Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
697278d549a8914e674de17dede2cd93_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
697278d549a8914e674de17dede2cd93_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
697278d549a8914e674de17dede2cd93_JaffaCakes118.html
-
Size
14KB
-
MD5
697278d549a8914e674de17dede2cd93
-
SHA1
846d9fca97f648389299d390aeb41fb1c855d9a9
-
SHA256
013a8ded07258384e70e20ba6565071375f38a2df3d6793e5a6c43fd97a2e6b4
-
SHA512
b5df8d186855c0d29f37c68319d3bac9543667f7a5aec71b5f998b7289a8165d4c945e463f81eea89723795f4da940fd3b8e6ddb306aa44844701f306dc346ee
-
SSDEEP
384:CyigeNNQEm/DjHDQjH/j6Ai7zy1wvMa2hwH+N1+ZojH/H+ms3CF:CyilNyEOXY/j6Ai7zIqMAa+ZU/EyF
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27D33791-18AC-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f00b9952f332d346852766564efb736b00000000020000000000106600000001000020000000e9d956bda3b482eda0f9886417e5b0a4d4c0ea0b04afca5d684ac9c8a5a5c6e8000000000e8000000002000020000000fd53a2667c834862418a37d7a3aeae7f13f37c29745e3352e008dc876da80f8e2000000099759b84fbe4b4dac9fee42b3a36499ae97270b720309fbcebf325611124ce6c400000008d905943ef6f83def9afb2adc022dd4b96e9d3e3629be06f8d32c217605bd3a45a3eafa8327be8bc77d47e6ecdbdc55fbb19fab815b82299293906fcaecad9cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e056fdb8acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2200 iexplore.exe 2200 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2200 wrote to memory of 2804 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2804 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2804 2200 iexplore.exe IEXPLORE.EXE PID 2200 wrote to memory of 2804 2200 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\697278d549a8914e674de17dede2cd93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541df0273e9d22a90c3771802231543b7
SHA1b63f83325fe82c4f698cc214adb6975b2bff988c
SHA256be875c976c570282e28ebb6c8306c9bbb63965c50f809e8637f97c6d0ad92940
SHA5120f206865f51addbe983e857567de79edfc9d0bab2eb6748d34a13122c5e1c0dcb0e6a15cd9bf0b453cd49c5e98c1b5d744a833bf07121499f117ded7f1ec8bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25c469604cf3eb781850fdc3e04a574
SHA186944e28da00ea44043d24c115cbf52d144ae955
SHA2567ad2bad1d983441ae12981cb51fd0540a0ab39ff75ff0c6345472317cf51e887
SHA51267fe65a41cb6c76dc3e17753f6426f18a5cdb2c07ae516cd0321775102987bf5f96a391ee23890b9e775171d33a7b56a1c37ec993a0948b329126c3b4c0c8a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56579499fbe5384b91dfb0b027e58213d
SHA1a0070c5dddf4f3613719f3aec3114be2e34d9a75
SHA256f7d1940554854b6df4f036bd7e291308f97915de06010db298bfff3d28d6b32c
SHA512b8d9af3e0ce71fca72fb8f07aec9654fe001ffa886ba4acaa007c2ac3f578265ea47e58f414fb7fb8c8bf3e57b18de21110a0daefe6df2dbd9e3b057d5c52e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e81d921f76ff5063886e3587046af4
SHA171a0dfbbd2767f97b8a1549a8850e9bcd9d99000
SHA25611bfe09d1412f80b1825f620b258ee7e85d8920fdc2ce423d463b69da5f50284
SHA512499f3eeb95407c1328d09b4d4bdb869426dac4809dc01dfdc9da035e7237fcd094a5bcdafe3de66687aac004b7069cd66ff3ee5227f978c30ffd66c3738f45d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce77931175a1cb3df7de5953764987b
SHA1a6252bb56b981659dce635cc81a80363a15d10f0
SHA2562fef2c0981838482c2aa9f3b7ad8f6b474e65e01195e092c702907c3053f95c2
SHA5121d3ad2aee03472baf22ce08a0e2f3e8fe07ab422e9c478021d39be15f590786f17bf51f1989641cbd039904bedc2f8bf56a8e36257e40ef11c9162306bac6a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d121088ba3666b4a398ce542e289d86
SHA186925515cfc55ff4994307976c73d450eac66dcd
SHA2568911cb46ed796b139035bcd732d1458f1849e093967c56584e3e7e9246fc94f2
SHA512c56c8db027e599956aab1b16abdfc97b580cd5771e7dddb3fe5031aeae15b146d752899324d8bc30aa8ce08df6ccf97623524a65fe9c5028dafff77a54883f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb412620e752a6dfb4786c305b6ecd94
SHA118cb62787dca38d46e249fe1099672ace6dd5084
SHA25611b7f93c6a36faf5b41116d0ae1f50b79abde728b0e7803d5a6d459b72c09684
SHA512263c19dbee3debaf975d11483e9c0f6ffae0045fe7e8da4c53da9469fbea0b179ee3a2893e6a397b4786a475087ccb31c75022e747021622514899b07cb7a7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590813919fd49e0521f6537d0aeda72d4
SHA1b5d2181d101799ecc387df2b5ec52e7f56f475d0
SHA256288e030631c949f73647f8942641b3aa706683b117bda9ebacdbb08fabb145c5
SHA5129e9ea17b73c9ba8e0554191fc9932eff6595ec18cb2fc5c5b835b0cd3c576d89136ad75c0e4a5ce927df94eeb68f21e71d7dce71803cd73784c0bdcec8e6ef37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff8eb5bb6eecf96e85f5b1efdbf3702
SHA11b13c803f8b6fc5c1960381ec2923960f9d9f0d7
SHA2560e732a9c48079c140b72e30e97c2235bbc99e86cbc806d4e04f4dcd87796a371
SHA512ddc9d85a8ff3b5c26457ecd09f839739ca7c6ec6b8f4a312656870fceb1a8a9a9f5ccd4d7d7b36a7e6c610acf630d9b4afea045f1da4a8de51e6e96f0101de41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd59dc1e4777a50d535e1d6c1b390d09
SHA1966dcd6d0f1bf76c3c8d1519629b1f380cb11422
SHA2563b18bd91b886d053cb4beb72994544936f8aca2cd653e06cbdd4bf5b4a57494c
SHA512b46c85593cc42181655996506344c73061f4a05ddcdb10f847b0989554df81fc01a3859d9e0adf0f2391f605eb69fa85abe451ba4f00e872e5963d6567ca53ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594bd294504dfa6c4a6551213da267bdd
SHA1a7f3c16c27a72181a620d4e6a984fd5439860dde
SHA256dc4a91917429f4c00add19e4e9e48ecbea9c295a49720566c8ade5d6ea0764fa
SHA512f6d79d62f322d4a29d61fa6a490dde6e700805ce8ab60a7e7a3093b2f3e5ea26d7ce656c13c4c7afc7830442d32b967f2b22b3bb574b3e998e9059fd70923031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bebe7b5fe15f88743fbd07c08690c8e
SHA1ee75d68ad354988642a15d2d6428d6fb239f676e
SHA256a3465783538252b316c88d44c6ac5862d89097d2eed5f2134c4086d83ff8889b
SHA5120f00233cb6605fa4847e6988209623b6897e7623d4459ef047df8a79b38551fed5142734e1214663f5a62f2005461fab4869a6e0b0124e6d2d3e48a8061b53d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5666fef45d4998abf4c80c7f5574e734e
SHA1074b87dd242c97bab5e3d4acacb053212d47768e
SHA2568dead3c49122f345a879a0db72ceb4e3d5e1394d448d95a801e3210cf6a45dac
SHA512dd201b1dee6965e821156829ea01ff5614d17c80c3516988d56d913415227f13c223becb07383c09c7257b34e1a1d2e993e9d15be63dbc89af6c80aab25e5d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55edb7d410c6a3234893796683655b5b4
SHA1539fc5c1ea3ce6c6e1acac2e90c57e723fe3d495
SHA256e20275e9f988731644a02d0c444808915dfb985d433c2cf602754dfb9a0eb762
SHA5128f38c4d34bc4e56bcf173b4879cc5cda3264fb535c1ffaf3411fc0f95c7fd1bcc2c89735064f2a1e96e8cd0cd48911d5c33f8f2c17ea1bc8c2c1bdfb18471d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceca788b949afb7d815a3691b8473e85
SHA12eed082f86050f3bcb1e5978a5cfa99222daccb6
SHA256d27830401b263fe1e7f59de4a3b4ae0be5c6b078caa9f96e2a42c99e72e916a4
SHA512a9b02b015333d28d3be2e71c5131eb7eea30add11c94997ae8b3caecf6a79c04f175fb8d49082ee6cba4436b0682258f33a747a31b3063dc6521896f668df245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50577a04f9ef334ca119d115a1a6a0f58
SHA12e8065f45f4591f165a9826ffe69d56fd2166e04
SHA25696c940a3f99aee880e523cdd3b5e759d2bb4ac34cc2b2723a823c1b4c6faf9f2
SHA512f52e2772714fb6bc9a300466c2e32d536cbeb39e8a71184a70a1c48ef557aece7b6cba0c28098cadbcd093649025ccf5048fe0deadfd44f2865550495bc478d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586efe042a43fa4d02f95c6d5089971ee
SHA1d86cca923a2d5671994a66895735e8ca76f9b786
SHA256e7752139e6e2315d8156f990a8ef8a1c3178ef50f4743c0985106dfb06a1fb15
SHA5122d92df26e10475f1ccfeaf4e1e2be438debdbc9d41074402484c0c5bb396803ee4341a6aa7308f2b2c0257e503f1cb95e81fa358cb18f8074f5023b10a2e6b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2e998a4445c322967b60b39e0ef4db
SHA106c84d2055fcd57b1aa531aebaa636e5d915db97
SHA256dea84be5a8b603e3a904411544e30151f0928b0d674c1d04369f8eeece65b410
SHA512906c782ff506662afb190d4ad9ef533bb45a20553c96f218eb3512f3601e120a31cc5284f79ecd12dfaaf90a36a096cabbea8527c83967ef0ed29b550b3d1995
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a