Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
6473b868c9418e0115589e678ec1375d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6473b868c9418e0115589e678ec1375d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6473b868c9418e0115589e678ec1375d_JaffaCakes118.html
-
Size
954B
-
MD5
6473b868c9418e0115589e678ec1375d
-
SHA1
d94ec4282b792d60d9d271fa50800fcfd258d533
-
SHA256
6dbda1a854dc63de326ae8b0cf13028adf93aa365e988d7f53b93d3fd28e2732
-
SHA512
5479b52b03fd91b330da9b3cdeb7ce0b485fe82693d7ae132f6834a945e571f34c59d2945d5e199f12f8107762bcc2697b86c35ac2c2de43e0411f2d262976ac
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a917ed753709164abd3b85d176546b290000000002000000000010660000000100002000000060888d812dc6fe4abf7345730afe0410f4bb17e33c47e8c70145b74b9dc5f0fa000000000e80000000020000200000004961feef156a87a0a84e1a9c7a2afdc902375ea0441106a4cfdb497d9bc6387e20000000fa460f15a48ff6612dcf57d2725ad144c8f0f537ec8d4500f791bb3fe0cbc6e240000000d144ae9209a0e92ee4b0c311d11297ab9b7b7cce0953169869e077faca406375094f02fdcdc6104dcdef65160c4e00664cc0fdd54a208ebe63f81cdcd4627246 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C2EAF91-17A6-11EF-A1A5-568B85A61596} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422480851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0899171b3abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1516 iexplore.exe 1516 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1516 wrote to memory of 2508 1516 iexplore.exe IEXPLORE.EXE PID 1516 wrote to memory of 2508 1516 iexplore.exe IEXPLORE.EXE PID 1516 wrote to memory of 2508 1516 iexplore.exe IEXPLORE.EXE PID 1516 wrote to memory of 2508 1516 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6473b868c9418e0115589e678ec1375d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfb8e7a7cdbdc47d94f6e1bc992ee5c
SHA1ee6937bda653f2ce32ecf84ed3c7bd6e531b3a43
SHA256c90a3464c9c337b8695b075e9d362db141d3bee9eb219cd694662aabdeaa0ec8
SHA512179242fbe3ec3e180811c95dda1dadc834b0b4c9c594031ae2d890f1a1a8bbc1238a9008adeb23583ca2f8dfc1a6bec408cd6e49f617494885969bbb400bdcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42ab0cab1456b8283909078fe35e691
SHA15a163224a3eb8add4d6cbf7cd4918a1834bed81b
SHA25612351f6c4773a8b1b98d1dd5e02bcc45b7003f03d593d132ef78f5a95c3d1486
SHA51202c07b27c9380aa3493483f9e1f5b7db473c65c5f91ab5e5d6bfc39fdb576949ed1561d7082d2fd1758871729f1f481c14ff8b48d4d958375b2fe5cc7fb97642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bcf4b9c013079633e57182ac51707b4
SHA160e4f66344c7132e001f6062cd9feb269d3979b7
SHA256c5444253e16b5705d29dab2f3c018f3db8b0793c0d36fe9ed2bb8a7fe9722e3f
SHA512332f27412ccba71760a05fd9d8b7cb9158aec70d606e41101fca0276f1d5002fc162a310b3cfe23f550e20dd3cae934f7c090b8e7a24e036449efde90dc3f31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5917a9ecea42b749a53f6f20f660baa4f
SHA14758d11f1dfe6009a0e612721f5f7c83adf2a51d
SHA256eef818700a90d7dd7184c8c64d3905e8b8f323df7569e430273764d03ace3088
SHA512c4a20641e3dd116633ae77dcf957f6062c8e101cf149c7f6967d377ba9f4b2e4b5a2e2e0fc8195d3f77c1236dd95c89e7f72766359e7cb8c095d2d7e0d20c4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9e790edcd4a8309f84446f71475d00e
SHA19fbb96fd64851232dbfa1dec9c3d28b6c8836eaf
SHA2561892148ae683346690f2c63f8405602c9889a3f67d2a0019bec05760dbea0ccc
SHA5125e2e949968de5bc16ff087d1e397f27d50740322b41f5fb911a231cf990619218aa2ce1099218e7a426ae749610b13249fdc310902e7e45907744ecbb3dbeab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5053472730531ae0b95d135c69e1adca7
SHA1558bfb565d499102f959368ef5862d92d258a0cf
SHA25670659cddb9e7d29f6343a9e58ba796dee36539e5c0f69cf9e3b6774fde7526b1
SHA5129aea0e6cc6f4c0c83bfdc758eab1e5684c8f36cb598f3ff4b79b1901b4fa8034163c54eb7b1401c52a295bc9e91c66d297a0978646d56cce2713564f85eb465c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f027d78b9158570eff4c266c0f604d0f
SHA158811a5e7c253ff4be270189fa4cf554fc7d16d1
SHA2563591d3c68b0259a45b5ea10a519846ec4bf95f6ede6949778158715f1df31a0b
SHA5128e54b3f5485f50e3cbcd83e901d5d89d7870909edd421d647383718b2fdcac3a19c904c263267680bca93cabc79926033a8895cc2f75da9fdbc5b11f87e18cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb68dbd92023ee33d7a6d55d447b764
SHA14c6556291a045fbc571cb61f2a8e95bde4efedd7
SHA256938e4c78efc575a261797d2f85ea6de006b8ecbfc277972689d3186e98de6203
SHA5124db4aace92834b2a79dd9c65da0973f1b5af4adf41671cef03af35077a924be4bd3bc297df5b0771489e38a61e2310c95a8da47e56ed929cb31341d295640e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdec911a2f0192a7d5195221eecf782
SHA1292e8bdd6672e294a89b56421aca4cb58822806d
SHA256cce33688d5e062d1923eafc71fdbf4f39991284e748634a66ecbefd81afd5c3d
SHA5122febb6dc7257a97007465149e2a5f0dc1830fbb0203675b33d6fac834c9203f3d31595e84cb70c7eedc80381404768cb68539fb484c5cef97e4a4a404fff13ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5715a980242b14f6d132853f3b791aaef
SHA12395492bacbff2f71a4d85b7376aa732298d3607
SHA256446627f71bd3b01df5ab057296ff011c4d773bc3eb6408339a339b425bbc578d
SHA5126fe6b5d3fa2a071e4c971a239321a9899ee7a4e9847a5c94600048e6b2a58da70ae280ca1cea725a434f79a9ad5e1ef1479d38adb9d4f9c9c0ddb871bca6cb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fd074b657dd38529bbb39adbf6ed840
SHA1c7b80aa08be81e4314200e259b05292fcb866c72
SHA256c9b953f4e11a110a078150498b3c54df9f4e0e113a02c2215564256ee001ac13
SHA512cf28da4949d7187f12a5c965f90a7da41f9ebed352d6d9fa340a3420ce8c48e1b0844d005f044afecf1f1511adbd0c54455a22d151f4835d2a445436f49e3d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5e4e734b6303541e691a80a2e004f3
SHA1474c09d1e096060c64edea65d3ce525f6ba7622e
SHA25666236ae8da62f507c8bbf0cc9f621fbac2ee0d2a61d841fedc6e6a1b894cb204
SHA51292fbf64b559b42f656a9153626ec1cce89f3d93798538950174a9b65cfd33e03b38e8caba29538d82b0966d1a320ac316613b6a0868b10d673d1a65ec7159109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec66b6aaa0ec31842076a22649f3ce25
SHA1f72a9f9b93c33dc138140494199f8ef448728ac9
SHA25649baaa5e656e036bd1929be4df6683ff437bb00ac2b32a540677aac627b76e96
SHA5125b0926a62443a32b1a52d843de1427ebd55e080f384001f0303cd3fa216cccaf3f52ad1ec756579a157a394afdc441eca3528fe1bc408079c1dfc064da58b7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eb713dbeb76c6835e9e50fda2c78096
SHA1dad9600ff0d282bb1ec685e45bba1aa9f3689a3b
SHA25675fe6c4003aa7fa5057d5dbfef29fbccbb2017dbe04a30a598721e464efaad70
SHA512f05436969b8e54acae7f4e34f975e8e0906fbc3b560c78f3f46d7e209ba326fadde670ac46d5641496264155c52a1ca04cedef333684bc3f61064368a1a7aa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e410283d400d5160204d9f299401cf
SHA18bdd9b62f99e4d16a86f8af5795566c57a8904ca
SHA256792c0dfa120f999b7baf7cb9fc087dd973143f4176e72ac0283d7345140b1b5c
SHA512a52fd76fba9395334cfeb0fc51468e3e67f4eb06cfa0e5a7dcb76d048cf747c178c198a962f34d78aac4b0e96df5ef28d4cee3f9d67770cced9616d7919f6e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca93f8cd4fa93950e1356137693629c
SHA15a2ea4fc7e6c4c568d81f21a71e07e0cb5c71039
SHA256b247388ea02228fe5c28be4387b9588a69b3869f8af03d2bdc095d9c4de103c1
SHA5127decf4ccfad93278c3ae77a5f5ad76409b99c1738a9c09290d0ac73fc3042c86414547173e735b4d4617e3d6a68a7a17574cf2cc3a4c068a2b0ca118c1293fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb1c86a1288ae6ebbdce9f08efe7c1e
SHA17dd379968b3d64afa020fdd20ce6c8510291b121
SHA2564f78610045a2d4046d8c6c151dc7472b078a0a230df34728c67f078e3697c95c
SHA512921f0b02b9657580a1da7370cdb65af8b6d3ccb0eeed4d392696e874d290777bffde66db2751fec28f836ea4e779bccac60d143df3748934fa12d15d198eaeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515521d434ed3302cd9287679815da7e5
SHA136c2b498590c80925fe20291c978a86ad9239a05
SHA256c7df7dda0be7a3d75a668389d076394bf3946c0c43d47c3e1c51e2c7276c8c22
SHA512d57bc60783a90829b9b6c034dbe2ed7afc1c4b4f3caa6b1ccc1f9636c3f75251db27908e679c6b4b51740a3e4241d3cfff6da226d284478fdf742bb2b4ca3590
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a