Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
698d7ccb10f474407402c5ba07482476_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
698d7ccb10f474407402c5ba07482476_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
698d7ccb10f474407402c5ba07482476_JaffaCakes118.html
-
Size
70KB
-
MD5
698d7ccb10f474407402c5ba07482476
-
SHA1
e839d9f76de6643c16edf74415a5aee8188a3db3
-
SHA256
65c590294922bfc825eab2e98f65f3353e2a28ed2bdc763164f973c99f17d7b9
-
SHA512
0fed2066b882bc307c9f8a9342ebcb250a7d818656e5e2b4060e3c988faf61f6ae7ee5d5b2fdf73dfb8e0ec3431072cf1822763382b205e92dcd1716bf0038be
-
SSDEEP
1536:SLwwzA7d0wIAx7lFmCKWIUJ+hTRglv3wIX6K99do9OXGx8sHhBugvcTib:S2gAu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422595905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a2a8beddffb3b8696827fae9a8ac25b0faf8c7cef5ba44dde8e699a78936bb2e000000000e8000000002000020000000739c3db29104892f080b25246fcc3df546479e543470bedd31af0412ffbcfad120000000bed8d4b5f65462180facab154bf914d07289578764f413f6fdec1adb59c3e8c44000000076c8c5fcc5230c5cadf723ae034c1337763d103e3539079e96bf38d73162661de0f6b439bcd4b3eb515b0213283a42902df5642bfd746ad01dc13d159bf7164c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EDCCE61-18B2-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e062cb53bfacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2152 2716 iexplore.exe 28 PID 2716 wrote to memory of 2152 2716 iexplore.exe 28 PID 2716 wrote to memory of 2152 2716 iexplore.exe 28 PID 2716 wrote to memory of 2152 2716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\698d7ccb10f474407402c5ba07482476_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c4ab409f95c8d6ddd8d64e1271c9dc
SHA14f20b7543f446bf2cc1e650b892aa904c16e6708
SHA2563bbbe50b80461d2581f87d3e24ac90a467113ea52d10845c84db64fd19361549
SHA512683f2499b308a2304d2efcb62ed38092522730270956b0209cba7439592e7f2b56e433766c2420672f1767cb8bfe5dd5d978253bda8054a859144688c2e81a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23d3fb197e576787735be198e809baa
SHA133752e60d13d885976f90628a9413134206de911
SHA2560c0e712e511a08718a7f46ad3535ffe82d52014547d949712e957bb9f40f7dc0
SHA5127ed39c0bf68eca14625f77aa207528f68c23703ed38e694d437e16c28ccce8f674823c04f47ec3214dfe077ccdb084fb4124423901d0ba10b2aa0e37ea35e63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e576de3f3a3fdf6fb59ed824d4e3cb69
SHA1a15c4204ee53e3396ba9847b9f5dbbbbb0c0ed92
SHA256af207854e2923d8787c39f4970ad3ac9b56c14155676553217811d8edd5c3c98
SHA51282e537a646f36d1190a3767987e51e53c95557a86a02102714aa56b63ae8f4a15fa9cc0089b54ed88f81c6e6a7524548d8104a7eed1b43150d1d9c240ab66041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d72d95f8dda638db6d3060a0de366b
SHA1e81021784e014acd91b88aa3b0db76dbf064d6e1
SHA256e7ed080635244c1b0f32100384fe1977b5074db51c7cc761cf1c2d3fe7569522
SHA512a68ab71f58b8b6f0979574e517cefae0446920fee6b991c15cabad868070d0ab8df95ed073c5d0ad3c8078130a36ef091512f5d7672be47500915ef7e14e37c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4ad167d18d18a3af30788610799d166
SHA128ebb00633da5458499738561a1176dcef4a0a7e
SHA256611f9d352bd12768f321102b20aea0c706cfb5e38ce8fbc5b0346ffece32d095
SHA512d22186c2b6b69d4e8b946e030191d023311f2f71a4b2bc48ab0a9113aa970f344b28e0195ac85b14cfb1a5894c189f9ea3ca5786423ec31880f437cbf92c959e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45ec65b02853b02e99b87ed38b9825a
SHA1d01e7f4ee3940d7f7a18f6d56d06414781f076f0
SHA25648d960aec743116fa82b2085e804bf783fd51d18faf751b4fa47eedbae9358dd
SHA512138a5ca76a813d7811edc7651b0ff7088ffa64eaba6c31e7b2cde550e6ae46f8aef509b608c3cc45e17650911cae8e2c8ebaea13ab0a6febebf492d66c93c7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7dc414376ea635a424da219ad88de6
SHA10e49dd0d38f06f42aba092e3e91b1bac6e759366
SHA25691936ae5e9cbc96d86719915ffa5197a1a9331dd6575b018d6d59fae0d9006d1
SHA5124688e5d8e9e7e0087add3d9d0964d8c836f9b8e3a386e71460062d69126acf0e7c05687659d22102d966366094f58b89ddf7660294c4abae63f0a66d66d2b070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b11446bed3ffdf3617df194fe1a723
SHA191d9f9ecb746414f06aeb38d47b1866869ebc452
SHA256b1728cb5555a915859bd80b64f654cd7c4ceec30207dc887f72f93d85afbe6ab
SHA51235de6d3b22f4cc6eb715a44ef132d4804304515adc60292fe668c3876831f806d46b74c980297d1892081e99fd4babe2a31160d1024314075ee5a43e3069af10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57266e9779db5298adb817836c3133b29
SHA1449387fa046cceebb68d461aa1cc2afe3ffc0c78
SHA256bb9113d2f8e199eb28c9d936a5514cf3be349a4580c1743a492d251ada4619f1
SHA512058ab5e74ac0b72a4d29e95f558215c5b4a02ae703b2149e204d7588ed07d1c647d8d31037c8e6e0e5e9ab04f2a63c6850dcd0d93b9ec7462977a7c1873a6a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e51c697cc85cabe3f4298feecc40b3d
SHA111911807a6de103662c034a234ac9afb45ec8daf
SHA256e973f3130ad4211f42b1bc5a209bc4d78cfbf934ec4c97e7ff14747a50959592
SHA512a2e170b5828e0ba2cbb43ba5ed13b6923ec4e1e0b420aa28588b538fdae3c17d311167daca92553f7b49ad90a469d68be6f291fc6fd5e2541f8263e4c57748a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ecfb141695b99219037922bf6506dbc
SHA17405c1700152446f0642d330a555caa350fa0713
SHA25618096795cf40d28298d16198527698bdc663def08c6abe1b313be687e092e48b
SHA512474a21f15af1c27a03db2b39c2d30ccbb5154da5ed3ea7c4aa93042294449463b974d8a4b3d660e624c86d0024d5d07fdca2fd491add520228e582312ce30c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514110d1ed364663ca8af457d18518603
SHA1fe89f120ded57b8fb02a8e3a70aa7b1374450ec1
SHA2560bed137cef87e1dbde832b730061faab112c53cad70c34b177935489978670b3
SHA512a933a678ddaabdab99046364d3fc6c4c1a2ef5292bc5df7dadb5be402a4ac01bf94f165274fd3d0982a026bb9d0c9665a9465a5698f0f2942524e506289652ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c69b4283b885580fd59de87e6ce3253
SHA1e9613dcf1d57945f7efd8fea4038ca4fcf9354ce
SHA2561c7471d26a545978cb6e0eeee7756e495b0d4ff216007e5121d8b52814a6dae0
SHA51297372470998a0150ad0c8f518f05b7223c9b566a1a63c9962751eb31db07faa777019d0243b82fbe6ff16dbb2863f03cf1014958a27c25eec2fe8a2e6b661e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516297e4f337f366bebdc8b940b146969
SHA12981c76038084b0ddcecb80d8a71c685efc951d6
SHA256f422fa8a053f6af629d5d90d106a3332115076bba6dc51e5b183d1dae6705fe5
SHA51280fa5532642e2697bbbc4a5a444d130a60a5bd8f441a63aac27be9a4e26cc719b9e5d49787695e80bebd432250f4aeb1933d3a150c44914bd2e93150daeb1143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5286e48f129b4bebf086bb3a2a0b2c2e2
SHA19e8e2e32b3b5762326294683ba2f1c56e2e764a9
SHA256d07c53501ee91c1d97fea0405e203bbc3bcc310764476caa97fc490d6c5ae25f
SHA512262ef7fc2f16edf94b111f5c0d920e331c79af368c7cda6e5bbd93c1e7f9d6df04c49f7800ab8fc6e33b45be7d700841740a3082baa39d2e3d53652fce9d4165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9aa5b2079c2e094b4f385f71228736b
SHA13cf211098093814c7872f653461c902e03a82aeb
SHA2563727050ba07c28c186e6db8e7bbee1a22d43049fee107d294e9f1bd2c4a340ea
SHA512c01088c85b9d448474cf09715bcd60cc73e078f0f2e847ea05966a2ecfa48c6049b48f0bb54b1c23aa37d5c82561fdb1124ce0952d2efd9f439615afdbd43abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51952a7a28ce3e2615ef950d88561b3b4
SHA19513902bbdc7a6715c66ea2bc8d2cbb494930ebe
SHA256379d45fa1e5239ee458c12e56dd08ad8518efbd3e16d7b124167e4901c682f19
SHA512625b757549bfec9ec594b18e9b18b108d5c31b7fe0674eb94b14c7228b8caf78fa16da57ffc52f2db80e69c61a5b1f7bf471a9d7ead86c0710abeb88f8356b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c796a5f367cfa4e8e2d1e5d0d391758c
SHA1155746469669cad802753fdbbc4e57194dec6d25
SHA2560825469ab59dff2d1b666043a8694507ddcccd3085ec44f00c0b5404e011309b
SHA51290d0b85d0332d456f0951f04b73c96219e849c67262554c96f5ef942795062ca36c6c2511e23d5bd753522fca9936210ce9c5b81f0644495329fdef536b959c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd549a95a233a6bc740b35e74e3e0d7
SHA1aa5f273eb7290213b75aa5c4505208761231acc8
SHA25635e2e55674e2a0e74a6e2ccfdc7c1ef18957bf64808a4303b94f068824ac1129
SHA51296437dea272e89b1e36d6ba5f1133bf362aa36bb67f925c1bd3e79bea3d9a9f1faef1d8b93dca8c7c147fe8b6ff733e7d8bb78ad9e30a4607b952633d7fb004c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1bfb6b0a50434b2a9caed5f396be4d1
SHA175f845d263a429526642e97a584ee18b01965a5f
SHA256c946ed3e058c25e06129b0564e27c73715b28abf7b22936a7e68b8b5f95c3865
SHA5122ad03bdcf57c891d79c431dd4010efe17c35107b213d54b5427a2e3eb3b2a6706c4f5e4b1b350d3ee350ac0490be7dd335e5f32d6537b770505547618ee96714
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a