Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
69687e764e6d500793217f493023ebcc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69687e764e6d500793217f493023ebcc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69687e764e6d500793217f493023ebcc_JaffaCakes118.html
-
Size
461KB
-
MD5
69687e764e6d500793217f493023ebcc
-
SHA1
108d1dbea6ee043e396d6939a7ee094ed2ca488d
-
SHA256
910e2c8b6e151dea911ded0b1de744cdbdb47483865a5bbd24fedf0b6f092c27
-
SHA512
b9ee3915ee157ce4a5459c278b57d1486a015865beb972db35c4222f88c39b514a86ad81a614be0e129a749158d950e2c0c575ffc51e97fe6aa7d08f907e259f
-
SSDEEP
6144:SusMYod+X3oI+YFsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3j5d+X385d+X315d+X3+
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E941EC31-18A9-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000056ebbc6009d34fb258f752bedec1c540e51078fb4cd1dd8991c161c6ab790fa9000000000e80000000020000200000005496536fda8c1d4fce5cac75f4d2816f7aa523c2c1552e14178fb3d1b28e06cd20000000bc66c323033c1c470c9c3d81c64277f243ee2c4276b29fbe8cf9ae190656750b4000000086032fbbe17a251506dea2c4abd5b9e1cc82d0766a00eba1f794408088c5cc8d6e966f2cbe1105b58079180ce37c2376165a8dd0c0029dba53f1acb54cf9fab2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09ecec1b6acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2324 iexplore.exe 2324 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2324 wrote to memory of 1676 2324 iexplore.exe IEXPLORE.EXE PID 2324 wrote to memory of 1676 2324 iexplore.exe IEXPLORE.EXE PID 2324 wrote to memory of 1676 2324 iexplore.exe IEXPLORE.EXE PID 2324 wrote to memory of 1676 2324 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69687e764e6d500793217f493023ebcc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb1e6505c9f1fcebaf1ea10bd0065c0
SHA157c1620d0a2195f8ab5bed74e9e7ca728387e878
SHA25622ff07dcf7e5fcb30ddd7145c7e06973a5c8ccfe2f479d337fb6f302a1c3a157
SHA5125193dd79397033e941bd134e4bb62f9caa50868030dd5b1f6ba67942072c612e6c06e7435121d0c3050fa0909b3bcab163793f1072f86d7b9a3d189778c4019c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592de6ac1f1bcd16a41a3a0cf4629cc40
SHA1d4b647a2eff992f416f4c61aac0030edc6cfa7d1
SHA2562b0cd1d42cf1252670f2bc5a62cb527303b2c8465f034051b4e975edc65b55bf
SHA51247c14ff8daa9f57559dfa7fe4cc5380cbb89df4ba4c7d9fa871aaa74c4f0e32845f3b33b2e95f451e3f0f32b88d7e5eaa992dd1c6f0b00823542ee4472f48b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6ef6a55b183a081f6d908548832b8f3
SHA1967354fce7ee04bc837259321b92ebd94e9d0e4b
SHA2567a1e8d8357f838abde275bba40ea8f2780eb563e5ff45352d720d045c4622490
SHA512de7fedba833cd85e4d0f463e65cee09cad4463fcd4439d7fb41c10481b44ac3b16e93e727d00d221c309e163028b3a18d4da8a5a45d2a3ed0fcf204177fa7192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ba1b3904b5d92394ea5320cf6d342e
SHA1ad4914ce52b1ab96a9727591d9d361ab1570de15
SHA2567c149777075062bd8484dc8f2ec3066225fd21145a7de0e7ed2d783cc2476a30
SHA512b24f64713e186e381390af281c4a0d9fc9ff8aa53deb2f21b7d39b53d99f81bab2beaa23981abada4b6e85b4d5acdb7c78621700f07785891183b88a4731577e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504550dea57fa0b3d122fa7392c02c3a4
SHA113541482653ebc3274b84c4764f9cfc0f7674b25
SHA2569e8682dff418bf3f2d1dc0ea88d0ce01e6ff3e4d4f507c27346b2ea7148f378f
SHA512098cdc5ccf68dd6fa96d0f701882457c26ff501131fa187be2a45b90208f9d8a284526b90420ec62c4f1e82ca6c36285e5f8abf00095126018cefe6b601be8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4d8689052738c4c79e9b6416273e211
SHA129436d94df52f41768b1538b3d3347a59e98dc93
SHA25610ff3a1701870abe28ad5dfec6d2eddfdc52117ea86fb9c658de104ffa381f5d
SHA512f6547c67f09905e54b5d19bf34c8328e6ce9c3bec85306700626542d00aae6c0873b1a9917b8bc8df15cd335c7af628b91de04b0597473823f911e0e60917893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c87b8436c7fd917c589fcc0ddec3043a
SHA186e5a466248acca7ea0f2b593ac1343a0e467d65
SHA256c5b58b6071a9c76ac4283b654f5f4bf28f04234088d3526853b1cd1c79feb2dd
SHA512481af8d09fd7ff8b46c57e4c0b9ce0b2a9d2ec42376682e62a4eff46b4945d28d23fe5671defb8f706b8032ccf1325ede28836bb6c4b42ce0e51f70f766ec490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b163a2d6bca8ecfb4d41e226d0c6067d
SHA1254615cbf53032b3c74edfd79004cc4f5619e9b6
SHA25694fd22fdd309d9b7b1dba9cc321bcfad60ae3901080b0a9f3d570227269e9ec4
SHA512c2a70d07aa33957fa6cfd4a491beafbee0a795c9258d370b7f267f3101e5ed669e82b0995643118641ad723941ac628ecc594f65621630ed51b9a980d9b818c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08029903efad198fff30016d9504d47
SHA1b47b50e5bb88c2200937c09d899a7a67dce3aa41
SHA25615ece09d662de891a8706127619cbcb181de064cf67cb49aeb5b2d146cf2da14
SHA5122f2255b2bfd3dcb22ba1ec00c468e3fc886ec77da67a778a0e08617d984204298cf20b609e7c745af4f8fd5d38645727dfe0ba0229b09cd11bc5354e50167b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3e8b483a2d112baedfb89f5c308e57
SHA11f52cb089d5587c0268b0e638321770966d72063
SHA256951eef30992ad04bf1d179ba60ee216d413cf6fc5a720bb92203a301dd685767
SHA5121f919fc142c41b30ad57f389f0a6e86a31ce4cef7a864b33998b2736aa17889445918c99567cc049da697757129fd4a5cca85374dabaee215f8ab8dcf5e69741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d630b6b0037016a9c73c031184176d
SHA17ce95300d6e7954ebd840271aaeba353db974dc5
SHA25666d2d7c26e26ae44b0f6f071024c0c741d21439796eae728bb1332404d67fff3
SHA5125810db5aff018021f718ecd105e9655dcbc6e16cfb449afe57621a83c97bc2634a1f30d7f04a87b09d93703f26be95856e1d394bf24159eee13efca411f08573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aa7dc4247c60543bdccb1b9a78f40db
SHA1a5caec87f821db17b09d3c7f6e7b592ba7829db5
SHA256b1060ac2cb20d5d956c6fa59720ae5ae6bb6de1dd74546325fd2a15d232be2bd
SHA512734d2e1e1cb4709198b8f5c91c51df19454f565ed057a209c9c7807d2dea119c443ed75096f5f84a9b760cdda47e8e3a3b6398571e696b6ea2c8fcbe69ee523d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c045b2ced31d56693cf909409e065b95
SHA1c6e743831f7a8dfc596c6e9e12f8f32f9c346857
SHA256e1dfe6b2a673148e9abebcb506c1a276ea7de720d50b52d43032a95c051f98a6
SHA512d12c5f9fd9c7e0ae1c2cb2417f0ee0d2d61e99c1735a65e42d3e94c48efbcfb85bbc1e5917fac003ffa87b74322df221726ea1582a3979aaac69b9f2b907cd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94f05ae00083e61f08f7c6eaeff93f4
SHA1eea04c50ce2a26153669eaaea517f38942bf8bab
SHA256ddc645b6d5d84a5d6ff4563e4cdae711caade9abf2940203cb18c57dee58de68
SHA51262c62bc8dd8d8879c516df2cb76e2b7eb39c27c3e3ad75e385423e38e521f0b514106447714bff763df570ec56cab4add4ad14ea78475d464c7ec6356b96a163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a4cb0623faacafd2de54eaed94f358
SHA1dedbcf388f608a55d5401918291f4c3d7a289829
SHA256ad325d1c05763b507074e02dfe124ff99a76910847c18bcf4a8905987ccce395
SHA512890bc8f6c327f7c79bf9da125164e230d9fb1ac553fbd889cb1a5f53d509d5563a4322a7066954b738442438f8cd08554fd6fc00aeda406610f1ffb57b2f671c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369c689668fe1c4e959fd7a208ab9cc5
SHA16eab8dd984698372779869c1c76671ed546433fe
SHA25684a77c97c3a6992c50b3f0aeb40d424bb8366b01aaabdb147e8b386e8b9a9291
SHA512dc56c5d35cf8801262a13e625a9fc4dd3ae6bc31c52ed12827a88036590c508fb76e81b98d6c74ae1e39c4d779ffafae218d9ed1664a27dda689a713b5be59f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b250feee5dd108bfe1dbb1d74b222726
SHA1db8f6f848206735f773106aca5328dd3a6994d38
SHA256feca0d495b7b52a37c1f362122dc896cf58f635f23e519e67b08250b87997037
SHA512ad2f77433d3780a5abd5c674e1ad0156a9ea572a2f04be81a60507bf2000259269877531f032a523469ef4bdf9d29b3d9a470d62aa2bb5f9d462616d94bd6cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d973fc39be500160e3aeb55320209fe
SHA1ab5b3bc132fee4383412c39ba431580028fde440
SHA256327d9ea88dba1a1a16defd6e9f3d996456dc4a7d811e84661b2085d34c275bae
SHA512765073ed819d24e2585c9eb698a593d426d1e609788a226f34da72d1c168cc17224173accb4ff3d77b47d3f3626239e288731efd95440423e04d1ffed26f112b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3326aa629191598011d5107322f1781
SHA15a5c4eb21677048f342803aa1f0319c9618c0c2b
SHA2568b7663a671fb4a8ea9596b588c34a31f62dff52419fe4d88c3589ad607630e61
SHA512a0ac0221420ce31b7b2dcfed709cdf43161ac1feafaa6694b56e7a24889cbbbee89cbe04e2f7cc3428224ca30ca9dc66b83bbd2403680c45f45e6bee93ce8275
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a