Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
6576776a4d0064ca17246282aa9ccdb7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6576776a4d0064ca17246282aa9ccdb7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6576776a4d0064ca17246282aa9ccdb7_JaffaCakes118.html
-
Size
6KB
-
MD5
6576776a4d0064ca17246282aa9ccdb7
-
SHA1
3c007dae4da8e5748d86a040702cdc632e916479
-
SHA256
3078cbf0d9b20917a221c4e884aa4e3cf79a37ee071fa1dd5dd52ec39503c744
-
SHA512
e4d16ab3523980b2aeeac99ef0ddad160a734e0dad6884ef9e3cbc232fe62a6eba67b0bc7fe398b921a89fa3970831e90ff923be028208f9baaabdbc3e42fc01
-
SSDEEP
192:IhUPTNPa2EfcwjbhlhJALVWlF2jIaQoT/W3K:EUPY2E7vrKU+HRO3K
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B585C8D1-17D7-11EF-B411-768C8F534424} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422501938" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a5579806cd1c37438858c252de0913b700000000020000000000106600000001000020000000d7e3c3d401c05fc1aa816bdac5d0149b2e39b9840bd887b3e9dfb708740caf3b000000000e8000000002000020000000ad087e9c0062cb5a31d81cc2930984541f603d5021e0bddbfdead2ec5aa32585200000001f72ba7576893d2467ecf5e75e9b9da49e608e33dd5b233e9748aaf2c5a2e99340000000db88360941821627d5fe1a11d66c94657d26d8294c0d0dfa9d5f3ea79320e1eb380c09fe7387eb0b2d4b723fd48418b94b7eef288c5b53b5dd0b66e52769b12c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20152e8ae4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 2136 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2136 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2136 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2136 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6576776a4d0064ca17246282aa9ccdb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53197e9d6690d534100d1cbfb59822ca0
SHA1fb3bf4a590dab14ac2455fa6e4b9016510b0ad91
SHA256dd6ba4d8470e19d59a2e15e640a38b659ea3cb31af8d1049355beaf22b47f2ac
SHA5124f80c726a749bc70156323d2ab098d280be609a4df2a5e6648b8dafb60e294b98db5ad75ed8caab48ea6eb1fd8ce747eb6c9c1b3b349731c43022188dee69ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d2119d1a4ad96f00140e09e12ed6d45
SHA16ec9e442d522f036ee6c946d7913dfa3cf46e17b
SHA256a23807245595609c4eb97554af1a7c5d96fe1304144f61c50bc7dfe08b5cc470
SHA512574367775ccc48f8416894196823cdb5e48c654eada438dbf406aa4e79e0ea1bdfdee00729b3f9f65897c26e06479971f5c03c5e8694932f83d6327e3dd30201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af24ea25b8e4272eef53b1801973a625
SHA1a3a97f49e552bb2cc1c0e7dde6f7f4087c6f4a64
SHA25653d93c8ca647e4a32e3fa0c88566571f388965de44b5e4e92b4e4611e2c6fc9e
SHA5121284e3e1c6354c360f5a47dfebd4f4cf904df3512717747b3cda6edeb0c8b314a388b3f1b2cecd350532182a5f8c0f4c19f0b8281c36a1dab41e50c2eaca4e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e85a5896c6c351405611e728149394f
SHA1e2b7e16859e9ccf5ba6719974577410e94c5226d
SHA256014ede90cff5c4a82000c8151d2915786cde30a4e139485c668cf4e01f91c463
SHA512896c45ecee221ef63c5d571226ee721a21c3e89c3dc3affe4932ded3f5fc104685fee181fd242fd32be7fc10aabbb8c1e1f9dae33a91fdabd672cf51e5684aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5381b25bba458c30087b5a7fc431f8992
SHA1644880e08c826e5d162cba9adcc0726f1b765517
SHA2568d8e3e256423c71c312db7c753f672319d4eded1b66620fac25a02f6d513445e
SHA5126af04c62877722a308f8f32c82e2f5113884745c1fda53bf16d38f6db03e9eaa945ed99cabce958d70f60e0195bd4687d8201dd9a3b8ac498bf677b980ede219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531434bdadf0f7d22d85f49af9f2769ab
SHA1426b6ff85196c1c1fdd472a9d6abd25fc744e5da
SHA256875c1362a993f09d65570d9835b56a0577f0e343fa8424fa5cc1072617d1521f
SHA512b4d18e9fe65988c9d9ce60fc93226b612bad47d114c020f95cee05e598f72da998c452391721363462e1c158ea1838b70f12c20b64cb59cfe029bfdac14f751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d71585597968278584b00e368df1c47
SHA135ccab34477cacb2cb34bf2dcac3243d1fb9c06b
SHA25603bf1421c8d9106787499bba4b2a73a8a46e14220e7d236e6d7cbfeb11a202ed
SHA5121caa180785e834ee1a74d56c1d7ccc771cdaa715999247c2650e82cfd61bb77e980cd4e2155e4b86f55cc6393c8e987528269c97c1c4de0e55240afbdd4d397b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5505d0e1de33ca5d099284f03861692e0
SHA13bd95082f718fd2be4d59ad6ec9f902de7ab3942
SHA2562fe38aefb49eb35fa1e4d5d840aaeb9ffc16367b5a656d82126280f1d0673f12
SHA512f1f7111cce1cf1de7a6dba3063e90cb12d56db05b42f1b743e61d517d8f6f25af831ef6995ef5014461971e3096763730de645d4d7048a52ff75d63ddd3b1bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57fc456cbc5e94d11d767d52d47138568
SHA178f0afde3246ee9e7188020e1deabd2f58dff881
SHA256055e3af6f6ddd3e4fa87b5344f432b5989c70cb589f6e1e16f76de1da6916b17
SHA5126434104204870bca755dba190bb0c28d5449dc07c3a1e1debe3435c57ba0b7cfc614651d99acb94ce019e18539407d04aa0d1c623150afbdda1e2a70b5dfc57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51561380dde8514b86d517f2cdf563e8f
SHA1f080d0262523fdec76486d164087bf78489832a6
SHA2562ff23483b89aa637258fb01f73a366721a38a831f692fd1cdb628928fab493dd
SHA512da87f6047d403167161db4e43718a3b3bb2ebd0a0fe27f910796c8fd60f4369a106270bf5f79bfc0f7328d7ccf2d061d3c5aa11d6109ab8198ba84b83e894070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cede212c7db46581044fa30cfc616fd5
SHA181888c993f0374beb1f0406004addd782014e697
SHA256fdf03fc4ec6bf1584d1c3b4f4482ebd58582cce60d9b9c91aa778ef439e8e266
SHA512ebb3c402679235af4fc67d8dffe5b5cb4a6f653bfc7bdf37b6619bc2cb5a160ed856cd7c0a18634e7686182a6a745559401fea2b04c37c7bc59f08750378bd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536b6b13e58c4c9c59f8de6ebbdd36c9e
SHA17f08774cbc51629be687be90aa04d7e9b8358405
SHA256bed084793a081728ae317bb858cd1602273e5716ba44d53a39cc59cd5030facf
SHA5127c7868b47fca9c6c6d418b084d631ecb2b89e686f602825d8e49edbf8af72b7dd1ed3c7f061c0bba055765006a93acabd21acda5441097903137721de364f6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD549119602a93a5e3a8ad709a7d72930ef
SHA1039e71d3d75c22a1312cca59a4fc5ae63f1fbbbe
SHA256b938ff3a455f1fd56890abfdaafab0b44c1a2d0bc39aa1b905137bbe3aed4c87
SHA5127c5a7703fd7a20993383aa0c6f624b671fd1c128f456b7e7ed378150d4ce0f7b34c445a89d879815c02d91c87de65ea044f396a9990b7b9eb4c392e5fb582e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c21896b5d508b8cedd2ec92eb12828d
SHA168c29641918ad0876e4fbf933345740bb6967bb3
SHA25661654d9183b8eccd7043ec03f5fdade2c697db176c628eb26c8ad21db98fe607
SHA5124871920c8f7f05a3bad50a30dbcd094368a49a89f3e46b40efe4c1892b738ecbd3e6d0bb54e402fe2b68735606da3bdf80c75eaee094e8fd92e4e25fc80f1824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9dd51fc6df502c03c27cc5a501d715e
SHA14d6abfd2f6c7bff11dbf7e5b28fc86a539d86166
SHA2569831373df4513a2f009daf5bd357bb71d38c69662f416cd8e3dd9372f9895baa
SHA512666296254b766716c2499f1112865d9bc999cff7da922a0a5178dbf9ff438b78a304d398ab8ff8a94c368d37ecd7a63416e5d6d057b3e465a8a14e77e6680875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588fbd1a506b3dadae54c2de682cf7399
SHA1885efd9e4964f79b1ab6be543cd9a21f42308a60
SHA256b91240dce9ac9f529e8dfc3c877b9b2029fd0b28c5db29baa2c940874c6d8bb5
SHA51236e63a475adb87528526d81016fc53cca65a6ade7590ebe69c97fb0f5825fe767cf7a3ffce0328805a68bf721942aef6a2a6e3eb6748f8e461e9f4e076091349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5d472fafb3a135d2373b49daa0f743a
SHA1b6db02707025b2b93c969ffcbcb6e738a72e6b16
SHA256da987ba9d0e8653d1f2496f9f3f60c40f1046b62532d572abbcc6150aa2f6b70
SHA512388b551c40158e3385c6de2167be642d06646321c357d5aa038f6b8407cb753786ee4bb76b38360828256cc7d338bafbdf5035e69dc76b6d915f42c299fcd2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf39fa8ba745bfd995b6a6fccc11666d
SHA191c9d997d2b50e96327056b944aa8a4a09f06f8e
SHA256ece9deedf64d510a37c51571be517a7c97096b2af82ea0d8a459da50222b5bed
SHA51224297de21203956a8f37dbb432d4494ec9644039df96efe2eb0404cd8b67160915d8181052a982b8e54ee7a0d8cd185ba5f489c7d37478f54f6b9969a24f8db8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a