Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
6904156fb25d59e576c174a02e9450f7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6904156fb25d59e576c174a02e9450f7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6904156fb25d59e576c174a02e9450f7_JaffaCakes118.html
-
Size
460KB
-
MD5
6904156fb25d59e576c174a02e9450f7
-
SHA1
9f15e87116a3afbf6ddecb75c569c79b18c54a83
-
SHA256
249fddd9e6a567ce673cdc1f45531e9dfafaba84b25d5a06d724aae1e51e7bdd
-
SHA512
95858eed86d5ed3ea934cb9a64ec39b18bd3be95e839d634a32c618d19ee13ceea5b93710b2c3c1f3ca23b0295fc51767e5d7f06df855637cad05cf559e27158
-
SSDEEP
6144:S5sMYod+X3oI+YEsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3Y5d+X3j5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000fa686e835e8cd0f1f91e611ac570a6c201425cc2e91c04526d329e6ad32fe94a000000000e800000000200002000000097c82f7c7ff360d62d431f93419db92756644306a1ab071a092b28b1f8978713200000009fa66dc3fc6f3f238e292db717fa760e7117b508a87747693f6867bb7649f48440000000c2c059a0ffa8bb12da268968147408f04f3eb695451eadfb7fca93e602505de5ca15f6ce287bcf2b1991828d287af7423ff943d342d59ffbbee619ef52325b9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ee38daa0acda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{019B8AE1-1894-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6904156fb25d59e576c174a02e9450f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57540abc8e47ad4d97e05f9816139614e
SHA14490a3b78527f8378e634e59232cbf98ef39d445
SHA25687be0b74fe95bfc99bbe77998a2c079c9e86d651ddfe50c6fa3e6181b6420869
SHA512ee8bd88123ae6f231890fd29df4883c58e8648ea395373cd678c531fced821359127a2aa261a2c4f026e14e9755cf1a0a847dea7953b6260480aaa9dde5fc8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a200c433d170737d851991fcf69acb9d
SHA1f3af12f581c75aa01eb66d50aec5a775ca3595df
SHA25661c831e10fe315aa936ac77404123b9837486e3ba2f1d2fe81c3ec24c8bc23c4
SHA5128bc04c28e2727ab8c653587051f8b9fc917d02162a1ba9d4e5620994652794164b9e32fd20556f4064bc779a4e3c70d199c0b39d104f56f53c2b5cbe50dae3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fac8ec2ebd5c3cb41afd06e81a27a94
SHA1012d00e23d72e39f9c352daf20928379f9eb519c
SHA2561c3ac934ddeb934dc6a42bb004ecb731a5c9f1afa756a9a55e4776cd29e807c3
SHA512530754ed30d07000519b8a6ce3e27dcd67822ca5b8b03267ec0de98f9d3c37f3c1d05badd242deebd31bee81983651ca811cdd46c228c76f968c3c2d234ba84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631acb6fcd433e503ed7bca84c0bb103
SHA157a7bde135273dabc29949962fcc6d03e3372d2f
SHA2560f70311029b11a7217a1e3ba6eb502b642de77c6c84414379e8567c1eff1d79d
SHA512e5761a26253e82284e89f591f0d16a2e9fe9431c590bf85dd7796851d98fba43a6172fa2c7a47fd69129f611fe9f31edde2b96a99222a3bf08436190507157ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad8f0db18d2438bd3feaabd7a15eb33
SHA1a939466a24c40aaeb7bf6d842191ce5d7cf83587
SHA2564189f6834306807a730552ed6995a6cf8a7bf6707e20ec0c63b4679db75dda4e
SHA512d996413f6096e1dee2eeb9616bd5722866396be986ef0a3b36e2816fdbe9bd74da97c7191e04e5af15a6007ca587406b95f997f2392b95ae7a76ecc6583247db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6319c17890b2503a5c3e33b7da422c6
SHA11e486cec0862525efc8c94c26199f13b919d051a
SHA256c39f40af3557cd69c646b5842c6dc260c5897b273d4429dc0f8fcb6bf7186462
SHA512a2d4c17435bac9b905497c58958ac436b453946ba260e9eb7ba6adb5bcdcd85a615e36ac1cd5df1016c79f46e0e02ed2cbc25ec21707889c472b7f37a8fcb379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a7587ab73d3a6ce21ce6b70f06e5f4
SHA13a7389a2e5d92031ea2d746e7927a36975dc6468
SHA2564f7788553916fbbeacb101367b1d2dd9ec9570e034cfa5ba09e2e36cdd04de29
SHA51221fab00362b6e2078fefd71e61091efdfefbc9b4198ac43144331aebcba2552a5701f6d1b23177d4f6555ed56757fdca20c0edc7bba9d2759a94cab523637dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d5fad9dcbfdd7f4dc409cd9e59e413
SHA1ba1a7f7705c0fc24d0584a4082c5dc17ec0320cd
SHA256acc76d2730cded6e14e27432ef6367f5c914ecf2b6342676851ffa2784f075f0
SHA512d92f959d9d14bd3b06e67f0c4b9bcc85af57b39c1f99579294c6cca9ddf19d568a4f7630b6ac269907ded854f6383da59f573f293d2ced1633fc20941151e494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b6e3123818d22039cbd609bb8e62bd
SHA11915969ae54863020a6037c89c9b1f566e17f40e
SHA256d6e6a5bc3fcdc00327f56dd0fbdb6f1cf42553f6a3d7f45246d8c733cfc110d5
SHA5124df1b4dc9c8f536aa19e0a649547fe7c46076d8ca1b7c39e5cf15537b02bcf3f0abd161e7eb4d3ea326753df1cdb71522ab044438965587fa77166ce8618dac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512e1c972e7e2c1efb5f54878f6d33335
SHA11ac00b17202a7ba703311d7f3a8096ecf000e1e4
SHA2567430838974b381d3a71f5c5809a03c7fa23c7036c1f10197080b77cf3a2d3681
SHA512a26b3ad0d5648164a317e5186bcc5dfe9be20efbb35e23f71559c1380b7ac991c9b5b414e6913ebd0bd9eb13c8d3200f900ae6031a0420cc35d24ef28a17eea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5869234dfb638ec11c3f4538d5d29e167
SHA13ff4b8b32472681a670a6214f2aad4f50def6305
SHA2566853e7e6bf47309728b5be87b293ad200815bb28a6f11da2ce1909268319c725
SHA512bbc793c98e191d919b6b09bef4bb918550a484c2814c39a6ac1162883c918ab16c98a64c6fb7e8ec33a4180949658ae6087b06a0fe13014d2d59d921d4881d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555258c783a83a41f4a1e175c6fc79741
SHA1263368a973686a892f8d9ad58afb79a1f830a7a6
SHA2561f9f3dbc6d75de4539940f266dc32bf5be239aade0f954fb57d9bf2261d6a873
SHA512e5d9d44d0e75cd45ae4cf3a9080edaf4c35e5daed8ca4eb46a2d93fe0334b71a96d0293144e627df73214e7ede24bf5102865f90480a9edb94e4f9c93d5eee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23ecd1fcb8724ab302a2c6cb8c64bc4
SHA1a19ddfce70f70a1da1abe879b778c5d1aa50ac5a
SHA2562339cc9ae071695f9537b104264920443af2f2f83c40368e363a0ed80a52ec78
SHA51297d7f9ad4b0c8957698bbcae65715fa2204fa5969e14431c6fcc3e667a175c2665baab1fdd2b67193b06a571df392405ce38ce0979a9e2975a15b5d78a7bf9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52937e649c9f87a601f9ffb9fc1e59a89
SHA166ebdef34e31b3c64d8d60f879fd333a6f4c3875
SHA256d408fb8aebe7e36e218db9c926e9b5683ef9a6734591519302a2687cb2a3e0bb
SHA512b8ff26583fd8e9c6378d9ec32f84a7ec9d1bc90189143720b0caa2b4710d62ffeb1e3a8d8a38920effb4d9d1d5bbe7c906aab36ce1be135acb15b54a1c51706e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5394199d333fd3f6e2fd962339fcdbc4c
SHA1de63820af3f20c3a389f64ebde5f19b1dfee5a01
SHA256af150ce451f87e13d2020df3d03039be02fd8a7b42bec8f969621d9211bd3a5f
SHA5121b22c7f0f5c79a402815c658b9e8668f1507222737a4419ce3b591ddadbed7271c2a9ba99211c2ebb6cd041ab88c5340e3308678df58b9c8ad511bf2b64197eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0aca78e5c0a05f4669dcdbffb0bd926
SHA1c41cecbc186ccf6ada789c369c2b5a4f37b3804c
SHA256339c1201c7c231e493a52a140293a567f9523b5d947b48a40bb5da360a0a9fc0
SHA512ca228878b37c4b1fc7e35f2e3f9bba2bd83597400e951977944f3abe131138c49a5a4b133e985e023e9c16518cb760a7cd47596a4ba3a31b351cffed50344264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b48fe1587ed121e4397e977d194477
SHA1f6539938938ddcb5e38356b65922ec035cd3835e
SHA256360efbffb369720c596511a442ae9085eaa5ba5bfb11e7df88b71bbd0545df54
SHA512f5baab1a2069ce4c2b0b449c73776df6245cda9e0fa818d62052f28c4bcb585ecc645c94a0a9b5ec859c13591afc055f9d50005030a30f24364836586aee5818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9003f50d5ec40e9da44da0dfa2e2ebc
SHA150b0de62dccc37893ee8aeee71fae4dd453af566
SHA2569b6f5cc44766d2ac3e92a39551a9b604769afef3c03b0151b4985d0735b7b73f
SHA5121f7b44c345c76cfc80b7a45e5fb7fb4e84ea174823604a177a2ac3e185acf92cab96df429c195a56878bc4d198c5ee7b7e187d9eb73e7513f28628d0882dbb52
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a