Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
696ae5a13e5e6f207fdfc89ba630e9a7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
696ae5a13e5e6f207fdfc89ba630e9a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696ae5a13e5e6f207fdfc89ba630e9a7_JaffaCakes118.html
-
Size
37KB
-
MD5
696ae5a13e5e6f207fdfc89ba630e9a7
-
SHA1
55371917f72e44b467a45be4a95218c4097b780b
-
SHA256
b661c01e2dd72b84b686c5894bea5a2f1e568bbee24cef1ba5e4e84df19c38a0
-
SHA512
f6f3de31f8555f1d6f05030222fb594cbfaa747a847a17eaa62de281cc96aa08d7eb7b8ee4b643eab336855ce3c17d52c70b101912a95a1a0beeaebe659215a0
-
SSDEEP
768:Sa+xBUBlhOCLnx/ZjL1Nurl33dZXBHwoHj1/:Sa+xBUBlMWnx/ZjL1Nurl33dZXBQoD1/
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BF968E1-18AA-11EF-AB95-422D877631E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e1ad81b7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592492" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ec5c6fa65ac0bc341989884102e213a0be0f5e17a37a1042428eb17f98ab4394000000000e8000000002000020000000f55db7771e2c98b7ecdb8d9c3984a4be9d14a7b68f5a3584a6346bad724fa5292000000062816ca73a0fb4c04c7705fa97e771161b9da20d8846eb15c9cc686c65814d3f40000000240b950cd865ee8547ca7556ca8fa628ea1943166c762e8a0e8373dcfceb51123d86384922ab298763b699a6b327b7357c79cbb4a0cb2f58599cfdc2165ed31c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2188 iexplore.exe 2188 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 1836 2188 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696ae5a13e5e6f207fdfc89ba630e9a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a89bbae9b4717a5b9577bef7e9e40c8
SHA194c9abcf093ecda89823af823257cc06248797a7
SHA2560c7f162bdc31e7cc1157716f903d25e3bab867bbe0a6efff7b180b4c9acea7af
SHA51266a79660ae5557d752bddfb777abe0d939b5c52adf7038bce62b5496c583f5b9eea3e972b5eb45860c8fa86c06af0dfa3452cecf419ac285b313c74ad36c7397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66be51961da89ddeace30505b4999a9
SHA13621181b1289b3236c980f646ff60d789844f0e4
SHA25674a87b926280a335e6bb54355c3a06f5599ea171aa02d2e1f42152883efe0892
SHA512f4d57bfea6e325ebb6aff99f0cd2399d799f1d9e439bb4cfc520f7a3da270cef33ca7c9d0e8c84057a80278c3c31d94d79b553984f6bab7f359f60b0e9513273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d58a8913d30a19cd56d8c7f9d947e01
SHA1ce4721fd95e28b861c0dcd5c70ce0b10eafb9dc0
SHA256de520865352d44608c841ddc003f2677b9a0543b19eb873b05505062585006bd
SHA512cbdc8096f9292cff22ab1901413a5d5e9b3e34d0ede4f8db229837e2678a07dd6ad2975086947232653c529caf2efe6946698bcd10763c56ac5fe4083cfaa5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51862e80c5f673b7709a6eff0786eb710
SHA16f89dff177ef0c23d2d70ffd5710638547c8274c
SHA256a7cfa77320245b1b68fbd1ca66326f5c2f030f08c1921a18d6dffb63eb19c4be
SHA512474f500887742ac35c3da2dfbc354559f4893c19a83ac4504b42ddb185177e24cdfcc6ee232af9b64a1576d4fc7d78ea41fa74cded9928d6e90d58a3db7e0bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598869897c4555d7b4cfe669c4530cbdf
SHA13f1858115c45adba788a8541f555b19249ecc2f7
SHA256fb587dc46c0ceb33db5d5e48c68c975d86271ee8cec1512a977a1df78f6f7ebb
SHA5122d7215c0166fa6b16522296ca59c4ba362708443201d1ae23f62a04208847d6d83f55cf0c6b558e07b367eff03df59f33d2a7d0005821e365fb7992e324d6817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0565b61f378f60a55a86ff818f5414
SHA183be85d5f5a0e08f912c63a9a1777930fd99d379
SHA2568020b0481eb166938182920721e6421de086bfa9bfc1e59f580f6985bf99f7ed
SHA512e0141f5d609e66784684cc2351959050893c5b25bad047cbee4e6b3041c7472677a3ff5e599180b396f10b32e8fef3fbf6460c339d91e44701439f2627c1dd11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b533fae52a444f78376f62584e7b3506
SHA10fadc15489fe1046f4abadab17bef6fc1c03112a
SHA256cbe18ddc18d355c7e8a45e2e97dded66d701d15a3475c166f1f5cf1c29981ce8
SHA512e3bdd7395b46d6badd51167d2f980d6795b8f39a1db20f1f51b113c4626e12700f8a6a4c79a80ed0312c6c7d40e806c769ccbb239289bc3f1d482e8d7fc9ba99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcbea624546092bbf7efafdbfe8285c9
SHA18a7cf612546dd0620536e08602f8134573e38ac4
SHA2564583266b884c3d1e295d26f11e5f051000772bd9a7aafe34878b13284ae06829
SHA51285937970fb0a3269800f7157bc996d5d1c5bbb6996cfc9c355279d66cdad4f4a02d4ea455cdbd8934e7c7039138c2970a37778f7097256a689f7fb718b0e56fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d4884c85f877235e00193add82ccd7
SHA15d18204bc3dae4c82249d150d7bf20c28c92b4a3
SHA2562c8c9e9f21b2284152f87d1f662ad742a69adb81b3c7bfba31e4b22954c6be4d
SHA512b741dc656e35bf0b398325f210c915c8d066c2b98dcaaa4c5b0353ed6c7a0ab2e27450c88adc1c4e52f56c3953b5c001db5383ea9c1e11cfcc973f41638988cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f351c7aa597cc6a61d443a514f33a898
SHA14b353dd07737af149221f481e06575d39cf63a85
SHA256c5e2cbb25f25e1f33c1a4e985209c96473e3069c53cff8fd1c7699006ceaf9d8
SHA5128a0318f6747e492fd8c19efee311a0ebb180cd3c251162b7f349aef3402de265597518708b5f7bdc9a545856bd02c054c8de270c7fe0a3f0803cafd3eafd2b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c5567cc1be6d06d2cdc4ec8688050e
SHA1e1062f8ae62510374167b16f6a6cdac915399780
SHA25629807d233434cb4f741662b6a79a92f7626d7b3e23b5451aa8076463ec6bd5d6
SHA5122eae652950ee277d9efec4406007a255b70f7de73cfc774e2a3ccc70e702e66fd84fa377cc656413fc229ccf626dd79bc8e8d60250deee1ab922f4f4d5ed41c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3f031c51b9a2189aa36596959ebf76c
SHA1e71c0a72a27fde869ad25e7c97ab973f8601f25d
SHA2561ab51f4852657d85b20b9fa5c8209e9925e045369b04fe3d8730251295a22e94
SHA512d8212ba8d9907899001e0de4290af3ff612151ca07f70192091f53cc5c0f85ad12909376eed5933106da62f3fcee7b54494a73579eefba945c1613efb96df34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a7ed178393a15caa73673900c949e7
SHA1f6edb2e2da6cc459e5b369b52e05f038da7e29be
SHA256d411f7960ac474a797451958d6d78f832b7c3b44005b2271b4df2b023692a253
SHA5127248c0a268bab83b0a5e616172b85d2ec758b684163662b05da09b93dba33a6596deb0b945692532a960910db5ff61266ad004999a7c90c664c86be8f93b8537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533396d956c3f5ec1e1baa9759792c7b9
SHA1acef18a671c2f18b8b5cb3fc0224dee11cdbbbf5
SHA256a2f42d549156bbb4d948f325094e28639effb8ef6bf511435aab5b742bf13541
SHA512f4d1c07bb84582c38e4c0d2686260a8b561faea90d729c52d26e4c868263bd0c5362d5972c3e9d9b34d46c103b44c8a3f02ef04ed6bd913189a66f9998cc8889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3930e6a6c6dd03893a3554bade17f4
SHA1faf6f4fc691865c5fa27d75ad54250f30b075a32
SHA256737e85403ce85de3cb22f4976d3a6ad46d199c1ef4b48bd586170311c7750b91
SHA51252642a6813968a07e5b6c7d44e968a713c0d774d2ff827df750a6249039010ff67e3e4502cb95493975708e4d78a97a2913b8c7ebf9e40bc62b6ffcd2e95c65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0cc3ece931eb6add47be4e49c9a3c7
SHA17cdbf9ced7df8eeff4c6799943f809403c9a2930
SHA256681a6032282d6d42ff15472f1cfa1caca38ffa8cf76d10bd34015e3b5a8fbd6e
SHA512f4688ae549ba73c82348a840ee43742327c41b0787d7fb63036894640d4398f690cad6a988b2795343373c747d09ee1722c0e23a4dac9ff46128ff9654c28bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774e78c701859a6732a9718208624365
SHA1effe85e51a62f64ae6cd22a0b738d4c0b687b75b
SHA256057ceb678dfc9fd2368253965af757581e1363b3fcc94c17104c2a4cdb7608d5
SHA512d284146ba82b9b1f24b5a0a10891f2372301539e3e0f49f56d32362c79a19023ba4fe7dc2d888ce549df65d9e1049c241a4d5ce784e5fd2a5184621b81f67bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e335a8947616825d410d01be2cbe4fef
SHA13ba6b08736d0b4c9298cab66793ea877641cdb03
SHA2561a3ec7d708699313e0297f1ddb017046a02c3c9850079738af349578da482e17
SHA51200e4166a72d27dc5e302bcba7e40c21a5d7b4ae1323dec5f0071417fb367b98e5c9eb6b7da636e6f961a342d5702453dcf03075f26ccca6d0dd072d02f16f99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296d581665cba13c50c8c6266766773f
SHA19805c1eceef1e1077c6693f3f9b74c25a7b2d846
SHA2567445fd0d303be55319ab70825d8141bdf0ea3b157e10f00fc516b04e70ee5a74
SHA51277a28ed528539fe8c239399e279d0c51f2349277717ad6d36e9babee8a30581e4309563bff0a321ea588656d74cc7618ebe0412ea831ca6f6bf09d7a82eba3f2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a