704eb6d3ff896437b3b6f11534bfa99c759b78d2b958c6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f4bcf18969813a53c869d7a9710561f
SHA1141b64b0341644556ba14ed16de7dc47a9516944
SHA2568bf120a2c44944b067c8d5da5167aa95829bfc98fc34f8dbfb7391ee619e93d9
SHA51275e2a42046147eaafb5f565c1244ca465a0e3c54a9b626a0c9564d0c085dc03d6773966a338c58a35710ec209dc295f76a95c87bf895617740bd2b082abb3b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5429b6fec364d74d61a4c460429be9a0a
SHA1c85edb28f4ec5a620ae254b6b6b380b51b153fe9
SHA256897f8991f431fb447a4ca3486e17c1bc726f0b4264f496a652a6a56dfb108882
SHA512e3606f1e98c2570075c246d2914286937c551aca3e35606460621baff29da6d13664ac1b53220f9999f814ddf7a2bbf44041c9df54729c5b70151a26607d8a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553473bf5a54fc8be525432bf82744ebf
SHA1392c1db31742765c3e90d67e8bb55ef2efcb0e65
SHA2569f85ff29d0b0d01e627838cfc90ae009f662875bdcfa0e911dd954bd664e6c7f
SHA512b42e3139c7f282f22de1827b6786a2a0ccb7e794a4477201c8eea96b9a3273b2ae24d9fb8126b268a74f5859c3dd49adaa2da50918dc884ba08a7a2739e486d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfddaffd9d1cdccac37360b639b25dc0
SHA1eb1af1591a34a90ce2230254e7c726386b94f82d
SHA2568f438b38680b5dd73a20d663d3ddfb547515bae5c1a444c404fb0b493f3b6824
SHA5120caf02a9b78b9f80da91dcb79a7168594ce923a1633a7ed16b347d1291e7f8c80ec4ab6347ef9d3273256ba7fd3e3c1ac424876c21c52f2d4e350134fd8347b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da84e5e340df02489a35f6b1104bae1b
SHA1588b1f1ef1b56c7110f8d43352328ed8ba6e2d90
SHA25632baacc84dd19630caa7f836661a0b1eef48e4003f39c78b7fb28ed12205ad9d
SHA51240f57de384c843385bff021ec0a15c7f536e9916187f3f0f9b975d2675b43bfbbf2da6bcbc9a2d2230520e9b4b9f9723b42433d20b10b9fc4a650b69d0ee913e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a