Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
6910fcae6886b89a3e2df890edaf5b12_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6910fcae6886b89a3e2df890edaf5b12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6910fcae6886b89a3e2df890edaf5b12_JaffaCakes118.html
-
Size
461KB
-
MD5
6910fcae6886b89a3e2df890edaf5b12
-
SHA1
071ce3e99cfc7a5c4f7a69ed9a459db8bdc0750a
-
SHA256
7a84a2348959406d2ec7cd796262db24aa4d3c9667d2443a411f20f671ae535b
-
SHA512
809463c2f94e9c2d2138c730740cb9061e67d0aa5e915e0b650274bf3f53df44a58f396502d1452f40c2829b6ee0a0827cbd924fe3edf51384490d5d6ea9562a
-
SSDEEP
6144:Spy0sMYod+X3oI+YGo9yQxQ/sMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3Y5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4fcf72183054f4983376ef94ee254ce00000000020000000000106600000001000020000000d2be77444644b3c049a67e9a878b0e1ede2f44969a269a566c331951bf51968c000000000e80000000020000200000006f20acda9043cf35accad4c004bbe1cd346f9d54be93e78069f6f329a984d39520000000e00fe3a597495f24877b8623f8bc38ca4bb650d86eddff6896d2a884862dc50f400000005594ac781970a8844047f1494b017fadf31e2e408296cd41ac45a115cbda0ddc6fe554f5c4103d256a87b9632437fba2cd5061301d7a1b33f9d0592b8258d4aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E71448D1-1896-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808ab8bfa3acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584055" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2308 iexplore.exe 2308 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2308 wrote to memory of 2176 2308 iexplore.exe IEXPLORE.EXE PID 2308 wrote to memory of 2176 2308 iexplore.exe IEXPLORE.EXE PID 2308 wrote to memory of 2176 2308 iexplore.exe IEXPLORE.EXE PID 2308 wrote to memory of 2176 2308 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6910fcae6886b89a3e2df890edaf5b12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5457091dd7c8334711d060a5ea55f0845
SHA17117098454ce295f3b425c540c3b0fdbc9c0c08f
SHA25675792af63eb69b63a845204b4fdc5e698f9bd734dbdbfe1f85619a8b54a045b1
SHA512987843bd1275bab967b232312114b5548ac811f3d17f9f150734b2ac00fd58899726bedac3a64ad71be627dd7ca0545d6b25b4dbf0d8618faa6e3a62f034825f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5907a23b5ee37707f690b88fac96141b8
SHA1d2448b7f3c7f1b9198aacbb99bbd316704fd9a89
SHA25604bacac6d1324bcda26ae9cff92a3fb631faccdee61b94d9481f031c54d3f689
SHA512f90d87b7c011e50304a115af3563b12333cea4b99a9ddaf4b0512f3aaa152bcf9b6a28bd8ab1b3d7d7138da8c50476db56cb9a2eeb4301bc1a7e4e4af843cf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db8c169a503f304f6d53c7e498320a02
SHA186e2e79d2bb73536a1aaa5deb5f85c44a91a1478
SHA2569e7218c703b4e8c49cd02604385baf3268b2b14ba32d42fe5abe2ba5fc75aa3c
SHA512ed6f9bd6243ddd0225f5b62d3d19b1abf8c58bfe0fdfe4a814e303c410a64108321e119c4a39371a581f88c4bad932a6efd9d13091f1f92909b063284ec032f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5879e50b3af9d95ba0d5d6f3ef54e6cf8
SHA10164b1df5f388d596c3625ca0cafce5ad7209753
SHA2561630ae4d5cc1c629e4c295f4989700089657b65a505dfa11457d0242213effa7
SHA512c294963c6dd14424d4185076734a32bd46249946357376604f40d5ce0b3e2415d49f829077f9a08d55b64d90c334fe024bbe8f419e7a3ab19fc20306bed44d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a450e66b72d4f2b57907c5c8594aebb6
SHA1875f758f57ba023ece2768b4873fb08e56b78813
SHA2568d72ef4afcaf8d05eb8c1c1a8eef25205c0305b19ae3b45f479dd07a21039d7b
SHA512e232c1574036b85775b99e356b3c67f46f72936f5241b9ad301a0b0936d2e391823b34e3109656729f5c314550feec8fa42c7520ba675553107be6ce43a9a097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59d62c54c9fa6da6e93269a4098090d3d
SHA1d5a517c8ab72e5c9b9592697ffdd3eaae1bf5074
SHA25639331d4cfeb17a81edbd7130bc56e41b2c9810b54ac446fdeb54a3d824c33844
SHA512b649602ab66791b0307636dc86d40f7c4eae6993d404b2e061c025b4dd164d0fb4256fb9511ca3c3329c8c5eb94351384e3439f1c17a9403e03f20dab9fb32df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD512270a399ba791a422bfbabdbb4f4527
SHA17398c9e1b2369d7781cec177cbab7fc28792f16e
SHA2569dbcf5ffc6e02dd7ec0d7f0a26a7e99714df71890d950a5f85d1ace1729d4c3b
SHA512af843edf26289bb1a906e8f362f3527cf3ea85e3b5afb4c39ceea7a6d26d52ae8da400f4e133499bea10a71536703450bdbed819be6a99804d24430e569b2e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ef8ab8e4110719890c081d43aa052bee
SHA175c411ea6ea4fe9b816728a3fdceae78654c32ce
SHA2566ec307a81114c447de54b56959006a271fbc21f8bd4774f8093e18e2c739d9db
SHA512453102bfb73d9ac5a30ff180f826d70c27ae263d4d36200ad68f7bc4bab69692fb4683fb5ff2a8cf6709a6b5c264c7f872c640759f0349aba18ff108b70274a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5daa0c0242f826dc836d68eb3fc8f0938
SHA1c8dc4856a9aa788d80faaa4f2ace1fa6dd34de88
SHA2569c98cb4fa84d9488ffddda61964b75fe23a94c78d0f45fc96032741d2c7aa411
SHA512fa34c39a93f8e34e4c123570eb1f629afd3b416452e44a8420c1fb207fb45e63e11018f3e97988fc95ef158845478fb5af92a4082cb10135f88aede2c12118cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5142693486a7286ec6fcab3aa33e4b8f2
SHA19474346fbe8609d663d59b6ad0f6a209178c3e9a
SHA2560ad6e14d3bc5c4e3babb7897415f9aa1bff3d6c4ffd8556edf379f9720fd72e7
SHA5125da57c4b1a1592d1b730db8dd9985ae46a12b885ec79669c329a0702f2dc0796cd4bc5f890f44a0d761e6e71d61667dabe9bc677acb069b3be6531dc6160e69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55edce3ea7975a62c7f309c0737191fe4
SHA1082c10f38a3aec901f040195f8b774a0b2a48e00
SHA2565eab33776826071be93b920b180994606a460e309a62c530d2b3ecb8b0d41a3f
SHA512a63ea42d3f8f227ff81007ef507e538063d3a0a14e274bde0b92e2bc775ff0b2f46e2223acdbf2419f2d913c72b009ac508a6893f1b1e82316d5ba825e1ff2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53b807920ec2c6364f813ace2c8d3b79a
SHA1ef811a529b3228fe8c116f7bea1654ba50355e91
SHA25604e454db9f5a2b3c59dd33ff0c71912e08000f5b1783be9c627c9c2f800cbeb6
SHA5128614aa5ccebe8239dbfd5ec105556b4578da7f9b559f2311fa1f84317bd51102cc430fc00608669870582266b3d1da8597ce4812ee965bbc6d8e5b72300a27eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ee51023e9ad898849f2df01163b0b2d9
SHA18b40d94b88068893a15d63b4151a53f2a58d6dd7
SHA256c62feb75d3c90fb1be9a026f9464e9a2c082ff7a3185930c7cbac40dfabe38e3
SHA512133d2393427186504a5ed5f3dd3574f82829f7310e1681deb23826d62984c138972589468d5fe1c9693c18cc4f015147a1f4dd4c8f282aa3a3f3fc47793aa430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59771b8f64bc65081d65e0c42672d5e1a
SHA13337c740d0e8a5d3d0273abf2e8bf5dfd9e196ac
SHA256399701c97ecd0798fb0f77e3b1be9310178467b5d872219199d9f30cdd8f0b52
SHA5129283072be775d611b74393b371db496a79897420b96492575269f57f72a486d0ea1512fbeae50426b6033655a488fbc8bbf6fec4702ef8c64847ca72f7ead1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b772d1437e4966ac4cc995bcb7ac1b4a
SHA15d389e0adfdf16b0ee7efb9d24d04419680310b1
SHA256bf02aef5733c5e1123eeb344ad8b18ab2979e05481ba042479095898cd5864ca
SHA512efe71b181ebfdcdcdbc5a50ff2ad8682fd0d844fe45800e97dcb86137fb68d27bfa1c060c2adb8ff07baa0fe5676b9d44991e6eab148a2064a66af171bd61101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5deb90941d2668d46f16fce034556a752
SHA101b581f1de419a5a40d030c3fa162cfc0c62c0f5
SHA256de33d329ca09350b8112deef6e1bd4706d2b040136c6e43d8eff4d6ae67b8192
SHA5126c47f98d313cf217169d18deed0c89779ca24a6e85d158d87666a9af2a00c9d08baf5fc42983c7ca891458e8f0ab2f9bbf08c857e42184ddde3d728d91dd3af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5de86dcd2ba0950106025a5fa3e16106d
SHA1e94ecb8c2aa41f4263e6ea7a7e5e4288e3cb99c3
SHA25658958796b5f63cde14a8ddce84de339ed3d381ea7858a2d8193d91d33b7e6dd6
SHA512ccb7a72a667db7a9e4d12efb3226510ec54e5257f9dc09b31b7e004bbaec40589983e8672f65fe01078ab8c23cf22d0774ef5c1b78fc5badad16c2d754ef63fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD598c424f50f21c4cf323d3775627adc36
SHA1ce0d0f42c4d950ffcd57b9139ce1cd05e60890bf
SHA256fd74c3fe7860f2203bfeea79e616b48132032d515586a478f851b798217bb09f
SHA5122ccae88217d4b036ab5d52d17bd9e1a328fa8f212cc1837ceaad037ea52888bc0d2b59c61b8bf662f10ba2d2fc87492c2dea523125ec249688ff85854228e7bb
-
C:\Users\Admin\AppData\Local\Temp\Cab3D9F.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3E90.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a