Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
69683644df804b0212c828c4d49b3849_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69683644df804b0212c828c4d49b3849_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69683644df804b0212c828c4d49b3849_JaffaCakes118.html
-
Size
111KB
-
MD5
69683644df804b0212c828c4d49b3849
-
SHA1
b101f04d834c227629525782b7a694fcda4cf401
-
SHA256
9547add07bf2f78f6664ec208cd712dba3d5378ee4c3b3a00d91e540e7157562
-
SHA512
928eecc228754b03b98e54264bc6eb7371aad3a68f08d95bb0a8e20dbfb007d28159a7564d3f0d2cc83fabd1b6e3f29bdddd6bfd996f7e558819486a8c2aee5d
-
SSDEEP
1536:3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSU:3yfkMY+BES09JXAnyrZalI+Yp
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D155A7B1-18A9-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07e35a6b6acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000050769bfaa4c49d478ba2e3e30d24b48b0000000002000000000010660000000100002000000007a71cd947b104d2c016bfaf6f38ad88633acc0d899e48495c813ceaa6e8ecc6000000000e800000000200002000000002e374235802cdbe32d10f0b7b7c03b1d7d11d5bbde2a5af1880615f45c0bb3c200000009863bb8a0853cd413fb997f45482b8649a15af7ed5b8e67967c0e3274a63110f400000004b699e8c36cb42af2f6d39bd086ef2168f40f9371183805ff8153e9b933d72c3a4e468d1ccad7499d428a620c2119214508244f855a85b721a1af0e6e43ad148 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2232 iexplore.exe 2232 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2232 wrote to memory of 2688 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2688 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2688 2232 iexplore.exe IEXPLORE.EXE PID 2232 wrote to memory of 2688 2232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69683644df804b0212c828c4d49b3849_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502859343bfc9ea4b5f5cbfe715e7f1ec
SHA13d9899e41d80518f51f5fdc3e70ac77feaf4e7b5
SHA2568aac0521375e369790da6d3ec2e139f35160c24a87e87305a40f8ab76262e2f7
SHA5126431bf1a906b6aaad6e0346452e479fe34b6221a14d9e80d2a9bb5878c3bcac9c8ad417fadbd959ff43186c6964b75da9812f11b1ee995e702e04c35f138174c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b21414eaa4c1437d40055063bf081044
SHA105c2887d0ce73afdac739f108ec85b5687bcad77
SHA256c4a69fc9cdf2c46400df37fb318af6d5bd621b357c658a61532c84c3da5eb9f0
SHA51269f94ef469b4a4ef7f6550034417082563da87e213a7ab49b48200b05770d78f18234345f83bbc3ac04a530638055939f9bd287c7c614c6dbd266b525ebbd610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd917310fa29c5d13e21f02d1863eac5
SHA16e0a10d44628222ab5131e4fa97176dd00527cdd
SHA256c1800d9b5b8df96795e08b39b1832f2bfd2c5635e9ec7409ebac46d159ac0616
SHA5128f5b002eb87d1e69e5d1aff760d8656a5459c2e5c47af598169c176ace4cacb8d51908bfbe1c6d5c4765fb04b92a7e7105fe7ce5ee9e4fc6e6d379c3d70cef42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4fa943f3a4c0856aff7d43ab265436b
SHA1fe915d10b4a41cde9c5771d4311cda205ef79c09
SHA256b0b775941775e55a1d4e058f4cc567b54605ef3c006d95c05dd10328158de5af
SHA5129bcb631dd07e8f9b9275750dbf5fdb20bbaf68810d1ff7d4c851c7a740111cba1474164a2a76aa03ce3c66ae40c46d6c6aa4eb88149bcd4e086861cceb597980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55663fccdeb5c012eb3676ddaa7504369
SHA1d8472d6a0d16a7926919bdb1d47e5e1e9dc6fd8a
SHA256c07d6c7b8dc56f7a9039781dddfee8a536ae7302352a7e82919064d385cb51d4
SHA5125326b33b14dab0be2f73eb258028026194b39d21ad7f971800e70d9ab7252dcdb95893b624f3e151c6ae90aebc3fee69525c6a171f0bca0a1326a38d22e96bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c78eaa9b98b32e6e5b7151014e7611d1
SHA11d5ccdeb78d509a82dd36f93dae004d0003b4948
SHA256657bf1975d8c5b4fdd57a78cfceede8261ebc9e6e208d834390e26005e3f42d0
SHA512f483dc812818a69f345ec8a4d712b4a26104a9700796560fa8452f64011ec9c2e9c1f4d783af11bfda865ec3b3b9c9e990a2690fc606e3e8b6701fcba6a5fbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52352043df35dc64bddfc55a37b076b77
SHA12ca0705a40cf733319c591064e205ee94c35b471
SHA256ceac2a7ab185274cc8d81ce71005221ea5fb088a98f73b037ed166d1600830e2
SHA51265637291ae6a604fe27c430d77bdc597f58d5b85799502b0ebd1cc85ec0b9be1fca5c14587658c23f23cb4aa7d4ada3c3c521b0a2a7940555a442e026189c1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e81265257de8c0f29e4b2737f25092
SHA1c65f71121e32e3f780b53a753ede0dd4e3858001
SHA256ae44b611ea9c431f724b169c62bc36101fd29404d44b7a449cabf69df9bb551f
SHA512426a706d7b49c1fdb28db222e6afbbe22a611e6f0e763018d73119680e4bd6150278034737db8bf9ba51f6b447b2ecdf7b6bdfd86a7f0e73cc182bd33777da2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1354add7682fe499b12b78fe91a4248
SHA163e44211a8e1dc2d6d09c46ac1307e9e6d089c2a
SHA2561cad5c6046ed1144739476afaf4a13de5242a257dce8d9054f8141d3ac0fdac8
SHA512d73dd7a53e056cfaa22f1ffdd9b57d65a6a360442a2a8b8117fc3552c10503505fa5021ffee728e6d0fa4a29921f25903433a13ec9b56e077760e110d81f89f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50611bf9c71aec1d5fd825c15a36a45b9
SHA16159407662724f7720873f05778cab392a27e278
SHA256b86699ee5bb269499e6a5ff6a302c2229c753f2deca6dc5f47b94abd371d1385
SHA51251d114db1d4261eda5efa035ac83d9b28584b25482356703df14962a82cfbae4362c185ca5b4c6ea39782104cfd37f3e795f82a695b6981dfd7cca3750bae00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2e1b2f40e8683cafb3fa15113d8a7af
SHA18c8b05b292925171f1fb60e9d5a4ede3396253a2
SHA25616d6be5a135eae01c7b228fe23f52e3dda39e1102745cf94908e01da509d081c
SHA512382fdbd0fa61b44353a25cbb7afe1a4cc24c3988c0888cd84a50999f59f5c90b39a3a05f0fb15a94f1f56e23384c4676692d8566a30d5076607f456983c3e7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833b18dd431d1eb2b51896e84f89adab
SHA103ec3136c37ceab4afcafca5e42e10057ea2289c
SHA2560b702591ad2a93c35d015ef9376fa26b0c0dc510aff9e70ac7699956a4234fbe
SHA51276886b5b244da3960abc50561c080c6af2dcc8f56b6c4922711c5916ad025f76fcfdb2b6c016e54b3be17b3f3e13ee7bf236bb1a064a97a632374f8cbef1eb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9d0d9fe7ee10cb8c89f090ff4a148d
SHA1096cd0fda6852425d47e8ec06a9723b92018bb67
SHA256416ce102c73a7cbfa6b4c405a70d794affd44c1665e4ccb0fd8e1ff2595dc318
SHA512cdfd97686a964f3e7103b2b864c45eb7d844f0778b180bc2a4f0e9f6df13d043e6316862fa45025cc8db499a97027e78958b0a527a78cbc39cac637e9f049fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592304b5ae22b0dc6efcb88ea706bebfa
SHA19e8acdbef5fcb4500216eeb7a88686314ccacf95
SHA2569ccdcb6a79462d2b128b786d6cfb3bdd32b5d39bf4db32c1491aadf40d5675d4
SHA51270346d8b46c05c884168c0a3fb7ffc2f26dab8256be1f78afdb8f3098a1ec28cc62a3d3e3aec8ab5c3585267928d61261ef0e61599747e2dfb29763d51c1c5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535fcbeca620dacb1e3f2a7456d6bdf95
SHA1ea791393cac05f00883eaf42b96808ed8cfce33f
SHA256ab1aad9b21ba95fa7818d6a134fd7c9afb5ea198c296e90bafa9edc3e5775e67
SHA512fdef6d4ede136f57a50a682d6d96efa273f24bcaed11cbc5339658adeea289f6b36606a0a14ffacee0911f1fbf29f85e8a46d90ca62f35dac5c50969e3ba07c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b541febbbee10cfca53300a7504837
SHA1078ddf729463bcfe05a47c4df766c833e2ccb184
SHA256c2d131391834be2df2a4432ad29e9c8f27c32fbc1a38c5d85b474735fc52fbad
SHA5120773cfbdd09a566f659f6218f6d29d846e4e782601a35c1bf0d63962c5462fa30efbec5dedb5835c0aa71b95b2cf10ffedff9ec2cc843dab84a2e0ae0396b113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539bbb15667635db661615367816e494e
SHA19b9245a86194c611d3eeaa2971ba7dfdf2b2fcca
SHA2566fc2e34832a0db4dda4ec85572fd5c64b6f54dc1ad570183f0391768612be708
SHA512d131b28c7a4953e6d97e2f6f90e35a3c5125395cf0cf2a7358ca87b2c56d02002b6693a558f9a7550fae274ffb78d8971bda4da6ebcf685eb063bf20bec7f1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee48ae945058802072154d1d0a6922c
SHA1189d69bef0787c8015b74a5ff25c1593cc805ef4
SHA256dddef4bdd09cd192aef92230eb1436884ccee927b5c592a13561e0178474ab85
SHA512e29bbbd296d31ed8e5248deeb0ae6f1f2876d9d9b128309efb2e7af4085cc3d39affbfd572a89adcc7ffedb4779b4b0b88c8051bb88a222c672f46f09f91e9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da69356626638451597086542a82def6
SHA15635d5f12892b9733a682f6cf72bd84ffc0fd26e
SHA2567069ad5704560edb0a65ade968d1c86dc31def3fe8a7f76d6c76a16fb5176082
SHA512f913cfac538590745741de476cf82f5a06b1171332d4cb2a52fd781bda3ee104dff7e1ded6bf9781e694254d33ed45cd5e4e5777a051a3f7b2836f84944913dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a