Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
6475d3d07309818b54054a45d29f37ea_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6475d3d07309818b54054a45d29f37ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6475d3d07309818b54054a45d29f37ea_JaffaCakes118.html
-
Size
25KB
-
MD5
6475d3d07309818b54054a45d29f37ea
-
SHA1
777be37c7b88c6e875e3f18e44a0eb5944e2ccb6
-
SHA256
64fa76043328b7c844a7078fb7f53e12521c7dce54da800dfebb441a8c4e96f1
-
SHA512
1d8c34ace83e4918893f09df78c7347a7844dc8563c63f65bac4f212a02fd2d2e96028de59dcde21b5a7e8763ff0f1d84ee032af45077c2bbfa3f8b679f0955a
-
SSDEEP
192:NzMLqeo9LowMOUq6vb5nC3+DfaLa2CDominQjLntQ/onQie7+nzd7nQOkrnt6E4S:+Lo3SQ/oMtrYg
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05b39c4b3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003b7445258e9f38052a3257df4406f3c8325c70aaabef371e421cc8b7f1b0bfff000000000e8000000002000020000000b64a9bfe9acc4611d7ed0f3c9d1cfab36a03922dab9310e03395a1f32c8067a420000000872bcb2185020bb2eec16e0d5c83cb3953b18ddf7be832dee5bcec31247dbb7340000000de056b2260174d2e6f7988e234c7233c5dc5de8b88e1f59d476cc2e4ec307783267dda89879788a13dc865dcd14656bf09fcef630221311422b0362489d63418 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422480990" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF948A11-17A6-11EF-ACD5-DECBF2EBC4E5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1620 iexplore.exe 1620 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6475d3d07309818b54054a45d29f37ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e210c09c5de0ef2481f6b67c52c1973
SHA12535e212ed53051fbb6ed80d381c60288dd37cac
SHA256da420e00c8da290bc34ea667b0cd16ce8b3dffa261374d40adaeb03248527aff
SHA512debe177770d29f65a9fff9a91bddecc0e6bbedec37cbf89971c85d52060ecb9f4ca7212911ff52ce787b572c8da503a7f4f8e896982276796a89f63df6f08214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa8c0afcdbeb2f73e1e77498ff5bef3
SHA1b6b9dde8f3c524541e5dbd9b46fbdcf991bb2f49
SHA256cdfc3e3c5499093176788d1d90cd86444bda487e4eb094286d94c4fe9d6b642a
SHA512554cca64f9f0b0a06c41af570fe16040f10082119ae5528413e5660c07ca4431037a8738653c97ef1b0597e92fb98b5e8115530c066ce37f21c56f4efc5f1c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb49cef21567955d853a929612fa242b
SHA1e62901dffc02c6b6e76ef17315b2afac5919b14a
SHA256f560ae5aaf6fe94f6a81d5b88050beeb71a9fc2612d115d572c160b1bc0e9771
SHA5123eb7f9461ad107e6788f7dc762704ac491c6a3b45e8408a48eef7dc36031340b5bda2ed168980a058862835937748f228e5bf810b74706313213b08afcd0b168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52afc60a5f6692b3aad7f3c63dd1304c3
SHA1b69ac619d95ac6c2eb378bb1073c7f84869aafc1
SHA256ab0ed48cdc0b218ea43e78e0e3eef3a227fedebc3555ac33f98cf59e7d42831e
SHA51267d367aef918db783d522be998ebd3b630db90aa076125cbf3b1551c031c4b036f8d892364bd8133775c6e3c4c57b4356b52ed3d7f2fe064f382ef884599b554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5999f76a1fc9759f03e536fec3e90f9cd
SHA1965fdfe86380772a8db4d8a230c396eb12979292
SHA2562b83dafbb06eb8f0581b42b35cbdbb3d91a01636de2c66dd480037feef030650
SHA512cb03368067a57f9bc93a4c742eec41a11ccd9b1ec2f3af9c665c97f04ed5f006130a5e00cf806a39702ef3882b568f69a83b9012fa0f92aa1f0369d228fc1759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd76c4c4dd2f0c94c7f7f6860e85bf3c
SHA10b190c83d0112c466060fb4254ea26234f5a0cd9
SHA256b9c5fb40572b1847dc1cdddd0ee58ad5dea957756e67946aeccac7e1ee613730
SHA512e22ad0244009fc1e2b204091ef85a90f99e1b948b52defb42469238db94eb3ce32728f7e0cfc7e58c9aa043c3c0994ee4c5d132ca7ba0759205cd7b85cdb054b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b00f90e747a8634ef43937ccaaf741c
SHA1d3a7c55d40258c68ddda454b1361f4d74438504b
SHA256b6885fce9bb1d983980ef244dd57425abb262d53f33929180f2a24d5e9f44978
SHA512ce631f3a9f8ebd0c88e48600338fc2c1b5f5d85043fe0d07e082f0ce08785824513d502989b85fed17c40bad6d967326e6d9bdef1c5b16b44461fd6e69608fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d028d50da78d54645bb324f23a0ae7
SHA16284276f839775867b1f5f34821b3daf1d4789da
SHA256d6f620736962947a15e53d6cf4baa51adf3a47889b4c8cb6897718244bcda5c8
SHA512200183083227c2dfd794540b3efb602590dd03842c741ebec28ac3cdb02199aa4f29f31644100e9b3aa154ceaadff4831fcf357fcc4fbc33520b2ab3403cdbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5d50a7d7339f152d24155e7322c668
SHA1f3a6277cf8019d3eeb0b6ddc77dcb3f806696f34
SHA25637ba29892c58c5fc7ff74dea0c5f28b6c30bbf715ecad3523d5f6eaeb5122da7
SHA51281ed9dc8233d7233798bc69ecd96362a49aacc5997b5b8ef7413c0c80153226ba2e11a690010b67061bbebd6367a1f1a5dcfd02e830f8f0338054f4220fa79e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d4571dae73ade99c987a080d607dcb0
SHA14030bc954bff77514d1ca4e3ea9cec083b8a6aaa
SHA2567ff2da1d897398c0af77f82750671fd97185919aaa4e0132b1dac88ec23a89cb
SHA51299b2a8131e76afc43c8a449ed3057f51dd16218101253be0a549a2427e95c07a7d4af56753e1abc91f5b0a2922b623b4e029e926812e2d0b4c3cde71cf912662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8739bbd413cf0836d0798cd3046be7c
SHA1297c5cea508302b42e3199a16c50738973bb0d94
SHA256ada689cd1d7883da167e1781012dcbc5446bdd3e76ccfc119201f9d90335a65d
SHA5129d8d2d28dd6de3e671a9598045ff0ae7e653d1a473fbd833870ffc4190d564964f6571e96b28b0a85625abab0432412e94c358736a7720d47bdfdd8a135f734e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50074d58eefb09b0858f9458b7afd30ff
SHA1b459cabd1558de3909c316df4063d0f511f2dd83
SHA256184aebb1d690abef182735a8f0bf69f73a544f8afd3823352b8180b131c642fb
SHA5128db2df3616ac9d5edbbe91274539e2f155615f59cc2ee41d664d7767ea6d0fa7ccc1ef5ddda52db23cfce74cffa7cc3c26ee811fc141fe5e115d8f41bd9f9fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4a983c370487ebe297ac6b61f22c6f
SHA12e9203f1cee03f27cf4ca090b9fe0e9832176c3f
SHA256c9c13d41540412246dda4efe949a783add500aad06a1d25527b1ad043e9ee1e5
SHA5128d2c2a49c76d1f874354e1e0c27621628a6409d04e720f0b7b3855067c875107020a07d0e4fb5e22af2a1e73635cfaf12fdb124458d85dd44a5c9434ae7e2096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cefb0f70feea13bcfdf0f8c1aa5c480
SHA17b372ff5a87550d02861905c1afdaaf3d218ac23
SHA25623537e0b571e9008c13043555f892e20878b36b7260acf9e61c919e69f5dd5ad
SHA5124e04961ce2df9103fd22ede409682574e9d1bfeea7187e93d90d3a7f8a811ed4ee0dd7ac008b52994b99eb09064c4c1f648c98a50ad53d4d0c853b95a2577aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4be6b6f89ad9b173b5f3a540fab37b1
SHA1b89c878d9ee456254ab95811b559b3c42bc5099c
SHA256396c9036a39248272603fb35c3c389b774ece42d90f5b589a9e29860b4030a1c
SHA512f5cd28bd287fb2103c4e3dab39ec1712517bdcc32d58fca9e05071b9c0dc50ae6c170434304c3e9c91eb9287c84d8ff39e825f5ec4b4609eba464d94df093953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a95b2c7f1974f93d30166d909c6fd1
SHA1deaad4dddec5020c0c60a1c5a52ec2eda9630529
SHA256ea9696d336851f7fc0ba44ff106dd2044a3fe5a5c14b081c84395d94ea6cdd61
SHA512577b0aa112ed3f0e23986aa55bdc40df6bfc347bd5ca26a6de03a282695e53b735dcccfe418504e12fb5c4515f7274f619a49e7223647b4730066e1066a53ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c2c07e9187935aa4911d8a395b23d51
SHA1d93b345be6e5e452951da88fb0a885f8b66c4cd8
SHA2562ad1ada5f2a1eae539fa650d802c125196aa8a49ebf1a29e91001cf02e0ee751
SHA512333400555c5df45c5c140207e9c3efce8379fd260a78c6d5c24a2e2a94e0552bfbcf9c73894298860b2ec2617baadbd4c24a7e1df2952ddc01dbd927ce77856c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53079bf82659813cb0996ece947c5c70e
SHA197a3baca5f51d9eeeb10c891752268c0f8900682
SHA2564a80cd734dda875cada4420dcbcfc9e978726ef16937d4baf93f1340a2229338
SHA512fa529f501c083f4cb7b9f339b81707ed9984014e379fa629b4deaf9bbaa3e83e8e416ba7b704cf40ef7c12226d6c62edfad80d35e9a710209f06d1c8bea8b118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea5ee2ffe649f4dfbce6fe7f3e7979fc
SHA13793db3cae8baf040f205587fe263cd38c04e755
SHA25663d73daf320aba1cec90cc8d479058ee78712c5863d4c0ad02d79a501f93565b
SHA512dde0b70535e3ac8afc30eaf288df96daa9e4823ecf3888196a16eead74dc30980e9c413b6fc66efb965284133fe94918a39480ef80382cce6292eb5e65a5242c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a