Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
6cb64775cd8c0a7792fb96d10b0a541d_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6cb64775cd8c0a7792fb96d10b0a541d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6cb64775cd8c0a7792fb96d10b0a541d_JaffaCakes118.html
-
Size
12KB
-
MD5
6cb64775cd8c0a7792fb96d10b0a541d
-
SHA1
ed794ed87c475c524f09c36f90bacc99ea632eba
-
SHA256
4b1c149fd39dd1baee072df2782837951ecfde4088c7c8b70b2c0e381efe9c5f
-
SHA512
cc0c7018089447da12d52667e23cb5114ed47010b4f12834c47be4101f5b437efb96b33e34c5ac10cb7d8fea0ceada2e801b3f289af5d7a706799fd415e66961
-
SSDEEP
192:CJren8VwgJfGAL/LwlLuuH8YBKT1TsYHPEQd0lLXa9c0Dp+vfRD2qFKlT:wGAL/guo8sKT1TsYLd0lDaxtEfRK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422670650" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f695566dadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81949D51-1960-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dac06ce5d175074d879f025f4aa08e6f00000000020000000000106600000001000020000000006d7b7578cbf50dfaaebbb102fe59ded57a5d3be33c83c6e8e642321555925e000000000e800000000200002000000076186e36fcd2df6853f1e1f8d91a5a1cfa3f5f4aa1c11f075301107c9d4f6be52000000096291b1a4521050250f6fcc8c042b9b8f2316208ae634ae4fba5cfd40a3b165d40000000147eeb0fb818ef4f381cbf4f9378d17038284f1ae428937efb17e471a031a4c64d7c2cad44bc5dc3582b2dec93fda12e052b15391637649f786a2792d6a6225c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cb64775cd8c0a7792fb96d10b0a541d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f0dc736341c0e32d749ce6d5159c8fb5
SHA1730e4531b5439d6fcaf5472458b4ae68c9e14782
SHA2564a2367733f9ff0724a929b5c941a3274aa60b1b7d9f8d69692e5bc7757329fe8
SHA51236033e58fb1948dc386d8cf50157cd2f95df440d316f08886939d30ae731638fb49ec232cb4c8f58a69b0af221117f2238dc70c3e6746c56dc1bcf2b5674f66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac961a50d26b56c4c461b10210f84b6
SHA19ad3961035c6206323fb827031c21ccb70f9a55f
SHA256a745ff3948d2d91ac528a0417284ae80d13c857b12cc4a896e5aafeebfe1b517
SHA512a081543a151bc2a8a4bc9bc4a2f3177ff21a3667781040bef103b9bf9d824e390aecf80c62c5f4dd67ef425c28311d0a9397ffc4a054cd43d465ac12a7560204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2489a3da0fd57645915d535215e5245
SHA16561832b51be348c2cb2afbdbe1d6e3d26988249
SHA2565748ed53938b1f2958e017dfb368355a5b5b95d2f7700931f930019e0a19d724
SHA5126e79e8515398b2aadb1983110a7c361ee59268813a93c6876667c88e773581e25061e626950cb95c0d9314ebc0d5cf40f030f44093f58baaf997f799cc0e0680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528128aa74626f9255e3ef2df8cb3554d
SHA14317774f8759749c9b7016bf4dd5360351adabea
SHA256d7032c10f2bfe8f3f548253a81cf2c39d766ee03219b55eda6f8948e5feccb64
SHA512ba9fa81774ca0dcf6b7034b7d2e9638898a77a307698885bf9735e9beef4ccaacc0e14e55a8207fb72ccba20ba5b94da47a22e794a96c42170ab69b45424d178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54841c668ae3ac40c9aa3c663818d1744
SHA1ac7b5b1ba19dda8f89c0c8189adbf9d4a209be10
SHA256998a4bb4c4777b32ff79fc9c6a3dd596da8104757557be9d1d66db6efd7b4209
SHA5121f8e38eb98a2bc918c6fa4f69ba7fc9f91e916573cf6511242dbff56c45946617b4a5bca99bd2fae526f7115e29eadcdc13c1245b8461dba8308f7c41c099613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d17fc7e01e0e744d53a7169b5b5a36
SHA1d2d2449dcc5ec67a66577b9f5f9f5831e76ac2af
SHA256011e7da58d878cfbe8ced9abf4d1bd34cff57c7686b803e1cc37a9e4b002140b
SHA51267413c409542d779409bd27092f9c76cfa9e987996e99be824b30bc89ae5747ed26e5eeae742628a32857d11df09f2a5fad97a50adc6af7965f9f97c505611e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5728d60fc6699992b33576cc8ca1658
SHA1f246df524af56e0282334654d4ace81855a6f781
SHA2560f3c06ae47e67a4ff771da624cbafefe79c7cb27d985ac158172283e25fd1683
SHA512e3674c9661df69d8c3b834c7c4d48c2e6f048278f57181eae86c8fbf1c27aa09d100aa32c618d5b9fedd1cfb85fd90300e32d3795677a56aa33f88021240721f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cbeb728d53bee991248780f6905ced9
SHA14df4af1b3e55f0e8099fa790a1111f02ca16042f
SHA256fc42a01c471445882d30fd993d5e8b9474368d4d82250e510c38ce12ba8c7d4a
SHA5124f021a3a0697820b0367143de72fe6237fbd4b67b8ef42b969e54275717406d0ffc390af18bf3413c42a1d753c2753d6c2233f1bce087360aa92e2e99b66b3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e93a390aff8b44fa83b5095d55161e4
SHA1d7ff280e3bc8d6b8dc91c5ab364acef06a084048
SHA256c190d2a2e7b11102a27bf04276c4fea6a7f397e712ab374e725e714dd1bad18a
SHA512fdb9c6807b46f0c8f3c9ea706db3ad006576a59a9bc6030b385da27e7698fc5cfd111b01958213a98b128b629441fccb759ab6c1ede259900ba6eb7df89b50d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e0b296d4b65fd551868270291f9133
SHA1120084d87a31973273111a9fbe51957a920e16fa
SHA25619428813a0f8bc718c4c9bb4d25d8f9a044681b145f709180f4050f47d1e05b4
SHA5128a9ec120a87ff247ca8699ef84950feb166f9676dbb2570e2f6c0453c99aa0bf910c32201b85ab0bb7d35267011a7dc6d50a699e9c376649699f12c31109cfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f505dc80d41dba2202132960779481
SHA1dcdbfd72648bd8e0bef37f06337d478960eefc42
SHA25685910f8f976a3884ef8d2d993a7fa3aa4ef3f90a98e06c1f2a801ed2173ca708
SHA512cda33fe3dd0181d7b1c6213d9b397017a5fd15781b55f9513df681d3434eee751f3257b22cdc6d26aa8c661f34d5aee57df2381584521cc24d3f7f8260b472c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d93cb2e4562fad712522e64e710ccae5
SHA16731f780f49b0f992da92b73b1f14fb598faff9b
SHA2562c955aa75c255153c7b25ff51624e616ec0b0e67cfdd5982b189cf5fd9dc8031
SHA512dd8e58b5291c3393412a8cedd9ea11cb3450abdd2abfa987e7236a0004657b418e761aa118598ee26490c9e578f2ba6b209e58f6e5f9d4708d66f716c51d95ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aafd281570a474c0aa4c49570fa09547
SHA1918ab34b91c6baf58c435f0a18770c4fe7a8e2c1
SHA256c4918b6e4c8b876c86d78c498cd87a9171880344d2706b81e9810b9c9f5e213e
SHA512703e0c2796a670fe7237b3bda0c640bfe640e57ba365635a0586947bb0d3ed0016f1e5e8aebba801664fb689a80ebb47ccadc86273078d01bea3bf3b0c1e001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d4d3a52df8b2781d6aff43145c43484
SHA1e9b791484610373ca991545ddf40345fc738fa4b
SHA256818bb78ef2229922fdb18658177c4994d8c3d900543022393678607803d8f550
SHA5128bb13c2105643e559112311076bff790f587e3a0d522f5fdf5c3e0bf999b8d92200c0429fbd39f66fcc1ebded4d81868103a5bce634f461a250dfd0b3804734a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f15a3aa713911a2e1633791ad22978b0
SHA117a3fc7f6cac121c60ec267fed7901daeeaa022c
SHA25637f0befce6f94971ec1a6e1b71c5e9a48a61da095a1666ebfbb748c284bac482
SHA51277cca697942f3145e3c468cc410042746ed05d13d2d2663eae8e045d8f89d346cd0faa6f060ab227032f49300f441973e23034725f27bc9434cf32bbdb2d5b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD563592aee913c909756ebeb9e42de1d84
SHA12a62ec9360743432cbf3b3150b8adba3366a3037
SHA25629abc64f7b47caeffb46d72a585c0056e0ff0dc2335e3c32eab7d755a85b43a0
SHA51211e8684b03b30b4215fe5ecea52bfd09f0a8519ca10951f8ad42a3ddb97ae984e481267f438a5db6af86ee59f59949e0e45f1334d3161df9d496a7fadc31eaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a