Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
6584cb13640d18d585f175d385dfae96_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6584cb13640d18d585f175d385dfae96_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6584cb13640d18d585f175d385dfae96_JaffaCakes118.html
-
Size
14KB
-
MD5
6584cb13640d18d585f175d385dfae96
-
SHA1
060eaa9b55609b548f67d166c5f5f41ee9d88426
-
SHA256
5a398a60735da9e25b7480647a9104a71c8057b0cad4737c5d3abf292a6c6e7b
-
SHA512
637d0b2233bc6faee3aa5e170cdbb391b317f28ce1719cc009394f76df4e649a2f43691fe5c515aaca1a47f1af4f108af9798ed06a05f1b21fd9352929466bad
-
SSDEEP
384:Cyi/D0I5dFBY0/RxFax5QFAi79y1wDduMNg2aeqyYD4tg5CYmYpKyFG:CyiPdFWEwQFAi79Io0M+eku/
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4670B6A1-17DA-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000790c55772d30eedae382517e54bd8e2781953ac7d528e1774e4b16db5b265459000000000e80000000020000200000009ee2242968455426d5073c8cbb0ca3ca10bbe811fb9c6a41059f34835cd526e2200000004417d8831014fbec12ca73fe35fd1b1d3e2cf4cd6b052ce6abf22c8ab0e6bf9a4000000034007e766bdcacdc1d077f0df0c64903b9f941781963259b9d7aba1a3dbd33a15911ddb6cee18d443a4f1cc167ee67d7d3b1342ba0497c793d8246bdd903a8b1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70522b1be7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3000 iexplore.exe 3000 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE PID 3000 wrote to memory of 2984 3000 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6584cb13640d18d585f175d385dfae96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88f6939f1bcddc664a6fcd7951be4c2
SHA1ae8503e88e12b800e69cc47537142d3037f63df8
SHA256e260598f0264677982f2382842661121ca411d450ac4ebb3e7113f6be0b4bdcb
SHA512b2bf07a40d20101b37d3296dde21e2ab9d67bc48780edcfb42d016737f0ae6921a220fa5a6aa7e967a72fc4fca77616f12c0e83f679a72e92eea6fee61b17869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0bec8a35956a94cb22415ebc6963f3
SHA1a2519d01c7cad151a4a25a643aef86251505ec1b
SHA256445c62133b58c8aa7535e404b6790c0f570c6c6ec4e0292514df020bf83d9781
SHA5127cffeb54d8f0bf1cc506395bcfe3e1c6f1d051e95cd28f3e45effb138d607d9f0483d39cf1201dd869c2bd1bdef645f0f5f5ca235dfa8176197f764dae125c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d8678756cc828a0c1cdea428798f7f4
SHA10853b94493fc47577d2d12d077898a654d96e038
SHA2561cc1e131d9b364d9d9066e27809acb5fb82807ff38c03e12eaac3fba5781f962
SHA512c4b10234fea440f01adbd6551c30cb8ecb01583682c7fff8b7f7378eb984797126619010beff6313994df9066885ed0e513512b865eabd5551e05fbae2f55d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51978de0e9e21371cac3f27d0d344dc37
SHA1db5c06a17b207ad3771cbc9c1b2e1072219ecf22
SHA256037c18464337a87641edc061fefbc65cdd472403de25f86a4d90db6a25194c5f
SHA512e629532e3b5be5ff3324a093260a8cda5ffaef1559cd7c152db9822be2c5e4ff8351009147d81e4ee6626f07c09ee7ff2f246db9f300838ffe635d5173bd1bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55202659568755ff2f66baea5465db7d0
SHA1b76f1d6bccbae3f0d0b34823e779628882e1dd09
SHA256baa0afa49b1db4f37cfbc369f2ff69f9140e2c3ba44de03e757aad15aead8acc
SHA512fec3c20dbc31371ae3099ecef9976277508303ad64e5955e279b002b54ccb2c4a0550b72dfdcb76d6c671afba70e0e8748f66ffed99be6cd19fd9865236e6438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1bc5913465e67c06780349258527cf7
SHA19b15d93bd9f2467bb71cf3ee47552bc014687c1e
SHA25664545f2539736caeb84373667db2acdf2231e9e8e6931208dc7511eb0f0fdecb
SHA512691783621fe8b73c373158f596f493559aaed84f38be284b9e68e3380b89c59e9e73a66ae9d206f108b1d35260d129b7a5762aa8ce70e0ae08659ac41b461c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5219e694ebd4e01ec105ca844863afa6f
SHA1db74a9670ad9daaf4ab7bdafd891805937209510
SHA256f4e881a8db0340b5cdb3e2db4659b6406117df90a62ba16abd2b3af3e897a28d
SHA512f29f3f583ce10c5e7f93af9caff9ccc58e90e2fb3feaf2fee135ba42929256b0febc070c6295566212507c95b74ae60f7d5795a69666495f899de2280d23d030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139efd50afe9a9be1a98dfd198f3db19
SHA18a1fc42852e888532bd409ff8645248af90dfa4a
SHA2568276395f06d0aa30e7f9b75da626cf4032eea275b88f2d68e94ec335012ab74b
SHA512d835a7541b99cba3fb28ad140180f658dd98297728b54a33f7a472c2c09df1ee29f2b1f37881155ecb9af30259168829d3c88ab1c5672d004117886dac40ac60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4a0b61c2f1b13b06005c28c81cf250
SHA1924626f3d0327a80af048e12e2db74454bd292e1
SHA25610aba7f4ffe65788c35892efe1f101afca30ea1047cf198dafbb7f20f071c675
SHA512c99791222e3b60fc8dfb2b45f13ca02459cd9d47c6046b3aa824a4131c994bab7d356e526be3f876a5ac4934b2cd02be331538fc62ba6b137a4026a4e5fd1824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d844d10623f0cd567e85aa4eac19606
SHA13e06ba368407173af828bab52ad3e932b696d8b4
SHA256e45699c0b7d35cb5122885185f83b60b56326f656c7e95f0501cb7363d1e5d3d
SHA51262bd6a2ef0e0f4d172289593234430f878c06eb3e30006a61ba7e43981a9005d58b8c496ab2765a4be53b7771df27b4aa22d596b6f967511677cf64351059ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5affb3ef033af1bd2533aea64aec6b7e5
SHA17cf3642f9e7cb40dc99230cec9f7ab225afafc1f
SHA256a3cf58c5f67ee128f446f75e92e471a87d2284b9f36a84d5342843f1d9203a19
SHA512ea4190989a46c2b403bbbb092b3ddd982c89e0f10a1f2eca6f282bd03f190662fffec401351174ad0f419025d323c971f42d9ca3fd1f33c61cd0286a375edddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e2475aee5e4478034d8fdaf123ffda
SHA19791131523335c41b9d1b850bf6af145fcfa095f
SHA256044b5bf0229cf4fc9b93d127181e42150206582320419da86c19cf6701d4a36e
SHA51258ee1adf96963ec0948f8ad9eeaa08664460d9a0676b7537c4eb452ecd7c8acad90e26b667d5f4e4154a34427b464f64d8b145c8e1c2866cabb4c0ec9cb1049d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511069065610769660776c96f55579ff7
SHA1c69662f0d93764fe4ad8620ae90cdba28329bc07
SHA256187a990d1c7874d1c6515d0fa4540ea5a239629a83a0ccd8de2e2c8db4e1c1ca
SHA5126198e8d8f4f5686fbced52281522f0688c4f2aaf71907bb29899adf662811eb8725d4463a4ad00795a102c8118ead5f62dae203f66cc3e681667d340f8303545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50194d65261b7ae7a2f5febf7d9293117
SHA16dd9f17aa4e5ac96a646b2c0d1370353f277ecc2
SHA256b08b137c4ccf10e8d9f943e32259c81991e7df212e086e1b474fd81cb0ee1328
SHA5123b8e64f943e957a52e005af75dbf77230703456ff546fe30277ee33ed2200fbcc1209df815a71664265c6ef5c6a5355b29a4a7d80fce74c7ffdf1452ecd9f28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9301278af1cac65a8b6b7e2e7532c7
SHA1d2d0d0b7aa2cdd282200313997e9c41a9c9be62f
SHA256e193d0b5d24474f6886f0655cfdf4d2012ddfa16ab1f993d78713a7086b84fd6
SHA51272192492a061aaf5a8f4360f3df9f18d9eebf1993dc563432cd8ae2850c8fbbc3d3eb17343e714ff9729b6af22953ef4fc4a9d91b24227ffa69b03d45d3a35bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b78d4841924cfed73ecd8637fb0ca430
SHA1109ce9f38cf1f3a747eca1827e76621c17a5b82d
SHA256985fd7b3a0fd5ac5783dcb3d55eb52f4b4fa58f86c7b8a3dac48ef7f0a5a2d3c
SHA5125232eb1105fdc2f05b6ef8543d0e699221aecc4be3a43fb698e67bc9c4fb6ba53305c5bb6bd8399151bc834877bc9d395d154ca632795a1b5fd48380b7757338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbb9af0bc3d7e3f2524f5cc46019013
SHA1fd93f51025d7a08b994ef8c7f86b9487b471cdd2
SHA256c4fb987d72d093a8a50e24db4bf04feb1a07d748cff4ee599d0e6b424bd79720
SHA51223941348fffb2a964d8119515c9720225bb63864ed13330eafa2c47114dd053a7e7489e085cc998a8d8e62f4107612d20fdc3626aa67f8fa27b7f76b42292fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e2a232e4a6b28b3a51d83630fe56304
SHA162e2630e3e61a2e3cc0f5504d326e09f8bae6f1d
SHA25686b5aa964ae8006dfc33bc10fd4ab22f644fd71659ce0c17852d4b85ec2c8008
SHA512aa8c85d6667f6dcce555064f0b64df17850a632f8038293fd76504c3894ef354614f0dc83f6d0c2fe33e7c3886bc9385a74f7df6e8bd5565d24d3922dc6c8cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563660f9b725464fb7b3f00a14e9adcf4
SHA11cc1ebad720207dd107416f25861b377dc2f238d
SHA256aea005b07c5b127331069006552b911186b675e7da28049501d33732cba50f49
SHA5129e933b3d8bf6013fb33853f7a23c1c54b3ecef4b70b7a9a357cfb43b82c265934706ca50c82f0302b5038dbbae4b67a7411f3945a413504d2a77b3ff39bdc187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58971cb07a889668a8abac8d8d4a2ac26
SHA1a0af13336b5b7bd3a574d9dd3ebddeeb43e75c5f
SHA2567ce66f81382578adbcec3d1c9d6be1d6485d5c5181a75fa76f246b1dce9ea2a2
SHA51220b444f4c3efd79ef920eeeb8adcb507221a3d2d403a25d51e790d61367ef384a3a186e05dfa4c88d9ae19b0c8812104cf44a73ab3213050b60a9b09a5c8ac9c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a