Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
69702b18a615284db28f45722f64fa3e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69702b18a615284db28f45722f64fa3e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69702b18a615284db28f45722f64fa3e_JaffaCakes118.html
-
Size
926B
-
MD5
69702b18a615284db28f45722f64fa3e
-
SHA1
6198f88960fd13b3c0040f2f4b64774c98a925df
-
SHA256
bc2ddc080f18cb6ff0a9a52ae6c89786743b42bc81299023862ece0f096011f3
-
SHA512
21517ddb633dea623e7b27965ca2c41a811c70e7fddcfe40b877480429262e09baf409b41a69d7c432186f635f3edd59a3aeb968880c78811519171d051170fd
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{847DFC11-18AB-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007d6b1c9c3401a846b365ec50dc6e200e000000000200000000001066000000010000200000002f60732eff03da581315582eebc907eb6a1a2759727b8428ea3aa16b3de03704000000000e80000000020000200000009db82bee475d4fe6fb0cc4e5b8d3e711362bf3a44cc1951eedb79d01db60e49c2000000082b0a87dc1c3e17b38111879f812ebecd66895db2a5534fc954dc63b6ee0134a40000000e65c3fea599188374ffaebdc42d74134a010ef6faab27028893446120bf5144caa0eac7feb242111ea2b574b2e3b6352e0557c805b6068b847525925402e6216 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e7ee47b8acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1668 iexplore.exe 1668 iexplore.exe 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1668 wrote to memory of 2000 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 2000 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 2000 1668 iexplore.exe IEXPLORE.EXE PID 1668 wrote to memory of 2000 1668 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69702b18a615284db28f45722f64fa3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51360c9698b61ef9c21360ce785fd2da4
SHA1aaf3afa4862bc7521735b529b7387b745398428b
SHA2568c30d424cd827682f9b5f92da3fe06d92b2965b5227d2b91960e61cff05a0b21
SHA51230217bb9addb48bf05065cd91918ea38678ece526fdfc71b4efdcb3cd055316a2ef420eccf267fd8fd77f9c2dc137677297ae572bb114fa104605474956401c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5235ccc52e7b9f3240204377d8e2d4593
SHA1747b87450357834c39a2c76327128d86f58dc566
SHA2568bba671982cce9ffd9c39b1e9190a8bb4c01ac7e311bc2678e0533697951fde5
SHA512bf6cab1090b5ee4366eda15959d037b2312578cfc147a310f328dcc322b7cd1118e2af4f4c3c230b201fa27c2216628f6e91d24bbd63308ec547eb212d097796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f0f01032a95e804d27e41146e29f5668
SHA1c6c8ef3f28471ca40bbf5b54bb1fb92a05e1ce40
SHA2561c50134d4a06a89d89e375c56ff974dc375f96fbcabc792a39414dcce12de8c7
SHA5129926e56f852a60303d376496fed8ada29bbfc43fbd0d795eaeb5cabf6714024ec220f9c01d65cd8f4bf29b3e2c817de69bce80c4c303ac80afb6ddd77b38a24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5deb895209e4acb1769ffae50c49f4d69
SHA1ee4d8b8c10a30b160dcc162a886f2a0ee14ea35e
SHA2569a353fd903ef6176ddf871e88b2ddbb24c677e46d8bb356d7d1f3a17468f401f
SHA512e7285fbf4101a584096d12fa8218462b61103227d2653043b2e7fda5c3a5d56ac1431936ef79a2d61295bec4a44fe0f7c05797970bed061c3c3d3e7aaa44923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a91f6889d52053281e16a0d84f16c964
SHA156a444fbe57bee9d2ac0fe295ad4959e9091750e
SHA2562bc3927e07c3e868a8a9c71ab4c67414ebc6d6e8e1089c1e2584d5d141be022a
SHA5122568f4317223fb2aa49356fb8de965fd6a637d57b663e9a379291a6895153902584f0c721544369777567cfdb060d5ac1c33a5e489a36102ea7fb20da5d2b89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50a561f22c81d28c104ce5771adc75b7f
SHA10fe85dbf72d0c3a1bbb9635161501f29bf63c63c
SHA2565d9eb7f962ebf8708b2fd1c83741aa6bc201e75fc58c128f1a773cb7fabb545c
SHA51261c2910ae79e7e9a4600c2715bedf28fd2095a9a4780fa8cb4b4a9389dbb3115e6c55df9903b7753a5bbe564b185d6dc3bf7a2047658d2db9905664db4eac0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD562a66369e2c5e27ff52bab657fef4512
SHA19990af8e3e05baaed9e7382b3a430ad9398fca69
SHA256fd1ae213e30bbdda2db7384c547cd7909690d11feb5a3a82eca299991c12d0cf
SHA512ed117251091e79281e6d53fa764eec831970689ae03b54dec07fb60bc3f867c2ef96eb3113c00b81b451804f8ff35e530ee803b03371fe3f1533b6af05bafd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55a36fec0c7107b6b2f2ddc93e61a0e6d
SHA16aa9a308c468d3930955580f91167ccf4ca34c39
SHA256cb67820c13be3316e400d3bc7955907c19612a38a92afbf5038943e6b705f50a
SHA5120f9151ee60aecb5800ea98b6cd7532244d0d87d246862f82f5a84a7d3b66865d51e483e9d07ea5fe3e2b3c854188bc421166c95b95ac1712b73e5884831291de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c42427ede0a29fcebbbf6571a1cd410c
SHA1837436bece26f76ae86eabf66ea7895409cee5b3
SHA25629fc05c21bd34c377ec4df0c10b3f235ef36245daa3c9f0448bfc7de12ae8824
SHA5124a16cc11f906e9a4dc37d6a331c4c823025bc1e1cbf2a9feeaaeffcb6d199f3460705e038e13ff9dd4ffabba2626ae8d18fdb482db0225c0e39d7dc1fce89d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ddbc470df31e1d57744a7b59f7c6cdda
SHA171a4fec87f72596dfe8fdc15a577b699bb9f72e2
SHA2567b975b2921f625b9251550ced4099b029ea4f29205f92ebd9fd0e5f2e448cb68
SHA5128007d741f5d16205f4ed315a51b1876dc8730a4612723f9b2ba064541e0ab1c2f75d9f1bf6df797406d7cf45586a33090e83aec6a235cbb71f937b7168dd96f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f267558cb8074163a634b7c3099902cc
SHA16db5361818d66e4157d1ca94b3a70316052632e4
SHA256a6d96a7abfe08e45d597cd66a8900046ae5368cb733d30ab7536ec2d6d2dc4b4
SHA512805813ce5cda6f21c1efbd884ea28bb9f81e5bed5a0c8d5042453457c0566172004749f0d23f4c27709d93e760139594b7ceec5f61d6490b0ba4a311c9694b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD581c84fdbf71348962925e39ce3ba13fd
SHA17c92ed85dbd7ed2a6777a8f10d7c27661f578c2b
SHA2564e542e2d0c5ea796a476eda1064114d7f3b908b13057174038448d3acfbed044
SHA51246c5bd8861520365becec35e47e04b091c8b9de8a049427e303e246fc1ef8cad72df2b1bb09d6b0e6a21bca41ff694cbf26b8406b1b96bb67e9af323bcee137e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5edcb94bb700cdcaa8f07828c5bf9a9c9
SHA1eb3c37a18a7f18dfd0b15033a338ffe7d9775dc7
SHA2561bffc601986edbc0994e9eee72b9eca92ee5d28f826f52f761bfc1f0ba2417d7
SHA512fdcec1c256e09fa110012583d2e0817ce90cd2beb169dea451f74514931c338cbb9a64122760f592cdc423d961aceb5afc558107167d435f005cf7d5eae685d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5da51a9dafb13d1f87c90596b21e80ff0
SHA120fda3772974429b63f2581042e1a8e3400140f5
SHA256f5b1a15c8ec8d58233bbd53c380f5e705cf7643282bfcbad0056bedfbbbaf1a8
SHA5122c741950a91a42f6883a7e31d93166a890dc0be804a971235accf6ae0d132f755ef87cc7799ade77cfb2866a6c497fef144ab2a053e8ef1acaea846b195ea0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58e468c055ff021222d35244c92ece739
SHA1dd74353bef9863dd11b360589983d608fb3057f7
SHA2562601f8d34aaec594a4425231987cd82b8ce92f53fc19b130323d2c82960f5e44
SHA512383a3a040626225f0e6e20713501700888b7717e2576db4fb0a68a63e5680c95ff2987d6a1d296b9d2d450e0b8125990116f48f7ce8a0d53521040df3e3bc2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cb7e19c70062a0f77ec19c0697722317
SHA10171699ec08bfaac4df847b7bb756e6ff17a950b
SHA2563329bd2be7d42d58e5b22b0d1ac107c2e2a2d516ba7a0bada97df96d58c9bacb
SHA512d4eaedc36e6e9caf910b5e75c42ace1c04b9c33c3a2820b7ce1d8582dfca129169b946c2cce256bc096ec9dcd6e4552e8ae513945e5bfa59e4f6da87076ea170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD505b3db52424190fea853615d6b061112
SHA13f6f5428c03e94ff8bfb8f5715599daf27e1d6b9
SHA25697feaccff52ac9cab1d61b04e06552f1cfb11cb451a4849ef19cdf52010662d9
SHA512169803b8f7478cfc65566df7299b26597ec4acae0bf42c817f0a6df31f6e59733bc593d244d8cb8be828818a0ab6b08528d1ad39e54ec45396b83ceebe16850a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b5fe06da4461a10049d4816242f11c2e
SHA17f7f9f865fb38ba62b7c62c39dee1f13032fd5ae
SHA256c6e1e13431b3630dce6393a6ff63379911c651ce88592e96abe513a7fc50a2bc
SHA5125a2aa074a70ea979efbd37945d54a809207487d71bfaa96262ff556b5564b8e72ba6aed3d67fd9201d70c8ffbb7ee9524d75189a996705f4ce095f6813d8e8e6
-
C:\Users\Admin\AppData\Local\Temp\Cab35A4.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3685.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a