Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
6451a580943d9b9bf801dc46117d4a1e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6451a580943d9b9bf801dc46117d4a1e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6451a580943d9b9bf801dc46117d4a1e_JaffaCakes118.html
-
Size
14KB
-
MD5
6451a580943d9b9bf801dc46117d4a1e
-
SHA1
ab2b8b75b68fb1ac49835a1b85f51903ae2b78b7
-
SHA256
1b6cab80ac9931ce9d35aece8c3aec42c734ec1363e6d01afb4fb66b0d080347
-
SHA512
de97fd65ac4d1821229ee8725467d3bc46833e36bb8c8c442ad481153b3973719e9ae51f1f30f77e53bd1c0ee8277b7ef18f2e2ce9b10d442d20c624adc27592
-
SSDEEP
384:CyixlMX/F4+OQFAi7zy1wI4lMYrn+rLU+Bj:CyijMPFBOQFAi7zIB+MGn+nUq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422478129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007b7f6fb850002aa134b8bc3d33ab327377fa37fd0d3187d3e64804a5e69cada3000000000e8000000002000020000000e055c802088033886e81553ef5c745a9406920c2efc27e2ef7163cc3df7fbc89200000005dd457972111fdaae2efe52aae4def0c95ab95492fea50ac99d2bb427e1bff4d400000004575aa05adbd6fffe2634e83fce0c7e2f030eb7834038a4f6c41039bee33af9bcad9015d2ac7f9aea99ca2c7b8d2cbd60681eda7f720b99848af57d566fad7ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a0311badabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46500C01-17A0-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1744 1736 iexplore.exe 28 PID 1736 wrote to memory of 1744 1736 iexplore.exe 28 PID 1736 wrote to memory of 1744 1736 iexplore.exe 28 PID 1736 wrote to memory of 1744 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6451a580943d9b9bf801dc46117d4a1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b667f48aed740721a9c155d251251a
SHA1cb5fdc690d76d9ba978f3c16ebaa7115836107c7
SHA25650ebf5df5745f3f63a093c01e9e25f73f7c1da27844d67ccd984e44a39dd2d08
SHA512e0ce65eae0bb5a3b559a1ddc52415e6d0bff6876968d8d4d59e532a378e23d5d8af21dd1abc37ad4bab9c53adc7c6f0f4d0355a70c2ca223f4a8cb3a7821f54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354c977e6ce746f8e71b121b48875128
SHA15c29dbee52d620b2fe9cef09b4a159c167b526b2
SHA256cfaacdb41af156bf746b83b2f9caef9f33076758d3904d85aff18c706df16cbe
SHA512ea8da2ff3a132a94318344b77b12210578638d83f24b7488e32bee2a5095fe2a4a6eed0b7409291325e1d5e0732d330924cff8bbcea00ef1201406739c242d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce0ce58e1ca8e9fbc88b2e3e1e96575
SHA18c9deb5518d7733ae99c87c5fa82c040314ee1ae
SHA25623eb1fc44f9f0af5f2b160c8c6e1867747185424c7058b07c6f0053cc8b9ffdb
SHA5122b28eda99a808ecf890f71beb663638c62fe6fa81ce34f1bfa460b5f2fd3b82af05cd7512739bed160e136a9c5c98fb2e291800d776697b7467a0fb5ff6b09a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a55ed4be125c7a6259ff2e03350611e
SHA1927e20a3167370fa51510d2cf7bfd6b04585820d
SHA2565f29168b345b87d5ecd60ee245106dfa27b756aee7807c0de9c51485842b7194
SHA5129fa63a6be73cb1a117ebca3662131667a2ffe1aac3dcf11644896d2da4c9c2fe63290a3d3002a835d405c8ebf63e08baa4faa46a4da67c56e5c5d3e06494aca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768f7def349e14e308f2eeda00fb8b0a
SHA1bee1769b7abf7239cba3a941eaab41547ac18cd7
SHA2565eba3a0a9af6f5fcee7654e0fd5fe6bfa3005dd572aaa290fa816bff3c2e390d
SHA512088a7d1b6fc9154b95cb1ddbb18a542e275a45f3906c1babb7c7de0966aba2c9f80a0dc554c00a5312245241a3371a2a29594e1599e460bf47f4f1ddfd77b7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b060fb04358f6598608a71eb822f4cb3
SHA11f882b6c00f188b9c992e50faa6e82a8d6a2cf01
SHA256b1515078f856f319f9e7182c97d047e0fa727baa347931f715c690d6ccb02a72
SHA51201eab6be01588342608ef0f5933de7ff1a30ed53c8761f8f17e2239ffd70fbb47525ad8913d9513947f7d886065040ec474069d7b9f7cc0c4e88fbd2c65d2cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0300047d982391068217ede88f1bae1
SHA1142614382ae2e2d2c89a776a53c7b8f78692c63d
SHA256c22c4f7e81e5cdb3cee096494a9b59874968d8b5dc26f03ab05de60213f9ca75
SHA512fc8e7f353bb832e9628cb78dd5ea8edc370c3d59430fb25a09acb2df8a66ad0c78f12fc570ea7a8f9944acc676c571f5e3a1f04f137a1cf6b8071dd825a58235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d501f594d671a81fd7fd9751cc8db2f7
SHA1a9f51bef25bb848ad32ecb15dcffa84d1d0abcc3
SHA256cad162f25ccc6c6d7f388bb18731152be388641d12a1d0017d70e3385683cc59
SHA51219f2d161f7a4459e90b6eb8acd92ac4b6813f44f86ab8b958c062b6568d9f4795fce882913c1c91a8551999fd0ded073596dcbe7e1460a2b12ec1d17b03b685c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd4863855ff1bc4cb7641d0edd96b6e
SHA1e06933549effc1c1a90e418632e519c0bd2afff5
SHA2568c60169a53ec78e278262557f8c6378c4866175eae4a351d79db06cbe530b458
SHA51269e1cccf26f9526e1bc4eccbd02dfa123ff3015795412288a4626332347ecf6df060ded0b7eb9c7abd9b5374e75db3fa93d5ba348660480c522700e62c8a76b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548319aadf828c22c567b930d126fb64d
SHA1ee447db237647a421ee582c2ba59860d49303afd
SHA2565a0342ffbe22a412e2b552de1d31da22e089b54306171bc2b0acd711ddbe41fd
SHA512fa5daa0dbca1d777b71a7b0a5ca903581a16eb7611f12657043c61511a9f7e3d59f32b4bb707e4be4657f33e28556fdde871bcb4d73f8030cc788e7fe0819b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f28b618511f617a74b101292ff6d6d1
SHA1651c75efcb114dc3b670e2b04e0bb43673b11925
SHA256147f97f51aafe4b20debc4d3d79bf467e72f05e73c184ccafeaf4ea9741c82d1
SHA512cd5c4e9b8ff7f040f3954249433111921c7c3b2c239f0770abcffd469335b76bf67b553baab05b75d91fcf37fe2d72c71f19978f37df7f93dbf7df9c563e89a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a55b549a7800d9f29a2db2bef72e092
SHA1c6e0b016e2812ea5b42a656fcb4cbbb3be6c1556
SHA2567cc491fe439cda53084749f5f7226cf3aa55fb77f1f8b1209c249f0c3544d7e9
SHA5128d58c19f7c0baf1a14a70106bd7cba387984f3d87966bc1069a12da8cf7f4609eb6eccd774b9b489aa55afefba2f2dc22703be448c918c08a8e91fa14bdffdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ea56c5b99525957077ec176fabbe9e
SHA1c0fd3591038314312ef4179638296e36d47b7345
SHA2567a3cc6d6e7e27ba4a69c07c31bfbf10f6958919e24e7e4de74e4162b78305009
SHA512cdee08099374367ef4e5c84f493753bb93d9336f5e6bd4e53779d5d711a2bfff6260289ec742b864172a488ad509405fb48555ae737e95ff96547c39d0592fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74e8c09dc9bd73b093cdab9e9fac9a0
SHA14bb4e49cb513416562f89173d3c5ec9ee714b988
SHA2563c6786a45e85bda81d91cd5259851e0a398350af3510ca9c83ba88644057345e
SHA512117f0ca0670f82fc8ae039b8dc1175e8f0b8c02623e03f3778118647d9886263887f9a9b88966cacd3b20bde9a8552686b7f6b36c18a81a6f1d017f02902b1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36353ae6f203db063cb05d52528c21b
SHA1552d239703b6783c23938f222c06b29d09b2ea7c
SHA2560c635637271eb6dbaec46f0442239f93e6dc2a643f2b64b5c5be313ab08a228f
SHA5124aacfb496c59b6a384d0cb4ef3a4d5f10fff21d3ce8ed54a69a7ef863c3b923b574b80c6d6461a6f1a1440235c74705edfc13ac327012c903b7f694cac8cb280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b2905e645793beb0bf8277e8b908331
SHA1d5ab15f42a54c53388c9871dbf061b2154e6f5c5
SHA256f8925f4edbc21cccc4cb53d89cbf83abae58230845da05665dbf4ecce8ff3dec
SHA5126e8ce2e43ba19231850378f166d7fbed9871a47f516bab488fb2bc9e43e6a41196500eeebe3846d22010d26e031fc801c7864378ca57ca4dd23d02e15967ae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d1f991ec8b660028f44f5fc370b76fd
SHA1f268082db9aa2b14f3579ce1c8a89c0cca90b871
SHA2567a5f1448b9ee53ec54f2d599ce5a1b7d96a4f944da0aed480b66ba7fbc204bdb
SHA5126f6ae17adcb74c6fa2413b5ffa030979d85c4d8838ae256fde215c824738222ce71f1a0e30599733e4d0a8be44bf8a3a51fe409c1b8a1f6a8fbde6d00b17cc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58270393d68eb14b88aed2b46a27b175d
SHA166bf1f397eec20089066f132c40d083890aeabe4
SHA256cb45539f9f8c000859565bf21bef4b811b8e03357c6a2271ab4cefae395e90cb
SHA51258dd274f10c610ddc71c2a2de214decdf385be733bb70c98b8085a88d216c7d3eb3ce01f15a89a42b498cba3005c750b0193fbfea5c5fa68fd2a681d3799df97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be3cdc4d7cfe8574eda660e220f3d180
SHA1ecd142f7cfd07250c50b8b6396894a5c4acefd54
SHA2567bfd8a6698081b669b458cce6383590ef584785c4188d27a60e7ebf9ce564066
SHA51277383c3007ddbf85ae7bbbc552caf767081fbaf4351ae8766dba7ca919afc24c66f73e52d4b07a2b96a65b8e05c35337d117017fc144f569fc56a1fe53813d5c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a