Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
699d7fbbd124c1f96398bad4a6e16af6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
699d7fbbd124c1f96398bad4a6e16af6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
699d7fbbd124c1f96398bad4a6e16af6_JaffaCakes118.html
-
Size
4KB
-
MD5
699d7fbbd124c1f96398bad4a6e16af6
-
SHA1
9e1bd9ccaa0a852365ff7a2d32d92849eb328c27
-
SHA256
f7bfda937b4e3269b9a8d0ac3dfd1285d778996d69a94dc94542f99866dc3bca
-
SHA512
d039a0e2e7065634b473f64c8cdf6ec7b0d3e9935faf3d29b59d5ba0cb80abad0b22349bab63a2031a8b61392de0a4d3e6ec297b6069a2006ba38c0b83159aef
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8onOw3Sd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a379764f2842e46b209aa4277f8cce80000000002000000000010660000000100002000000069ad324f3c145cce789f3b06999339b374574a503c25d55d01eb0c62cecd1b84000000000e80000000020000200000002d53c6d6e9d49193f157de8c6913d684402f7dbc13463bb3e0c16c5d0bec84eb20000000d9cfbb2521a147065485d7cca9624406f33af1b12af4dcad7e357ba93ac6c40140000000fcbb95f04e5d05568ea77489b0fe9312422a0cc45c655f588f3190d675e597b51bf81985d6596f6b4a3941f2cbd14b5ca726b8bfa0bd8081faf6435bedf793ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422597489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e076fa02c3acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E6DB941-18B6-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\699d7fbbd124c1f96398bad4a6e16af6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac5fd6d414e6cd4b9a11dc119e83083
SHA1b7ce87cc0191c14052c134e78ade61f31f72c523
SHA256bfac8a743ce109d2826737ac66b6c50fa672c4b89542785bec2ec90cc4fe034d
SHA512cfd5d5a8bca8abda5759ab58868094bf7ea86d71d385bddab78c99f970832ceebe897bb0a02ab444123f11ce3301041a4137bded2802ae2196ca299364850982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525431615ff0d4e94033abca0a206be75
SHA19c3ceed2b972fcd9e29a649aa8d1ce73e11d1d88
SHA256d43830c68df729162ceb586303fdbbfc0ab2398392c137ccdc9da9353ebf3fd3
SHA512d7e35f703271dc638f0d628846e8eb8fab37487699d86f4c97944fcd8bb39fbcf9ed718ebe4b3f01ddc2c85c4ff838985729a87bf0afa83e4223bcf3a8ce4d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d29b288cdce5896a038c0cca7e36a29
SHA13fb90844ec9bb5bda4ba1a2031158e620cbb32a0
SHA256b7f6f570606761e48dcf70eea350b20ac5c6c7f9a65ea23a04e2e17588f93af9
SHA512516fec924964b33ce31896b098236a4dd21688d203d0d2e95596d2371e01204d293ec67d6a5f493f7179931b703eef0d391e51e4924eeee0df8e33215a47f05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22cb73da085a76791de9e4a9bdaf4d9
SHA17ce6fd9686b9985b2eeb5d6c19353c552147abd8
SHA25696270073280be7460bd17ff69b13e49608ce93c3ca345422cceda7d7768dff69
SHA51297345b2e4a13c2aa26ad72e6160ee1be2fabab28a544e0eb63aaecf11dbd517e0f8e201f3cff4d918203021b5871a2ef899cfd1aabe9f0d65e5572e8e5fcc40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51558d4f3fa64074cd22b767425d3506b
SHA1b2708c7b7c87b11467602c0311886be60421cdfe
SHA256308af4f737a333069c2eb9301e2b6ec588cbc690494eadf74a3637ae3b7ba2ff
SHA512f25eb678b4074a6d9649b9757bc45b421d4e22e9bfb91d76a6a769ad0cecbec1f4ebc94c6d85b2b387eca53a10e295aee17dd1ffad3750692a9d9a9268ea2100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c2ed5e7ac95c2479dc1f4e49037e03
SHA1840d1560cec32fcc915fd73f629488d53d52ccb7
SHA256168ac08092e2b4a647df481a1209bc500d2954c4811a78143d2ec3869b5f73fa
SHA5127f218bae3d15e3c9ac40c8e0a9db04553a25d9b30e61a1305bc570de22ed43a313c6d9a3795c966fda8f3ac438087e6b85b6c0334db787b2bb3fa8732755ab20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abbc93c219c3655bdcb100e54a7a8891
SHA15510d5d9552f3a57d510ee54af4850860f16efc7
SHA25674ab2f5d0c4ac554602d1632a3581a0dd4e7033f7d2ef5c1d742b6c2fe6ce14f
SHA5128424ffef12d2fd3d9d2aa46037a2ed18793921d40b80822f08f7023f0c660d90187b3ed0478478afece8c92fd3fb30ad9200542132f0b4fba624f5e0e09ca979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d566bcaa14141c69a4d32c2ae997490a
SHA1f22745c4a8d662e98a13c3bd2a95f879e9d15914
SHA25659961c581fd8031bc236e0a9a0b8551187b782056dd8696c58f11ca65f65eebe
SHA5126c0f175bac43ee902ad94e716620d74305e7a3f7aaae002da5b40e2240a47b196afa0306900ff81b60b57758fbdf6d230b3fd8506899e4b0c2fefa5b8bf36432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a7898caae09bed873a482be9a5a2832
SHA14ab008ccf5533a2ea11e352239443563a6ddd2c1
SHA2563ee4d18c375a1904aba3973b1b28dcae316f0e7eab9f67ba9e010465e632b705
SHA512a85508d0f7063e3f488a24a8a5caee93511eaa418c971da97b958a3e62ca80465d453fbefcd73d1a5565ac4a0e5f9b218c05b5ec67fbc26da24bbcb760eaf6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c17a9d6b5a0a86e9e6500e79dae4cd
SHA128711984f43ec8659f6514e2a735c147834589ce
SHA256d1571948a746b10cc0a6707934a0b951f5c92a47df36bbfd8c9785a06dd7d336
SHA51230e500db773e9e0da5840838e6a3247c0f978109be0545e1e1517de73a9c9231650ed7895c93e0d7894f049b986693d1ec6c77c04d806c2ee796a277fb62f1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb227d53695026495910c869bd0ea71a
SHA1c2d6f391254f04cd90a66fdc39e47044fd36fde7
SHA25630c0a9cdfbd38eb9a254265fe69499cb419049d7009b97ab46aed627006e8ee3
SHA5122b5dcae834aff7ce5cb08b4aa9100d5fd669531769068b826911f753c3b0153c0da0a5422df59e49f6b05222e11805406f5193cd7bdb362b18b6082d63d960e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c942527ca1d3dbd0e763938480631f
SHA1df9ae6472282aa062a8803a3e8ac87343d3f9d13
SHA256c9e3b930b58c1d07273b93a10226d005c9ee9a8db14ca308b0fbbd9a908ff988
SHA5121ca41f301070794387d0a55eb3f2abc037e754ff19d8f6ee1f02938cb2846dda3fd1270796c7287e26f73ea3eacde5a3363c9b0faea8170b3f313a8474c5ae1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578c603a9aadb87ab96339eeba4c9a319
SHA13af2a334922144fea970ed2a080b490d07ccfbe8
SHA256a4963fc55e4f34ab27e35e024a2989248766d3a897e0d86ba5dcf6100466dd7d
SHA512f4f9ec1e8531342c43bd8aae5d58c82587c44ddfdd112dacc4ed1bc7e2406db742e2bc4cd239cfb60f19a1b8d403148c2dec96d7e7e3943e093e35430e1df3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3d694414c0acea274f0f1e973da17e
SHA10240adc44488dea81f4469c30f898f424784bdb7
SHA25614c9060e497d5a8948868e30075c915ecb09a2a2e4f95bbfbfdf7ae4d8a30967
SHA512ff404d90e89f3aa35b44f3249f9c3b5e9cba07cf8fd67cf073c39a140f0e6b4c578fa530b87e9d675f2fc036c809b83d647306eea8c4773c1faac4fba3e070af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ab2bc1851c04fd9bc2604ee1cc31bf
SHA1e6a98b0aa3541461b4265a8c66624eb69e07018f
SHA256c1bee8144e649a669400693b652912b6c1b759891856a27fdea1a86459998c68
SHA512a61772da7c69535d37dcafa6e1263bb326b9ab7559cfe2b3cec0ba3fa615abd8d347b227638a7785ee24a69b8673bb76b8609c1c5278c351304c1e34cb2162a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b68f3bed47f5a8dbe458ff593c579f
SHA13a19a0279078171b01b425645dfe3570b56cddb4
SHA256810572eb3dfb2287148edea91b47d3e14f623daf27afbe377706d1e223406ca9
SHA512c55bd3982260621c87ba910e01467aad4d26ed11327f5b9c2c5e11cfc70d82a226d000a638265ff3da6bdb615daafbd437b1daa55b6d049c7548e221580c41b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54199d3e3aa6b0d13cfdc06f6b8c092b7
SHA19f3d9849e0bf88b75cbfb38730490948287b194e
SHA2567ab5a8d10ed6e889e9d79b64033f733dcff0b63bc00882b08b05aa0bfc4d5a14
SHA5129a9f9d64f399a9414dfdffe60e5ed5cbf6503e0f91f13fffb5d71e0055ff1e5f46a6373e437b1c659f587af72ec286920ad33dc554c4c0b7c15b2e9ee76c1ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53497860fa66728dd4b336386b649e420
SHA1e4b5a66ce6decf1f8a3e8890aaddd64ec63451a7
SHA256c613130484924e7cf780276a3f2e8766604aa9c6ff67b9c8ac04c2d974e00d52
SHA5121977c18b84786db899f86e9ac57191b11893ea01b27a8cc412b028ed8a654164681244887ee11d2a065ebfdb042c4da57aa1b9ae4cc34ca23277fd8fb12f1d50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a