Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
6226231ea407d35d08a95e7ff0ef06d6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6226231ea407d35d08a95e7ff0ef06d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6226231ea407d35d08a95e7ff0ef06d6_JaffaCakes118.html
-
Size
28KB
-
MD5
6226231ea407d35d08a95e7ff0ef06d6
-
SHA1
3e76e08533ab1eb33031bbccdd43c4c8da91e4d1
-
SHA256
84950e01fbec4eb2acfe2fd1c2007ece6f516fe96c17011da5ad35478fd9972e
-
SHA512
bbe494214a4c0e2caa3c49a3f3dd9b1ee784eed88b768740446001c41792f954a41a7035c63472d4aa547e0f471cb616ed4bbd4fd3c7a3b3f10980f918d82ba3
-
SSDEEP
384:CdhkhvsIxTN+PGTCGKe4weRe3eNwe0etfeNe4wexeXC1o:CdhgsIxTN+PGzK3wAS3tGc3wQV1o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48269091-1731-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422430457" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000c74e08e66cf5eebb04d12d6914cda1fbbc92274a1dd626676152585a7b742eb000000000e8000000002000020000000ef3115148ab2260a1b4e7e4b23232fa0d46a3847a5a6c634bad064abf299565120000000e8c1305f354e2315b81c6fa9b34d9934902a42f4af02b241539998d500397cbc400000007fe6b1ec4d0781732baad91e8a5ce88ae1e2d1f898b22aebf501adb78ef52ebe09614163525697003dc988dd19590c4e34525277201c424903b7599663aef455 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4016251e3eabda01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2140 1968 iexplore.exe 28 PID 1968 wrote to memory of 2140 1968 iexplore.exe 28 PID 1968 wrote to memory of 2140 1968 iexplore.exe 28 PID 1968 wrote to memory of 2140 1968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6226231ea407d35d08a95e7ff0ef06d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af1b1ea54a3d3b604638b4581a295b1
SHA12fc22993cd24dd90fff482c76d243de9dfa1b397
SHA256ad220f8c7ca22da4cae4df52b72ba3d101d142bf197866637c5f89d0d5ba1b19
SHA512ce46e193ce12ed6be4f344b0dfb043a0c1d6130cf7d2598e6afb4c8606e1729c7dbc746e382a3f63fd6f6b781d32a41e4f588d818a23d605691dc9d81e2f878e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50415424ed99fb922285259657388cb20
SHA10542d60304c3e9fc52f95d4965fb1e6ccdf56bee
SHA256250d5fffd3a04535378bb82021ad3fe546f023947d32360256d2e4fc18700639
SHA51205bda1815afad0b5910143f6b4ed08091947f4b3db04420a9f26181bba2a62dcbe2292e2234d1102e8738ddd1a8c12706534b689118f63c87ced5cc24619644d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f98613f14767bff11411a5e663657d16
SHA1145793b5be16063a04582f471e8acd49560042cc
SHA2562f3fbda4d2919c7e8121816efdbecc3104d734e9688ea34d9bcc36df72d37337
SHA5124b8476f3f328ff60e4ca7f9242d5e86b746d3c157ca41aa8da07fc5ea232b6cf4a076b0337b219f6a395997d5c05b3ebfa44f3538862a9a7938a35279fea837a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b521a31c670be6453a48d56da44a6f
SHA13d73b6c64246d64c6406f5c90a38235c7fa8a92a
SHA2564eff66656ec7f2926657353581834cc2cad3b5aa2a12bcb086f486d85f38f20a
SHA5124d7f4c27a670c8219cb17f8241ec715b4154380a589b43ef2e753f88671733ef2f488ba0764caff589b1141daa43424a3e0a1ed5262d1a074f95555d99e895fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2e8ef57bab73942bed0e636cf4f4694
SHA1ef23dc14254feff2ec1496beaf6cb3846c11b4d0
SHA25688c1105e12f137eda2fadd6b9b8823f95ea726c1bc6c28e9f8de48dc05045c14
SHA512fcfba00f16e168302f4347c8350860c0a4170d7147c3934df2561973303db9dc8ee5df1189d87132f16e6113bf767ca455be2de7826185abd3291bca28a7c0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f27bf5f9bc3d073d3d78cf683ea56a
SHA1fe7c2a2f56b0f68c2b0a921ecb391bb9e864bbcd
SHA256804241696a9042438592a5790deb827dd60049cc9496d74806d11b928bdd1f75
SHA512a6022bc2d2004b2c56244fd88e4b1c11d846ed4d7fe8956792ff68aee61581b6fb5d4e6951259527861cbf1d52aa09019f1d2d51afb3e1a0a2603d5c2b7a9235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2ab3a6d425f879d22f424bbd2bfecc
SHA15ec88e348e7d654f3a016286c59e782747569322
SHA256b481562e204932af497d9d4d4339e152cd78f5bc88ae7ef9bd42593272ae9948
SHA512ce450e51ad7eca0aa98efc1059187a53b919afddeeb15fd6573768c3b8afbd92fc22a8960011ce23cc480b06f67483770ec9d4e75b69459a0c3f048e8071a963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb582b6a29bb9a6b54fef37ae65bd2b3
SHA1c8ac1c673487e41177c187c8d3f0e55324b1bae7
SHA256ecdaa28a5d0bbb44716b6cc86ea6968c2d0969151aa7c7794abb728c5a95aaf3
SHA512220d27ee2dbd7d2d6d8ad25da3f8efdd3aa40f026880b90330d5e06a7e3edc9f407975ebe2399ce4b843d0edbde7bf833336d208a529717a2282ea8d63d0b25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5cdc762c82d438b36ecc970f5a42ee
SHA1d0e27040c5e4303f8ec33ca440d2d0d79cedd43b
SHA2566d937eaa0214c5a59c557794741468bfb15f4c5f8320558b6ec2ca4bc4ad09e0
SHA51229a8a3340d9fb3ab0c6d786f315dfb4bdf9cab1bf2679772070cfcc5063aba8a692e9ba043cc4f7702addd5d4682e92faf554c6593444e55d74782920bfebc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feacda38f43d173d8443a4eb60262924
SHA1649c9f6e14dba2714611c479efdbe2bf19d1fc9b
SHA256c647414134a03461e76420f421778846654aacf5020647a44cc744883b72c095
SHA5128c32b87d2aaf3ec538bada016566ebff2f00e268fb1f97207a5c020a6a28b514dfdb44ccb91e727248c2e71955d2ba5fe8e1f11a6b9648ce1a0560c99d75e1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a66bcf8c25573f9132b4666aaa6403
SHA16a73664c475032aabce3403d81a2a03d34a71548
SHA2569e1a27518ad09f4b77b7776a0fb24de04478e75cfb61f87ae64aa9ec2f6c7b89
SHA5129b458c7ed4ea5ff0192fb5fcbc42f1056140f0a88ab39e8f8b95f04ce0671027dda5e8607b393542236d6588331e2aa172ab21941026d5db0058ec587ef695f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220d9ff0f1f466dc0e74aed66e0b464f
SHA19eaadf69ae9431fc35989b1a0f680f02abdc6c8e
SHA256a8c58a25dd3224164de26e0f8b44e9051d5246fb0a7d1e17c51b4fcf3e525a16
SHA512b439915d7da3b9d3be35e1fa7b90f34773203f06188527bfb4f4355ccb151e1b2ec89045115e61855101348683eac73b005637313dc5f675b16e3d70785ca6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a17e1d1c24c672d6229b07163ca0fdaa
SHA1bbd3dbb3f4df96adab36390b6852fc83aec33ae3
SHA2563432df74cd3d8fb3458ad421ef35caf971bc66ffcf4adab2ce5d676cd70db1cd
SHA5125fa2a1e5caa6d7f6a8433cd19b7bd42562cb2d12d3a9a3572b622164c54f6cd0e0bb52292605f28cb290938045980aa60f1e4b448d63eee0680a643782493022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e83f7cf08d7f6d498196c7d4d7d765
SHA1cfaaeaa184b8ffaf6f3157c522d192f61a0c8ae5
SHA256bd3b7bac28a8f39cfe14ded276e9c37cb45d529bcda8ec11f67210869a10b8b0
SHA512600ea59cb5e52c00c33cc8aacd0624fb8defc59161a4c387258c17a027bdc53ab963fd7103fa4aad8438d08eedc1f328bc65ddb222894fea7bd0be29f0ec6870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47df1baed4946f5a30ce71697593ac4
SHA18d0c65720be034239a8cc98dafd6ad206af9392f
SHA2561a6a556650c767059b62abb7c9432a77bb7d2e3c52859e3d528cd0a7ac5b7c5b
SHA512a15e47439e42eb73f9fac6f5e450a26b4ff7800e1be7f4c3abc0a33c966d117298415af5c70a6b2ec67ad0aa4f3146b1433d3260e1552818a342436bebcf919c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a8b4b1230a82887ecd998e99436f37
SHA1c51e7721e00e6dc65ca22d464148c5e282a7b642
SHA2569f951fa9835e39614434562af7798fb2cd811a551f0cb670e3e0c8734ab7017f
SHA512fc9f89689cda16e40bf035a99403dd5a3f0a56e67b27f774e7d61f405c1fadf4752bc07a55e42f8030b2c21a3287a5df1f368a0da26e1414aa5ecafccdf01a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b1999490d304a8858d6f40def8780b
SHA1497d636b9d143dd5f1417c7601120401e9e59578
SHA256c4eb8bf81e92cdfd31682403eb630753d1d8d2b2db31a83756134c64dc440264
SHA5120d63633cca1bc4a499d610b3f76c3819e772d4939c3c5d3d390ee7b936a35ad7bc17ef9a9a9692759516ab0301450f6f2bdc1a3dd4dc452db2a40ac4d63ea385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bee3b26bbc84a781e25016b923f6b4
SHA1ee7ffcdee251394945bc04e20052ace47f688ea4
SHA25609a21f8d57e93f9843884560d84c7d8070b5d64259503d47680aab9b617cddbb
SHA512af88e7bf2470724cbe243220ebff7d61deb3b48593a0c5906812e9d6aac62fd333deed80e86e7dab490c00e6a9dd9a8413ea333a8b16b9ef0d7d275d7b04d9b4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a