Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
6732a06abb193b4ea2fa1ce1d398c6fe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6732a06abb193b4ea2fa1ce1d398c6fe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6732a06abb193b4ea2fa1ce1d398c6fe_JaffaCakes118.html
-
Size
19KB
-
MD5
6732a06abb193b4ea2fa1ce1d398c6fe
-
SHA1
79afee595a462ee260ff9d286fbf22114f962464
-
SHA256
cf8ea13f0bb6f0fc2cfd7111fed888a65bf13a6e69d32182a732817022d99b88
-
SHA512
696e68b41a8384c671160ee50eb31bf93727e76ea965e8421d8b98f19f66cdd05a0526e0d75132cfc744cc03361d26b067bca40dcdf78d8724da18681053243c
-
SSDEEP
384:SINr37hx28dhOzr2CsGoqKCvQIYxjuwUuczryaIgm3QE72bIxLMi5:SadAgVsPYxjYVzmaIXLMi5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0650bab46acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5F3B5C1-1839-11EF-8189-4637C9E50E53} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ee59583e43cbefcc44a80c1922152768ebdf51a26badfb69630de48c88dfd82b000000000e800000000200002000000055e832a04b6216d866413e741dcc02d1a4ce5d91c74d5b633caa3d65b27e526c200000009ccbe75130c0582c76c54a4024dc8dfc82327ecd5d903a9162adf13588c79f4c40000000e51e1fc666e4d24db52a8936ec803746aa74fa5ae35c00ec5896810101eb77d0dcafabe9fea4d602987bd440db6d94528e98d18753652b57b226488334b4425a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422544082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2172 1608 iexplore.exe 28 PID 1608 wrote to memory of 2172 1608 iexplore.exe 28 PID 1608 wrote to memory of 2172 1608 iexplore.exe 28 PID 1608 wrote to memory of 2172 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6732a06abb193b4ea2fa1ce1d398c6fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabf97d1388222de476deb9a76701c51
SHA1342de53bdee1de7ac995939fa54b3ac457116983
SHA256f7a3c8e666896070aa73ac3dba88b5c2f32d440e6ae94897cfbbb8f12ed312e7
SHA5125c5e5536122875cbf081dd4fbfcfae189adf0ee23f4bd0c4258af0586ee539e9ef8e90a7e4596f4a610debfc5e2ab328336fe3dfc712be0f1c0a60dc22b5c98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f6b0de48d0751386823de7b1e113c2
SHA1a40b2e64981fbe9786f807e1bf2bf5345a0124f2
SHA2564563e206d07f05945976fea23e17bbccac15de9f8611f898776d174868daee72
SHA512fc9ffd9d52a075998a62c491a5d5a104ce92b81eddadb65d3d6c30b297230b3535569770e9de8efffb85880684bb0120ba7f68e61ffdf1ed2b49b7bbd6b2aaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb597bb981478ac2c44a6810e5f2ab2
SHA131c96e8a5201001ef54db36917d917e111371943
SHA2565d4f6376b36b0e25ba43a34c56d4b703f2c2ae9eea76a80126542616df995995
SHA512b3e556ce4c8bb6f450b86f1e5e9a2c05d0acd2c99f5846e54502af8ceeeb58684e58537cef919176a51f95c3f05b19688f3a97ebd951eef74da504fc0c8a57df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cd18720759440da880660c66bcb80cf
SHA1f9b70cd1709af33469ce78a12b758b8bf8802d01
SHA256fddad3bbeba0e544e1440ae58c3d5084ac9cae73045a0356a41f3b7952d51fd8
SHA5129ee70c268613a611c78c055c7f98671900422cd1a0c93e89ca6df5dcd24aceb0c7d7cc3d284205799744a370ff5e92a8b7b7a1be025ea63330464c35c0ad37bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a942e1e9e8da151564be9971a09f995
SHA1089713a3d7731c6c22c12ae64e174677c08c5559
SHA2563f293779d80247075dc6badd71d8f8b7f1123a16b4bda09b4fd12aff2522c683
SHA512d61b14b092f74c2b75ef74f9953e5bdb00946de8f98cf8a416e1f0bd9e218b8ede840e9e136c279380a53dd57579ec303502beec3d3866e178f882c27d94712b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51383fef66bcb8bd2557195be6f300af2
SHA15fe9aa9033ff2a87e077bb83bbd088a7f45b81af
SHA256c009a79bd9054384cedd8c79fdb1263137a89b78bf9c3eb6adbe12e1648bc098
SHA512bd3f52a8f4e7bfd48e282640c29712bc5e9f12dccc3f1759879c287cf3d5d042f8d265e6cdfc6e5348c298bf5aca3d8630bf65ab928382f50656269aafb93866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6c1e20c5ddf2013624d37af18e89bdb
SHA16cbe5b04f45f720f47e305323a65db9f68bb9af1
SHA256f961a016b52fbead22cdda6466c8f5823b12751741d6129a2d710638763d605c
SHA512fb926442b665012c583d561a47033232958d94ba027d3aff7d63f7a26d6b3e1154ee5c21374c36658f8fc30eb50c2a6b208591011daa21e645d60a11e9ed41bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb8d32eba6aec0a0940a93ab518196e4
SHA1c0ab584e784c9a7a6d756d17dc699c34e96e487b
SHA256e7c840d2deb5fc8f87c95a7db3a3c458ec20904855ef603531b0c732d78c8d7c
SHA512b0b1cfc1b58313f035e3c68a0b40c62de7732d040140ae4035680b5fbcd01b797972bef3435320e05f70bc1c1e59ae2f41a1de77384d839421d47d26aff660cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5ff099535bc2517942a4dbb0b15fd6
SHA166bfec66c052b40c5ca0f19de856bb9fbe11854a
SHA256ea419f5ad41b0d8849a3887e6df3401f22310d7ac4ed32d04e665a1dd70002f9
SHA512d619c4df0c2bacd0950262c39571ae6627b219d82022f203973f9479e1d7e0c6ddadfa6b9e646cbf8e06961abe1cf7f6a58e446eae249d4410e0e10efae9c956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588c3b8d34c9edc1b84e45dc7af7f4810
SHA1cd464f9e8ca093dc9313875a0da6210eb9848446
SHA25616e8c38e95ccc9565e0065bbfbea639e50578692f3d7a76f0dcfb8c131184de4
SHA5129af1052d6a0434693ab28d461ea1857e2dbe19ba2284e28ee17ec2c624c0e307f9cfffe1901faa73a67a83bde03c53e11ba5cbd6fc95440f5e654258893ed978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545566e121a05e44fc9f64f8950979489
SHA18f9369bb526e70dc947509bdf86b07422803cdcc
SHA256444458038bfd232f36d34428f8b8e56f97fd476da06134c62edded1fc21751f1
SHA51229c8fb6dfb6d4658d169b1e4ffd1eeff11db6142c0588b32160f0017d0b19673c346a28654a32dceac113d68497f82097c21c4ceb69702bcf12f78cc6390c8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5469cdd7e4e1d0abf996ee4dffe1238b7
SHA1df1a6fe17b6aabd01f0449fe2d041f5b49a1e570
SHA256053c485792fd6a7af041ec331f8ee5a8f780beae60d6678e6db6e743da41ea70
SHA51272bacd7f1f94a34fd648312f4561fa24956cb85ff846afb5363e3b3540b8d59b08e875bb85739177412bd0e47e48e648eabef5a65c3f4edb99d35d5265595113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddaaf94ccd755475d82f43d28b81b085
SHA1c0d2f862df902bc07de032a14a461d2e2a602984
SHA256204c666aa737b945ddbafbba3fc6508508956afc1c8f09937547b967de590cbd
SHA512c2f36abafb7b6694301ee0c2a19192c160077ff73eaaf076ea8aeb03700d2ee8a9ada1c6b05a97f30bcbdef7604177cd003c0bdfdb2d5a08a0204374def42c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50922a36da65b9559ab05c6dda44bf32f
SHA1a1f011236c373a6ec6ca9fd0cf4beb4267223e86
SHA256ac81ed7ba0b023387afd3baa40782aad436effd63c369238b8f1fe3b46ffdc49
SHA5121df0316baba1dc9c1d1c44053ecfc2220bcd59c8722005a18520d06573c3a6eba44886a499d10d60e91cdc5f2b85f90019705373fd80dcd01f5b225030a72b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51372922731943d4ededcf9ac63649e03
SHA1e6addaf9aa63c720344cee8f91b68aa36804def5
SHA256082ff28d649687ec0b5357442b2606db0bc8cdf88aa24d258bcf61b1c4dbeb27
SHA512fb46368f832501ef2aa64572c5f3609ce3aa62e23a2d6a53d4762f1d38b27f6b421599715e9146f08ab60840ee0e14028cc82f65da7e41eef12ff3ccdbfbd379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d530ddb956e1c19f6fc8114c4ee23453
SHA1d276b48987518ef50931f9e43bdb595fcd497076
SHA256e5260589ef69dd0540fa7581e4e1c265909a2116e1d56bc7421cf4a6a484faac
SHA5128163166acb1548c9dd1e70914f6f0d9d31b101df5569b8f7133b749856b516afc50ef7f9504e3d7bfc081410eeff8f5ad80b0c3d95050a174885acbf7015fb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c767d8d04c80cbe0eafa59a2c2d3ee17
SHA1963bcd6ed42dea02a9471360e1e5df6f8e2d3dac
SHA2569ed9bf9d9725bfab8d743da61c8f06a2150a99c83d450dbd22b7992dfebc26e6
SHA512ba6fc8895393e7abb99a12a2ffb67b4a868d43afc52a58d166c4ea4db4fb180b68acac2bcb54bbcfaaa40a63f232135771c0ef66b3740e9fedea02637f9a836a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c3048339e8285e86d2b25bec016735
SHA1f3ad28f7e3b480e0739ce6705cb128ac2b1d78aa
SHA2569c1eb7b95f0eab4219824ff2c81cf83725534c0e8139270268ea281e2b15edf6
SHA512833aaaaa0bfb15fd9d6438ddd5880e63b9ac428a5860580e92cc38ec8366ecc25147f5529ba5b5f5272339091c6153615545fca4328ae7ad95e986183777dca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab1d82dac89a529dc1c80f08c66edef
SHA19facd7760bb55c151763e376051593a2a7e637d9
SHA256b77d8d17d1221cad8d66c553b2cc629c516bdde4b40c2559eab8b5eb4dff4a1f
SHA512ffd60d44cd34d0dc37c5f8c1b6856d524f8466fa93f0963c960a3d985df9ed9057902992ae47c17bf1cd868deb9005f0627b5b9f32469d3deeed3ffe83f073f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166b926b568f7db70317f9434c290f7b
SHA1934e8fe45186917b8f0a68fb4cf641de8597917d
SHA25651d6249e880f1b7d7ac4de9584cc9a1af35ebc472d739eb64a57f82155a4cc21
SHA512bf68a1abc8b3d9f2b2c15407430e7a36de56eb114986c41c62f3465a902401175d3575d86a5b7d134f1a7fb863f4acdfb6b8ee615725dd13734a1687bdfce5d9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a