Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
6575de2aa899fc859acb1130e130c56c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6575de2aa899fc859acb1130e130c56c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6575de2aa899fc859acb1130e130c56c_JaffaCakes118.html
-
Size
462KB
-
MD5
6575de2aa899fc859acb1130e130c56c
-
SHA1
0258b6e3e1051fb7966324a00cdcca7825e573bb
-
SHA256
0ba09ada020e1acdb2d9365b3539cfd61315f1ee6c6bd935d856e9157ce481d2
-
SHA512
92d8ede770b2800be490a36539aca6b3870d08f03bd4ea1cfbe1913431f7f4e8bfee471f919ad89d3296079825e5422ed82baf6044c4057eebd0c7395a138a78
-
SSDEEP
6144:SssMYod+X3oI+Y6sMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X325d+X3p5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001d0d14c00e5d96817f164354759a501962ebe28781322afcec82ed340cdad0ac000000000e8000000002000020000000961d844daf92cd42b97826015c99faf8f54b22fe9ea05a543dcac1431aa3349220000000458783359b70b6ed19568e62028e1e7b16d5ccfbfb68b909e675e72bd3bb536e400000000d2afb95cf07c52d5978749a3b8bfc48cc4b0b69e1e60e48e812e4ca0f421047bed22e22cdad46aba87d767b363c6a661a485e172e55b761db764c5f4eadf2c2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e3a575e4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D1F1C61-17D7-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422501896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1612 iexplore.exe 1612 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 2996 1612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6575de2aa899fc859acb1130e130c56c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a23bc03401fd756ef23af638c7147b6
SHA1342ec66e089cc1f3fe26d0677d3c0ad5fe57effa
SHA25674ca74bb019fa6b808160e0389a804284bf5e97e8e8ed0cc9cd833ec8d7f350c
SHA5122223937e65a339d8d149fa5ccbffbc102884a702cee630e363a8a7ccba278b6d223557c321d58933c8ece1c81cff0d2f71dcdcb242d2319f415baefbca7b29ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5608159c08eaaf1c1ee169482032f3d1f
SHA126456c9096400ad5405688c9c456fa7a81ae66cd
SHA256b994c777880fd2018a63ccc31626e30f49fcafb4c69ef6d70d5a835207360653
SHA512f0f0c0644cecf944a36ec5d6926bd9ea8fc8d51b3bf74637dcaa0894ee12813d633c1b97b52115bdb585cf5ab02b27b2ed896a8f6b0f6edc575096a8580a49e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba5ff9c6462957245ab10776a1ab266
SHA1eb941ec4a68263c07c433ed1b7661c57fb2deb37
SHA256ec66d56cedcc0a47b6e3674e2c5978ad20cac06191e6cb26162a635d311a9b20
SHA5126b51eeb86ac8e54fd29deb67a141246d46e6ba5fed230c188002bb6602966d082ea121cc22232e982178d2b12344854d9161b2bebdaa72b6f886858c18079d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6908da2316a5416560d9deabd337c05
SHA162f2969307311beda3c7cd7af9ade600abd42a2e
SHA256fd7740a9418e66cb4df98cb63a92ec8e21121ee6e1877da8e4eb98476b047d32
SHA512fe42accee433ce51f677ed26153f607fb0bd9b56a1125ed80979fe7596c238a10e82ab356bfd370a138a24980158b1653af8507a0ca04188b4d7c6bc23290821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cddc193ea47051e002c0a6e670c11b2d
SHA1efe13da7a93e4286facfbe114ec08e5658ddbd21
SHA25691df2cad999358d23c168974112e87820b955e2a98213d249c92c41024b00bda
SHA512212618b49d9fce95c6e3d176c05c831e39b07445e8f6c4f343661fcea42415bd16b18280dac0eb269b9feb64e94a8c2062019988025f213c7c10da434f7051bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d7178efbf90677e7be7982c781d4e4
SHA1d2c70e21e304b5fcd5ad9e9872b36fc3f7c2d0c3
SHA2566ce453193defde2761f1edd574e0df3bb670f8bb525a1d0c1d5a5eafbb28ec37
SHA5126a61b78971d2e6c6633527c315eb0007749bd886709adfe8e459e68d3bf26bac52e53fae332155c591c7af56d42f4e5ce095c87671e29bbbaada1ba710ab84e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577baefc9ebebda86c04acce6ae608c0d
SHA1a5447a3cc2b679bf58b9949764686a61f0f90d2d
SHA25656c0bb63a6faaadf5c7373cd409d71795815563b84fa9776dd848b62bed016ec
SHA5124575877dfedf40c19f96709ffee7c92a6c2fc4c5a16afa147d2ee51386b30f5c595df58b1677089aa2695183a79d649d786ead27b86ea9342317f3ca803493ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527882313f6db27d8d7a3a2e763773486
SHA1bfd0fb2631858b039a7cb4b4ad8e7d3949dc0069
SHA2567df779ea54d849173addb5cbde59fad69d1b426c520bf33784750c5ed244e8a6
SHA5120217ac3b4c90fc424419addd82be2f4cad6486c52119cd50be1a7714b87750197b06a69763033802e6fb704603a878717054b2f0a97ffd06ceef792b1ed16c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5590b32353a6459259d43a4c7d2496fda
SHA1ce1404d38835d0632451db35b3210b07e74cbb66
SHA25614374c11cb5b3808a7c00897d607eb0a026981b7392bbc17915f05f8ef639d7e
SHA51278c75a06c64df8de012aa6bc06e4481b9858bab240baa94d15b3987a073d4057aa87a01cd2a128c8c322cec2c2606dc7c63e3c4a659a17fbb9a6729d180e7155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561b56a1f7fec6cea9bfa3c17040c350
SHA1ac6fe62e0e6551e79461f428323564192ca1d1ca
SHA25683ddaba71293abde969c806603001c90ef55400a9b9bf4bec90a4a48e8e7c1d0
SHA512a151fa63946dd1918ed624578a0fd8629fe24725ae2e846a016c681929392167b3e56fe94df58b0a06c1b2ad9ea2faf3bfe1f4cc4da5f91105d8cfe7545a6686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b3368743828c261ccc42122fd8693d
SHA1514d9e9b35e3df8653361d6dc2c226867f7ab281
SHA256f30994f159704099856f64da29eaaadfe80c252ee22dcf249c1263f16f885adb
SHA51265a071559ef0100bc270716e9aef51391c7cd9eca0006898b5dd0066497e29251c446cf547dad67377d7f3a7e8317d0c16ebf07142b74617ab5ee57da36dbace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc715e1ce63c47dcba01038913ee6de
SHA15cc3122dc54ca031b803bd2a830b1f4b393d4089
SHA256f4e6761f3f62d5ae478491618f0f33024ff550fb216b19941fa190ecc20d8bf7
SHA512c5e6d010ecc55e1b0d968b7a403313c0cc06059a13f7d04b67fc7458fdce99eb6027e67a84826f8714a753f656beab42b6174874f532b9690c64f4a9bbe72598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d2b4d5acdd8beae08b44c60ddb0cc4
SHA16b6fc34caf0eedc9276d887f0b836555d1751e5a
SHA256e5be7f6c059fda80def68557f7664668ed2ddfd4a582ce22d7f5a4b91b011dec
SHA512c86d5784f635ad5f6c65fbec0937195687fb16af0d796e8f753c32cb67589bdd1f4eb1e19830d31e27c492105db53efa9e2349e99fca7bb41b7369bdced8239e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589364ec89ea737cb88d75e957a358d7d
SHA1eff8a93632c089a2da6ee9855ddc0061207d3e35
SHA256bceb1ffc7e497e99ada28cc1699b2f8f73b35356e9aae2f5fc7c3bff8e73eb0f
SHA512d4e5a57aca1e3ba4ce96ec8866b89d16cd1d7a881be6e27a13d2293784bd5b713f28b49acd6c1d6b90fdcfb029f29b2d595c807c7094c16d2af1949fb9cd1e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51631c2c5fbafab26a7680f649d21be62
SHA1ef0c9f5c9f128473aaa60e7a5cd5adfb3ed9cb7e
SHA256eebafa86406c64d2d1ffb70a7813035cb3441a1f102d148a10df827e78256b66
SHA51274d8a1f9a7b05a4b4ae5475e7bdb1ccbbaef43f68dafa00eb41df3aa6cb1bc6829762dbe60e58f4d537873bf0e34b86e36ac4449e4f8c00df8b740b7bfd3fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1adbfc7fc5053808dd4924f97f499f
SHA117eb168cb1801c514cee476e06990a0680158044
SHA256977645b09b8261f59d48c49ab1ff7ea5e967728b2d77b868e87092a56951c5d9
SHA5128026cf81b3f9c0b8cd38900bd4908cb3cf905a27947d1ce9361e7939bf50cd05994e2f4dcf1db4807edfcf05dd21675a35913a9b16f191930818cf96d6859795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532fb5ea4b54076018af81cd70e1a89a1
SHA1065c79ebeede897c819dc65c3307296c76fdb620
SHA256eae23545369496855bdfa57941b51a2939d679731f041326ff683cb599866878
SHA512983f2c6c919bc8ee25d2e3a82f1b7949ce3af798ac07ad94fb13489b7408a6829293b8d7c2df315ab4f6e174a5cd32eb125ce7c00507efffab9f56c540e2f41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54b5e3e78fd58d7df70570b7f36a00a
SHA101f3ae75987229c4676712e891578d67368ad767
SHA2561aa40a9098c2acb319aef9d67c96d6b45db06787c93aa7934bcbd4cff223cd76
SHA51284a3a704cf5397ee0c0f641fb66b687d27747da85efb2744d31a049462d9a437b22b16f499368655204af2d3f0518fc2c81fee07e87d99cc2d0cace8522edde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c77249c7b945a4a7584103b888646b4c
SHA17a970b9ae2f2fb6f3b9ca263a3c123be27a5aa55
SHA2565dd66edac426bda5d5c335ea7d0580aebcdbc0d16817186891658ec99d8a19c9
SHA512e8292c0e64cfa868602900a4d7db900bbac89cf51e8572934b77dc0dff1289e2fb53c2c9d246a58185d52a3bbb55f092448ee7b6e96e0507fbfe1f824a7a9ece
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a