Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6896e503690248559d8637e74e27efe3_JaffaCakes118.html
-
Size
220KB
-
MD5
6896e503690248559d8637e74e27efe3
-
SHA1
3b58ebf4bacb5127c4572d4e4dd1b6ccfc3303d7
-
SHA256
0ac2ca2045e756a1e3fc7b505c76a31f66f65a4310fe22465f9e37142df662b1
-
SHA512
0346332de32fab36e5ef4fdc69d1cd457b9c52b6bd8c416551a90a57e9765ad0c9111e8d0813bcc694af7f46bbeb8aadf0b5eb63eda71e8d2f5698f088a06a7f
-
SSDEEP
1536:L2KD8JJK3lvLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:LJ+KyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBE32F21-187C-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2340 iexplore.exe 2340 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2340 wrote to memory of 2748 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 2748 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 2748 2340 iexplore.exe IEXPLORE.EXE PID 2340 wrote to memory of 2748 2340 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6896e503690248559d8637e74e27efe3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bae5e778445b28fafef5b33e843f25ec
SHA1f613590dc08ba837af6e7df1fc7a164cffe32a70
SHA25635c758e35a8a90500ef41036b28e99c23461182b16e5316a93aab9621b0bbce7
SHA5121daef5474fa1b74a73eea1d726f0ca814cba5b66595fd3723fdf8aac6abe816aefeb044e39b3b709b69805815321d82e398faacf1f86e57f37fe9aa714ec058c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5678898cebbe453c4a9fdfafeb52029
SHA1ea4ebe6d0e9c091de4ef0d42d16a282df7c2af4f
SHA25649614ddd793a8fadce2d549feece3af405fb314f6a44d1da3017b06494e19654
SHA51237a555545ffe376cbdec279c7f3c6445f892b524bfdb6dad20f0a8213881a74c13558192718b8892f65fc0f073b85354f3cccbc00b330df863300f25f805a4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530cba467591c2a4d7189fb3a85a2a9a9
SHA1a07c683d1778ce2ed3cdc0f4c5d8d2e2da778398
SHA256dfd07b5852d9562051e7a660a61ec3c9b9822fe7527898b2d91e2847341c06d1
SHA512f2f0b8b21b9f8b5b52c159e3d890a9160fd6dc6a2b6218c724e4338298cb7fa66c72ee95158747d623b61d4191038a7304c79382f2e6402c50891792de475975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee836bd936572ef259310c9cca3cf69
SHA1ed02e58b4e0bd69bc2102bdc7fdb19bb4e331538
SHA25617c7287f6ca7c939937626b9a2f288faa547d4a42ce9df61294f5e36f18544a6
SHA512c5bcf49683be446effb3ff6c9aec47b868dea205a7f286201d07572de13e887ced71921659285b6f43c3fe81d5daa68d735d78bf4b3dc1b34bb7ddc749aab77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a9742954cca17c1842b9f02cef00d16
SHA1ee78224561db371b027af9c223137bd57951541b
SHA25621452a178ee1d756b5081c24195673d87e3b985c9d9d4fd1b2ac356d4bd6063e
SHA512c19f2864b038794a648083cc68dc8f1fa08226e6ab4777fbc9cb111419a9f9d15fe131cf3c0b558a45b9258d438ff0cda28a716cc2cf654c160ee84b2c29b77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e03683b68866ce9d6753a0f58f5141
SHA1ff2e7e836d60a489665502fea0377a5cdefac0bf
SHA256c4004a98d34723e1bd386612973dc4147620f247476a483ce845799dfddf23a5
SHA5120b8e5bc5014cff932e1750f985d4dd8495c2674e3fe3bb7cda68f56b8cf27be19e2855413eabbabeb364efd279c889d6096f289785235aecb3d0bd6b351c868f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834b5c54df467c276e39d81a4b23c2ec
SHA167f7779d57f2ad62e3c4361108973be18b09056e
SHA256b251deeb06b67cc86c18592499e977ad6c5784820c6888b0ff518a4e1f622e11
SHA512f856dd98acee56e7a0d31c2ce2911d60947426a4f126325ccd5ba48f4f124374a8530b0cf0f8e92756697fbf6486872f622e0086206679457fa5080b318158b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d035f149b951827823ae3f162ded78
SHA137f787550dfcce5659f2b968186460f3cac92ec6
SHA25651f8ff6c362615bf955a69871e198f9cf459e25f214a7d44d787b4d90dc01a29
SHA5124676064df1d1aeba05ea7895d8e440e3015bbbc8582c54c4181407a800edbb919ee18b3d290a8ae5ff31e1390fba047caf5265c54e96305ed71d5535663339da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577fb3512530e36c7a7f83e7f23364afe
SHA1aeafecf46121af4eb9266fe802d2ed6d6a4c54a9
SHA256c3ca13ff6a630e8ae907dd4f31fbc85572876078769ed90f134ddfc9c57e04b4
SHA51226a3ae8c9de9d7bebd9df805b098d593d04cb5c0e53602353b47fb8b14f442c38c95123bd5cc021807c9b2b60587a410d8dda0452ca3cd84fcb02c48a1b80e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe1c7a58ce271082134553b8cb0b32e
SHA110d0fd03d8edc6276874da9b91f3e1325bdb12c2
SHA2569dfc9cb7361eaeaeec50451d61c4a380fe0258a3aafe82d7048afdde9798837e
SHA51265a9d58f10822a0b0376724bef9a3ff5d7a09791cb7595e8b34e099228226595cbc0e2de5c87b2201086079d573a2769dc26df19a1fc7583fca0fc5faca3d409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8ea6556ef0f8de6fe017042f3e1903a
SHA144a662a71c326efd3005468ca87ea3a6c5ff1ac4
SHA25677b9a986fd7d960b46c9ca1f006364345a2d3e8b6bbd2cbfdac00c6449d3b90d
SHA5128abefc7f738810e42e46f1f1d7e317557eb5f16ece1e573942c8c39d963f9b883858e648563d397d51fbf96cbb8b69d0ab40fa1f451f10e37f897325f0f2a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58b177736741697a861a5389ee60fb95f
SHA15905e29a67e104dcb29025c4ed20f559ec7b78dd
SHA256296c7ce49994e6388b4cf3a866f5bdb4562cd6b66971ca831b982dfef3afb7a9
SHA512a2e464cc5271180a4e3f4d3d905d6cc743cd232794781021aa861ecba7bb30d1ba509e791de8ae6e0032863305f147ecb869674e9caf8463c884db55363b524a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a