Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
6587aa13d8efb7de625bcb7d2769946f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6587aa13d8efb7de625bcb7d2769946f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6587aa13d8efb7de625bcb7d2769946f_JaffaCakes118.html
-
Size
31KB
-
MD5
6587aa13d8efb7de625bcb7d2769946f
-
SHA1
d17c8c6419dcea720d135a9e054212dfb650feed
-
SHA256
d4b0456733aa502d9b44616d60abb853648b3ae71d8cb179bc91b6537c687248
-
SHA512
3caaef4f5e598663a05075472d3f1b0fcb470469710d161370a458e0e0fa839bacfbcd6eff62867449fcd94fc8724c98a50447e59352d07bc54a07eb81719722
-
SSDEEP
192:uwXtb5nf2nQjxn5Q/PnQie2NntnQOkEnt9lnQTbnpnQmSNxDLcwVm3YtcBPQaPqb:HQ/gixv2YsZiFsBQ5D
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000182248119cad8a4c986b6930e910dd0c000000000200000000001066000000010000200000003490d2f4f4c063742b616ab36438701dd522fbbd93ea5b8417443465a0de8f4d000000000e8000000002000020000000aae8279be60451377d6a7708da267498d1628d924f6274f6571950fa1183cd4a20000000df7f5aecbfe2ab1e8dc7b6a1adcd577c187026af547b6b86a552912827db68564000000083872140ae7fa83e9c4116740ccab4295a68d8ea094cba137c2f169766fd6ae6c467d5e97f5a84dd7a8fca6e035508b66aaab04623866f2c1cbca7ed2e9d75ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F46EFAF1-17DA-11EF-9066-F6F8CE09FCD4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ef33c9e7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2196 iexplore.exe 2196 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2196 wrote to memory of 2156 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2156 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2156 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2156 2196 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6587aa13d8efb7de625bcb7d2769946f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD522a1a495c7a3a66581620bc051e7e95a
SHA1e0b72f20fc410e75c0529fa99a0f6e63086eeb2a
SHA2566eac648bc438971be3c79fb5af79590514ddbdd434e0d5a39fa003494abf6846
SHA512911aa24e6fe65bf9d76879f0d6c7f3a50c0eb403ebb4c4299567825e9e40dbec33f4eb5c90747a6ef2dd4943f4472d00e5d1250c15e5f7f432ed2f7d57d824b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e56adb6f8c5b120f2c5dd9c7d8bb62
SHA1defccd5b36756df97059e472a4e509ff82d63439
SHA256a3c94758ac8e9346a7257e792c3b774217bacdd213a462d816bfad632c4b1899
SHA5120980cc2ee85d2071a2823e65fa6397e060052789000c4020f6c17e8139943c520422d995e1b9716b5d25d9a1b3dbb75fa87712df148a69a441438fab57c878b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56410a86669f66816700ac2cf89908880
SHA1e4d19e3981947560378d1343e4c99b5d9041a021
SHA25655c4f6d3e03ad2397f992a9203847d2d8eceb7efaaf3595375973bf3da7d698d
SHA512b1a50aa30d7b74e855abe975c53380459676c85dfe2d18dfa4cb71c442de4abcd77aee582b8e81158063f9264c904be3f222fbc147f12a99c64e5fc439a1510b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58934babfc0380e379bdccf5cbe7b0bd6
SHA188708308a86ee3674377395ab02682512e2c3da6
SHA256b6cc263fc2532b2ec346bd1ac9084bc293dbdde7c25f2e9797437d0a4da98871
SHA51240b4998a36c0301c0aa543c21f09481121e6fcdb26b85dc8aefcf864ff0b381a6338384b72112034f532d272445cae7d10cebe3d3ac8790e8c8040927e652779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c0f2533fbb29644a8bb1e7cfeaadcc0
SHA100c448d14a4b0bc386c06f09c863b8e781beb6e7
SHA2560466a6abe1349636e812b24b6c9cef5f0a506f8dda4ec6e28f994d5590371a8e
SHA51241e03209fc49f21ff3b444e7b62f5217fd98dcda891546a08bde837f3f6dbfe56039fb1e8c83528964679b2fc838cb21519d2a3e3d7adcd5d531bdc47b3617bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562aa1af0acf8ba7686a903425cb22d5d
SHA1f60017bb3ffe444186b51699a5f10b3a881365ed
SHA256087d0116bd2a9e84e8309f289efa6867700059631495e0f169b65990d5debd66
SHA5121d76a23b8099d7f8772c045721a95c2a1db74ae685de7da5a66a099158e7a47525fac97b05236d5694a062019f9099fa803adb56f7f1a419a8dcbe59623c8611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ddbfb8fdc167c6c11ca42f713581a1
SHA1fbbb7a436e4845e4ba6cdb0a9cf82d12e21f73f0
SHA2565f1dfb6c49f49ca7af5d99c2297a4508a736dcbdad54841865fc48747664a870
SHA51291c40c064a58a65e9920d1fac8bd3942d74273b71acc76c0e7382e4de2ea88b90bf02afaa675de081719d8e227eb5ddaaf402fc16831dc0263f19ede1507db5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b526cdade74ce2f7519b55d20e91b1
SHA1f9e7b908f781534e22cecc737c0eaf6ed8864dd9
SHA2569daae506a7821dd1bd872f7f5faaafd30cb7d2ee3ca68d09c38909857e0ca55f
SHA51289db92516898f070212a834483ac51860bdae0d5ef72247f4421c7e171efeb483daa869024fcb974ae723c0dd547ecc1fb77549b4d673279008aef2490bd569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560038a0492f87010626839446987eb3b
SHA1bb87d298a34481d3818e15553b2f075ecdca64b2
SHA25605a888c1ff2a005040a6f01b7f611e3adbcf1a73757631535381c49404649bf9
SHA512914e8d650ef8f8408b2271e1c3f37f9d053cf51eb58e874e89795913440281cf8a50e74b1e0eb9dbd2db9524bd24c77e2b9262d65cf663d2ebbd3336e3d6966d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4dd8d6f7f6a660611dceee8a18fa35c
SHA19e49666a1ab1fd96e032e847766084659e6f2f32
SHA2567767df32eff786b776aa28f916f8261721760303b5d803b23f04dcabb6f62ade
SHA5128e1e167ff0537e5d983b898dfdd713a5114c9408475f4578248f39bb093e0e4df917d1ac8c877f38ef5a88fb4f96785c68fbeba6ee34d2cbd4d2db5618e616ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD508e8f5bf2ac2eda5bbe945180689e0a4
SHA1fc982b5fc26c4969f3bd4661994f82b2149c706e
SHA256c18d07f78cf1398ac5fbbbe698f271b56cf128c65e50fb17431f3cd86afd59fd
SHA512f1d3b32b523b847c3f195f7664dc02178cb7758ab7c1bb424dd3648fa6e0b527cda162501a180fafa51877690a07f1eb78e847a4e1670115e2a79944338e930f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a