Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
696889002411da7cefc760ce74da9ed2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
696889002411da7cefc760ce74da9ed2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696889002411da7cefc760ce74da9ed2_JaffaCakes118.html
-
Size
4KB
-
MD5
696889002411da7cefc760ce74da9ed2
-
SHA1
2a3d14df9367d42dedf5b2e12cdeee1298181a7a
-
SHA256
d799e72f5d7b5023bdac75810b7bd8735cef8a14c500e469b26e213920d784bd
-
SHA512
d7835032787ba4b08f17bde3de9304a5136232413afc5b5e208387206f393239f03d634c562c38336a7c9809530e4abbb6d103465fffb785d9eae0987cbe09bf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRlSXqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004bb9982b00f49f49bc5e1fcbb2cb9e5c00000000020000000000106600000001000020000000920890c83159761025eaa10dce72e6ecb4f7c9ff3a4a043cbf431d520184aa4d000000000e8000000002000020000000ac4dd81f1354a9c5d392f9e01c5ee6e9a4c08aa45bb360a6f53aae44b84bc52c200000009d6073b26dd6b30abe0545a34f21d5697e8d7ffb2a8a6da794d2be476895a42640000000611fe2f46cfbc9070bbd71af150d97ce6c8fa50fd2d95b4af3e8c970142789d91084aedc36430385bf936aa8a21d8753ff6b2cc69526f5b91bb2300ba676d1d4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d361c1b6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECDA2651-18A9-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1948 iexplore.exe 1948 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1948 wrote to memory of 1064 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 1064 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 1064 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 1064 1948 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696889002411da7cefc760ce74da9ed2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211803d7c772feedd86fe2eafa2d037a
SHA1fd60d6e5fd5b151d724c32f1780954ff2f40bf0d
SHA2566c06435fd70466f89456cb9e24cc2ad9da31ed169a65a99a351a21f24080632a
SHA512e4c2287fcf56af5fd10559e9b8e58d6ef6a092b99a6d42e699df080bae38ecc2c84ab8dc35d708ee25dbb54f5fa35a66a4060bb905b6fa2ff4bec78885f2903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d375e083ed96c843fd7b2a44c712a3f7
SHA13697216b82bca1aa90856e33e4c68466926afdea
SHA25641a2433623d57063e18f2550aea3bf37bad1d47ef6c323629928c62a7176feb5
SHA512e73ee783390cf8ce6806cbde35b824a75d6177d11d52a46ebe921fcf2aeecc48469baff273d7d9c279407a546b396e57c0bf4af0545f7995b54ade8b41419168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be976e9a140424dc1f0d8736cc8337f4
SHA1aab1963059bb63e5881d6f9f807f2ca683b8f6ed
SHA25675d2182c5f05686b8a6442a06cae8bd8c7f6c44873c7b4ffed5ad34811a07a0e
SHA51232c7c952c6f12eca026284817c06b2cf8de23ff1d05d0970ee42e5706e10cc5d20a9cf8751fdd58a275192c98f10245a4126d3767a37ac6d18ed6a9307402846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e1379d05160beac63c68cba7eec524
SHA14bd727d18a59ab1671ccf25c16c93685b5ee5cf1
SHA25676a67fb6049d2a3b2ba1c48e75f74752976a6e8c0e1de3281bf93d89476f5179
SHA512293fb9bf4fdb87d17ca3a4631e63c90dcbf278576ccdfecc95e58baeea63342bccbf3a0c41afe133eba0425203a192b4d42c5b78ffc2ae05a436002e4c4094ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d1ce1ed6c049523fe261820ec233f1
SHA128a16e78663cf61209e2b35d00d2b749656c43b7
SHA2566f6c727b54ad8a86735d40c95a680e8b7ba0bffc01d40e50943fc23fc2200d93
SHA5127788019bc7af41cb49bb80f7568ed2a3ce3b08fcf7727a3076a662b17c796294b739952a789071fc4dbe03bbdf31a9bd79835d6cf5381d65a5a8dbc5e89bed56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe731ed39f11f207bb319759456b4a3d
SHA1244c344a94a8ce700951b6bd6ba2e488ba45f7a5
SHA256ee8039ace6868b99e204949785e52874f202d0f508be984fe0cce834d77852ef
SHA5122597452056961e362dd8f23d1006880ebc08209054c4702b13d2ed53ac17f422ccf4a232683b2b76b2564358045267fe408474952bdbd03f92c951fe90da3f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531c9206cc4430703a9d3335c00ab328
SHA1c2d4fe9963b5ebcdf67a4d03ed6898e870771c6b
SHA2564b3d8af605da251837ddb1189bf7c4e80be4312fc1de06b117c3e014444942df
SHA51244062fb5153a1eff87d3ccaf3583ee5467701d9f2b347fd8f7872fff8c3c2b8a8e747ee25e9b11c739febad27f0cec9db692fa5527300ee6d0a6d1256d578a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3224390e20f4cbce50d1ab3397d5cd7
SHA1ef1ada750affc11ffc6aa939caae86707fd5e6ea
SHA256ab150d7255f7a12bf26e3a6d4f2bb748044f119d57ea2b0bb5ec458decdc645d
SHA512b3d85175a5d0eeea9d52ac4be66c00b02e57c0caf717a1167e5b670db3171175b83ff358cc9f6a2cfd442580f7d29a3f67788559011bdd38e188ae77c01532f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a891541ed9356bc08fbe4d2b38a7fef1
SHA15da4620b593aef7c7d181911fe842704524dbf35
SHA2563b1bb96fdcfa742eb2640309cbcbe6c2830be7ba81a8b59013d2ad51f68750be
SHA51278faaf48069ae2c32f632545e808b2f14c28d0c124405ac06ee1d03eb48f3da617d05eb539b62cf7097e4e20e349d48562968dfe7a3a8074fb15d64a40c203ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c262039d2f64dcda8e42bba4b1d61eea
SHA1e3e599b90b02011d9d54e4d7dd996830664b85ad
SHA2561121d1ce6c36e72b85cf4231ff50b9836588f94d2bfd6cbbe04cae884057ed1a
SHA512bbc8edf0d1a0f6d9624f67407236ebd6ee9098318527e6cd666999fb0a0298da5f1fbbf48ca1ae847b897a2146b4de33dcb1684868ed4d089a4e976042575b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2e5440eb7da570096e010cf53a1bff
SHA13b3261060ed6b90c7ce737d062b95e9198b228d7
SHA256324cee9c2cea7b384311bdcbf0dc6ee8bd2ea0c5708b5da12721810c7d8cd334
SHA512bad13e94169bcf9d30fece72ec7c56829b424171268091d3938d55344c7574d9dc2ccf7a5bedaf9df8372aa3111664bd78360a5f6b4b32b3aceb071c09194f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c8e82d621de5d0b455835818a3689fd
SHA1a0620ff245cf61b729bcf62970c24a9520714082
SHA256ce12e69cdd285e246ba127286070e22c6bdac761442c9c3eb6e9334f560dd206
SHA512421af9905fa6a29911751471f6e09cfe3b8682ed3240cda479397aaa0fcfe8cfd4a86cff74bf680567cdf8bb3d07e3801c934dec223b916b063f0676f4147a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9aa133314f5dd65341a2de9fc6bddcb
SHA17c04d7a9a03be594d93957ca846c143b4dbf212f
SHA2564baa5a2f5d163a1cafeb17847a825084832dc18f6fc8629cfd9226ba00c045da
SHA5125f72413c7956cba568c9e046d75b878546f49328e05667ec56731d3b735295ebe74f217c46091891f0054dacd055db65f9cc4a0d2565b91c2102d292c759df85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2795e704dc241e4123781ea4ee44a9f
SHA13609aa3d3593faadfbbaf3c6ac77eec97738f439
SHA2560971ae53ecfedf26c64e03b3c35548011ddc861a254259a66b28065c53c7a1c6
SHA5123fe10cb0669c438ff567761e4c4d5c8a1fc8278a9cda33500fd42a260bb82acdd1ed6da73f810e3f4007a6dc142cd13d59522cb5320eac735461a74f0fea9c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f6d7396836ea08457727d76534132bc
SHA16fe8f998464440877d958167af68548ee6888e9b
SHA256fc065b5575c10b3774ac55df8261f8a5d2fc74789c217b4e5b6a6072e48fb11d
SHA512a4a455ee27170ece32c7aeeb2e73b48b77a586e70277505d781f20aff84805fbe1ae0d6246799fecc4ca6d7ef78af40709ecd7f34762be355e1ad3c6db5193c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07dbccdec067035f5841212f7da7ae8
SHA1cc046e28bc51c177fef7f9cca76fa0eeea47bd0c
SHA256d6a556b4141d3afe4f1694599867783821cbc9a233c37e836bf108c395aa2dd6
SHA51225e1b8809ad5a81eb674acb01965df513a0e05337b7caf270401ec913dac36ba16b554bbf62880f3c1135041532c7b728edb548bbbc8bb2324b4bdc16daca987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503186d1ee4c14ffa390ecc3f166177bf
SHA18689362fb23a1033d9f64fee9603be274dde5f0a
SHA2568dd998ae03a35e431b978226c52c87f42354cdf2c7a21c53ebf126b530fc4aca
SHA512258233a46d906ba3df874a54600adaa228bcf956b166530a3987024b510abfe194e2256d85ba4da07d4105e40f0839bde8e3ec0e01e149f18be0e7940e42f171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f051467306b626aadea3d5ae83a219
SHA1431fde12b8557eb4aabe878c0816491ca2e2480b
SHA256699dc172eca3ba3740e73515a862878b2c6f2cec17b6a554c4ae56099fa1950c
SHA512bb3fb10ac74d62286721e24640f00b26691053d20c2d36e598c6e92d92d12e6520dcb51dcca15853c85758035f75abc6cc3f861a948aa88943e7b5d05006bf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c68be25710489d08b094cca2176ed8
SHA1807e689ad67b905943159c888ba8785275805210
SHA2567f87b69a27838b14e76c75e3dcce99a229b1537b089b8ab99c072c7add2afe5a
SHA512686458ea0add047ff2b27e2b3e3c7a1049623d3ecb025560c16911a9eeab44ad72ed4c394069cbd5469d2c4bcecb73bbc383f2548832a00c39cfdea08a5816b4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a