Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
6969ce9616ed3cb960d44c0a3a77b3f8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6969ce9616ed3cb960d44c0a3a77b3f8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6969ce9616ed3cb960d44c0a3a77b3f8_JaffaCakes118.html
-
Size
67KB
-
MD5
6969ce9616ed3cb960d44c0a3a77b3f8
-
SHA1
6b2b9c43b43bca8158d31486410be729f9c7c3c1
-
SHA256
25d57ac2f6e729afb51149fd866095fe67233f0f3ef0298f708b6bb2610be26d
-
SHA512
19f5a838f0d19e30f5903299ae3c46bde7c2bb1407f8f57444f96fd017e2c92a10c5008d82c8ca0c8bbb44c26cde57d818b49cd9c05ffb7d44f8143d65b7a458
-
SSDEEP
768:JiyZKgcMiR3sI2PDDnX0g6sq6eFUoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Jb9qTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f21b2b410892a0a16428dca1b22a4bb1f245aaa141c7e1b865b10ff3bc549d8f000000000e8000000002000020000000d27dd2afa57949809c6ee40c836f525ab8b29fd8ff4b52f77b9a0293522d820b2000000045b5599095071c3adf03c0e997db16bd8c38b6f193fd8666cc2ee704d2bbfe8940000000171d7f525eef91195004acf589c8292c2183b4766bee04e807f133ff080d0a30a203dae37887dc54205e5c9427f5989c12d57c62023cf34519f7a646c11dd45c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{346025B1-18AA-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f72b09b7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2716 iexplore.exe 2716 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE PID 2716 wrote to memory of 1940 2716 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6969ce9616ed3cb960d44c0a3a77b3f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51106938a51e6ee373c9b386df62570e3
SHA1119341e7f3baa76fcaca041279a61ce1a180e879
SHA256d1e98a809c525ebcc5ce1ffaad40c61ce29445acf165629823cab731e89d9f2c
SHA51234b9035ecfb7fb24da0d4d3b63361ad4620f6441f26ce31980f1f679aaf72e6424d75c05ccf260a71fe76cbce60911819bad712048b49f300c1a50b29deb6d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5120f9f46173288d8217022dd1d4d7c6f
SHA1a471bcce9667041a5a24a902d3c9cebea27464d1
SHA256416c9f4d1576efebf59827fef274fb872e7935a2cb13fbaef47f40c3b3c5d3e6
SHA512315068eaefd63cdb5dd91abf6f55211079ace1da6f8c6036ded38081be098ec77528aa1ae5c668ec2322b90b28c4d30cf877b2071ed0c4afda8504f8becf7474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD589d33d2da778214178005b1227784bb2
SHA1c74a44c17ece65d1ce30f177b3a9710991543bc1
SHA25606396641e826e3d0370093991c00618d46f3e0815be5704147271b5023630fff
SHA512e4a5fa57b1b009fdd1dbff8259b33d1699fd33b7df67ee043a6c8df6badb37e56a858e4c7c01e8d66626017c47009ae635eccbb1b10d57e3e84aaa0fc8a76096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5250955a72958106a8152a2cc29647c42
SHA1252796d5f4c8cedc7c7f537cd84787ba41a09344
SHA256969d61bb9b96909530d4018c6b88713d459838fe576b290859b6284e7043de5c
SHA512b639753d621633a58a14dee87a1163bf6b55aa4d14da2e80999bdd91deae65530517c34b21868ebd9324a2246aba7a7f23aacb44b2969c895237164ace242d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d23f1b108e6a8b20c0d187a93d52616e
SHA11a9d051a604c2f9507f300f7e8fa6380380a0c4c
SHA2569d72699095cb7c4dfeb8c84a480f8a4950d6c7a8f459eb0f1e176fb19ef6f609
SHA5129d85d4cdb663bb9b0739bf9715ea1de3ec66617fc4335b1fe02b4894c9ba2cc9b29fe32686ac802eb38d9cd8ca1661f98e16a762800b8628db50fac60568c516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d08b2f1e45f5679bc7c6be11a0971f7e
SHA1e0548fb56fef93fcaabc7e4a6aabf0c7aa81479d
SHA25665b88220689b7d785d9b2cb61c6e72eebaeb49cc18f68ddcc9b0d59fb4055b04
SHA51242d6b2feaab588d876cc2458118c68ee75f723f246584d0191aebbb8a7a443ef66a8e6c3cb70ef105677786a119e67f8a4d460fd2f8325f6c58da843a7d9f2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b4de8ac2174cde6dda31dd2e668ec993
SHA159e5076e9877770bbf5555756513528dea80ada9
SHA2563ca0187dfb99859fd6c832fa9c7e66db21899cb58bd86634a2b8644da6d688fd
SHA5124175d64c21473fe379fdbb3d2755238ef0729a9b99c530faed6a849acb4a9b10b9afb86a17bce9ebc7a37ccbc9cf946953d66dcde78e068097c03759489dfd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ab015c5ce52fd160407eef65872b6c59
SHA17f782fc50a125ae508ad82cbba64ba3b6c3c511e
SHA256fb07da62c33c1f4da50ec11d3103bc3c21d994f26db4f5f7c9984dfcf66c15e7
SHA51228ab1681abc69cdf24776d19c626074c868b6a476705e3aa1971c9b8a50ae828ccea98a9470cfe2cccdf06db215e1a55238b0c0ab18f8df31a2cb742864d7e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55e3f708f3316162c929eaa0971eb733b
SHA1ea5a6b56877d32ba121d59995202a5fba786d884
SHA2566b8512b277faee06101f69f0a019bf5d69bbd2cc195af9cc9823d5c6b19da2cf
SHA51223204a4f368fe1d1fcd397985f05c128f92da5c2229729085895d45f0e3b5adf071fcae7c1ebf0368bae27c9c867a011f1f4302dce57e0ed6e5f081b5357a622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51a260db1aaf8318377b698fbac67ffbe
SHA15c10e7e790c19d586fccd6233ec3a3edc3baee18
SHA2566e0956051a219889f4d8e9dee920051c8b629021373abfbce13311d55e887be4
SHA5123bae61d9842a806c7712af93b905eaafcd7afc0c83c269f3698bf588b88015fe1c200d1cc2a14961d5cdb3e9d7e3ca255f799609a954bf2da27fe72dc08ae18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f9faadb862d9b144669ff6787e450a03
SHA1e607038b88ed9d7fdc0a11f7e09bc6f5b29e104e
SHA256cac4b9936f60497d1022a51486bec11f8e9c6c634dfe404b54cc876030669283
SHA512013302b9472cf233ff4625238c53bf485174446455fd184e2669a205595c5d0420b12b5f0eed67fa5e071baba83177fea13e5223aa8855ea936f5a1aead11e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ed0265080c62e0ab04ee2508cf57e95f
SHA1c3cd7a2b646bc80bed9ef537f1f1c03f6ea9c6d0
SHA256d8b7ecdba78449250b9330ccfdcf636faf019884ec22bea4cd6376338d841d0a
SHA512c118e9bf49c06c0f66f0b89603e0a1c1185e692952884a6e492d1b0f387aba780554c4615e3cd6d893139854d7c2f0191967823e4c542b25656cd9049af59d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a3bfe60e9690b3ff17dfad8ccf1eaef
SHA1b5c94a8c5ea1ade8c573a81230c34d02a7d9633d
SHA2568ddd05f79f592f9f1942417fc4cfe2a640fd0739b0b67e40ca585dd55406ff9a
SHA512ee68685f286ae0dd85e9aa437beabde28711d821bcd8f466bb4f7250f4ef7a4e4eef98cc7edd9ceef9b3435466466d35b1bf96f5708b71548ed681f4604f88cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55b307c90a3b8e4b69f0873d4d7599e25
SHA13b2768bb66158771398650ce0f5d50dc789ca99c
SHA2565eae4c4d64ad6dde087bca7c858546a0ccdd7f4f723ada656d46810285fbca03
SHA5123d52d6a90f341825c235733422fc778e7f528a95d7750b1a44e39e7e24702a723ed8ddeea815a8805cdf4dcd4dc093ac12e71d8ccd25add4b3f19969ba4c506e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c9dbf2f26efbda8583e60b2779254e88
SHA1a2da46ef84b894990c52be4c5007a5bade003f8b
SHA2567e98f421b42c21ed5d30f1c9cf8a4c833b28e85134ec49b733c1ff81988d47d8
SHA512b3e2cb0260a8c205a83da0d657ff41b6ceb3080c17ac823907ee9041b50ce6dc0889a918402b1a06ffcfaee6998972fd17cb2ac727c7943a60424bd6cc0be0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59a1b61110a1509602cbeba4840ec3cbf
SHA10e4524e60637fde385cf20f13ed69151b464cbf5
SHA256794b017b14990e1b77b087ca8afee7fa3bea1308c4d9fa0ce0eca432a9021079
SHA5126c31d42188c72293d3c535d617d0fd30d5235f6800444de708f67c857fdc99cda8e35900efe5f0fd0f8ab7bf5902e83f2191048ffb737254459f40ce63221d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588b0343f916d96ef9404f0e81ca1eb0c
SHA171eab7d988a60ddaf0ca784bbf1b639f5b1a9f0f
SHA2568fa526cfbba32ef8becc20f2606aad58240d43c138b96463feff0cad5fe5ed81
SHA51245a6c188b98f173eed0ee494553b770dbf4c00931eea0e0fc69d8943554b6c9b20cc45c86de04dbb592ed21d8c637b029b2f228b44cb6837ab75a298620054d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55d169a05e9f1ef11193bf2aa7e8dca68
SHA14522a5a2611f70a774c756d9d8fe008ecbd179ec
SHA2563680996593f489a8ccbe1a5b2ad5e57c3102e6f9ec02248196aa40483da92bae
SHA512b9be093144415c6a82ec73b1e8ace99747997dd18eeb6a7e29d3e56cab48404f213be2d6ba51bef0fc4e7d51d811dfe4299f25be2ece28b5156701c02d1e0f9e
-
C:\Users\Admin\AppData\Local\Temp\Cab2ED1.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2F31.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a