Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
6c5bcf8d4a5d291a0d0e3e3bced2e29f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c5bcf8d4a5d291a0d0e3e3bced2e29f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c5bcf8d4a5d291a0d0e3e3bced2e29f_JaffaCakes118.html
-
Size
65KB
-
MD5
6c5bcf8d4a5d291a0d0e3e3bced2e29f
-
SHA1
c1570663e4dd90d655fdca77e1568399d037ecbc
-
SHA256
bd071859ea6cad585b88575a772ae2c7d3ed7ef40fcd6315cae90b1a4c4a8ea9
-
SHA512
fdb421fe8053a77146a744e8c90af0b2fb3d2b7dcf2fd2be89bdf7a5540eab9ae17f3648c0612fa30a5f4a1ee619606f056d1d8680ee877e3e5304640d8d7633
-
SSDEEP
768:JimgcM8St8tN99OIsN8p636Vw6KoTymhCZkoTnMdtbBnfBgN8/oyo8QFVG8sG/IV:JOCXTNgec0tbrgae+NnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9E3E841-194D-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002598001b9833149c3176a446a174064fa8abc9d451d4b6a623f16d362f064461000000000e8000000002000020000000b9067e561e6a89c646da502de407d2e855ae4b2fd9594cbd292c17e12e1d11ed2000000098a7ad6b60a50042a2a03a91a95b309de87adfd59c8dcee7b0b3f934d3e9e554400000003d397131c20cb6f396dc1af1c1def904b0c27c61e68b479a93383c43d0aad517b1f40e4aa7f27587a3a300a95033c62165f1721262c964dbefe63ba339c34139 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422662577" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c1888e5aadda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28 PID 3068 wrote to memory of 2460 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c5bcf8d4a5d291a0d0e3e3bced2e29f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1491d363b668b8b6df0b88b5364067
SHA16980b0231eae564ca748fdd89269598126e01123
SHA256c1f183d0cfee6869b34a78ff1313b04b201f62775e5e44d3ffca921b51803727
SHA512cef38e68e3beee45e3fac87210fddf78558a33d1640ed98dd4dea3bcfc44aa072dcb0b604bda0ec59594da65101e9bc73845fff105230fe1d8393d35fe69579f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2cf15fbaa7121c14100969338bd2c2
SHA1ffb24638f46c936b3fc1df8745b88254d81aa5f6
SHA256e1e1e1151bae2c93a30335f18d85d99d604af44980ee5eb8d606c3f82eae3978
SHA512a6e842d90519214254fe417a4671f22c19154c704707f4afd453ef5d24caf4049cb252895828bb72c52cf693693205219facb1bfbcd5279afada4d1ce4142199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fc0c3a17e4b19470ffb163e1816262
SHA15b9787afdaffac47ecfebf30d8c78d80bde7cb46
SHA2568ae7574d44a5d8f465f579fb2834b963a50600d369f4a8ee64036969e603720d
SHA512fbab8b53fce93351cd88a5cd63b6101abbb23e30d7818d5ff2b53c2b0a6e28d5e40dd770da86646ab85f9a0ac8a3b52be1f1a47750704cf72e4b3a2ce5ffa2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296c69d74b3e14f47eb402dbbdf27b36
SHA100388fa61219f6b22131cc37d4f1c8d5bb77fc88
SHA256d1166e99e51e20296be712ea936dbdabd22cc2ed151af6f5030d6a79d9160e67
SHA51295722a899427c16c7a66dd0d8069b3b01747c327625caefb749b08f67bf3fc3d69b1930ed7f35008ddf45f00834208a8e60a2455cfb06a59ff7098ab5af23b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b73ee16d72330376031035e76e6cf6b8
SHA107005460d0f1aba91664536e2188f843d2fb2735
SHA256d401ae47f8b054f6b1f60a23a7a5045d0eecd1f626f6a111753f3db05797112a
SHA5129f80cfbac069dd7f608023603838764a4f9448431199166fff87ff294fa3fbd0c7dc6e8e2795fb7e2c30afea6512b1e023ed5e18cbc6bf54bae424b84f69af90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58753131713d726b33675de854e3b2961
SHA1a36dc52d3091d4f4c31327459660b76ef6dd74e4
SHA2561d915fe51f02e7e5caaeffac7c9fc5355dab3ca59fb2b54ed03ff3c93f163556
SHA512eddf51197f54641fe3ad452d0db206c9b9a46a451667100ca322270d1eef4d36828943887bf8b5e9fbad96a596acfc7dc96123e3fbfa554a6e11c4a9f108a0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59005c322f95962b9b1c421c02f566d05
SHA1f1ce48c82fed4c7e2c7c08051f913aa9cd3c5fda
SHA256d3fd1438b4c851ddbc80e6253855f38d4027163fac88c2aaa5a8722af71b52eb
SHA5122c44e76c8a613376fe9604b3c2deb9dc8471f9c1da148780c50cc8be59996226e0597eb37b077c41d61dec1b10504e7418a80edc25a08d556944328c5d88a9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53401565aa816da4dff59c3702f781285
SHA1fde4f67be8472a0abfed19d0faadf04b217fb8b0
SHA25674f9c838c1ad363310759321f7f3843ddc9225d55155acd82d00d0bc8ff5cddb
SHA5128df3989dd8ed6cdf9d33230dcdc5f38a21db3cc21b65683b308bc0a9e41d1d70b52f47b2803238e093d42a17a29211544ab8b1117f59d7573306e3dda1c50483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589aed9f3bf43cc178dcd8be7a6c15d18
SHA1403e4ef2e4a128dc99a74da6c1efb1f8a8ef4785
SHA256488bcb8bea73936563016f0f8fc6ae05e81bb59f4bb9ad0337ed1f8a3ead94a6
SHA5121f45e3b6ca90c6a6c64ef3a5760d2366458d19c87407ec3a1a77d812b3f235f2122afa90a1cd0742c0f66bdbfc843a4251e2352c06cfaf67af775ae268ac21b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b12a7c04bd8d252e34cfc7793552bd07
SHA165f80374362e6c7da7841f6a193176648202a0ae
SHA256a9093e1a033465aff96f0ddcc858b47ec6ae99687d7152fa70960b11457f5395
SHA5127f8cc499a0aea364cc1ec47744a98fcbbff6fb112250e012fc6f8b06c9168f908cedc43e202f8927056eb937d7f3b9b73dae9dba6b69c08e9e872c96c34ddcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54290c8f598e615b30ac7db7bdbeee15f
SHA1cde3639052c8ccc65f8b61a61d1d570d89b20875
SHA256561e8746f65edffdf9316ccb9114987faeacea1c94b258007c1e844a08559a0f
SHA512d7fc411fc5296f8428df7cf709c7f662e2c5c63c347c520acfd6f422df64d92794ad31308c70317a47005bbef3c9f16a775bce6c6bdabd4b9001e011e3e6daff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d179525fb3c7229f4728e685d7db9434
SHA1226c91022653e0fdaa9f1f7c86fe771aa1e18e05
SHA256fca6ee04ff032b245abb83f1259194de9466809f794e8fbb1a80f02c9b4bf95a
SHA5124581ed892497b13e2e48037040544cf3d01ebd9851884648b67f6944755066d2e96dc7912b74b0c937dd1021bc4b3a6e86680645f23790138c2565f3a6b22e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca855610f3fb038a1e32f9419af0030a
SHA10f7437df1c382241f229adbec7f711f83b6903d7
SHA25615ecbf3e3f26a8e1c54f7e6040e81779786464a5fdf058d648fabc522919f7cf
SHA5127572714f395805e3bb1462caad6aa7897b080dc80917fb5de55bc8ea93ab0f58d42645d82b68ed749c3d02dacecbe9e4d52988c3fe5ff89c6e74d84586f1e3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4a2c9ee2cceb21bd5a8cd73c4932b04
SHA17b3658d397cbaadc430032f28292f4f731cd912b
SHA256978ba9d43ef37cee67cc6f21c0cbc4f545ad1144d0e1ed32e0d1028a9e79b5ab
SHA5121759545e158681848ddba86762112af55fa2a0afc8a68a7dd01183f6a9ee272f4062597b2ed9bd6af2967047b46ae1dc31d2ea540d3eb0a34193b31631843975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1699d4736446e03c0b62ea6b2ae12d
SHA18de4ccfdaa1a83211964a115bdfc20cea463d5e0
SHA256586c6d9bf7ca52a560efffd94ff5227d6fc93bdd655e2d21afd7669afdf8ab4b
SHA512208e186d5da831d2db2dfee7fdc2e597a6b4f848fd1ad4436550d1771fc5eb2d01671692af5159101765124aa46d29e0fff776b9881097cb726dbdab895c6338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510dc82a8eeb8951b9e3863426d3a32e8
SHA142bf7b65622aff4aab4e94751eb3883dd48f4f70
SHA256767ad1ab616dfd99f821ca8e94dabb67d9b49482d8c23cbd065296b04b32f034
SHA5126a91df636feae504043d834ea3973ad18a68621061d3c6ae9773ae2cb5df7b9bb36f6b081bf1603522e5d9e70d5b26cac980f71fc36eb37ca5cc6cc42cd8ab06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74114e535c020fa2c8d706d9abc1022
SHA15e808fdccd178a608a86528b25f140e8623278c5
SHA2569cf0aa36e9baae83050a5a6b672674051b00c14589a927fb70864adbc2160f66
SHA512c06ec41170f1a9c8f42254f6affaf96574c303b34f244b41c83c4c24bde48e15422e196579ef6f6f86b6388083f72ddea27c9771d4c9a874d62e5aa9a983c02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a7a0ff5fda849e20c9fa016de2ce75
SHA100e1954ba375762562ae4c3ac7fd532e8954ea82
SHA2560e0b7c98f5b43e760d0826a3b1c2a9d3f0fe3354ffaaef753d6afda54a10362a
SHA512d65cdc56519c43fc652addf1cfccdbc27f68df4f763bfeb4a380b3c3a007493639971b298812bc7b130c3b2962a5db213594bf0b12e87353b58ba48439cc923d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c0c0f05053bc2bbc5cce3dfc4959c8f
SHA1a87a185e1c238012d7662aae8ecb81420ea21ba8
SHA256945ed4fcb91c4ba2819fabd7827bfe602b000d9d8a421816b7ed7cfb47f83fa1
SHA5122518bfcef1c9a0227b8cffaa5c95991fdeae1d613707868cba35f9079265af3dab73583d46731da29d0b873a5c01725cd7f04daa10c1e179bff12ab5a8bb865c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8497577c0115322cf25200f1a930c21
SHA17d92ae7716398253e6688039c3e51883fe22444a
SHA2569a03d1c0442f47418d4a77cc49282cc84530e99fbb056c500ebe39f4e7b95807
SHA5125d9e793375d052a3eddca8469c9c4bcbdae6549ca8ba932e66c7431932be32d38faddbfaa7789f644096de33c7ead1879929bf30a6e2e96d64c9700968fa2416
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a