Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
6580fbe9a06b3237ea12b5b2e65bf2c9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6580fbe9a06b3237ea12b5b2e65bf2c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6580fbe9a06b3237ea12b5b2e65bf2c9_JaffaCakes118.html
-
Size
15KB
-
MD5
6580fbe9a06b3237ea12b5b2e65bf2c9
-
SHA1
3614242b6bab1e175569ecaa1a33ad2dfe66c12f
-
SHA256
242b4e0a5f0fb0ae03e0f1599a17b76811fd55a41bf0794b333100ed61654dc0
-
SHA512
b0c675a5d97badb9ea889b7c8cadc2d26b09622391f8321f7ff5f4fd62722b31cbd286ce061cf96b45473c2d1c1f082ef267f14c17481ea3747b87d75a411fd9
-
SSDEEP
384:H+GAbguo8EDcDwGOOL7NVgheJa4d0lDaZ0:H+GAb5owfR7vgQJVKY0
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8098667be6abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6AB0A81-17D9-11EF-A04B-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e27c167126ef2720b7d985fd57cc1f0e5437b21dc08208c65e009e4781c4393c000000000e8000000002000020000000ca27a2c86ce4d89cd0a2d1b1987184004f8eb74ac65fd08c137f54405513f89420000000d632280aca1a90f0021470eb885521e2e0418a73ed974b5d979b8b032f84dd6540000000044e55930ff174a80bf3660acb5e80b589250eb57ddcfa0a9769c19b03e6a9b686a209d995c121c7ec0a1a0cab413c53ee619df35574f54ae8d4c68a3939deef iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1988 iexplore.exe 1988 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1988 wrote to memory of 2632 1988 iexplore.exe IEXPLORE.EXE PID 1988 wrote to memory of 2632 1988 iexplore.exe IEXPLORE.EXE PID 1988 wrote to memory of 2632 1988 iexplore.exe IEXPLORE.EXE PID 1988 wrote to memory of 2632 1988 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6580fbe9a06b3237ea12b5b2e65bf2c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569bd5ce06efaa1784f5f6b82fce2ec68
SHA1e786feb6fb35cc4961ba787d5ce1d0850f27379d
SHA256501c4987248af0a46b146a02a2bdd6e1e55bf049fb70c3fbda4508e7ee62a91e
SHA512affa8bc37462c0bca046e9ce7e7b7f7a0600a52e47984a82e9b2a10d8fb611d8e2cf102ac6bbf36358d85f808d26b47c869a0968406d34f8d0ea49d575648b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c83d61d641e005aa8f3055ccefa39513
SHA19c80a126eb0df1313003f98f18a3e1384674a0a0
SHA256771fca5d9502b5be6c00fbe2a683dae1c220391ed27798e539e2ea6d9199b8ab
SHA51232b992cbc7ca83a4c0ccebfe2600b279e5a3f62b1a548c79e93068cdc4b876adae8e924ecdb60f1205812c474611b7d164b5747981c14e9a0764e48ff94582c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b87b50317356748e00d76a6585ec724b
SHA1b656b8e2a4a719bb1419ee4eefad08137d09b204
SHA256710e469c4d1ed169f40e48eab432f9ee064b02da1fc0693e266a1a7ceb2a9fe4
SHA512a0195bb441a7bad12d83aed514627d33f96cc81b80a01b09c65842d86abc4de9c3d5273f146db087856f5857bf972ee093cb40cf800af04141aa0533f29ce188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b395f6a1e681da6501929eeaf87cb7
SHA173bbc609a6cb9187b1d03f716b5db75ab5c5f168
SHA256d5a149e413156c45ceabaf212a0d1163beaf954b5cd0edb94609811b3bb4fd40
SHA5129da60df537db0df0bb2c494cf2300a4b65e89e0a656c33cce1dfcd32f500569110fd37aa4cce773c307f9aea5aac757bf925b6e790ff8dccc1392ff33a3d31e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52890e98742ceb24b9f504a42e1555026
SHA1e91a7bc9a0b8aae1f63e27ab97c1756993833413
SHA25699a311acfdacb824618fdf598beea5cc1ad2b7ed4fbd97505ade8bf85c3355da
SHA512cfd0651392d7f921621db37382147bce23c0954b0678fd3abe9aebde68cf00617f61abe846e5beb1e0865a799a02d2aadcbe9cb0492c784b338094f098bafd2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5680b759d8a7e3521485a201409d963ad
SHA1e3f9b50108f744fead4ae01ff958e806d83f1f80
SHA256aab8f92bf33f1738d028185edccb6118c11ac987f4d32d5c91361480a9accf23
SHA512d48a5333e0b4adcd84e11252a8ff014d5bc863cf1414f2adbf0a06cb14dc13bd975d8f1d58874ed388dfff5571ab7caeb0e27c759b06454b4a3a2df402fd59cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae550e2c27fbe730d7fe76cd1a0d6f3f
SHA1cef7ea1cc9b75eec4feb74539ea8d78d66d985b1
SHA256e816629135c430c2b8fcdd81248272595d53b809a0463a2b5e524534a50afa1c
SHA512f507900c99077cb3e75f711f0474d759c16d3e9284ecfe87d8714e50c6e57ab453698295bff6b242bd7e75a8aaa2d2ed73104435fcd219e2944db85b54e9b235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c11a98384ea0a6141753c2a286ac59
SHA1b94f06346eb3afe00ab32b5b920f17b6147070e3
SHA256fbf07c3fd64dc6adc02c5c7c6d0ebae02cb54b24db2a2373a058c5cd95121e4a
SHA5128ba127c339553406f49a4d0830adc4ca34357b90eb6bc4f3d6e17a6386a992321aa69e5dd2d07de2b92ef54fa3a3d92aa3b80a336b6b0d90a53519b6ac2b2bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4345fc80f5019ac255d919614377ab2
SHA1e17993329e89293dd658e3bd8137c69dd030a532
SHA2565ffde030e884f101066256ab92768558fcb5024bde3afe4fc4c4ef317c589a32
SHA512d1744016ab5049bc711cd3c0894d2413ba0cf4727a85bbd50fa70af625b246dcb1faba5c338313bb87b42a64232bd80e96565a5dd8c6f29563a6b716adf921fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564b49f0b36415d87e6bfd577e4e6ce6c
SHA1c56d568005c99a37cd43e38b0fe1846636f5ef1d
SHA256a8afe687de02433b0e4bbecb324481693ef2a54304a1a5e572ba4804b37fec31
SHA51264f306836803329f6e16661ebfa5769f524630e38270d1a0005800f4d1b3912514dcefdeda7edd20e6683fa6b6c399190bfa8b0de9ee7b0e6027512d5afc8d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5403595bc91738b9d130739dbf6afb
SHA1a9b678f2425c68f3f07f5784189a41f1459337b5
SHA256cdd8f764afe53bcd635396b2bb189f12bd36f33b83f9e3b95f223ac043e9753b
SHA512e11f8a9b7062dd18bc9b616326f91969f842c28ed5fc54776bd0140b9ac56eb3c68a2eb42cae7bca35e4d989469abfeeb3f5e25bd3074aa4fb3a8b4c5b80a2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa04c6e73656578586a36c7c0fc2b296
SHA192c17367c7251ae85b2e69b081c5d32eeef29114
SHA2569c85735cf6c411e8abe8c9b5d25a9e307df36083f2edc472b2f7c42769632a87
SHA51219fa8dcda79e6c4829e97094d402b36f681de05ac3af4302e3ae98c5ee3386f8c712760b0d24dc113872f9b5eab625efc7f3be4a29f6df034e7494bd0c1bcab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd254512cd93227b1bfb7dcb0de12ec
SHA1dddbe098ec42f10f8b8405b2efe4db86c88e1737
SHA2564fa6c91e7af3d1aed324fd5fef7981d53bcd4cb38403bba2119e901df6aa3d64
SHA5123653c785b10050a72bdb7e593548ce4e0abcd27d37b0b7820e45554a6c71308f1ffdc0f97bb775c562b5e88ef180e9add0e0e52f5f8839f3aaa765e826d6c908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544db7cf88abe55ce5a22021d936cfd39
SHA1e7afe03119c18728a6cd4e263ac5c78d03171cbf
SHA256069907af08bb2f50de738308f3559c034852215afafcae750018a9cf45310921
SHA5125fa18b1e858b882977056e90d5fac70d9844aec0fef8e0af21595dbc5385e2ee3f051b0026e98ff016b3329ff3bdb5e55b28b31b2fa37e33bfa2bc8341e3688b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cd1718eb30c27a2b583b862cc2f015
SHA1563916ceb9e6c8842a19d0ae75bc66540aa90155
SHA2567cb96d6a6de1ef8c03707b9ad259fb7a3aa26aea529bd312818e9638f62a5c58
SHA5121f97bea90131156a97321ec159ae855adace31d257892370218af680c8c4420e03dbe7a0a4abedfaaa6614d13d0be9f2bfbe837bcf4f6f7bef50e3d68dad7ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc75affacf0a469d667b88353ba78c54
SHA1be6261e8120f931072643ff39ee0d1579953a450
SHA256ba59c0311daa3fea20c7516c103a9a499191bdbffe0d1e7de355468802f1c62b
SHA512970ef8f2ed0d238f758a95df0642cab677c8dc16977f7787ed87f6dcc6d1986437a0fdde0bd8d05210b26dd74bd1db10a6d9888bdb47b38fe1a09f4da9b2ff57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b278ef97564ea5d11860113d0fa623
SHA1ff3d9cc1d19c92ffc478f24f6a0f89e80ec43ba4
SHA256f1a577a2250902519fbfe3e15aa826c163422ad1749a071088b62aa7cc1e04de
SHA512df9d0fa00b3bce684f5e51cfe7c649e0759b29ecdd88d54cf35c1cb0fe06a8764ac9fc0ed93f9143d15beca8e74d505ec622d231cbb5da0672d00636e229908f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2c559658558e01d18f47ffb824ccf43
SHA1f4ab671f523d996daa5f80fec17e789c9ec0e6f9
SHA2567747b40855892d4677dc1231a0bf3829149bf409e8b15072df8f946d6d73a2af
SHA512f7d4e96c55d80cfea3d5253ad4ca9420ebd89e3b042fbca1ba130da966c24f0814004f3033e75eefa5ed2520b86108e59256002feadab4b158b40596d3e2da4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c470b9e136a5127c628fc42cde69e163
SHA1a3d327c17ceba76e99e3c3ad5a690129ecadd554
SHA25643724e5011414ae59e59f98622bcb5ff0d170ae811244dd33caf85aca2215d60
SHA51277e750e0add25c8d2dfed5ecf1b49d1cb75f520378adede1017e150a88a9a18e96857592eb2acb4eb14423cd6ae74f24dd5abb7930badfa30fea943c0c3dfc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33b882259c017b69df7b7b2ac1c51aa
SHA14eacc0868ff7f5855796c2bd18656dd6abeb8de7
SHA2564bdc006c5efe2b9af0610932c6e7e8aed7e81a6a555e65536fb641a2421e5ce4
SHA51208b9f694c3cbc996ef0928641787e2b9ed860c42bd6087930f47f5d43e5ac434ee3973cbb45ee00c2ebcb42312c1205dc7b30d09a56462d344a52d634b03a490
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a