Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
6586832a209cd4fc8d2c9e2aee1ed8d7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6586832a209cd4fc8d2c9e2aee1ed8d7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6586832a209cd4fc8d2c9e2aee1ed8d7_JaffaCakes118.html
-
Size
70KB
-
MD5
6586832a209cd4fc8d2c9e2aee1ed8d7
-
SHA1
f5a03b51453eedd0d7235a3c8c4d7512242dc7c4
-
SHA256
517271688dc55c91fff6265e8ce4b28f5a29000212659c9702350e20384fc811
-
SHA512
f0872f91e9f115787d3f901260acb31391fb704ebfcf61b782095985f77164aa80a749a922135bfe554f53a815f26a7c93baa971ba82358c2d106b300e21fec8
-
SSDEEP
768:JiqgcMWR3sI2PDDnd0g6OWCy+oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8F:JoM3TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8099c78be7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000fdeb3b484f1b54cb88f03991f8a6475234f712583c4803698a274751b0978a15000000000e80000000020000200000009796f9050f98e0858d8c39fa4a0fa4ec8bf79ccdcf021f62b79c375ed4a356bf20000000bb8f1f66ccfbe5e8e2b08ec5a26905cdccf3d8825a24c279275fd74454d88a424000000076f2582ad1bb9f7e13cabdf1d5759a2a9bdfaed9a20af26d5fae3f361acb8c01a78c53acb2857cfdccf8f00b50e5dab5713a8580f3d1d4d91120a1561a9c396b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503229" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7170031-17DA-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1732 iexplore.exe 1732 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1732 wrote to memory of 2264 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2264 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2264 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2264 1732 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6586832a209cd4fc8d2c9e2aee1ed8d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce49f4d6b58a0ef49bd3f93dc9e6d9b
SHA124b3dbcf7c43d83c1bbfeed4939792f7720b81db
SHA25656311975196ed31c3cfcf7c79d0ec49c618a3e90de6fd5701810eb0b4ba01d41
SHA51265196ff58bf270e557f30f410f45d08bfba002098b4a0208576bec0ab208aa85d36bb2496960a177c00c0b2f7ea199fdfb35d8386411fc8cbe6a9750de30091b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59918f673c90f7e8d5431709ae79c1188
SHA13edebefe28e09ec10bde109241b68e942168c574
SHA256e6982117dac8be76bb1c2498c21d033df5f43e6c1a6c4f792abe705811ade755
SHA512ab864dc427c949fc2db4ff44bd8b9c16996dfa5dd7510ea7e6bbfe0bb6da8be2769e181b1a2a80e0fe95eec6400031b749684becbccd0969dc2d3af928185083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40c7e7fc3d3ecf71094c9b4e494d18e
SHA1416f89055e80af1e9eec37699955471c726297b4
SHA25660ac11ba1af117542a7c2a33bc73a1339d6a40a3e4ac07d8e4fcf5b0ee72e2dd
SHA512622bf68ff53d84e2fe118c01f0bfe2bb941cb8404c561ac5c590d07719f09315cb40cb48b2cf3813d5e130c6d865de99ad07e1d6a4f4b17d60d46c5514bfa488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e39656cc47ea2b381a074d2c85c90184
SHA15f6c630370ad8dad71a08aec9b6c97f4377142a0
SHA256bb42636aa6640f8e14eef5f0dcfd3ea1ae66fc6480a82a25d24df0898a268013
SHA51266029044088acaf78a6cd8b4b7e6b74e6716851b1823e16f55d0cf28e0618618e114046f3d4c6d0cb62d09be28994d39696616e76b1d1fc8d8018dfc2dfbbdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502b0d2c5985ff66f4a1d9bbc193d69d1
SHA1148a7e00897938696b1d7bb687cef41802005898
SHA2560957a3dcc59d3ca57a0dbb7504394db076c968bc33c534900fe773c89c519f22
SHA512a641b5965cdfdd84e65756efd318ca84b6d9fd6f652714eb9d976f74953c3608eef81860e30913ee204a6e68dd35d6ad312950162a90ee030e034787c39844b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59003c0fc04e3ade3cbfed24cc5fd2d77
SHA178ae062ef172ad197b66cde0bed8b4c527cb3582
SHA256c2101553d7f6f72231f1670042ac130b0cb3f2c9da30c4903ca97148c4a270c2
SHA512f2db520a50db65ad1255c4d45a4e89d51406d76b2fd74d3e3c8f5789ab49be3581e8acbfa5380efcf69c8c1ef46bf85c2d28753808e9d1f304642bec5ede4fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c7e828839247e10e1e42c6e91f950b
SHA1c79ceb281c334cc2aa2b139968baf6af74afe528
SHA256b732a929876199d14771694bc3aa022c97762a51a11805cd717525281c55c1a7
SHA512b967c7f64ffe3c57928b7bb448d6d518222bce51cde221bac10c3040addd53a3e77b9aa3e3a421b2ea4a91504f6cee9b5764f58f3ca54be04637098945509336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1083990e9f79d0b2dae280433fa615c
SHA13fdcd095229af40d571e581399178abf627e0c75
SHA256e3471b49e338894d359b33d9632c03139a20064ff5a9a0c6588597724acbdfc1
SHA512021f8196386b2a0781d5e4ff529ccfb0f520ee4a6c667f801da6ed749f53cdb3eb499b102690ae2865bc7ae01409d08736ec09a60229957643c58e9dbe48ffbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d04d70b8ad9a40119bf00be627fc613a
SHA13c81940bcbccdf6d2c13ede876af59a2b7ad367d
SHA256dc3f10ca9fd45c166f0311ba81de35fedfcf4a5280bb4f4b7df48b2b868eb299
SHA5124c36cd8c92978e16cddf7add730277bc34bc59d0e07b8ae4df685efb9fc956e0062eb5c32fd198d109fc8216c6e3421918b7803d0372d10bd585b42a421fe105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405d56413afb0f2b1ed9ed24b7111d8d
SHA10ef3d5eeaefa1b4b4723fd923ccfb2544d346433
SHA256c555df77298b2c8293c35300e49602e52f9f0ecda8a9a2906c67e9b5d831c9b6
SHA5125c20bc8c959b53a554494be4f0700e9a4a3d46e95b6da6e39bf8cd41bbad3fc3344726104c43dfe5b5f07026f8352d950edb89c10e2d0eb7fe3c99f1aa9df121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665008236685d12499f316b541d5a4e9
SHA1bcd5b83204ff8a85aba102c6607b6a68c9d71627
SHA256e8d2190377fb82d49dc99d79b22c2346ea44f388375c8f63adeb7b1f7b3aecfe
SHA512056e7dc2bbc33d4748fcc7e3bfc343507930731f4d039fb98efdbf21a5aff73f3e934abb4a63f9ab8010482f1886fd65852fcb6cf58ca9ec9e1ae7853247cd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac1e197996137ddd6af81cff05c8746
SHA1f6c912d013989211c807c6c968fcc375f977806d
SHA256e26b10e70ca10c8a7d742773d2fffeb441e4f7501475554cef9e3bf97df8bd6f
SHA512040695e445e9ecd1f8765921c04a2906f3d06c674a868cd0b655b0ca0fc6358cad4469bcb6e514387fccf2a3a683941b18fb2aa20b80f616660d95a34ca37a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5556a1743a7b73686bbe41611249c293b
SHA17c58f535fead7fede295bdc7342375c258a1b126
SHA2566c50455eba348b7e29f62d58d68cea9029d9d2f39bbe8bfcfe426210576b2ae7
SHA512d68af86a7be9a39080d48b5be861323348e5eb1113c472e94aa16ab2277e5a8d97174cbfd939773744972067906db51abbc38521dab76b8b6a8c40f4b10be137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe0f1b4d62b9e4c7eb87a56f6985a983
SHA14a85579c8910bcfe749efe3d8775dc0f9f9aa83a
SHA2568c427422d85b577c0e32b49498ab1f365782aff57692a2300f97587fc06f9c99
SHA512add6ee00c75e6a5eb9485143979d4c9233d1650247ddb5741b5e48ef0f08e9e60656d3114afad0e4e43cd68e24579d8942377e34e1d0d58060d5dcf3cc1ccd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a1b18abc9995907e055e8d76f469c8
SHA1cf96e6eab06e9ee02bae6afa02923e0c9113d449
SHA256631c0c716d736d585c452a1bd95fa071bc3d8d20dbeadc91ebc3ff3c53437e2e
SHA5121ecf27da091c132ee10fecaf5c260f644dd3f29cd8b81866d39e546c1ba7e8e0bfc2aa336ff98bff007d39b0407d1ecded736332e84cbf482656422cc575c4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f8bdab4f49ca96bc0d41da972bd31b2
SHA19dabfd12aa6c7a69dd19074aeb98a16c1072f3eb
SHA2569a58ddc0e63d34202be65eca82d6208946277673565374885a83aa64e365f8ea
SHA512380490ca983fb710c03d0623f78cb9b8127098217db142897723e6332b6ae276f014b10ac32f3b24cab0a0d7e9f11dee404d145243a71d2c14ba2bc07daaa117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5239a93dadb0f60b1ad9df66914b3d6b4
SHA11dbe722d62f52044f7214533b76ec9ad94afad0a
SHA256b8392d40646e013d2963b6c7c16eb3340b68d348f67eba8d309da336876afdf2
SHA51262e81a1c82485301dfb30bc34c354c73dc4f92933a24c0cb0b5e7ced01de02ccaeb5247625d46256c1b498a222c929398d567e72053526f7331ab6aa43c1c9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f46f89836b502bcc62f689850f4bb31
SHA180fb15c2ea6577a3cbfdfff22624de6aec6a60de
SHA2568e270147859b625de1b3f578674aad57fe755061a2fe81fb194f444abbb0df7b
SHA512494ed427cfa971a93a39208b7003f9113b2f825f4285e12cfc6efe1f2f8f6522e9099099786d49debf85fe8776fa670e674dde88b7d0e80afdae13cb8f5d646e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14fa87c4099199574a67ab0ff207792
SHA10617eb51c74635b206147efb52d6f986b8cd26b7
SHA256b3894e1a0a7b91588e467e12bacf97adbd5e03eab3125ad82950442a813faccb
SHA512aa6a16fd95261740b74b549e736bf32369c337e98bc9e729b376a8fdca727996b26a11b74723dc7fc51a89a1c523895c6ab9cb7a5813ab2c67f8b6cd2525ca6e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a