Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
6393ea9c5e0a579c435a9bb0d9383854_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6393ea9c5e0a579c435a9bb0d9383854_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6393ea9c5e0a579c435a9bb0d9383854_JaffaCakes118.html
-
Size
69KB
-
MD5
6393ea9c5e0a579c435a9bb0d9383854
-
SHA1
04b2e012a52fba4a4151fcdfebfacb6002e5ee40
-
SHA256
d867f9bd2ed2cba4036febf7467215792e4ee5659c74f25c09e6c6cae609164f
-
SHA512
919d1d1e33639b5b744d1142c5ad91249ed0fe4c936a77cfb0a4d4e692c0ddf23bbc990eb38ceec56cd51835d86ec047eec3a35bd32b9836d97c3497a08c4569
-
SSDEEP
768:ULsukNyitI070t0T0L0jzERH0ije8s70fM060o0SiQt8yJfsNLdBs0ZV:UwukoitI0HzERtDLdBvV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000755e6eade86cd47abfcef2c02e39e95000000000200000000001066000000010000200000007a672af63ea2900d029a590043a0d8506fdbb32b71c4c2ef645f6705ff189eb1000000000e8000000002000020000000e8aab76faec88b519fd27e7706521356a4e5b4880afe74e1f38340106f2b5833200000009ca9a4738bf47166a87680a24bbafe932bbb28b7a153a9ed47aae8f56900fad840000000dd62caef9b680ecc183a02d13d2e741f64ab6533b80e2427cb811f959cfb302c5e3302b06dfce499ddf2b98571e5e3cb125b4d3410eee765c27f1ca6cb0e6447 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77B49691-177C-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0346c4c89abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2328 iexplore.exe 2328 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2328 wrote to memory of 2520 2328 iexplore.exe IEXPLORE.EXE PID 2328 wrote to memory of 2520 2328 iexplore.exe IEXPLORE.EXE PID 2328 wrote to memory of 2520 2328 iexplore.exe IEXPLORE.EXE PID 2328 wrote to memory of 2520 2328 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6393ea9c5e0a579c435a9bb0d9383854_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea159d0236b0298416b739973679166
SHA1d7c441b8b7b3acb50338e0e4a3fcd1cffadad547
SHA2565ef1d3c7b78d3e09a22287256e8f739fefe9ea0106a40fe407ec8fbcbdda3002
SHA512a7777d228b9dc47147dfb03aecdc26e6b84bca5bdc20f7ab786d36b8470d2895d9ac65475d8e416d27673743345f2da3f45a16eeda3d93010dd55f16707164c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3917a2478fa65df8e0c48343e29b6d5
SHA11fb0d4aab0fabffc4f0d2015aeac6787f9767696
SHA256d9c5a6ff27eed34e39e98cf1e714875b94b99adcda1670c5e2c9bb243ec5feb1
SHA512e2da3591bcd8db85a4ef6ade1c8b1c7d176dcac2523ce09ba370e98fcc099154a924fc18e8ad9fbf5db4a204ac098cfaa147459536d8d027c016eda08a681f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304da836f45a6eaea2dade6d2a4877be
SHA1b08d74a6d2b1fdc54afddf575ede653eaf3ba8af
SHA256c21f1f1fa2fcdbfaf9f9b110ba05c17fcc169b94e6fd9e642c8a3bd1658aa03e
SHA512010f8ecad2a2e3de9552e33c7bd8f1e760417b548f9b076b3119cfbdd8e35d6e8771259ffe696d03bf7d168409ac7dd5d696fde018d04051733ae98333617cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3463a3ce32e8e1c52a055455fbf35a3
SHA1babf387af216f382489a0a8c15430d643f54721e
SHA25677aedfb866edf218fc586825df7af11da40c4c861377fcbe7e8b70837afd1f7e
SHA512974eef989111ebc6c7c5a90006d469f53887d6e9f90c369f98648a972f90064554113a3dbfa036e067fc6c8aa0c558fec5c15446d23cf1b7dd37fce398f2cc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e4269c2ec16b66c4349bba257a7339
SHA149ac76efb2842ae3dbc9a94ac5498beb0add6ddb
SHA256d2972914df788fc8e29f8a7ffc7f53b948993dc036d2f61b23c8c78c85911709
SHA512f0b88a881149dc7b8bfe64162b75eee73b645c0573460efa53928c168136bce66190e27740c999fd387f3d52b1424da934e0ea3484d5e552b746c54d070ad693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0f814327bdbd1c22e16b46964d637c
SHA15445729fef2deb86a2670955bc5dfa7d0f8317b2
SHA25623cb1d23c90b7bdd6dc31cfcc06b9ca2c795db15d726c43b17a5a907277f2851
SHA5129c738c251f2f6ffad46df1acfb1baab8516d6bc80102e8767c3838501a8396112f57388694cea876065808b13b57d79e541f6336fa7325defb2f5934d4a9e165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585026973d6422aa13617107a303bec17
SHA148c78ac65c5bbbad8de808a97b9b8f2a68221631
SHA256ea44b31dac620fbcf155688d598831e7ac6797b20955a5433988a22dd9fb6c1b
SHA5123c2de04134bea56ea9521aaf8e55f3c87a9b7341f61eba4028582df8f3be5af8a5564450b67f11c612332c7755a902857ed66fecb99cc98fb372b6ffb70781f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bdc47c899429023e6d9dcb4123255fe
SHA1ac967b79227333b7e7f8598d5bd1baf8c52b52ba
SHA256d1912346386800b34b658aeb91f4def6459c0f0b12c03fbbc43452cbb5b11bcd
SHA51205558ec1b600baa95d629cf180d6745089f5c74d0adfc580348a675e1e33402bb65e0e52246c06d947cdd59faf0b0c985b17ee1ef4a61332a9472e2e68425618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e571f22310ed317f6c555c76a44b270b
SHA1fd998992a5551b8f8d09c89cf9e9e0c72b5f4b0a
SHA256d2c0e523ac9bcab3a06f41bbb18026f7e1a66e53bf5327c6776f927adbc16db5
SHA5121f3ee0f526055561edef88c0a35accf674c41e775660fff9d26810353a552ce29791c6d496a8c21204bfd1ca1cc2c61ed87dd77b4c1b82c6a6530ee3521f6a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570bb33eab76fa5717ef0434b267cd876
SHA19592c2f5c26af06bff0d43da6c1da81f803c652a
SHA2564826c9d5b2348feb4622b7df5f8249c2d13b60bc48806efa2f7dc20bccab41ef
SHA51225cdc049f6461c5f54a5af52b50b41579890d2ecaa8f2a2cb76ef24f30b356dbb04f0c7b6cf25133b420faa11d7707c5ae4605acabc38d6691c6f44c5656d8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd402aa8b5a9d73a3ad376067969b2c
SHA1e7e68a9df1791fded03c702198158614ecc00409
SHA256b11f57832f5753bfeb67d0a62d32bcd4ec620f5b167f2ac454079622b14bb667
SHA512d18dd8282d04b36f7a8b36eb543c12f0a96003cc2e7eff9d6c09b372b2b4e7d10c430fc69fbb3214d4f909f6fb48615181878643d6db59c395659f8e86ee21a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e9731e6f9cd03b0e11c43d7393ed36
SHA182c864888c51b1c2fab3442dfe913eac718012df
SHA2560dae5f55d49dea848beda39f1d650372cc151924076ab60d969becbd9f64b34f
SHA512b75c42de6c3b6d771843b574529d2da9cd4c32c693022580eb79f69fbfff0e210d782c6700e4fdcb02564017b27fa763ac52d6842650d2f47948d7f72ce717ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41b38ae9810b75842f7f5b24a497be2
SHA1d962200d40f25ee7126602645bb60d1bff2ebfbe
SHA2561cc23fdea9fed4730001398e7930368e3b193d1d29a200ac8262efbb1ee7d784
SHA5124e66ddfaac65febc424d7cce33f5935404f5123f29bd8802117434da248d8dd45865a8113d21f124ee21fa331c12fd3d9b12f1302bc4ed4237a3610ca719430d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236dcc033c15170ece0d855ece1ad45c
SHA154a9a374a0e4bea3a0d86052c898cf5c65797365
SHA25652527dfd49844a583c9196b25c29dcabfedda037ce57e8454760987a93abfa30
SHA512590bea5dde3b56335e2702e72fef914fc11f8e41aeb11662bca5aa2bec9e929f4c672dd011e65a09dfd896dc7541a5a8cd09236e4f0ec39916ddd6e800a720b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35848c8edee3460a96f8801424161fc
SHA1e66f00a0ff2ded39bee9e4e95a1e688095465de3
SHA256afd4230f630d50d3c091d72c4361332af274746815a757c05e341ed0355ff129
SHA51298123794e41e4f3f35c4f8aa7fae2fa177f8266fc2bb3ce945cdcc4d263bd0df261972c498919658dafea3e10cd38fd83a29f04b8e9dd0e3381bae8b0e4a268a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a1a5ae8f40c50c1a1cf51e9c11891e
SHA1b255f940562912162ae5fb5bcd5e91ac61d3bbc5
SHA256489edf37078ee5cffe9febe35cd1ba8d5afc6deab173ac005cc467675f33d8f0
SHA512d370522645399d67b460270ea7535224ea1fb4192816de7d9f6c3df994153c1f4b866f8486337d94328c0d08d651d99c5ada2100c91dee54e794e45babdb1078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f556523c5961b7ffac55aecabc5cf7ec
SHA1eaf5d6d294048209afcd3321b15bb15aa484ef28
SHA2563bdfeda4e477d01f3b6ce4823ef42509e906cad5c57af3af4f06b76f13461426
SHA512d1a32834632dd8cfd20426777ecd9697fc8685529c786b187b2e58bf6ede56bac1e6a2ff5b7f9ebe3d79653cd24f5660b50c50e313554005ef6a5c35c4e6a324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143277ffadea7daf509da39357f56247
SHA104ef7b811f774375a8bb0fbb4aacafd242dbc583
SHA2561a610fbf7b1c6f6733fedd4b32948d317398d2d84a52fe97411ea770ff95e2ab
SHA5129b9f8de063a51af5a6712e90cb0a543d5cb22599cf95f8d2a07877674b345532f534280d31f31a4cac8b9310c3600fea49011c64d3abafab4ec564cde46589db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a