Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
6898e11f490202319624ecebbe4d34cd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6898e11f490202319624ecebbe4d34cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6898e11f490202319624ecebbe4d34cd_JaffaCakes118.html
-
Size
4KB
-
MD5
6898e11f490202319624ecebbe4d34cd
-
SHA1
0c53898056a4700bdcd7f01885707675ae368895
-
SHA256
164017b2e8a0f9da76ad91994bbe3aa0b8f0a616d6108630e17786f720491c2b
-
SHA512
63b8d2b6686d90890a4920c08cd131f9ca8834020b28ea6f6f4e1ba939bc5270051ff0d867e54673e6f6643f33d9668f3876872c1383ca7bb544476c5b2ad840
-
SSDEEP
96:ziE6ZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhVcl4hXxL:zibwV4GD8/h/KiZwQn/qwl4X5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ca9b1b8aacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422573079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000003be9ab4139ccac9c6f67aff2e370ed917649a0c14493511714749419e757e8cf000000000e80000000020000200000009d9d68ea329652c9ea06a6f7038b3d0ad428ae35ee7b370005a99a91b30b4be690000000c05ac7dd46d25a6b26f8eb8570be8bd28d21def989c2ff5270b15f8841f04c54914da11920dbf258e96832acb9f086e8d44557ddc915445094e08286710b26ec642b00e97cce72624d8c10ddf72a53fa8b60527c733bc02b58fb1b32ab8b6e5a1be3e4db6d5cc5016a41032e5b1ec49472aedf811bee57c8c3d0886293bdbddd5c23c5f87973859a507267aa9aa7bdb840000000ad464d60b7281e207caeb28f08592d456b0355dcb96770c1b4d5209d98da4cccb5cd8f42b9c8a56e5522075a2b7f20309c86ea28680eeb1c81cc581a5baed833 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000e4fbc2bbb843ef8cf8f051b1650b7804a8e4671314d0084ede0d3a0361c5a89000000000e8000000002000020000000d44088a20ccd25ccdca00724313573adb229a6ec005fc5ef40504b140ceb7282200000009d03ab21a1ea07d78ac40bc48b46ca686c95481fb55e1968daa65fec2706441740000000d0698ad3e2ade9a49f72fc294cc67d43d21a7f504611f87016d7eae73eda6c524cf588b8c1052957b55c5758a442d9f6c79be2f0a0ab8f3baa3de0e561881681 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58E41D11-187D-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6898e11f490202319624ecebbe4d34cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf13047e8b3ba06ae2bf3dda9e7aa46
SHA12c72adb4038d79be2b60eb8e5f822f9329a1afe7
SHA256400b881dd291f6178c228a01ea4629bc492a19e9773e36fadbbb53757a448582
SHA5128bd0eb71c42e332213b24c294304e020b502e5a3f8f02eef0d768472652311fe7c096303d2e15cc46d7983f746b2740d462ab3636cb4fa31ddc217602f580a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd2a1a89fc0f5c3196257ac0cb9ab7b7
SHA1642a5dfa44114c979dff786e002dd47584e5374a
SHA256084f393b2b970ff93ce93bdd5abfd579dcd2e7e44b7ae7361e7e903b27f450c9
SHA51246c2e6a2c56175e8b0b8b504fd1e1f8127150a99eee12065f0bbd483a6c61d220ee61564146801c0d48c026804f1410425eea904f68b7caab5a71b509ea9f579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353b174e91e9f3b2570ad25731b2f442
SHA182f66b5327005d30afa44f883ba57ee94da0e4d4
SHA25665ac33e320f7c8312da3ee6ba4734fbc036ae5af383259d8b1b09cdef0dacdbc
SHA5125ab4132de6cdaa93fa048e53062bb1415c9c7fe7d67530bf497d8e5430e44d461ccb22efbcd6c8d88a887432bc1cc08f162c89bac33f41a43b217c31df5f7ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce65897d772558dc6e56868e6c3e3800
SHA1a1b4826b67988b882036be1fcc554231f19b99b3
SHA2568b4ec28b4c3f72b8b9e9fec0a2fc681aa4b8acb29853b8c31b141c02884d42de
SHA512d2e69e114073c46ef23cdcd698e693f4cb6d41a2007b859c10cc8fbc7e5f1b0e1f367d4918067dfaa2d74b688a01a34a87813a0318e1b0daba3ac1aa2de7b83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54072d6579241194c38c91405e93d44aa
SHA10691b90ed9d9dad59aca42bca644fc7e5e52d3da
SHA256bd60646d2f2f0c9b9d40c690b9897fc178453da48bdad733c982a3cd052c2369
SHA512e3e5cc8b343b0e2b656df83ea50eafda19049f3e5555578c18b71e14a568cbcb56dd7d640896474a59e6d508ff9d74a97dc817afffbb2bbe070e0b566d1ae6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54164081f6aca20073f84c6058237eb09
SHA1f4fe9dfc87491005a0bce0fa0e5ea1d88651f298
SHA2566c0952a0932abd456cab747a4b1c66708109d9044f009a51675fb09d21d2fca5
SHA512182ac4faa40c9b1eaee944d73500c0e95e5d2203fb021c9858993a40c81ba68041d18768ec774398d72254feaf5dd081094d0c0345d64b703bf04ae2dcdbd5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57737d520c42b67ca3c2abd96a9730620
SHA19c145dff197f7ad4aa1c028b67817742b1ef0584
SHA25656d2f1a9647be7207655031f970c5c9453731783b14e2c818d37b3737e25e8c6
SHA512d69ae6bcee82f312c3900ce945e26c0440b322bb15fb3868d955a27c1fb0f49b2e65aaa32786d895bb7c00660d5b6227b4542d082b24321d6ea354bbcaf8dbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d793273ba744b9d5930736b872e6b64
SHA15deae55dce7bf1b3fb75360108990667bee59ef4
SHA25662677c756f594bec8a42397b866d5774b1d8a4cc8e3acbef7be827d38e0d228a
SHA512b0c12db3286a23151aa554670d833e843b64c13fccf7c385accc629159e21b684dd0e41c35e25648a84ac8a5143b84bcabccabc4701f422e9f5013fd8861dd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d4204f1a50fcbd5850dcf0a3504175e
SHA19b168a86eb3db791e3f27063f0664957d8bcd027
SHA256ecd7166694f69f25aa4a182f1904287d8d1c80e74bbb2d68cb46c815d584120d
SHA512a521ee85c3bc59b17bc2714faf529957b692cb588cce207d304cbd9b3441b3f4e8d569e991785a6fb0b46104b70d34d1e789d9e29c67bc546088313e07ffb9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d32e46c68eeec22d466f5a2908df0482
SHA179d692e32a69925103ec1191a6278ed6c1e440dd
SHA2561e389d97c21619e488fb8e57c55fbb9cc0be711f7856b9b1a582345b1c42d094
SHA5126dae04880bc8cb83110d849b473cb1b76673d18e9daaaaaa63c5f9f0045f04a902d4f5dc00a945fc38a15ab8c5f32132838353d67903fd30a64761d1e2865b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fde2a30942b38de63869bdf66581c6
SHA14e6a252cbf2132c5fbd3be436d0198aa21be0efc
SHA2568758a48b4ad09522d17f249b5c1dde8312c1a9c4d761d3b8480c355950816d95
SHA512b04e65a89f15ca0354af7614d5a366ce8eb2426d0101d6a0aed2739fe03c27f955b1aa48ecdb208a3494dbbac72f1d3656304f731df5317ac049030c01fcef97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db17b2d352fd948c5dd2429b09d69245
SHA14d9f910ecca43eac51e3e2119d1f91e1810c55e6
SHA256784aca0a66686e2907ebbe89df68d170672873711901fa5c90d82bfc144e1415
SHA512c35926b3fe1b1ef64d0fd227efff654cea5f01c45fd2321befac6b6a084c0d378869fbc696888d46491d4060cbfeff410dedd3cf4cf081f3bf902942cafcd1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e974062686582a2299f52fd0356b934
SHA1588abcb420e61d3d589e8c241af0442602b14298
SHA256b381bc9d5a0c5684ee0eec55b052b81e9a247ca1507c7b21fb95bdcc0828bd5f
SHA512d61c90fc6890a73278517c82f0d1de492707633413fee36c1a7f124576fa3f60a1f8e3c437abdd137e4f27ff8f4194811a94e491ae2bd5b68d8f31a036ed05a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a9fc79fe9889aab52c5fc872d5189e
SHA1365fc177a959ad851446dbcc8bfeaacbb7845801
SHA25679ecbd64ce4a82a3ebde2e6b03558d62a951ac170a0735860a8622fd242b54db
SHA51226a2b943e74ef0006f6df24167c5be2b5f7bbacc932610e15b6ed995df38c7381f939d619d71d16e57311cf7dc36b2fe7e782f5238964969b47b988c89cef16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f59ea7fdb6e26095fe0ab24c60ed5ea
SHA1aa5a77c1275803792e2f679a9bc90c56330c83d3
SHA256376c1586d3f0f1e65bdcf800f5f1b4acf263c53ff8cb3fb22e7b7d589bec7daa
SHA512de4005886bc5a34bf068f774deaa5a5a2f30e5a24228c816d396f517b88d306ad5f2d4f917252a0f197f0224e88dd445ab07e595caac4c513afd3e154096539e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2579f89ad054e4379fd51a9201010f1
SHA1386e82aa4ee1c470a4dcaa7e86e9774bb1166ed4
SHA2560a9a5af0f99e4e9611504f036135e5bbd86b13d557280996b7c942d0b4151b22
SHA512d87a0bfcc44dcd1b5f6c1ca4b7f43346c96c4a737c95fd85d19d4bd70bcc8dbbb58f0b297616d4e008c0c0524f556ce5c6c4313f6717b4c9845c00887ac1fd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e1b461c7b0c8c5bf5afb62a748f7d22
SHA1db17cd909eeab1beb35c16f42794c65b5825aeeb
SHA256edd9a0905d8b0f99d2ea646590d2ce1d2a6ae6e6cacdcc9ca8f04e3d623af5f1
SHA512207cadef8ffacc4d6f11a7176b75fbfeec8b6736435cf31531b4fe6d7f86914deb937aee00ed40c01f152b25309fea63ca0066e1705c681ca36ed69660d61965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d799aba198df13e28d506a28fdcf52
SHA1db915631d836548adcd9e4066f7e7c36f8d0d2b8
SHA256edfb8f2b964ab6ab86425c4a6de9a2292cd3ff506ea34db8937c9e671d8b0181
SHA512c9126631591078f2d608e8852a6e9fdb9e2fb90283047fbd688f36d91e951c794df3d81590644e7cc81c5ef8c54af108b0a661e3fd1102a215474874a8cc4c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a235a7291ae04432f25948708d17fbc4
SHA1b55e68a1310b7a28f4887d353bc258c1dc86b8d7
SHA2562d4fb54ea6e6dc19f161de4302351b95f9672a06e56d3c1b7983f92e28b28773
SHA512e07819565c6c95f564fe754ab47e1e9750a9d816dfaa48c1d52b9adb1f3324324ec8d1d9ad0ae707e493aa5a222a191cb7d1ddd896df40427fa39955d04f39fd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a