Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
696d8cf1b544e94397a1fa45b025ada2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
696d8cf1b544e94397a1fa45b025ada2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
696d8cf1b544e94397a1fa45b025ada2_JaffaCakes118.html
-
Size
21KB
-
MD5
696d8cf1b544e94397a1fa45b025ada2
-
SHA1
0afdc3669e44329db0c5a9ed3a36e580122b39d7
-
SHA256
7ad6dfb935d3155a1b3195a0c5aeacbd3fc933fdc2ae6ae169fa061379a36943
-
SHA512
e5f14c21b723f3dce969efd10629d90ae65b3e4e30f34d6b9a69e05eadec83fb1180d23f67f58929d607b750609dcc2fce336f257c1a68f31318acf94dd4bae0
-
SSDEEP
384:zi9KcRAa5r9DIiXbWVBD8c03RVhvWRcmEfP4ycbp5HzVcr6DJZTO4uxq:ziKa5r9DFygc03d0cmGP4yo1JZTO4yq
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb6f7f4a7d27f04d9641e57fddf7c94600000000020000000000106600000001000020000000fd58a1c71798ec1c95d5cd8f2c1bf4f835fec232d0ae5301321bef051fe4c0a2000000000e8000000002000020000000c7aeb2de9064332e43d86817e7c105e03959b6e1a50f34d5ed698a92000bf9492000000093337d3b08708672efd386bef9e769f81aba6f2f651d4dec2f0771df2d1cb3054000000033402f6d72fcf82cc27d6373fcb8fdf16e223f54374b1356b570d7da39184406dfd5db1414a4e603dd5c886c05a2a2803ef34d0cfa017e4748925ec334f91610 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09445e0b7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B7E0851-18AB-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2936 iexplore.exe 2936 iexplore.exe 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2936 wrote to memory of 280 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 280 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 280 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 280 2936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696d8cf1b544e94397a1fa45b025ada2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565c1aea9b2fee1331cc21a7d985c8b74
SHA1a56144d12cfffd3fa6352f8f555a8a6e7943f07a
SHA2567c5ed567a2032826398c28fc5f151f3c415821aae8cc52a28c2f8bec4244fe68
SHA51211d5a2cbc88dc2eef59d6f311a7df21e9ebdcdc1ccf9be63a85cf5d1e0bc241b0f46ee13b4af3177b6e980a949e2772f93e6463e1824c41a571de0550a896bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5775c64273aeb2cdaca92e9c7f4cb5a25
SHA1e935e0a210939d977f91be86776912cf107f5fb2
SHA256637eb029b67a7014f33ce2a8702b5cc567f57d87de601a5d1b673229f487270c
SHA51286a76a7b414c3135915f32273ba01af957d3990cff7af0b7e20f269fe88ee3705b437b5a89e94bccf392cd28347227d7f56e14eaa37c1eebe50b021a75cdbdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5008c311dff5298c86c1274fc9655a05c
SHA1f98b2b41f1f2716382250af81db7d73b8f72dc86
SHA2566b69ec626852febf0fb445db0de52b1b851de02353caf31dbe848218aa4659b1
SHA512ce4900acb53b53ed9bccab7190e04bebc7b06c6c5af6b2a8d46974b042959dd1dcc365091c63b0c4f01745dee0dc7bd0135e50193c69103579fe2455c1810d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52db921cea7abe92cb1610056c43a8196
SHA131070bfb61745ecf75130b473cc29433290af20e
SHA256a5bf30d22906abebf03f04763e42c5e8a67188e81c10c9b9b4d8b18f15694270
SHA512971bb0282f2d8898d0263eb344bdc8c5fdeeb52998da9a34fa6b96be11a14dfad761e3fe10e3172767e5e9975d19dec988882951591a5709e4ac567cf780b4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5554b67ac822d9a44408bf5f5d913d347
SHA1cd1158a2dc67f7c081788ccc7469c79c6b4d24bc
SHA256b450eaf7d5c9f361e72b57a42b2088d9669f257828dc42be26fa3d2e32e791d6
SHA512bbc793a385c3810e1cf50eeb9bc8bcc18d0b525c3a140f485f366c967349ed739963d340aca138c048af5c796b5a794af72b54d144335e82dd8dbe9f2982ec58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59a3a0d330da90bdd9cb6bc97ba440529
SHA144ba2be439aafe8e61e080158e6fd9519648e810
SHA2569ebb113385893de0784e61fa0edff04ee353f3b6e1a289937271534acd7a9376
SHA512ee37ac0e2388ec565814e95401d7a5e37f3cb779529820713f87e171924dcd348ff439ac5c0a63114b11af3d9dca0a6ba6eb42fe3702f4876c20a448bf2c8f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50095595634cb4fad8158d9bdf1991109
SHA1aa21a6ac13784f1d9dcae5ad5e57f2a3b1edef74
SHA2566521d6c66e3870e315fed3674dda4b5c8dac2316d9df11facc36cec58b10b23a
SHA512a7c8ac2ea8bfea2a771eef6a7c2773b2c5a3e268c4f210f0527943a690953c7a7f6a109c141047f7c62999615b254fb33b6abd96175c0fd8d2608c3c30504043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5d6d856846e272529e3728437e62b9b
SHA14f36d25fe22dc0a291103ceaf333ef68a84cd608
SHA2560e4380787ad761e06f50b66e3bf192c67c7fe43233000e9c7b2f448c13330dd9
SHA5124d9d1f701bd338c118a27c16ad36af7e9477d5f5dcb6d1981ce12966720a25d8d38b3723a4934ba047bd5f44a3a4c5ecda41053e4a50e56092ba226b71245b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588b952b882699388be7d5297e0ed83bc
SHA1048b9dfe4aef9ee7868c4545f9f5f1ec6fcd4168
SHA256dfabf66851e2a135c6bde989568a1b78c6af352688a105a2d1dd6929f9a06427
SHA5121ccfca926c21f8320af7317ed53043aab69223986af389b1151cf631f64027fc416a0642d66fb4ab97ce7e53acdfcb1991437aba563ad39e9d934776fd740f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ef84ad02b82e9e767cb60d1e0ff64e2
SHA1ef4dc28c2f61e95e76330a36e5a832f76fd1c784
SHA256cfb010a5e0184832bf0e00601eb855efd0f39ca5a866701b406c902d6511e829
SHA51257b6b50b2e90fcd95244d8602ccd16dff7961bbd4b9cd71c7816dfb3e4a3bbced111ece08d6ff30a1d0ed92b680f62c65f26c759f652e359bb30a65c4a6fda85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501da40f5582910b08212e75e5d28b9c4
SHA1b8316af052622aed28957f0fe5d30dc968576423
SHA256d1529058035f0f2a64f095865f607ab6afb1897de4387bf4443cc7c8cd76cd4b
SHA51257ae267ac95aaacbac9108a8abb9679d6d3215561aa20e555860e7556a7f6aacf8619fe4f2127e4272911803571f169ce8ca6c60f2b0aa889bbdec6b50032c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594249c2d9a32d3d3a6796982e271e0bc
SHA178dca3e7dd293728b15f8fa9f3bdd3503c169869
SHA256f5601bc5e42a0fd4797de881af3a694d8e8f4078c024e0a77745d4d0e2314a2b
SHA512627ddd6c00b4adf45c78decc8b73ba31d518a7b4832fa27eb5094f6548c720217add326b583c9a1429072b78d5b86665cb9fe60ad7d96fe022a1bc3cf2bfbb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c20d815d7cea75d2de9b2fc2f8af68c3
SHA1ec644bff951ecc447779d267531a8f42e84e9cc7
SHA2568df9aa757eedbcef92a9ef253c2c5c98bfee5e4a75a8de0c9057e942c0ec7080
SHA5129712b33ad084155aa7f610c27c8ae212091b9c5938bc72d8290e199d4e071958903f522f77e245008f0da8edeabd12bfe987136ccd5cb9b311c7922595d0777a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50442840a9e19c05b6962a46fc645b479
SHA181aea320b61ece6f9900a7ec9b121810b296a146
SHA25611fd8a171f83e84eeeb6b0d45eb797da74ce34d535f151c910323fd2d2bbd267
SHA512aefd6cf1372e5a0558df274b99b2595a6b590f3a7ec67c73f1159731147e010149b5a0ef58537ace474cfe4517408b67b583e3b0928aedd66ba6fb24d0afc8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56271bbcb242984496d76d682114f3d42
SHA11a1321a7e94e84591c893a039536843244ba50c1
SHA256f0130e414d563b1679886b58b39cc5521c122b701b6c04732fac19115e50b8ce
SHA512d023fdce710cb60ef59351214e2b9e6878df8f5c1ec4f8d343a87d11a7f857625d4c38dbab24e3c69430b4b0417dc4f48545f808cf77a9e023461088cbde5f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8d2503e1c104a6b32ae7cbee6338b57
SHA1118e1a7e151d142ee2399ed77565fa594376f39e
SHA2565ffaad0995a591e8629092d1c0cfacff85e4a1c2f27f553d772854b106e47a8e
SHA512bb63bfde3693528b5e01c384dcdd4fddeef20ea38cd59e02478f691310372de8fe323f4f2e2efde59b37ca1386bcfd422eb5315b579492ed765fe256e1c96fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b56f634ebdf467e986070ee5c94c69f
SHA1af52eed497fcfadee6bde28f470b5b828598ea55
SHA2561fe30590980874392981b64122c004d2abd5f357464c14c5c6e55da828134c4d
SHA512cea38b4a4cf93c701a975ede6714ba0344360526c0f4e33c56b7c369ee67649cb9a2fb6ae21968814887b440a1a15bc5800b61687a2ac3122c529622be9bc3c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a