Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
06a61692f4df0d8cd9d477a99cfcf96a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06a61692f4df0d8cd9d477a99cfcf96a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06a61692f4df0d8cd9d477a99cfcf96a_JaffaCakes118.html
-
Size
49KB
-
MD5
06a61692f4df0d8cd9d477a99cfcf96a
-
SHA1
cca77e8efc230560ac0db96cce75327b148b140c
-
SHA256
665cf6d515d1868e6806339d7f84fa00509ad6c8fb1a52445639bc662967de30
-
SHA512
bf04c6953e98fe3da95b568b1556f3b47ccb244171cb24fd252474f513544143182a56958d037aea73c67d3b40d0ee3975f9381df02dea32af21c10b6d3cef56
-
SSDEEP
768:yai7B+aUVGmnb2ar4bdxMYiGOex00PXRlVCa:ti8PVGUmvbPXRld
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c52676df99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1875A41-05D2-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000dd48fde4aec9d318994ae8e729bdca175fdd0818f1f260c5467ae8366c78cd64000000000e800000000200002000000082da05b773bf2bc6c1d1f15367bf7df50279fa69ee214e2cf754ab41880837c820000000e515dc488beb1eeb4db781066ebac13d49eb032bf6d5e548dda525e3e52d90d840000000368be238a2a63281b9de292ca53644d9c87a3725c6c0c97789d912d9bc762b93e5d7ab1d748c97a7868022a8389f79d30c410d3722a7aaa91d1bd7fba7ea229b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420520636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06a61692f4df0d8cd9d477a99cfcf96a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daaf377bc411d8882f1707abceeed430
SHA1a17e32af3f703566692b907f21ea63202cd1c730
SHA2562068e58cec89e505e4b998b2fe6c5b4a5e2426adf74dd7c97ac6af5ca62134d3
SHA5120c8908f6fa95d75a10bf151013926271822c5f8d894833328204ebff8d194dc86bf99bb34a62845141d492a394a416f90b611162b75a1e22ab79c7dfa891467a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a11712b2ed539e9b50554fee1648d7
SHA111b8fc556793b4d4fb8e92a825286c2b08349927
SHA2562dc3da1126bec48d3c7b4bdb754521566e0fb5b5c387c0f527273bd2d5ebc894
SHA51220d4a02b2f8a18d778a6f5da12f40ae16764cbde5af66f9a31e6a5b1f01b4a6271411ca7822e140f2b2ec1628b99cf829410a0155d3789f0d8598a6a8ce29b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a9ba2f3f0d193ebd9b2c9611e3833c3
SHA104100dde332e1461ea90c8fa3cbbf0027d201721
SHA25610ddfbeeb0afa9565b5dabdb0a91eea740ef1a45c0bb003d12c460e4c4878001
SHA5129b61f157887f22fae34d5092d24f09535b4953429f8e0d35a91b8e1b853aab203c3056878e42b2cc338b0f51fc09d59e7cbebefca8e2d9c8d7d329883780d907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563827660fb84c1ac55d06352a6678125
SHA17295c7d70eb3b34eda98ca5d8a7269c73a5330e3
SHA25682af06efee003a6a72fd5962aa95762636a9fd26467c7a3f094f3e5ef7e286f2
SHA5126d87c4832dfe8c91531914f4b6a4f714d0e9a121a08da5b8da70035b55f451a0721bbb28c8331498d6f53efd2a0dafe75e7487432c94bd0ab0780c5dbb0cf041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55661f1d6b70380ffe34515bd2b191c86
SHA132d1f65073c4188afead4af4e0aed6fe708f498a
SHA2563efa27eee9b172f69488380bbceb10d1d378db0a087b2187e4bbb8374d13108a
SHA5129e7c5fe73815831fbf543db51c064aa31e4423247a6947ce01cbf0302b673bb86f7d60093f45832fefb3a8b3f3f59df4adb5db8bc1a6e0b7cd93145c3e66bed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8a8ac802c575734c2864178fb51022
SHA1ba758ed735e7a03a6d2258df15410ed83c71a835
SHA2568c82b28e4f821789e6d0986c2146b65a00ffff34f66811e2e6de920f47363009
SHA512717ed66079d66a2b872ffdfcad09bb53dec18a3953e06205e2863e4a87c71bd806f6f6d708088366d8eb0071a5187e6b860838e9ffedd1a9a2f3eff6902218ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5979f59670d6fb7d613c8c5afe8f1bcbd
SHA10e8848672c23d4fe28f1969bb9e2f0d61dda2de4
SHA25629a0bbe54b86ac7cd3464f9b27b8703dad00f23cccb90100bed7a66b39014178
SHA51261e7de87500bb8f9bae6fdc5795cbab168972c370a107dd00777f5db49aa37e2f17aa5d92bc52721cd2086fe6287cabd4b5f39ca26cacb341b78da758c7fb894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7d4f655725feec3d2f268c50464781
SHA1e80b30f741fe07948b9c2d158bdbaab516fb0e5f
SHA25664972e76d7af144c05d7131e0dd4e806fa5e577d1a370b089ecd7514d2ce4f0f
SHA512d64e16502653eeaf9ddd928a44729ef801458d0c824535a77f9d6a819fc85d5071da1a60285a3955428fdc8c4465e3c47d1d065e22cf80aff7fc5a025423ef65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9e0d84097f00c0dd4653b1c9d52bc5
SHA1205346b9fe2e702b07395b38a0c7e4e4623d9354
SHA25673c5bd82db95238ed7ca56d7783d4b571fce52c638d2eb457454112261def58a
SHA512d223bb2b800c249e50401b46689df7e70129868cf275966a85ae37182eddfec2277365538790743db3c31b4cbd7b7d2991cbe070f80270136393a8defda37147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c870f51d1582d780d0133211e3d495da
SHA19503d798fd59b9561b30d45f620de50c9cd042a4
SHA256a20d52b7516d5425e5723c4ddb44a1b59581768704be8a9db47c2612e07c64f9
SHA512a914ecf1b3e4a89420327ec9836075be4df5b7622ca7de992ee816291387592e21f5c897269c71138ae849a221f0ba86e8c8e33a0636478cbd06931514c56a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ded90dd511266bd9f472cc17a430a59
SHA1f7fa79ba7ee28134970c3eba96a8737d04c8ceb5
SHA25636b9d81d9c516e58c7b54f355eda59eddb049e08ccc97d42d7aea834de131601
SHA512eb0cfc5804a0c69c218d9bb6973f9d10d55299aadb88f3cc744bd364e385423b504138d071ea2cbc595ff79203406ea4e81d6b9e0c0c04165f92d0ee1a420be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585840b084b78c2e7d5d9b443d6d7873e
SHA1dfc9928806699807069640faafbb0914d1d95d1e
SHA2566423434886626b3b6c2b8bc6e2817f07721138b75c531a400ea01762891e529f
SHA512d7d5fbf6c7cf40baeb0ac89ec90193d56a3686b14e06e4de244eb6d316c16bdd7f3f32647172a4a68c0e29bb29eaf00ac52525df8bf5f0f695f6531fe3e079e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed3aff6f5a159396a58f18e7121ad1e
SHA14ac156c2232f392fcee29d93b2d16110a6236f5c
SHA256145cdc09f71d101072880e4980bad94c142622cb00fca0b3f9dad4586af52881
SHA512e6ce9e90f550670fc78c71dbdf6637e11b7aea7ffc26440e90c5a7f7dac6b6e851048df5ab434c5a67941537acd11befc6bb5ca5816c8194aeafe535cbf0409c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3b19e5d8a7856600159d25a3ac8e1e
SHA1d3e9516b68eec7c8e07023205f0fb48cf78851fb
SHA256204a5ffc33fe9b1096076d887686beecbfe8a6919d77cabef6ba44fe65bfeed0
SHA512f36e4684b35bf671b9e34fcc59f0baaf26a7b2e9f1e787ab209c5bdd5c048945b82fb54c3a3318d6ffeaf289839b362062d94d35ebc3be100c7ecbb82ffdc5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bf1c692f7a497597fc01e514f74a06
SHA1476b47382241d46ebe2da17798706b2014279f26
SHA25659409de8835d05c3ff73f0da77ad5fdcddf6e08c8bc545480b8a8f8c3d5c4f68
SHA5128712ea9d2686ba7c6634f417df8d02ab2d2322f28d9ffec49ab820014a6c991e1f047f487b050e3df19ff8d41c9d123da4576f0a2ee24e4aee9841b6c7405105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5756f095ce90b423be4389c2b8975ce38
SHA1f90268cf050ea7627ccc852f81fc49fddf8476cf
SHA2560560461b71823d3ad677b6d8e631268e6fbdb07af6f802c9b57a6fe9702d4868
SHA51205e4f3f1aac66a1c5119a075145284d2f38d2d8d54123fcba6a94b4dca4abd548e58c57a6fb0a233367e06f8859f1a2e2db5052bae859390c0340a6c147b8d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37cad187c3e41a3c6a1284b59b56258
SHA1c36c26f7a2c05d1f1ea2c05d80ecc28c51b5e101
SHA25635645362f858be45a7e4bbb6862393df47af4e6e934f35b18b90518d3b7ae340
SHA5121d8644d3b9b98e3eae08ffd7a869106dba3cedf2e7178c6952c35a7d67947ad8ed09a2527ea0ae6c8a9931b0ae6a2475263da125d53fe4be32ac4f32fef77762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d020a6f907987c660af0d13e1646139
SHA15d8e9d05fefd7226a5591d5c74a2938982a14c65
SHA256d6b801b301b8f9c915ac248ad578486229e7de1a3bc661bfd05f7a388d00d4f2
SHA512269e18b8aeaf30db4f86fa46f3791ca7708a931cf7e27287611ffd1476784bae227ca898e385a315515d9329f607079fe183ba5beb23987bf6f63a896759fecb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a