Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
6401c54073c71d3a8a733df76d367e04_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6401c54073c71d3a8a733df76d367e04_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6401c54073c71d3a8a733df76d367e04_JaffaCakes118.html
-
Size
911B
-
MD5
6401c54073c71d3a8a733df76d367e04
-
SHA1
1915a8e4d7af7573490c3899eb9e5f52cb14d7c2
-
SHA256
e1dc35246ad0225a807e569f0ba69a66ba01c18d0fea77562e45ffa0c9e7a19c
-
SHA512
ccaf5486ed901ec7bb67788de2efdbdc66480aa75684bca558e9f77d48538cad36e90463ccea6fbde06b5cdbb9e81132930b229a3bdc21fd0383bf0fb7c0c991
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35D85711-1791-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000040e95756f022f2d8d8130b47e910d30792d3bf5e0fa8e6823b27d57869b6f10e000000000e800000000200002000000057d023a0b1d08c1e2ac483320288538539945572409f80b4e2686ca150d719b220000000014b7f93e8d352635d1eb6c82c1d47b6f3d4bb6440b02121d9c0bcb558b6a6e24000000078bd2e8a2e3e56581c15ad04ce26cdacf5a0b9f74f8b37a9b7c9aa88f6e29ea95f4c255a0db9802461d141bd1793b9d005f8cdeb216f46b25cb219ef70769c01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07561f99dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1340 iexplore.exe 1340 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1340 wrote to memory of 2096 1340 iexplore.exe IEXPLORE.EXE PID 1340 wrote to memory of 2096 1340 iexplore.exe IEXPLORE.EXE PID 1340 wrote to memory of 2096 1340 iexplore.exe IEXPLORE.EXE PID 1340 wrote to memory of 2096 1340 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6401c54073c71d3a8a733df76d367e04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e684e8a533c594cbbcbf7d0b2d60bfab
SHA163490f3f03978309b9a39bf82b56096e30c3a579
SHA256fb8959097c70cf076c60dd9d0ea44f51290bf474793ddb90ff006c8c483b1fa6
SHA5124855d4eebffbbd64cf1cc69d606e2cfb36667894b31180a5756f1cc200c480bcabd220e5b3da96654cb9da3bb6a421f713eb00b5617a022079433be26d1d2eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c70aefb246a3096745971647708e6af6
SHA144659366213d0ee8f26533a59b226f18425f3579
SHA256b48ab1d42bcaf43248f4e9f6ff036a000637f57dc00ad9f7735e7d9aa318b6f1
SHA512ec9ae9d528669d6cd76230876d12be18e166942d9ae9c9405a89565de4bb81eaf5077a0077579c2c5d6c69401cf62d473bb7d20a94c04b012f20566c5c5a5699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56fbeb23107b3d6304ee11c9e88a42939
SHA14da85aeacdf5c9eec649c3dd0f59196baca01ac5
SHA256bd8416f6597b0db9467ff5c6c05afe0296ce9dfd0938e2f18484e2a6a4fff2d7
SHA5126769594f8ba237c26be863aee6f01502e80817dd026f675b5aa90cc030a8f5e70f0edc6ba9f29effbd564b476c304445833c9a489340055284ab151b5c1a24f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD565caa788ab3ff3898a5d66927f317b23
SHA108d3d8b333aa8950eacd607eeff23911f68e4196
SHA256dbc77d889bea664e44af69bed212204982b0291290bafceccc75d9303bf44ea2
SHA512e50e8fef183a0f62e06f61ad2dd10adc5302d5bec4b45b7d29925ded609e85315bb2767a08ef07643c0c68d169005643614f3972adf5be3c8f18029c65680b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD504edd2da68ea2e19ebeaefa5f7090d97
SHA1b852889b08daf4a9cff7a2d241692cd56066540e
SHA256139b9eee53770afc21a4cc56349affa4c19c12028fd94c386914d72074bd8f5b
SHA5120c2b0dc7a636661661e3f0c7ab505261c06363b6963eb22f167f3e2167c2df801fa7bb88e86413ad3592686ba8e6bc91c8a81ba39be69d7eae44260a9053b480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51064cc68cf1a5355383c4becce20bbe4
SHA16d70042053769784249fc3e5fc32657e366a2512
SHA256e65b98e18be7588d6e05853dd9b9b72c87971fed0bd98728f1e1ac2c939d27a8
SHA5123956a0ec954ec1c210ebc34943af6c2648fb23da786e4a567737186eafbaebf6a366586fea282ff12cc516367332ba7f109d22f80a35c28e485e53796576af21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f31637a8627f663e4b8d3ecddbc9cc51
SHA1b37b76d17e15c4ee53588dfaa2d1080897cdc809
SHA256ae9ee192e67b0dd7786e13c655a3576fa5ea0402fc93de50bdb6344148fe9b23
SHA512f6b36aea64d6c8c9aeb9c0739cf7c213c9bea88dd0704f19ac0def25f46a89eee533b9770fb8c044757ff306ba5ed9bfabb9bc7938abdc4b3aa2492c9f21e51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54146314f5139d00f064e690b6ca62408
SHA1c0964fc7c9c8c22dc6f19003dc70c2266cba04ea
SHA256ab3c3fbf496f5edda65a93455eaa9424aee21d5f112093a3107869f2a460a237
SHA512dedf0d21b126801664256dfa1cdee8b885995cf9bf035d23d50e86078a63b05ea8cc272cfdf8c9be0149f354216acba234210ec87c6e06830748634c297db13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55de02b2c00a99d98da1d796fb2a3cf50
SHA137d51ba29cb4090ce327ad19832f87750cbabcc1
SHA25623d3b547da9d90e8197a70b5438baa9fa70e80f849d87e3cbede2b015776c210
SHA512b542284a49e6226f26dd42fb6e6accf86a4ada31dc74e65c6c613d7ce38ce2938d6b672c5bb097453a8e2e53ac0aedcb958fd1b1db20405639033a8d8cd4d4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d2bb5c5ad28c7e4d8125465caa653c0b
SHA14bc12303105d934159c148df98baa14f7ed9d1ca
SHA256f26b815b2e1ab530c11cf30b8ea13f6cd19b527306bfa7d92bcaaac31ef0a627
SHA512c85c7472158537d7d50de5a4b26ffc84cc86083cb75d9b8be662fa140d021ee7b29b3399ec36e48c58e361061f636e52f149fd20a93be6d442cb96da71cb80f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54ab63004e2ef312a588973760755cbba
SHA159ed29413dedc5947e3a13c7816241b97689df2b
SHA256e8ed392b562f3d7931d28c237c744829ee171839dc0ac5b175b9cddb61fc3ce8
SHA512d5370b5f71f077bbf58d894c5bc7d12b84da7c9d7ee4176b02c31d9524646e4e8865c15e9bf8ceeb1a62ffb8ea67988a70d4a8f11e320a244a292ef70e381212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d8a3216d08ba8a190b3d11695c0bcd92
SHA1b136acaef06ee45428f1981c5ff9c539051b0974
SHA2565b92e0b744e46664c3184a3977311f5d55ec29f6ead7209e67b448629837b4d9
SHA512873a2e925098b84ae41c08010c3421a7f9d544eae29c9abccc96d8b4c57e8b664ba6940a807ad69cad2d03a7e825154f544021e6e84ee49e930326fe978714b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a35386b167de39e18d79eb9cdacaf263
SHA195496323e7e541df30dcc755204c1510e33d0ebe
SHA2569b8c309630a8ca524474741d013c8d1c60cc5429a2d84162852eeed0ba5438d8
SHA5127afee6190d6866b06576978e25697f94967aed4418130b4d4695c8129f38b75a94c0b78bf004195505fa9391463e959331acdd7522e0d9c26eedffba5ebbcb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e401748bab962c3739bbf04a9f157b1
SHA15c5aab162c1f9f3d74a07e0ee649fd72c00c808d
SHA25666b2ecf8034d5025e979a584c35f09d8b072f9d0fe433e4331223aab4549cf05
SHA512932d1ed2e57f05cab74136c16b7ade38b44552537d38e6cf0519445db236f9ca29c0d9786308b5af7bd3e7a582484a3e7b3330ab981b259bc739798db1f0273d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cb514a658ac050da6b89136962784270
SHA1bf8de6d22669c5f2887276e24a80443e9c2d26f3
SHA256cf3cb7e0645230a0f4d5df1d7bd707d48f6b252716bb7788d52ec9ef15082cb4
SHA51294bbbbbdaa1ffc34308564cf8ed4ffb5a72cf0e971b317ced045af9d47ba04b964f5be47d212ac6518ff58d3b3bccd4d8bffbc3dc788fd2d360c1c2a852f8a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d8107d51861099d333bca6228f5d9985
SHA1c4d3503a715213d7f30ac15a97491c9d757370cc
SHA25686b75feda8463a25e38f608e6641279be5fdc31c4811a1f8212287cb77173e7e
SHA512ec9cb48cd6d8711da0484d2d1921600a0249e9a85a986ed8d8d9d9756f3050959b69fa8f82e738b2cd38d77392c25a0daee75c6f842a43d2e22f17f99bfe7397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51d9c1f21d42bf9c72c44e9c7578e2a1a
SHA1a6eb945a678451c45e308a9666c2f833b06b07ef
SHA256175e22adcd425d3371c9a480543aff2e839502c9d8252a46f3153cca7406fbe5
SHA512a8b84e902aa2e9530ee8ecd170b3a972c44e7aa0775d1aec173e1f2637b8f907fe82bfc99469e7cb7b6a724eef7e76441fd12aafe6034a1c934c0ad502b5f046
-
C:\Users\Admin\AppData\Local\Temp\Cab2204.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2265.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a