Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
6405cf77f3278bbaa48efbec5c9aae17_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6405cf77f3278bbaa48efbec5c9aae17_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6405cf77f3278bbaa48efbec5c9aae17_JaffaCakes118.html
-
Size
68KB
-
MD5
6405cf77f3278bbaa48efbec5c9aae17
-
SHA1
ea8d759a5e24444ff79b9312329cd81b2b9b5b28
-
SHA256
f15b35551a5537c35c4bf962d03e1b418ec469cc25b2881025214463426f83a6
-
SHA512
6d5e04eebf559ff53da5c4a21ffc1cb16c8186fa19037e63a5df6bd5d69a8532b5fa3f01898800327d25a82393c0dcca824a3e1e86a7448878bb3758bf93b1c4
-
SSDEEP
768:JingcMiR3sI2PDDnX0g6UlyaoLTAoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JZPPoLTdTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7FB7D51-1791-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004c47293f6ea2a441afcc564bd5e5d3f80000000002000000000010660000000100002000000091f04d8045afb9914ccf06931a578569181217b5db1a1a1e52f17c441cf83bb5000000000e8000000002000020000000b7cc5edf6eda4d73b848c6ccd32277418988563216f2a4de3c7a7833c35e56af200000004aada612a99e2f93f9ac9c80dac23874a734bf31f304b276d7a88f6f582bdd8f4000000084ad5ee9b74f50e9607e81fd039897acdd2e2a2c07cf7f9fe8ff7c7398438105c8b11c401cfd5248cdc1dfae245f5b3a24732be47abc3e6b25bcc223b390be04 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fc22bd9eabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2504 iexplore.exe 2504 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE PID 2504 wrote to memory of 2892 2504 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6405cf77f3278bbaa48efbec5c9aae17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50850e458c7cf9d5c49850c04cf7fb706
SHA1caffc1a5a6896d36a9f879b13d73158e26689b0f
SHA2569b4df017ae5856ff2192698ee6943f3741b24c5e4228ee67c4e9eee30f99cadd
SHA512fcd6bef2cf7dcfdde59feca30b1e02ce4af49bf31f8bee653e2ef2139f323595e039b0bfad92e0cbdd135ac0443b9ef2432dda400341d75f43c2399ad9a97acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573bd3300ae46081d0b46531e6bbe4250
SHA1bea196d620392fef63536aa40c44589a6bb693ac
SHA256a49a38aa8eae51377b006ad5b59a78334068671a8998ec752ea5b5c62b75d5e4
SHA5123b6343492bed02bf0a9bb9e078a69036a1cf90261ece98bfe8f18cf9ed063ad8e93b239160cbafef127aec2ee51c261e7e936a12f181e3a95abdf04087c402bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745aa38c112c3996ebd46194b8cc2b44
SHA1a8c7ce9fc7f23eda4d46fe8840e9bae80e17f25f
SHA2563fcb291379646101ee481d2f2b653a3173dc78b88f15bb2423f222f766f2cd32
SHA512304f758e525564ae6a0c8ca353b1f5743a74aa09a8b1a20fc19d1d0e32a37c7801e38f859dab56221db259cd8939967571dee6148912b111cef2e97b1888b0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf2c8cab7d8fd9e31c0604c07e7d06f
SHA11b2256554a774f6316d0762e80b4db0ed64ae741
SHA2562badadd49f856cf91675c3cf0b434d6090360039462e34ed4d260fba68ded9ad
SHA512a970d899ef0236f90d74e725fa5130c95bf40af375534a90a42dbb7a1a3bdd9bf8dfbc80d65c44145447ed9e14d93053678312edb8cb1cb6b04099703a515c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b61dae0cc933948426d0786ca737e9
SHA17b7543e52ee3dfadb1d3f4e6dfd5455b612af2ab
SHA2562344166b0405b1cc3fcd2fc607a92c743bb194a3f894505f4f66bea1343895d9
SHA512f9643d37de66236da379a51a9d0d8e32ead7ab651390610296c0e5d90be95ee2a917b4645906f321b2bd6df32e59bdcbbfb9684bedf728f6ecfdeb5183f3810c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8ebac5f1775b9d52123c0ee86829006
SHA1a9440cee1b7d10760704ff265bd240d9bc51a603
SHA256a06efc744a239abac1ff4d5ecb3ff75809d2b9a0d86b8879ccd025f4bbb5158c
SHA512be7d74d269276a48e0162ab8ec7824141c4109058c1014afdc53666f0076ca510e0f83f8fa754c2ab2ae56e424e9501e3769c2c4339c8798e540a699db9a2fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff6b47863aadfaf76f25a104c900aab3
SHA1260893ff58c864ba0c87a2943726be2a5178fd93
SHA256e0ac61e12ea9409a8f399941c9e139de40146edf1b0e99d22e198b50f5d113bb
SHA5129d228e456357f176408628ce66c24b3e6d9c9fd7da253181be23678465f9ea73f0c8c3bedd488d78cd1bfb8d1e67344bc752d16e54d3c85997bac252d0877870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff1c71bb7d3a3085dd3ea8f7ce18c91b
SHA1e2e32ed71b4b27ccee93cbc14e3a394b2d337c9a
SHA25664d94be238d9dbbfb32489a39c0598391c45c266c94a52d27589a92db2052979
SHA512f1b8a786926349654258df20989c7b3b077a8d49ed0274528e11119306cabd8982386270337eb2a650b43eabbe2ece9cb5afe2527e1fd2f3e8e4ddd1871ac974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9580ea062324d6e89226a9200cd401
SHA15eb876ca2dfcb318ebca9b139146da2d61af520f
SHA256da78b3e9af8a1fa7ac4e3386983a22c38ba462a34bb9441cb3ef8c3a7806d4f0
SHA5128b5eaaa669243c095106d0bff05b2c59de66b06b873ac013f383806383506e7c1f3aee099c5e64f3e4f0268a292941e3a43e1454e2041d59f51690a5aa0d6251
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a