Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
6907426f850559d531850aec1701c8c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6907426f850559d531850aec1701c8c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6907426f850559d531850aec1701c8c9_JaffaCakes118.html
-
Size
3KB
-
MD5
6907426f850559d531850aec1701c8c9
-
SHA1
57407b81f64091f13f54d80e619722c98eca4dfa
-
SHA256
455d12095f69481a729a09f8e909688dbfa8def4b5242a9a9ca3075ec0132e61
-
SHA512
bc75f54e2a75283a127a296f63aa7c3b747a7c7fd4cadfb761bb8f521a02a0e88e75e25d4619eb542bace1b7ab22854bb4354073a0dfeeb2ce94f52235656c12
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D70B38B1-1894-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b993f510d5383c4c866b10fb9da7123000000000020000000000106600000001000020000000686e8df650d0cf302858107fc36acbe992489408dd5ab71fb1fafcf93221d676000000000e80000000020000200000006735fef525676aa2c7e52599b38936d70ef97b97cb6f8a71c9e89e2c9737637420000000076291dd919b0f5580b295014659fc3c6a820d6a32a3def96fc13eacabef2fb640000000915a782f2758c7a425cb19f735400a73745a983abb998e2e046969ebf90d9520e1c041d2e68eecc6c0e83926feacb284c45360e0ad2341fabd482246cd4a3091 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583168" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b072d4aba1acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2192 iexplore.exe 2192 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2192 wrote to memory of 2732 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2732 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2732 2192 iexplore.exe IEXPLORE.EXE PID 2192 wrote to memory of 2732 2192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6907426f850559d531850aec1701c8c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc43de2e50f2644d3286f02e9b92b32f
SHA171b85bb54154769e8a182898c3ac58a767dcf1d9
SHA25663d85ae7e7d402786838adb53260f5128eafb2376d70af2c816df3bd80fc73b9
SHA51229410d3dac42c037ed3fc813a7538c8b8d79c72733059ec9c3bde2511af6020178ca66135ed16e31dd543dca19d8e01b0ecf981d2fc53f1696f6dbd214a7dc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600abe4812fd02bfbf6aa7b0979ba4f7
SHA161762c994c3c04fe89da34a8c5f2ebcfb93580c7
SHA25660a84a356d02f56f0855569d4700ed732398eff1e660207c3ceb84d999c61b86
SHA5121f4bb3695a6fb01f8960e2b1c355d1c3bda800a770d64374438074ec580ddbf39f8bceda8f442c2f1761814b197c748668a0bf8d23172aec64275ae4de5bbf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed450653c6fe44623b897b776df68a1
SHA1a5acf3d96ed947883ed8316251091330d03d3f70
SHA25680c43252fccb3eab71ea55173c94e6b056b0d80e655c2e4c0c22e20876935786
SHA512de5c3b403cf95c1f196f7e5509161a04e6611849e3e7b53c1be34af99d9b50261d4c87f9e27e5edff142bdff96770f31d27417725e877f0899163b1b57e1e486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c8078b4af675aee68405fba8b74a5dd
SHA133e04f3fbad1bd2854f2f71f1020fec81abd4ce2
SHA256193f4b71c58ab824f0d58be5d54e10a04d7e33220d73fc63394e1d630c3304bf
SHA5127762ad12e55b47b773e5a276ecb1b340215a4d6525746b07e637b0457fd98e40722798562ce9895a01b9d9068d1519c1c4711475f47d90933dde16f9f6d36ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c4f1c5657a7d48176035eae2f7a9cbb
SHA17aa022fb44d9a0a62f40e487a29503dad0d6b375
SHA2560854703f86c568f52feda2120a53ac133967c81ba126597d72178d81b1df7ae2
SHA512951d0b86f600cea9fa045ad94aaa0db9a52fdae5aa9426d11a3f6f86f1cd3bf6b5f32777230278f2f8cb4a97450e49f00554a31827299808b40acf59781b68e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1d594d1ab5d99ab4de8ada6f305447
SHA11bbb968c85d4d452bdcd00471f1e9f47b32be6b6
SHA256f8eddd49bedd6bde02f87a279aa8b3e458d01abb389947f126c94510c8982656
SHA5120b5a1af31f92bc8d424de34dd332f00da0bea16b9819a0cfd36669642f83493865f33e8a276ec683b3d0425513fc315da2ba3dfc2b24fe09fb173aae054d94d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296b6c32d4564007e8068d82c9b1c0da
SHA1c65601ae3427fe61bbbbf57cae1fc8b593990da1
SHA256b1bae8d955907c5a15ffb29caedcd311c44d5b61e60e1be46ca8c0d282119b84
SHA51232342da4b22fa6e47dcf836bc346eecd436eaa7551d6d92455640ff00fa20992a710086a0fd674de3292ab7ef90a3bd0d4a4315cc1515ddf33c6b8b82997134e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecdd3f53828fdab70c270c39b8ed3129
SHA17895431f8423ef5e7f452405fb438dd1f68b680e
SHA256022dc427f8bb1978dc0b8a2191e8cb323e216241468838edd55c6d1c71fcda47
SHA51296632646b0072cac4de0dca4c35ec685a078919cb725903dd4a21525c0fa1832e6abf29785e3b9966eadc4be8e58c51c6084400013ee69a41dc5540964f52ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad97d6f9e6e2c2b7a74e87612167c5d
SHA12ce0b04e5cd671c92ad802b7687538779bc79965
SHA256b0f5a461402253f34d7fa424ffdc89ab1d0f2d9fdb4d90f6013d7af8c0981036
SHA51270990cfab3f6acb71cd099f61301777193f9bd8bef1a99115cb7636623e7fb06bc32af0b7ba7ba016aaa9586d9a8f9b3c04f8260d17e83f372a1e7627825bf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b770a425e794465fa8c17f9d881d7519
SHA1656ede8e4ea76de36ca08e896fe26cc18971b03a
SHA256de442fdaabb8e3991cd606dfeec1b6e7f60384ba877c3761400807f3bc5e6a65
SHA5126384bc893e2861dfb8d986fffba07535d80f9f0f52ba5036e191e092b2e717bb2af0324f2ac623d45f7a3ec67f39446084b6efc16533025980c1081cae418f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ae80961381e899ce083268b085db97
SHA146c3f91f06e9fe775b6dc8692593daaf00a0cf65
SHA2568af3079b28e1ff75cb1cf45dd5583277b9f6b6b9bdfeaa7dd95f37777db0a864
SHA5126b8358917ba69b624cc0936c8b5eca26a902dee075f39b072ec7aaf6ab5ca4e7e93b0865bab2437215ca1fc2e5125dd8f51397c1ecd5181cd622b7aef37c94e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d624b6f775b8682b57d10ee86526aca
SHA1ea18fcad6039da3d6589251e73c2f4d3404d48e9
SHA2562b278aebb9eb4a18842ab632c80ac385758ac4d089e2ac08466629194fa94b21
SHA512104bf29eca1561b0ca4d7d7bdb879dceb8c6ad2d26ce4b40233a93110ad5222d5207291c31d741b948bf81fcf2104568d268144bb38ead8eb1f98375e0ebcc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9c2e108736a73518a6e3cd4caf5d70
SHA184806c7c14d14d89c0d0bc2bb793ea4f9c25b54e
SHA2562e7d15ea765e5ee9ac4f40afa26117734db5f4ac8d5325184971008b3a9c8e47
SHA512755e561f612b291d367a4d70cb1bdffc0500b1f1e2f98bd077a116834159ce58b00e962d44eb48d869576dac772db977dadcc29053935def3253b7cda50c695a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558aef8459831055beb10804fc00bc863
SHA1591c66f152b897d5fe73226ac9b383053f8bb112
SHA25643748a28843d44a549f976d4d1bd20e40fcb40819a80782c8e7c0829cace2853
SHA51291a5b57d461187c0966ecd42df926e4e9786ba7e57cf8a43b593837730b1cd24f63b31f0d2f99a20cd381a192b73ad0a493e47eaa99fe76e2c5969fb7d10b800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a2b28404facbf88591a3278a25fa2b
SHA17fd734dbb629ece40b7782775af0662d85dc0a1d
SHA256535e009aa3d76c3b41081c4e1486720b69d643061d6eef9f7b75ce24bc4a4b6a
SHA5120fcaefeba103110d304f27223a42d9e8a549a03c735f3981d742d14c36aadf265a7acc47da642e13439f5c611fa23a2181d9d378a9e3e276a2d4369012c07e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4fab67533702c2cdbc3290e874c8a9
SHA1277b2c6b603cae5c03fe44a2efd6246102fca609
SHA256526246a7b33f14f86fb7eeaa8b307c534474acbf445c0894a4e96be8d5f299b9
SHA512e64174bd3434c79e3c909b58b8568060e748530e5015d7a757ef2c8d42b09a12b49ab3c939b73423cb4c19047dd5e22f6ce6d8b76af2a1742c11cb7bf909dca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556254de275576535594cd8c2307ca732
SHA11a3f6b711c617fda5d20c0a3ee09366c70355fec
SHA256f668d60fc9c757bdb7504fbea3c31c90e3dafbb0db4d5fb978ba9f7a736166a1
SHA512396778fa1e71e0aae409054c6409caf330a20594c09df688d3216d8c0d4a148ca02a682091b1e56b4e62da4ce0adea43050b98c46ae2203d586c432dcabf723c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2852ffb536d48db962071db00fb3ad0
SHA1679d5cb4e9ee9bcc78049329c9028b4a36c002a4
SHA25678a83795fb3b0ccf643b422276658f45989e1350b5f2a7f29817469232e46750
SHA512d1af82e9dbf06ba19910a2bca1625a9d20524f4c6800ba131369cbd00bd9154683e656dd1f12fc29ff1199d8ad29c920a77b1a336e9f860fcb28e7869d7e20ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a