Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
696a04ed14723c89a3e85e61af26083c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
696a04ed14723c89a3e85e61af26083c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696a04ed14723c89a3e85e61af26083c_JaffaCakes118.html
-
Size
16KB
-
MD5
696a04ed14723c89a3e85e61af26083c
-
SHA1
abf5abd55f13b2525e2d72889528aaf24f9ae0c2
-
SHA256
a015176b3f0b8c3854e567b18a5c5766a7775db3a6ce25949b8b532a3f4278df
-
SHA512
dc6c39cfdd9a22e400d8dfdfc4ebe6c6dc236b44a20e2f57af3dd4536b760cb3b6b35368e4c473bbc6edea89cb898c91401ebe6f78d0934b6021944f3f5104be
-
SSDEEP
384:C8OkjHav/Z/vU5VFegTgmgXgMgNgegcg1gp:CvW6v/Z/M5VcgTgmgXgMgNgegcg1gp
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d4e616b7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a500ba1bfce2640aff2111286c2af1f000000000200000000001066000000010000200000001302b2b0802c6440cc140631415582bc8a279845eafbe743e96cedb0daab8daf000000000e800000000200002000000094a955aa54f3f3ddfc78a0b9be83409a67529f6d4eebe5fa7f4431f79f9e74e4200000006065305726558bc112042b071f2ad75f7373abd0126b68b2790cfff17fc46b24400000004a90067fd6da18d04430a624a326df56f12b840027d8ba05e81caa7bc5e5f32fcd9b441319e88868944e45b3d0893781096b55aeac543a0c91091a829667e898 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FA20381-18AA-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2868 iexplore.exe 2868 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2868 wrote to memory of 2148 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2148 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2148 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2148 2868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696a04ed14723c89a3e85e61af26083c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ca3a4c9e0b9d6d68f376e5f19cf0bafd
SHA1999be3d417d47b608aba281975de8f803926ab28
SHA2567686acba9a477d3a4c729b5d319f671de9e94ba95dfef28db18162c8eac33e66
SHA5120b836f6ca19229333c6700d1dfc4855320df81d7a5a2f265e17d65452e8c5109d057c0f79b5872c3f8f2055661bd22bf5f2630311c66b05135485c1499c181c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5678e2306591e1d45b7095f3e09ec4014
SHA14ed4c2d90d99276ea6fce7a50a3f9ed4d4efd6f3
SHA25631c3c2659cbefb93db2290e9b020ea465eca85c724756cea2742fcc75f44366c
SHA5122bae75b86579f18a6b8a7a39c427d9dab8c13ead10c2c2df0eb06237ce708af155717674eb106203e231f8a6b527ad7f2536cc15b6bdd74d402ad8c760619c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c0a7cbe69a047251272103e4460e2d80
SHA1d9f276918c8d631067135c548da21a853bb96233
SHA2568ac8a22bb376f771c8fea425681ba2294db99e9a27a91c2febe5ca2f4d11420f
SHA5129d35fc051debd5a09ad74cefe8c0a3c77c4ea258b4c6f85a9f92d7a2a536d9e54feec9863eb7e37adb779b8438e63a0ab1f2386bb07ec5942a5ae5d99769858b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD583d5c3f46df90d0c2f0f87106c147dd7
SHA155fbce40c7b615809b5506dd8b6fa1f93742990d
SHA256a8d8ac2bfee0c6456da143fd687fd92893f978229027c70ba7bab62408675063
SHA51247f34d6b9f55b459ff01486968bc6976d7bc527577d45840cf6aa2edbb80799febbdc80861f6fc2a413863473550332a838da1e885951283698094051f3223fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59cd18ab22eba1ca0ca860a34a4b1098d
SHA1cfd5a194d3ce0813a094040faf94f59eb04bd51f
SHA256562aa529c68b42a190eef707049da57c273631848fb8d68f3e09b6ef935c8d15
SHA5125149208f1a49ff0473462e1a970a59ffdec894625269adfcc67d6ef452506218d602ddeadc93c195e16ab9e7843fc48290129c4971a68f27ec99418222c12bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5956efbb81b80cae1325a857ce09329df
SHA12220639d22ea94520dbaae1091d534d6bb5a179e
SHA256f20200871b521b13b5e595c390461ef30dadaef251dce4c97bc61d1592e0541b
SHA512dafea262c64f3cbbba7d8b6a0156a8fe6cd27354d37084425b55ee89f8fcbf22d96ce2dfb2e93f178970d631edcf3cce8fe9a38bd39c5b1e5cb233095c41f720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD509d97016a8ba6e7261e82a4f391dfeb6
SHA1a9118369a64939c37f40f7231c7c43f8fd1dc20a
SHA2565cc8a03a19a1f6dca20015e81a05ee96a786280f73b179e050dd10e94241958b
SHA512b16770691f123d0a6fa6e2a1c7ad2bc1cd7cfed1fe70f1f82a85e14f4106e33eb9f6183b3184fc4480e2b258b87ca80dc228bcf962533f38e815d0c359588874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD537eae9adfd1e6d7ed027cc4fa8c0ba75
SHA1d270da7ee5a3e34a220696c91e260f45e9ddd614
SHA256ddf5670f07793365e35998e0aad08bd727ad938e591386647891f19042c13d63
SHA51262cd577f7f4d045ab980c85ff814dbaa0f55a390e3618f0a04893cec2a76275f78c15ca08aa3ea6ef27ecadc5658dd830c45a1ca018fe9d03ca30bd21b41d99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD572ef9bcd83fcd7a74e2b6c4a43be33f8
SHA12295db0083e719ed1b07aa0fa5da1cd21bbe5848
SHA256e14bc08bbbfd34590e6c6333e837d4c3dd22b477bce3d2f318d3d6e9a17bf924
SHA5128dc8d394cc34b92c99fe79c78655417d3231dd6a7b851115f9649e8c5929423913c1afc9063fa207f09edd0524eb0a1a273c74e7ef3bbff78c6e9b91291c8569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54840cdd20a61dc24454f04a438ba584c
SHA14652e420a357f516582884bea321e2f3d584602a
SHA2569daee22893556ee8db8b9ee49f874438b78e093edff22f4f0e82553641a3c118
SHA512b086a33293b0fa25afbb43a9c3cd6c3febf0df393afc8140764f107d1fae422fba6b4a7bb30c4f25bab7951d3ee5474f70fd2f532f2fc7319abe8edd76ae1a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5abf5789ff6629b46257e62aadd0e6d4c
SHA1c03a579bab5f62974b945e438b61f42a579a15d3
SHA256fb98423c10f14657dbf9c77061b673f0e3aa932a5ed2b5cc31649473803ea319
SHA5125f28d7f133c550a4068c56207b8305508222d118abce4dd39cf49eddc3d9468dcbbea1625e9e7a043ad6bdb025c69ba48846bbba1bce09bbd5589487a398e500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f61c028540e2da6095dd53de65e6aee9
SHA1c09e52cd644d48154d4150431b5fbb1bee9af0a7
SHA2567d74281186687f2815c926f71bdc420402fb80d404447c65334e3b79d7aca739
SHA5125a9c462fcf4f0fd8e61fc7a3981b38d648756fc2476cc59e208fe72f80451ad33351e41c332fd6f28979118d1f5f7c5bcff3fe26a145493fd616f8798216ad52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f5bc4fbd197c731573a377c81f9bb55
SHA17428ba956007237f1258ff7204ffb2f899a1a841
SHA256ae4d9959b1bf8f53d86024c318c78ce957e48031edf40f50f9a333eb32735600
SHA5125c5aeb782ea067869209dd12cf04a736961e737217b9600401244706c423bba8e64c421aa6754322fe69857255b6e86fecde617dcfa609fd54a19dc5afa67ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ec9aeef60a56812adb1214d1b7add67a
SHA1d297d4fb70fbbf5c51a8bace5f654a1343645a51
SHA256a0d000c4a81ba4203bc4509ab40ca22328f873281b09abed38c46cf3171c6618
SHA512a05fdc9ccc8aa1ce122a016c6cdc4233f25d823d80a2f82b402701a740a0a77ed73aa5deaeac9fd3242b459c48fa5afdf197100adf1b609387bd353595a84d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af49ae262f29f81c0f01fd9ba2f3e843
SHA1d29fef8b29c3387f0c68c60988e1c980ecb5d2f3
SHA2569b224121c3043af3681a9824341548642eda1acede0116f2bfc78a8acc470eee
SHA5121dc9e556468e44f0cc386512d6fb69ccfedee18e1e02c634d561c329512821e8c3289bff702a6ba60bdcd672569ea2b47b0f73e7da7d4456eaa23eb38cedb81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cde9b2be6c2948ea3c7b1ae0dda3e5e0
SHA11f2247c2f66faf5e6c02aeea8e9fc3870c1ab3a6
SHA256a17cac9cbdbdf2e60b7a115078d528e29d5c3f2a347a4ea89b7720d46bfcf40a
SHA5129a673551977ce990daac6883fdbdcb3a2b87108709f455bc31581d7da1e7d4a311710aabe6640e0ec6f3fb5af1745e1869c225fa23995754c9e851eaea65c771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d13f1b42048dc870b5d69ba0cfbb3449
SHA1b5d5646a3214edd5608b2d378c720099cf50a970
SHA2565a7059bec7d55602f1ddab4884f9bebc010528a8f72bbd73a9bb497168aeafc0
SHA5128f3ae256ba2d39a4c0f63d8990e12ca083ed200696155757f51160e863cf22d7afd91249e7e47dabaf6fc7e0a7f90938272cfa7622313dcf30bb58cd9a9f6e2d
-
C:\Users\Admin\AppData\Local\Temp\Cab3BAC.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar4093.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a