Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
69693742f68388613972f31a83f9004a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69693742f68388613972f31a83f9004a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69693742f68388613972f31a83f9004a_JaffaCakes118.html
-
Size
4KB
-
MD5
69693742f68388613972f31a83f9004a
-
SHA1
3c8dd979591889092d66e345a87d023832148c87
-
SHA256
8691c53a41ebc478f7a9bce82ebd32a432824be40aade029f9748ce9883cac4c
-
SHA512
0933a4e179e057f79ffae40172c59fe439fcb408de415801efea59dc10f0a7c68f422c4f0170c9de51a4b800eb7b23cdfb9c7e5a2e4c7ae7d875a29dca690091
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oDXowbLd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11BDA191-18AA-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000929db8fab360b84c94be9dcecd4bf6f10000000002000000000010660000000100002000000084588efec163acdba407be41f7a0bef649a51b4cb537e4368ae4d30e107df68d000000000e8000000002000020000000fa2d1b8216a87b2bfaeca8d01644458e5adfb943c1eac9ac989d614655cec20a2000000019b2dd1e88b9e2eb4e4c4a0138b3cfa726674c27a39ffe845f8047f4a579c815400000001d61fab31b0b849788a41f40651999780b60177e1457917d2fb032b620b15cae742456464d45a11443c5c574bb3198c39e060fcd7c596c80137c804f87a81703 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805757e6b6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2288 iexplore.exe 2288 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2288 wrote to memory of 2332 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2332 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2332 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2332 2288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69693742f68388613972f31a83f9004a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d01fed617ea3fa38320b033fd19a32c3
SHA10850cd3f18da3dd3d0f5e822d3b76b74718aa5ed
SHA2564b7cbd801fcd0d337c9524dcb8ac601cc0ab3649e94267c17d2d6075e4ca313f
SHA5120eae6bbcae58d186aff95ffc343193eda3226c4644cbd27a53a66bbea90adbbef73fe6d0eceb4ef95c815251a6db5aaa9eaf28a398f31a592bca03d17aeacdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bf00b8732ec48c5625f75dc4f32fe7c7
SHA18ce2586962cc27a15b3f497e80c8390c8715a8af
SHA256252c3cad280d4505e3a9981386b4ee2dc01f2bb265cc84f22cee68d64e2e1e20
SHA51218907b2e50a62904c36902c3d7d1db3dcef63372a08b47e0629d7a8bd689e7927c1ad0234ee02ef46d9936663de82f82b3c3d842e2007062e27f12bb001691df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50a8da12ab1a1c4496cd2e997fb53b393
SHA10690c455d77ecd07f16dd6de0fbbc9ec528e8e7e
SHA2564b93ba68d2ef3a91d39843c53c7f3e93f01c5d88dac97c20dc6d459b65d13228
SHA5121fab94f332ab60640e1276f035448c980fe552a7713eac1ad7dbaaef5f67a4601295d3288e632fb7bc6bf90378de993cc5e84657ed8c6e699243a877ff33593e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b9cf7ea3e86b3657ab7164577ab8a53
SHA118ea9afeffd0b380e5330aed15d367d8295b3347
SHA256841ba158300ae11ba2b1bea72005b7122177ba961c7eb6c6db8a92ad929b30f2
SHA51275027b357ac54011ad8047dd5caf43ef1e227c82e6f9f900854989aca68789b73a6ebf0016a616dc3c7af2e892f8fd250755da4cbd3d3bcf788b56a21dfa0981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5086ea085b1f23c7ff0189de277269764
SHA1558faf241631bcab106452d5275f04c05ace6a9d
SHA25654341eecb0671d4af4f5c1dbdcb39d0a5a856231bd6a39d0bff0b2a0443eed78
SHA512e55b2fdb95e43b5862bd1ad6f79cdfbfce20a3b5b5b7eaa22429452306f87a90404c4b507125c75240b8e350509438c462bda7208da93f46a0ec1015fbfff3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50d07e2444c24d41e968a1998d035380a
SHA1d3f8be6a552f4a2ed13e9ca69761547708160677
SHA256c8d6e769a39806e4c1d25cc55236c0f90804c0c42b20f276f558575dd732147f
SHA512a687f73e3c88bd914044021593a80962cd3fb1a6c71225bc1ed4b266c775979077764148104c0c43236c62159f7352fe67a7a5ed1b3d46ee43c1f368ea1c7128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f8f3aefa62224174b8c97d87e01c1f5f
SHA1e0699286cb132bdc0a50c7f89c92116f04481d6e
SHA256fcc74eff880d1ae1e0afc51bf46c8de214593f535d4bfcb9bc576a33c040a7d2
SHA512002e66ef8e14d36b9da558bd99cf24568f3f8d5c2c07b0f86a0450205334fc0fc7bda02d23c661b4427bdb3e7e49e95f221560709d0eca7d612c801651091a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dca25434b59a5a22b8e82b3f7c6c1912
SHA16b572c993cc18735aba2f172d3c81c9a21c7387d
SHA2566e8122207f3ddb1897af79f74a4183ee040f4a47c2d1f8b0ffadccfdad116038
SHA51235104a3db045c9df7f377d0cd5f54767695fa21a88db38244ff95642d28797a37ed73ccc4ce24449fec7e4dc94a52cd797655b9fd95c82b4a358e948aaf28033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD581fe1257a8717c0b1cef2704485d4d25
SHA1e3d073e63eb5203d383c9ae22929c70f066f8ec9
SHA256b256fe78beb257b9ffdccf5f220fc5a735544d803da3810cb306ca0d23a41f2a
SHA512e3238eabdf4bb793a157d92f4216cc7f9342c5ff120ca8c0dd006ddafeafe7eaf755265688936c88f5069816d1cad7737c53c2124b8370d5f557ea8b6a26077b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5880593e5bd0fc4cfd18c9a5446c73ed8
SHA1caa0af9d1ef4d1388471565aeefcc3c7f66dbe69
SHA2560042cb3fcdc63b2ba2e5ca9c889e4dc08762400ac5f338d3038dbcdd59c7a34b
SHA5125e2fccb3a4c18f6485dc19963ed1591986d2d9b98cf387b3bc8624fd84766cf6fdbeaa0a244d3bf11b9a3b485765abe648ec1bca4c3907a164e1144b5b2edb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d5409e218d0598266a7b483cceefc2b
SHA18beaf6bb46d86ad9921ddba64a473be330018062
SHA2561a0849c0a090f9e40b784dcf1aa6014c1c6041928567956d4a096017edc79652
SHA5128a9447721fb09aa7e56fda3df1d696e59a22a695b7dbbcd153de307c1f158a0fa76c1ec069768394125edcc39d3a2e4783ba7207d5293610b02c0a6bf57c01d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD560a4f7612afa5c876aa5521874fe0a94
SHA1d5cc2d32e132e4a01ca29092b78387128ce34d37
SHA2568e1cbdd92705d175160ccac4e1229572d0230d7ad19a8765340eaa715827be11
SHA512e5c75c6ec03a86dcc6fc4dbb264c2ef9964d974b2c9b68bd204cd5d7fc87347f646957f87777bc4c742f50f4782b82aa48dcc5ba9fcfd7d62ead3e5b360edc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e598bc19f76f3d8996906fc7e05f2926
SHA105936badfb5184d2370a7495394576da2a0a10a4
SHA256aee3f722dab7e0efea5bca4f6282faa68457da88abe29320e3e9c74602873960
SHA512e6c184a19441f0a6bfade725af042553926561d8678e03fb677f623756befed175daf91df59fbeed0913739aaf5bff538beeb5c2e15a49805df1a5b01fbbb9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a0aeeb5c0b0c1675a0511861c20660ca
SHA1082fc598eb78c4f1fca534cfd7f2f788a9ba9152
SHA2569b840f167e2b9a48797d02e1f6c04eb66650ac40dde50ae78f3f4cf3d704bfe7
SHA512213e4ccd21a18687da7c34afd31fc97c52d82e25ff70454e3fe72d58c7f9030ba5e6c3bacd13dcd0c2a55793b812b6afa5f28330f4bd9afd6b8d6efd8e858634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5112abc970cb9b0da21be6dfa67786011
SHA137bfb428c50d07dc05e8d295348557ab83ee88bf
SHA2568c6c1fede1bbc70b1c4aaf97beee8f479f0cae8c23dc91975510895b9bb5afce
SHA51292575f9d5dde39837047730af276a1236fbef7c9277c51051cf291ba1f943b2d5c58559fd2777228daa4e3dc07cc21de59bcfaf5dbc5d2726826124a5bf51a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD546cefe3b07bd9a611855040908c2c812
SHA1133bff63ddd501da7ddf71c9f0f339d5f67ffc77
SHA2563981aaaf803f1f1a8dd40f7a1c6cfc0efa247064afadc535b2b68ea89ed8d3b6
SHA5129edcf980a0460c710da2da1d3d2496351aced65edb2c47cd7d907d62c5c0007783d76edc1926f5a176b80fdd398cfa5af98d3e44fbe85304c270f05c9bdd6588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59915938692bc64b26f175e80aa40a5cd
SHA14c29a2e72384bacbbe30c7572359878b130af49d
SHA256b88d64d64fe7917484012f9b320ad6a82771f8b9f7f3ec1af26f46a3d9b05ea9
SHA5127cb3600651223fe6261ac8de98807148f018bfe9208acd80e936b4d196d247ffd2041b87d836475228445a0b19891d377aab500eb8bab648b0ddabffa4e960eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD572e846e7d946984005f926184d15e3ff
SHA1f019c42aa57d2d6ced6d1a0fbc916619ca7c7682
SHA2566fb6dfe34a19d5a047da41faa7c426e053f9711999421c01e2cb3df42e76e451
SHA5124ebc22ed8948a5c327c2e7013cbd6fcd9e7e86aaad232f3c58f0df2f124ee8b4b71f2ee07313e9f897ecb2e60b36503a0e02ebd34c0c3a5a58b4dd7b748247bf
-
C:\Users\Admin\AppData\Local\Temp\Cab2C51.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2D42.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a