Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
6402b431d035e8d46099078164cc1fe4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6402b431d035e8d46099078164cc1fe4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6402b431d035e8d46099078164cc1fe4_JaffaCakes118.html
-
Size
460KB
-
MD5
6402b431d035e8d46099078164cc1fe4
-
SHA1
78db99570824ed7ee54e8cd97aedb4cd52a87dcf
-
SHA256
e254cc7da10ce9a9220f1e384b9c6ceff1d8fb404334748af67caa88b1ac7a03
-
SHA512
421d4387c9d669538af4cd4128a60b8c067e33e84e62af77ed8e62c432ce91a0ea16d5e88c96b4d8a02a1a2b07fb92a98ee94d92bc2a6455354baae5d4d38be4
-
SSDEEP
6144:SMsMYod+X3oI+YtsMYod+X3oI+YzhsMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3D5d+X3xt5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73079BF1-1791-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100e874d9eabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f362d76cc255248a0f480d57a27f09c00000000020000000000106600000001000020000000cb664de1ea24283cdcdedc31dcfd3279b8ab33a7c9c38d99d2c14b9206173424000000000e8000000002000020000000102cb5737b69dfcae61ed23e89ba4957d66b1fe9fcac03c9aacc8de04d39429890000000bb87269a39138d5b34b3b004dd8e9f934407834833aecb2ae39a0d2fc10167749387031602883a64bb02a1bf127f48853e6efa0c560ce91572cfb4cbb7c267deb27ce532ebb9838af1e04ce6910d2ae587c730916f9bd8a2e1fed7bdae56fe7f8a6510f867d3cc471b8a4888fdbc25f1c2fc9b74ffa10e3b792e06baa638a56d68fbee689f0e1800ba1002f7c1bced5d40000000827592f4c0b10503922e84213755b5915c8b673f628cff4db8d01fd546943a06aeab836916e7563f886963c1fc982ca3261bf793cd1978fa0c853e575877351c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f362d76cc255248a0f480d57a27f09c0000000002000000000010660000000100002000000038305a4987b91d9e38444e022d2acee024d639e2955f77047535d3fe4a80b207000000000e80000000020000200000001f50279a86f2cda568af1e615e64e6c88f594eefc17a62555e4140cad6e94e02200000008e2421262bd3e4dde715149afb0fb09ee366b34e32d7c8eaac2c163e2ed31515400000007226d58256f4dffdfccb07d3984fcfe7709750ce09d16b8c3c4f4e6b3ffd9b258a10d7b431d058ea71a82b86662ae509e6fe858a15bfa22865b1a7f566fc1e93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471771" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2180 iexplore.exe 2180 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2180 wrote to memory of 604 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 604 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 604 2180 iexplore.exe IEXPLORE.EXE PID 2180 wrote to memory of 604 2180 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6402b431d035e8d46099078164cc1fe4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58552608048c92d237591b30d573bfa0c
SHA19a52cdd0eeb265a58fb8523356ba7c5970fc6ebf
SHA25639d797d1a1b45851b43dd10553cd03261be80ab874db7150aff2fdb6682448f5
SHA5124fbc4867fe4bf57a981dab12a0e1096c542289e65038dd76218e201a904209b1d5e2c7908ff231b33c233492156c8f0ba6806ecf81248c450ed09a3280960f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57280c2363c65a4a71e2c60cde6339fef
SHA1a4a81c2b0f0e2af5b92583422f581d7866bb9b8a
SHA256641fedf2f7a0d6fa0686af1f55a64557481963e6efe82d92532d74945f257161
SHA512e56a7ca52bf6a3f34cfc6aa81bef08c5f3d7be10f92e3f950a1ff878a70eff55964ed719635ddfb24d6f05d857a3aa9a4131c787298df2b2c9507a52f65d5bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f684b579cec55d62d1f99003f93e023
SHA1fbe7dc48a049c7f193a5171cc92f1799cf5fc575
SHA2565431da5b2b1101a38b9b28cfb650ffc4895a3424d97bee0d062fde9001a6932a
SHA5120a481c321ee933e041895a50751426391d53ae15078e32be0ed0a2bbdc45ebd669858563f580f740dff5fcb95f637d01839eb00244e8caa63fcb6752a8359263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27c96d09554308ba3def3ea0a3ab012
SHA14a64c400e70dc97582670ae2f9691e0af6220059
SHA256f4f18a50870372e8da747bd567e98bb3d7c9a4b46e7ffb0bf1fc5513fd814488
SHA512efee513ea28501469fe804493bb70f3548c2a214b5c54ef30fefe00bd829f3122eaaa1a9dab0fe4f6a11d46396efe70dd093dda831fd06aee75c0eedbeeea683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e4b65d16db5f5bd5cce6b2f4f9b421
SHA1307e72087680dd084f944fe7cbfe880fb803e47c
SHA25658ca65c5474cf3d2e341f90949ed403eca54250fe99f1998356b1a927598b5e5
SHA512b0b335ecffdf594062c0212b707135cdcff8d3b7b6a98643049751e0a27788061625be67dd128eb8f55c3a743c4eb2d362babb51a1f9522715d5d868da9ed518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501522d2b8347f2ea0dd178c85857008c
SHA11661a816c85bf061f66fab1d587759ccdc4fba87
SHA256aa4c7f42a5be9708bc4953e4038406bb7c5ea6a7366d261135d44d49d0c9f1d1
SHA51285fe458632b889675f4693995aa460690ed6dc63718a255fc86aa7c6fac5eb671faaaeb632872158c30201f86b46cd32be88a08575de8fe6c5849759de5cdeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b99cc7bdd4b9b03bd4cf71b93410d14
SHA1d41946198e486794acb3cb1d7903bc5b492bb6a6
SHA25699f9b231423d014e412f300b44ea44f46fa9ce27c1f7b418387b0cd9362f5cd9
SHA5124a1ee34e678858c54cf34c4f47a7a14f27fb931c9f01fe0c527b540a3cedd5e6a47bd138c1a55646bfd6e30b7206288c355b1d0d799ed2034336fff642dff35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d50276ef2f9d13429e0ad82e2786e73
SHA12e580194ae0424d3cb3747be3aa96b810bd03a93
SHA256b6f0a34f73e01561dfbbfe8b724a7d04359abfb9dde39be02a3075fabe73ee5e
SHA512ae5ca92a36eb56ee8cbd41b7b6bc345c2a6ca0ff44d6264eedac78c2ceab01cb20cbdca5d398c05bb26c0ede066852ce81147abd9a3e465d60e4af7ee4da50cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e5404ca2a6170c16fd619c0cbeba17
SHA1df1348a44ca6599b9af6c3968c751a58af3880d2
SHA2569747b0f79d59dd5b193bb18356eff76829722fedb94730b54cc7042b14a46bf3
SHA5129d1bd0d5692e83248ccbfacd7a8076c64ec3a73c72ede51a9999a90b457e63840d1280a96809607f3f83bf13042b57efc8bad9f351e449bbbe423f68f16f36ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b00d40b219fc9f1c976e8db316b7f894
SHA16d4b83b19eaa50fee45b7c9c7a764edf060d4100
SHA2564116ac7554ade8ef64931c8d841cd98de296040f1709451bbf9d183abde482cb
SHA512a6bca12c4d7768fb3df4996ee5f6526d4d538cacb3175c39ecb0342569688601bc63cab40c7cb9da88399281ce2e0c483509a5884b61f7401468bf0ca60cb438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c0d26f1de01af29c85352ca1763f50
SHA1a99a74df20192ac5a9a697f39db9343344f8e16d
SHA256e5a7bdc9a9e2c2ec08e106f8f307061bb2f5f753f8e0bf1ed04ad0ea9896d984
SHA5128aa11f61718fa395e796751830e5f7c18586a97025cfd8ff1e0381edf87c083d7ec5e4d38a421a379faba43136aa304f08c95db44074d01e5f79deac363c4009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d098a8a41f698de858a8f9e7c254ef12
SHA1d7c392d5f84320f02e597c88f05895e86466c7a8
SHA25640bab7ca2a189bd006323bbc4b9b9a8e294b5229270cf44d0730a6da3e32b5a3
SHA51282f69c9cb2abcdaaee5143423ed794309ac332703175e948ca35f6a7aabdafba578bfdf0313d2371402e002a9eb0b83e76233fe40e24d537a4a066eb6bf745d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa256e8b5e72bfe952252f5f9db90bd6
SHA196a60022c246e608915d3dc5b28426a9ebbe1d37
SHA256d2ab6f4a5d0c35921df62f43e16df5fc1cd5780e2c22d64c1693844a86f15e04
SHA5125552ba62911624247197a5b952d7d1f21c395c7f39d2270bb6bd72b653dd877e5e172b570af7a1648d4f443e2a32ccb0f36fbf997c0f81c92b39ba940289e928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd1e84e217f210a7028355379aa99de
SHA1ba29b63d85f44a7597436c29ec8b8a3bc76dcdd2
SHA2564422f2a3593a81009385ae0055aa7f4987e0d5ac0dca44876aced3078b2e83b5
SHA512799ac4162194a7149cfb309264c41ea79044e317bb8182b5b6a1e5f04b38f39b44e8f2b12010f0e96e308468d24c38e369fae7625ab6bf0a79016db94d2f63c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b378a4a410af5416cad756a67ddac0
SHA1d7fb9d7738a2ce7dd86f42f70fa0ae42dd2a1a9f
SHA256991102075297b273740a9fb2a78cb3acc84e64be78c74b227b3f979b9b034933
SHA512796f346ac731b194beed8e31326cc68ffe6599d1bc7e2b2a547f9b68547b30168ef75fbd305c6fdb1ec9103c169d9c392b8ea259167175c0a712d38360356072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0c98fd93613e3618d2f13a085d3514
SHA13a8c0b7353ee6678a9dc30aa204ad01271c176f2
SHA256b62cd3aefbc16b50fdc798c0bd32b786bcc24ae9946d71374785ef88dbfce786
SHA5127ca5dbe6f48e325051f049a1e5f468e6b03286f17936f5ca710dfcf2acef60de2ae80868d77f2849403e0e6ff4a551369686a7caeec24b4726ee64375a3c98c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53847e9d80f480286ebeccddcf0235fa0
SHA1f06d57d80cb313827fa78fa67aa408fc255a4a8c
SHA256a392af978e5bc9c4d5c07421f685d8f04434974f1c1ebaf82ed70f36db7abbaa
SHA512120eea77af6d1bba4ec6b5d5b89275b3c6178c12c61e57cd420c501e2a973808a98dab725b009369b0a82d3166148a5daea466a0e055212b063ca9a9ab32b3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513235d994625b690243794b063c1b3b2
SHA1ba0386f0b0ff74c92b8f8b89b161333f8576db76
SHA2566a547157ef11211064efa1a2a8b57d17b6aecb8aa562e0c3b06c47eaa921e011
SHA512e843f728d684824d1038c34bb39569872eaa6c97b7618daa0fe1a5474eb127fe634e994d34f6a098f9aff073dcd3ec15d6862df096934210bab2145fd893f96c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a