Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html
-
Size
11KB
-
MD5
6899508a1c868bcf4a16bd8c08bf3a5a
-
SHA1
eaaa3ebaea2763e56b09b8cc03a4c1469d437696
-
SHA256
6b41b3bf0d63735e27597828fe7ae7bbc57c60ad26b5fc46a060f2d9ae283168
-
SHA512
a1e176cd8d7337da16cb4a8c03736b0ab4a88499bf67b0c25d35fa32dc81cc302bb57866c8fe6d4e6f51942871f31c34643245f7d013e0507370d818e92fa119
-
SSDEEP
192:O1gFojL5E2HFKYnKppkb0hZVaY5SIVHUoy:iNETa0hb5SwHUoy
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afccab2548ae4949b3f03c2fb8318e9f000000000200000000001066000000010000200000001cbc0706ffb25004226db4802bc9778157247c02e4019b9d01a9eedd8b59c948000000000e8000000002000020000000d5792f24c3655fcd5e4f88f91a32c043c87d2ca4c5fc96288ff8317cb210dd1a20000000b80967f73ac6f5e86d0c02c30486bf685d03da52aec78af01035b11b12147b5340000000c9ecc56b417bf8c7cdf2329d5ffd897b8a820268607fd94c1d2967e71690c01c8966c282e74cbd761af9f92f316016e69deb0dd264012fd9c47bf99145a10a4c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80363b878aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422573124" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73B7CA11-187D-11EF-B4B5-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2936 iexplore.exe 2936 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2936 wrote to memory of 2076 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 2076 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 2076 2936 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 2076 2936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6899508a1c868bcf4a16bd8c08bf3a5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5349c3a3e40d71c70be2499bdddc4b69e
SHA12a947dcdc97cb1418d9e73f63bd64556cd0a04e7
SHA25601f20a15bb7e26d0fa065c4ae8961717ba4cfb34f006c3018fe553ff9494b9db
SHA5121859dad3dc194d55f2033cb8e94e8818852848241c0533dee3594dda9e0171c1169ab4323235be42ef3098eb68899044139f678a08020b84bab54fa6b596445f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b577428676034f07580a60e0be78aca
SHA198a3fc9dcef39ba850faac367bfe3b977152562c
SHA2567ad414877e1bfde2db0844d0f9d818025c14b76fc323f4e4c905ba10445a58b9
SHA512d974c7d4c4f1d7bad865d32701bddf9109976ed4a3003cb9ad5a857a59c100073f625d17afe9304c4a22388218ff805d0b4e17e706cfa6ff47a7a9567a85606f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b558a4ca8647e8788c3829a409e81f
SHA140cea57d5ef7a7dc8defa05f0b08914763d0046a
SHA256c514a34daf7e1d46a0d1608b6f39c881465f77c1d1d97ad7acdb81e85a602805
SHA5126753feb3ba3bd099b03d640831a305cb14ff0d367b16e25dde62bbace91a18a28bf6f29f69a1166a6c734787c47e33ce8404adeef6d26ab4768cfa20051659b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b84a6400a68fe95f6a3efeec42faec3
SHA1af65075fa844c3d940fa402342bf8d6038946033
SHA2566d5449c8bc6b528b6af8aece5a74fedeee612cf9d22bc33afe1c42cadd6cb4af
SHA51251e0a07c4da4c38b2e569147ac436c217e3c4452089c95f6264d778f5e532fed4da975f8c6e89cb0816ea7c342cc4f1ed6452ac0207f53b648ee26db34f79bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbce7ae653c7513f7071b484c3b0003
SHA1ed8880b1071aa75a744c8688cba4a16e03aed863
SHA25620ceec7ad05fe8ce3857746fe0a5d4f8b2665aed5da072aa08647848c05b58a5
SHA5129e0f91b0f0a97b0d054f45d03862b64edcd87cf09434b35c8534e65fb90969ef38a3fe1f2e05d853a18f0eecf1967ffdb5369afa45804e9b26820889995339de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6a1585f5c1c0de61facb32010da081b
SHA132c52e591fa9f5578fab2082573baa8b3fbd6df1
SHA2564e8cbb47c4fd5c9a06189135cf7f5c87ae6ad4830a321ab752d50c4c5ba3a27d
SHA512a1673b40f9d8c84656af9d4fce902115247154404f757d49e6d2f17de16331e7a5fb417f37f5850346b5a1301923a0f89c2e4dadc60006bc7bc0a15a0844216e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a303738f3f3c243a012b439def070f
SHA122b8d60a3a2e87f65b60eeab5d4bad4abca18430
SHA2562b90ae33374039d2ce240defda17cc8f6526b07217e561dca023db161468cc0c
SHA512bca91dd818aaa28cd1750081625e694f3b2ca985126f9af4772ae75018fde7951811d055a13e24c14367e1a7d1f61b6b628eb65942db729232ae6c937bd4e6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd3b6f21ffb953d764f90dbcc773418
SHA13bee8c0bfe77fad35672021c733d482e3560bdd3
SHA2561270350b469da27ca7de3dc2fd98c8d566da91da10ce840702131beec85ba78e
SHA5128cfa03c6ae8753516aff410151498514207a1d7336e4558bde16bc917ad6ec335eca29539da4c76d3f41e0c3ff1977a2bf0569e8e02ac52dd0010f7a8411d68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9853e282e71816d9cda6b2e96cb9b86
SHA1e642eca6baf70b8cc2e3c483a2d146dee0139b14
SHA2560ea11ca04d89eeb1efb250da95368a731149e1393079d2081a05582d53aac8ae
SHA51244739be028a78d7d3d2b0ba0ea662275dc1033a89a1e71b8ac8f52c1d121694f184e5eceef23254892a6446758f1098da58f3da88bda8f7cdd1380e804b02501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f9a2f4f27008ac87d4e3fd361a25b8c
SHA118e0dd729bb3ead11226e9781122506f8ab7cecb
SHA256712b7350e6e809cf7f76a4e074801ce0f63e525a1a88c91437dd76bc725c89c1
SHA51214ccab35b6e9473a6cc3ba99b55d3ffef972ba072bc4c139b6f6db47037ceb0f2e45bb133b7bb80776f2c36095385c257482ab8fb3901ee4172df09964ecf575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5837952e5ec8933da2366f19ade194ccb
SHA1af9801a9726e3a09e8a81e298a966e7af19e42ba
SHA256ac5b96332aa74ce263ecb5b9b475f1338833e2704ad3277a0e263837efeed243
SHA512c6afcb5a11d1957650f899bb85ccc4fb65618d7044f34da86bee1d17ff0f43da084584698edabd415d25fcfb761ae8398483e3a652d84f2437a6778d64397bb3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a