Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
6599581a5cd52c5f6b5ed601c9eae74a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6599581a5cd52c5f6b5ed601c9eae74a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6599581a5cd52c5f6b5ed601c9eae74a_JaffaCakes118.html
-
Size
462KB
-
MD5
6599581a5cd52c5f6b5ed601c9eae74a
-
SHA1
ed579a304a434ca2f88a86afbd9f9880c5209088
-
SHA256
11c52205f4e85d2e575a454e24104f5f7c3f42c4d4fb7738c7ca1bc707c6b8c1
-
SHA512
70d432985e66ad338fe3e1bf65b8b5f22d45eda6586131191002f7c966b4b3ce88a7d7e2b02c117d04c9d3b0e31f4f553424852fcf3da6f564239e430eb1f966
-
SSDEEP
6144:SbsMYod+X3oI+YsagLgQMsMYod+X3oI+YZsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3L5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35BFCEA1-17DE-11EF-9B88-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008a96baf11ed1603ed8f087f740ed518ca09a802d6da9d554df31fec875a5365f000000000e800000000200002000000037e51cfab5f75f7c3f465f995c1dc263269fd8412461ae87e72211e7fb9514a420000000fef4d73692a829182eb9b0c79f9e044e4f8d4d0f4f43e72111c0c077177ec13c400000000ba6cc13df2fe50024f74c1273a5056f18bcc6805abb87f40656adc34d18f002e927a7121c050f76c1cbf9af1d06b1743e9bf07625cb3967617a03e3e73d708d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d073490eebabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2236 iexplore.exe 2236 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2236 wrote to memory of 3004 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3004 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3004 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 3004 2236 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6599581a5cd52c5f6b5ed601c9eae74a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5767167c68da0af55cf9f0ebad1cfd291
SHA1d598856fb94d7e08c857c674e86b11ce59b7ac05
SHA25699fb51d54923949f5b7bc4ff6b0adf7fd8bc74cc3e1ae7754c949d3171f99e82
SHA51253c5ef72ce12be1a35c262e7d773ae3ba4b1a0ee3e542996e716aaf2a4fb304df5e10603bb1134f3be1417634ba1d80289b0c8ba27bd4b24ee3173bc0bbc3bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aec64b9efa30266352afc1590439b2a
SHA170b0418fc782ad795ed368a89e5fc676924e22b5
SHA256729b00206d6232612874c31781556cb5dc2c29bc07972b3d1a5b04c341171981
SHA51284cb263664de75b76cffef50cfdb18bdc10344167588cf28ed37e32488e999cbcec4d2a9428ec38bdda2249beedfc75a4da715f97f88a3f06e68a3278b5accf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5429d1ab560013922ed328927a3c0e283
SHA12f10e3dc02005b5bc52594df7ca763579ba4a442
SHA2562513e3937446bbbd1b8bfb388792ed5cd2b4c8f1f61b10e8fcb91534af7b7208
SHA5120b954d74c6ae0841659f713ec39c3156911e8e42bc6498553db790a74644f524100698fe3094d8e43767f86429dd2c321f208b32e0828ad65385c1870c3bf796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53222c94729f853e5db9a19484ed80eb2
SHA11d90e1af79ff058cd59a135fcf8f75a74003e139
SHA256e73d3305e8b32647452c0544d9b316e52299e055fea71049b35516c6b342a33e
SHA5128043685c83f924f94bea232f266ae2b5925df727eb8127ff1f229def90d7c972e22bffa882ffb9b794441ccf79c97cbde25decf4d28f96305d8267b5abb3d8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b1d03933f5891e9a8a7618b0a20e83
SHA190b79d90006e9f6ea3108eccbd4ec1a91338a9ba
SHA2560472ea82e25707e3ba92d30f271019da04cab16437284daf2206957eb9018667
SHA512054805d9f09adebc7ebba7fb94679023ff84091bf519ad82dd526038db717590e7eb034c2fa8c7db7a89b41dbac4fa491f2c699e643d56afa842065ad5a54c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475ed5752629c49396a6903085195944
SHA1a00f128907efcdb2d23ece60abda9ce99747461e
SHA2568265868be6ffb3ecee3bdbc01d444e36d23b46656b853f12eb52ffcbcd6bdec4
SHA512952c08fef8d2d47f23c5ace103afffd856ecb1229947398d441fef099beb626daaf93e389a269b2c984597940528d41782e575b6e6f4288f34d6f9fc5875c607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f08c333e0b01ede53584dba6921a7e9
SHA1b7c67a08a39c1fe47cc768fa122582dd1683d4b2
SHA256996b9d2a696140e1ba8c0bc0d7bd2da25247aaaadcf0accf16426c2e2ede66c6
SHA512ae595a4e32731a5ff19c328b1c7aef69b99dbb5018992a98880761a31b5616000ce137b8c02c03ea69b52515b430a1ddf32b27e08d0f1d18275690cf606b2389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe33fc9c985c99b1f0f3944374b7e2e3
SHA10ab8f55072b334f95af0bea0b53e6b579508f553
SHA25614c0c57422cd663f74e4cdf9cfe484bac139219ea014c80c2ba4967a17493071
SHA512faa8db02cfb0785411f831747794cb2e4726be6f8f5a58b095af987a4b37559a3abf463da4ae674832e82a3eab0a373d9032144a92a61a3dfa8e7b4286bdf2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f1953e303e3097b1da244fc470a5a5
SHA1356afadf09a3de36493c8b82f1619503ca692ea0
SHA25649e98d54a98b55778ddf59d5c05b8166a5e2178f2144ece76c07b545a1dc3bb1
SHA512a4fddfe7a5c014b8dea90437b9d5154b77eab33db60a19a5e1f97f0990edca3fc14f98144f147996c9e43011394fd800d8376f35aba19674bd6d114e042451d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd50541788757aa15867936d00298e91
SHA10a02cb6516e4af16356304cffdfc25c812080541
SHA25675cf278de46b2cbcfb66223cbc8312811e275e034eacf42976b179ee633265be
SHA5125a04939d4b24c0b0beb330e2bfaa2e3b7001a5524942166f110477ca801d9d95c50c04da22e89ed2d7a036b983b780a7a9551649fc183819d77cf5e98558ca72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510321e30aa1b3c17711ec140c023c020
SHA1dd0769c80cbcb0e8d4c2a76eca73c1eff801a36c
SHA25634475c480844c2ffb5040ebe62fbc333fec09f8ceb96495b628eb195aecc565e
SHA5128c5bfb88295a3c899a3e535870bc2dc36f66e2f6c9a857022a8d1186648111cbb24b4db5778616ee6645c7f13123d264176d65a7643e4bb15c61ae57c97a35f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbac69e599184e4c6f56e0a6bfc27ff4
SHA1dd67823c83ee66687567beaaf43a2a3afe5372f7
SHA2563a2624d15d7d679aec0445e5d51f901de0752985d41c3d0dc59f5940894c7426
SHA5126f4d2a2ca2f530e9d0a9123360869723eeafae7df29aeb97daf6bc854982df115d039455933ef183cbda70d1b341ec95a26248fb13a04ba3bcee5de3bec8ca79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5639bac96ca28072adcae29e1e28eea0a
SHA1b7b7fdc1cccd8a281c0a392765f2c473a400725f
SHA2563b812bcded2ad2a19e3e211e949400b068492439a83b6b36a0c81506232b0dfa
SHA51248d5d588b80238f1b048d7344bfc34b7858f8b085ad5cc95486e00ebf8dfe5d5ebffe48df4b8da76a3c4ac71530a262e74db0c4f2e7f1380115a1f6ca08d646a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8f5f12ab195c6b4bb93e86fbb0f99e
SHA1930fa47ea9bed432875fe816c2400d360c9748ca
SHA25628722a554828561699083ee71b6fda5e44b1169436df19a3c37612d596b34308
SHA512e6e506cb93634b1ed57f27cb020e2dc6b613e28f8f68033e78d920071b0ca1a4714d316654c66e11f226b4d6a6902bcadb5a1b6bf6a18b3c1935aaca1438f2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c517be21e606c48ee6935a62e50f0478
SHA1cba91e602621b877e5be51b00d38d9c1abae89fc
SHA2565b1e3a0bea9b2489104648562ca67900a616b26ff2cca4d7187b3cd2db9edccd
SHA512fa3fad27ce5881564bba399800e233d95546aca369f378979e5d13146cad5073a3f7de0144e3782f82da87b88cef8d7bbcb598dbabe29c9ed6d72b8a262b34d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b86a2ab62ebbd6873495374660894c4
SHA169c14147c5576178a9365072e483eb9d570dc972
SHA2563a3a1c57ae12accd9d3075bb4973564c18823a02bbfc5b149cbdd6e76c4a081a
SHA51225df56c5d68f77f0d9ff4323c3f4dd7bae2ee28e93539f0a288f2312da74334f7e2a0bfdbb23db25991bd62dd35f48982cd987c7f9ede4c983aec35e0220646e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d771cfb52fe471380cddb6781e668b9
SHA11f96e9555b55418fb3ecf20f03fa320d4b671aa3
SHA256241136f80b8942bc7e376b418ed5dc92e0a7ecbd84e9a8aabf65582cfe594f6e
SHA51240c7b50c08f531a58076956db2aef75502fd575a58ced9f45e7dc8c9e01743eeeb450ef731f4c8e601f05562fe91a2d3ea88e2c154fdbad3846bd599d48d723d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b543438343b04a70314d07e174dff82
SHA115577b92b046c1878ab1ddc7b2f2e2d22f2d59ac
SHA256041a50d27fc1c4345942ae1c17c832d862b8856e90d8d59e5c664f631bd26a1c
SHA512d1259d7f3b0707310c928ea74b2de3ad25ab7b4c9424449653ca9494734bc16f42ef9b7f23675766d90cb9a14ee073ac3995c624407d7e8b6bdd3dc1bfc35bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513eb3742b0f90d7e28a3c6a8b3185a3c
SHA1b30d630b2cc2335b0a5667cd19c768d812d6ec46
SHA25647a551f9041b1e893a3be8887b0827657f6236352c999c8d8b722d2bab0b5e1f
SHA51240a90d5d3d385e76084f4c622959038ee4aa60b32cc36c6796149a840d054eb066a294ee61fd429c2895fb457da75e697754dbcf090ce836f730edd6ebda42c5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a