Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
6910b13db071bd2a8a36349ca542ac1e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6910b13db071bd2a8a36349ca542ac1e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6910b13db071bd2a8a36349ca542ac1e_JaffaCakes118.html
-
Size
460KB
-
MD5
6910b13db071bd2a8a36349ca542ac1e
-
SHA1
f3cbd788d4a171cbc8fc523d8788206cf60384b9
-
SHA256
c26d89c8783bb77e4b0fc6fe8c51c3dfc3844b5fc6edb932091669e200ab2fb1
-
SHA512
6298ebf273a1f31aa8b7d924dde2b82c2b22f1420c404e1475d47f3048d0007d83c4f09512151cca772b3b170f51892c411d7c4274837cb844cf4f8ad361f21a
-
SSDEEP
6144:SosMYod+X3oI+YWQYsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3+5d+X335d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2075a4b2a3acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA042341-1896-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008aa34c451a1c20ed42197ddb225dc95cc4959c556511cfab50bc490bd6a06bd0000000000e8000000002000020000000b681abf42b75c1bc6effc8819f2f6691b6f03c5c67d5b27a2aca720f852a0daa20000000a3214d36a98beff0797819e3263db3fb3ba4dc32c83b05898a6823ad63c90544400000008b2616e796bb6fbe0e7757cb74cbf0397d248346a908a456f3b5e667593e1562c48f4e4cd4f5935fb986a33fb324870f9788295c76df946bb9e85a9ba932fa12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2128 iexplore.exe 2128 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2128 wrote to memory of 2056 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2056 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2056 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2056 2128 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6910b13db071bd2a8a36349ca542ac1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55987bd80edce8fde0f8c3ba72b5b3685
SHA18f28481d4a79c10e116978ba6e49674ea4ff4b16
SHA256b1c766c3dda35dfad18bb73582c718a4dfa39be5d19643c3444ad59668c3ce78
SHA512fbb53a53893ee395b378b986358bddf085dc0a92f2946847d222b65892643f3ee13f5523a22a098b7dea291296b4e095151a9720b28ef9fdd94d2ec94063cd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a13ad404be6dbceb65c95919de8ce8
SHA19b5b37d5e02aa756539fa1efb73c4afea3c65caf
SHA256dd4a6650a69d21822cfa10b977636bb2c738890d90ae29808268ab0c7a532944
SHA51221c02b090bc4b912d33fc396684c893d29db24d94951047fdd94b4eeaaf45c375acab21ec53cea462a4ed4fd028d8ff3ff77191912012e6bf896cfbc0de15664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee4e519b5106d0e5e6cd739958ef374
SHA1d7adee341e91baca5568c692a6d2d37552758d30
SHA256960cfb899f60b2a26311a13dade5168b5a196446f8ea10d354cfad017d7db721
SHA5127ab57d48bb8781dcc610c8b8dd91ff62758a5602de1bb43453f29e3e2893a84b26d622e2e666a89c372bbc5893e6f7c738bda7bbf9d044f40a3651f7678f0ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51daf3a6bcc217909e2997aa849ab182e
SHA1218ae2e4396ab2086d0df3e5aa56fbc020d51306
SHA2560a4e090518182d6a9afe33603b4230c22da32d3249e194d8db55f57b9e532bea
SHA512f39dfb93bc2fd32fd3bd6f33c75e3abd48846dd5472dc522342bad8dd82e30c2f2743a1a4d2a4373d29888cbee434d0d9ce7bbab0d6ef7871cad68f45e066287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51729d6880293b370920f8f8d36dafd68
SHA1ae666201d1dfca8e278d9a51e5f1f6eea9b4d306
SHA2561736f574467d21cd40a97044edb40c9992c473189423bb95cbf60336e770f0b1
SHA5122e1eeb0791e7a5ecaab0a01055595d594444e9cbd8b8955381642ed6582fb5f553e5ed6cb0fa8f74a414917487aa70476a00f68b86cc08f2c1eaf85259a6141e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f257ccde0b79d9c9269ffe8b3743664
SHA140a10912109e9ce22e790c8c69bd927588cf623f
SHA2565b30a096bf056c0991ce64634449db740229714769622b8e28e5b4e9e4a3a204
SHA5128994e676a7092eedfb3b50c636ee57f6f8aba91b1319b891c156f50909aa5209920990d40982e39fe493cd10c412a53d93cb3fb07d7d352f534de52d1a242823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534d8ea7c71008f5b66ce1b5361a9196c
SHA1e8bc0f1398b7062446ac8e53263070040f0a95e3
SHA25629dd2eeb51791827912e1c70608e7ee892701c60ef0932aa0a59da801094bc42
SHA512e8ce00fbbd245022b070e5f0bc99e655256f452b9dde098754edc8bae5fb810ad6a02fcee1c241039e40ff170314de0ba512d496a1e0138267fa7f71624a10cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a26de2155e92bf5446389ed035a717
SHA157865c64e94edb418c98f10bef5814084ba4591e
SHA256c7f3da1b01aeb3d33422207a6b9a19475970d81dc6bfe96e0ec9e1a2eb2d8e7a
SHA51249b56f5045624db235b001b43e80ea6ba3fb353318f9b6746fa9beee7e4940271099a83f04fe7f3b1040b35d2b645bced836269f2fec531fa2b73ecc15f929cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7a74b58460fb370f5cc04da78208d6
SHA1124f785576517ef07ab79d8264e2eab550b43b6d
SHA2564e25e0869611d48214108c2b87011c5fa52b87a1243df9dc6f2527e507e6853d
SHA5126f24e06840c3a2884bd5b182b7f878e96cd5e00fefd5735deb9605989c09b2a792283f1368a55f1d5ac10c310f44c8f3b413d57db17ad4263c14d9b46a5c0e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd82f59a44abb22af0d5e5f2ff666aa
SHA18dfe8e022b8d84a988931deefd9b3b52f015d018
SHA256fb8e3460536b87c6ffcfab6cc0a4d15a04553bc04d7fc8687d2daa058892c38c
SHA512ce27066793055cd9baabe279a266b72c7c74692e455729a62624f53a12962b4eceabe843be8a04bfab3b363a92b836307d1e321b205db4862227904d966db355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d7c87bc9a4b4df10405b654f9d3e26
SHA17636b78f2309aae171cf70a03c85e8ae9abe9245
SHA256c3a90acd8dbfe5467025c6fc2bc385604df0479817c441d6bd61f2fbb23a30e3
SHA5129728cd130f993a2d5cbf771f2ee72c1a6ea8398f2c1325f8d8fb67628295c8e235cb325b381fd4468488c2d7a90c96fc60adf81c40bb7057fd26204d1fb79f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c2fb1c696923f4c6fe82f29f290a28
SHA1e13e30b66f6febb34a5bd3099536e0623f0e8c0d
SHA2567a10274db9add38b09c690133fdf11209f5f8c99dec66c2206b27a6343cbd1b6
SHA51290f9a95bf1a1c6b3c5d9dfb682f36f2d3072eacc520cdc8bf173d4b5a8121de2629ee96ddfcd53fe58010f72e71f2aa4e41b9ed0cc541b68637e54fbf15b6ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b36136604c7dabead1d7570c8f7170b4
SHA1b4ed043609a670663e89616196cf4e26ffe76f5e
SHA2569d95c8e6ccc48d7a6e6fbd7a9715210d7fbb847d2100275756cbc804970fac2d
SHA512edb594913e12cebdd82dec42936dc717d7965d5ef5af948909197b72d09648ffe704b48a52821aeace933913ede97c3530b6e93306adf2de777802b1d27e97c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511351d46e236cb479447630ed1900197
SHA1816eb82455a79a0e5b71ce7363f30b96864f63e2
SHA25656379a68025bc1db5609593bc49b99015f46eb3ed93b4ff621266d6a7d4b9dc6
SHA51274c3fd60e5cba2ddf2c916d31f2dd0b0e153cab56bd8a3be56a770d260cc30c49613d431003b595ff467ccdf896a32bff3302d818be17bb62ff631fa4453ac55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cebc2f7251c69856abeb7980cc12cc4
SHA17c5824366f901172d52afec540a91e99f10ffb4b
SHA25655c10cbba657e02a46d28acc9aef583c47c40c6d53e0315a67fd5e5ff5318bfd
SHA51209cdf545c2691b3c352999e12f370f449b00f37454eaae452227c1c188029ef8e634c6a483e8d27cb4875f9388e2ef7279142f9500559ebf67bd1e8ba9002d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57387d99ba4d66f8d20b8b44968edfe1d
SHA17a8eba7a2f5ca6a654a0f458f61d2bfa88c62c51
SHA256578493cea40b7b6831e6d30e4f4167a93f138eb07e8cf62cd4164c7715793bb3
SHA512b2b306e4f53a3722f6d844dcacfd01a8694525383e8caa58476733a743993fc5c7172e93659e0b58e84afa7e7f52f09f266d2fbc7604b8f2fe28482f2fcc4435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e969769e99bce421b4fa47cab6779d56
SHA1c407e397d462cf6135d711882a98de4830323f4b
SHA256472b10fae2c6c16744b8294014e0603fc5574fc77227f2eb523e8eadc87bf044
SHA512e988d88e280242d2378db6262de37686bdce49dc8c9ef3c25850d4d0352f81b3d46715a7edb8846f9780975bdcc069456fb61b2495bb28c4b0842e62b585af00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b46c06a7ca51049684e2fa52ce1703
SHA1cfbbe648e13867fd8cab66c7a09f00c35444468d
SHA256bd4337a9ab54527440bc88ebe8e28364df15090db4fcf4978ac9eb82994bed8c
SHA512b10db1322eb821bfd0f3fd839ed07ceb1dd0fd3c2f2fd7d27457cf624e322059d2adb2f2de80ed1d28a58808b836429e53e068101c45ac1f7dbe092cfb9ede8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2485a980decf3df4ea7acb8c275182
SHA1bfe498bf584c7f52f3ca50b508629e7ef3a89bbd
SHA2567da5a9d7e727a4bd3835667d256d579484578d297d94e84b620ed345126a676a
SHA512c62759af0c5ec8fe49c149396e3a5382b0bdaa9f5e301c24decc70a7e7299ac1b07ea22d9c82bd0151b87109c2f63cafdc39ac0d2dde2eb1502b476a13706482
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a