Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
696e1263484602e4b410cb094bd6c7ad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
696e1263484602e4b410cb094bd6c7ad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696e1263484602e4b410cb094bd6c7ad_JaffaCakes118.html
-
Size
186KB
-
MD5
696e1263484602e4b410cb094bd6c7ad
-
SHA1
2b4b8cbd3999c52ad2925cee12d07cba033c4cea
-
SHA256
5485febafe8b6cbaaa60e0b4ea711781090ad4deb79d3d88c405020e30c2022d
-
SHA512
54363eb6921a5a37b98c1c152794057efdcb87818ecd919020fe3da024a81215f81745751a8a0ede1d0398e2b0b61e1cc79e8494e6f39d7f8c2766324430183a
-
SSDEEP
3072:S8yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:ShsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FEE7C21-18AB-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000034da8f1c3349d949ab4cd05e82697cc800000000020000000000106600000001000020000000daa51946060c42c549e1ac89e9d52ae72c237d48f16e65596ed678a900c03784000000000e80000000020000200000005d7b6ec46b65792580b73e17c4ec2e55916d9e8ee27264b0f849f070a2358400200000002c2ba35eab614851784655fa7f5ea0b0c2ddce298f10f0ae82b0e8a552ad8cb740000000e11125dc9a06841dbbc048bf9f4d0f9c281983ba982258ea19d03a5d94ea9cec0b325b2e61a5389abf4f26b5453b11951651b974437493789eb20a86d4e07ea4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608f16f5b7acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1440 iexplore.exe 1440 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1440 wrote to memory of 3012 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 3012 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 3012 1440 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 3012 1440 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696e1263484602e4b410cb094bd6c7ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51cd861c6639ae405f27f9a3abfb983c7
SHA152414d10d8347fb8e3dff2da178ce41aa82b2eef
SHA256990754f0cb56bfd5ce03608138ee02c3bad0f9149a308b5065513451b8d265b7
SHA512ce4e155a96f1469f493a1746d1fa89f55ade57a5b9d04a11138f52c2edcf3fb6c5b4a5c337f0bf953ff3e126fe14798013dd54953dab611243fbd14f660d4a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c3dc2cbe530944a0f41b3b76a3d9cdd8
SHA1c1bda9e11d1a989a86259b6798de8eb299f14175
SHA256e2c18da8699d069c8eb3a43f9b9fd98b78dab8e46a69bf166af2ffa407055a36
SHA51260151de2dd468ae00611f90de1318eecb477d5d3923b8e54e5d3f7e7868718587de9a24249b3ab470842603f86ea6be2f26c7f08f7cbbfaef261de940d0150a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f83c79d2f95d51eb4a91382ffc9d3ed1
SHA1b24aadf446db6731e0eae66de8263fc7ab6672c5
SHA2565aacb752c5dca2d62528b68111270adb456978b57bab154b12c6055c2b99298c
SHA5122f4d4d21f420c2d1558d0becb7757d75dd422e0ec3c71e13fb46bff4f0d13f44ad012168bf4cca88b49cc44c296745d210265cb328dea39960fd6ed46400b377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD547cf83f02db70cbf19195a1f13ef74ca
SHA1eac0e824c47207850341b354dca66e478a504fb3
SHA256f5b20459f87ee20b76935dc621a807850d5312fde1c110c67e996373154c60f2
SHA512c8f1f4a88db575e3fcbb5fdf990ace8b03f5040bff1a67b4f4a9203e6abec0a84f3c99b968e70a3ab431b77db0ccc5a3bbeda47d9bea1f350265d1b1c78db034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c377a0863b1d90188ebb1cbe664d337a
SHA1c5ce028d12157230da680401bd1ecb3431b0c849
SHA25667a5f2779b4214e56edd3978b63c613185a9518e8361a318e86ed309a4deb24a
SHA512429872b032b097389f4adc94e38b8223ff96cab7628b72aacb9569450a73f6f9817a720badf1dddf70034c7ac5b65c6ff0dc0e0e707190047dcfaab3b1220bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD522b8ceccb8250222e78cb145a08831c8
SHA1097374d207d2e6034e53573cdb168b178daf0be3
SHA25613e35c89b97ca6980b05dfb1537b78664e319ff0ae2cf291aba1a9d5fe2728f2
SHA512390d7d0b005a94a60f7b04539366b6ca2c6ffbab6e937fa76ddca52f25172994172607580cf6d49da106b4e5f122283e89a5fbd7efee8cf99586fcd1b9a30489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57d5c5a1f8bdebb2ec35b5c1035fcf5d8
SHA15e0b614a2203f8c8bcda45d7e6ffa069f16a05af
SHA25671b0bf94fa175804c6f701c5a1dfbf629b6f63c71ae7d627d32ccb759f96da69
SHA512728f894b3a51368d59f13f8a90fbcb97288664b5e99a9f28cc77fb92a53fcfdf6f182bd4e57c7d8811ce1772ff8cd9f87f16b1a411aa56cfbc6b8a5101937c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56c4ed1312483c982722b3d31fcabfc6f
SHA10dac75b1f17d3e7f74d15b0bb326be53d77e690b
SHA2569c8d1728346845bcab7035d9fcd7a069b1df89cdad81894bac47246f7c973486
SHA5127511edc33e3fbf076aed541c9df266451fb11926d3610be505a57ecef7e2b37d4210f991d90362302da3468b8d187931e209b6336bae0468b271e4486f792233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f4d68754d9a04b94c03c2dca98182160
SHA10b3836ebc79da361fb3fb43607941ce48f1eff19
SHA256c71f41074ec650f9320693e9cf11539af974963668c86aaa09d92fc730d2188b
SHA512112366f66ce65831905b7dbdc59c5ceddad61e8095f20b27894af17d9e0fd4657d7a2bcd823f41be0ac1726d1d21b78dec0871a554a4c6049c333f33fa3ec496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD592e4c57a67a1edde73745357828cf7ce
SHA1087ca8f04ea95de0c3233398f4389a4bfb1c3462
SHA256121c98ddad1cbdb05fdc7f1a9455f66300ed1bca7435efa4e39a4ea3e4097d45
SHA512ca59edc97302812d5316490e0715522dd60162f14423b636ba1759418e53be13ff9c47c5571f44eab79763f1b350f18ec75a3f99f86220ff440ccc476a228084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51da12504e073f2b5a97a83263c09f265
SHA19a7745a7497a93a6f8d6fa22a78f172129f6b1f2
SHA256ff05f9cb12a388172f38a9252d11982ecbc72337604a2b1bdf85009033681589
SHA5127156892ac3f05508a9d56de24cb29ff85828696a0d9c9be958d7140237e9502a79830e2255b7d986b50f6c7c78d740dd661e2ee4605b005bd430f29e696ad1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53254a8cf449b02792efa564021b02095
SHA17c789622a4c7aee330672fd5eea576a27bbf89ba
SHA2569433412dd939ce95819666890bf3158d11a714765698e64960c50b89e7a41f54
SHA5129a7c7b92c3fce8b5cc09447b8d6ddf8a8df83f5bcc02499e1973ea69cbf3024445b5f77ab23df9b8347b524d247f89ad5e360410cf01fb27e850e2a1fd2f5c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d863b3a9493ff74e87f84b137ccd46fd
SHA1eff631649423d411ae377ac4716d151a15f7bd5a
SHA256a5ce57c34e8a32cdfe6e96e0977901181205109072af45db93b9fbec9cda556b
SHA512ef60025ffee87e15e38fefc1b65c16532f27141bc560ed504c34f76343d05d9b70af5df2bf17e364f4372176b6036f130443f5785572c243f435c158b6c9a57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54fe4e42a19e5af81879ae79b7c4fa4e5
SHA19b894809827a86238a037c6c4ce8c609b689943e
SHA256ccc789a708f37988acb546400da82a04b7dd370684f5054babf383662c84d943
SHA512dcea49daf26b74a8277c8c6a9cda7150bf20efb229beb15d3a47e7b337bf55f6787d71e0d940e8b8b7475d1aadb8f1f50ebcc95b3fd2cf648939e2dc780856cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ed1c0c4ba01eac8719a9f157d3910eac
SHA1cbfd0fa50139950ee99f15d501772130a4e03ae5
SHA25613e19a4ef9b0a367ac254aacb1310bd93f7c1a5cbd4edecbf01a8ad15dd6fdf2
SHA512e5128fc081cbc490187e39d51ee92865b112029a8105b3b94d76b035c137d419e84bfcb14035348e32df6c5eb670004be0badbefb2d8d74d4eadfe7ad867694a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51543cb19c85e11872c605856972fb040
SHA10a0c851456be239a621a7bfd9de77987c286dd9d
SHA256e33b4a6f6037457ea92fa9497146ed130435b7bcdbc4c25a4699796730dc2f5b
SHA512ee607b49255d03347a914d36080e55af9d22a448d35c62858ee677f02e83baa60987f32a09a6ad6b4858eb0cfe8f18536bef97bbb05589021948a77685ff5ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b9ff3acde0d542d4bbecb0117ffb7db
SHA19fa93425f84fd992a329049664f057172f3d19c6
SHA256e8f06479053fa811b7b7d91c079065c631d5fbbbcbf6783dcb928bb753493c49
SHA51237000e3f9d14b1d86be92faae28283258d1099f40ac939e74c9bafea46255adbf2399cec313bfd32e766f7c04b10ea32895b5c8d710ef0d37184686a10e6e564
-
C:\Users\Admin\AppData\Local\Temp\CabB232.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarB352.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a