Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
6585a7c38325e36effffc8c6e5fe3848_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6585a7c38325e36effffc8c6e5fe3848_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6585a7c38325e36effffc8c6e5fe3848_JaffaCakes118.html
-
Size
3KB
-
MD5
6585a7c38325e36effffc8c6e5fe3848
-
SHA1
1abdd04af060c53f9c769c19fe4efad0a8c862bf
-
SHA256
ae1a848f152e47566b753f87da05b80a0230b6c660ca8800864175fcd95f7b08
-
SHA512
045e6c451d2bc6d80ad1155c83e2ff53d8b5e617fdab68c9bf183d9dfcedacda342bed01d982d239900a6191f1d6e86be2f3c72bed5158c7d3fd2cd26f850b7d
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000dea3d592d0bcfef5c213f5c98d9e19fe28c94434470d7b4647461bf946a94708000000000e80000000020000200000004d7fb365b672cda1c43bc8ba73b24a458a6021be3e7b19a365ff175bd27dec572000000017a9b55003a204964d35cfc4504bd8c911158c71dda6c866272d7e4e8a7c2ad5400000001f98e877f90f37fff4e29f5b4fa99421a24ebda9698b8935166dbb3763783ab8d6cbc94ff4d47d10997c0e78db2b93864d4b9f00282fa9497c229ea959c7362a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f5724fe7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ADBC7E1-17DA-11EF-8C92-6A2211F10352} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1960 iexplore.exe 1960 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1960 wrote to memory of 2592 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2592 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2592 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 2592 1960 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6585a7c38325e36effffc8c6e5fe3848_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a541e41214612ae570cf12e2cec8980a
SHA1474c9d7691919ee02bb49c9869ebb26775059f58
SHA25637f36f1de67f1d22c0eaada3d4336b244a314cf03eaf0e8e873b08eaefceb7d0
SHA512121ef445f5c4523548556193bbdcb1315dd799504678ef0fe1e12ed128ad2b549a70f247a1aaf93bf68779c251895cf2e012504c8bf67416986b1db8a978ee29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08e9122b750c8007b36325941c6fa4e
SHA17392c1f08ac966be85b280cce82161a2363d0460
SHA25657f8abbd93b17a82f94daf12b89d4f3a5b3db23602515d4d1e13210807c80ef3
SHA5127e37308260d55e7440695b2d31a7bd2cfa43b37ec95c8ca985b4037063803e92a5824e37e0d7b6d347c4e8c5bf429f66f9b21ef9b818d8d5d44cb2403f99486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca6a009613f61a01d8d2d1a107bbb31d
SHA14da3e6fc894f7d42d8e42ff92fe96d71c4eb9ac0
SHA25630e5fc95b1841a9b5cb5a824fe44c97d4c1b80ec8755a0621e3d9f1ff12b2904
SHA512daca2b55ce7c9b6c080e9c1947859944984994a49c7aa7b57d9ecb6dd420750fe3dbb769f99de2334b4f309618cd88fa116cba944cf90481da964e0828837999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260602de935015606f44a10408dda1c8
SHA1bca348f151881f65752c29b72438451cbf91054d
SHA25615163e0e0ef36ff1c64467ada5fbd21a17935e5df9af0956b6f1dfe243cdc2db
SHA512c74fa3caa81795bf65b5e0510f26772c6939d0deed7dfadbe9bc91b0a6aacc32d3a220b16c24208eacbdcbd46903c336b4e74cd20718412599a0547209962c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508138d4dd487dfdcbd7822beec03c98e
SHA138f2e23b5e09403f0e330ce23218c0df31cc5387
SHA2560811fdc287722a312c7ba57d36d824c2e99ff14b2790b366503aca8ac11a1f41
SHA512460c0803f5a41b1e4d5e21248e1efcb4177287d9f8b482142b40c68a414918215f43a3e1ffe04c31153ff2e2dfc168c663979317cced6b82e2a67f30d1757fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7418a7b2c76008e69b4af91d95c3ab
SHA1ad79a19a9c9555f38751c92947420cdb8b923991
SHA256f349a41afba7fb4ead4abcad1d3126fbca359fa2c02041b42fcbf0c220b83bc1
SHA5122dd66352899441babe4d355a3934f88895462e13aabc16efc6f01d48af8a68fecd56ef7427888f23787d7f330c4f68d82bfc6c8bdf299e05b86281dc39d98371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff6fa61fc3da351d1686bbe695f76f7
SHA19732cfcbf435bb8b6bdcc084c95d1ec4e35de84b
SHA256cc130d780f32e87d1641e609c2c07a6b1404f8e1db0e73902dabd78e8ace0ebc
SHA512951837798dc9f8d1dd46c5ac8c01537df6ffbdb60a928a195801a018bebb0b2257b5d8e381e07146c0942c2b330c0eca5c8df973ac235c80e84a1e76fd6da2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ea099550d0ef6b8859ee15feefd5b4
SHA1327364662863c13353831c10a9d6adf370232a7c
SHA2564501c5fe6f8108218a35db5b61a4acd94ef5789c2f4e9cee3d6527c4954be3b1
SHA5127cb45b7f7f5d811b5f4ec5946c401ff4a60439051ab6c0757fca767299efdd73e9c0f272555c011c907ef3a0b8a1ba0bf25db4f3ad99c78b12cf9df067f97e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1fe3fc5334f277d2bb840c054f1ecd9
SHA121ed02615f338a160f054605112347beb2ad9454
SHA2569a28e3314e77b601f91f7b7d00e69780dd3056b1c9bc838012b8a5a2b95d6a5f
SHA5120bfb200ee96cff423d6f793a90d6416429695b40813b854cf8fde52c9c0e58428dd3e9d7f30cfa11d788a1025a264b47e90a4aaea7d7ed9b2d9f4c0f03254e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593dfde55faba3027f00327e933ae9306
SHA19b45ffd0eec294934a3f1535111da8595a5f2fb4
SHA25606c4f9ec52d667ec47b0e30536126aa3d32f8fe6cae9db70038cce80844c2718
SHA512da7c465a64e937142d11c3ebfba9e941ef8bd49bebd2e821732a7dbc2d100eb45ddefa0039cf9d0dcb6ab6a4003591116fe5cdf0b462592073c644b124f06672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cfd96d6f422a112b3f78bee4a17f828
SHA1c0d95dab259ad1dcc42ced5beaace24b0eca3fc3
SHA2561ad9d90f116502caed0a1f1f8336c535a0bab530a8677aa1c8292f5eb132fa2c
SHA51233a27feb0e616bfe73461b96539d5f95bedaac51514261acf5548fb6929faf943ab29cb702f004f90489946f9120209ca59a3bb62c0cc81d990f0f8cfb1ad913
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a