Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
6931c665640305af39244f9a073e52d4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6931c665640305af39244f9a073e52d4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6931c665640305af39244f9a073e52d4_JaffaCakes118.html
-
Size
6KB
-
MD5
6931c665640305af39244f9a073e52d4
-
SHA1
fdc930e7c15eb1f7a1956045045868a614864cbb
-
SHA256
e18d313912f6d62da383a4f1fe62c677238a12f7c2ed29a611423d55c431923e
-
SHA512
fd9223470c597aa7bad39bf5d9b38d107f9b8fdb54e492c9ce458f9ad34b89ef303201dba963d97129e9020f79fd8cfdb4f6e5591755c7be6326de905bcc8e6b
-
SSDEEP
192:PR/MmCQcEBD8dhQyPvhxz0jZUEuaDP7/TU:p/MmCwhyPvhxzkUEuIP7/TU
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0607b0fabacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587202" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000390eccf066a6e74d95cb4ae9674e295d00000000020000000000106600000001000020000000566af3c351173c85f6c35f624208d122c1afab5202d03a2fbf5d9a8ee515ed44000000000e8000000002000020000000224923389016ac9d7276b32edc1b48d2a0144897efbcb8c3af428bc64a64185720000000a93979dc0db42d6616778eea28e4448056d36e2e9c7f5d97dfca3fb9d4f2aee3400000000fa0768d78c7fa919c6b592b8070d42191f5ad8ae293b6db984d5c8d86307670c8b1d9d31975e57c95a30e9e87abf9fa33c989c6a245389a23116b6c988cb120 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3ADD1EE1-189E-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2740 iexplore.exe 2740 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2740 wrote to memory of 1540 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 1540 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 1540 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 1540 2740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6931c665640305af39244f9a073e52d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc945a105530c42fa16b563637a69b6f
SHA17c0ef4846b0c3da62e61a7e65956ea592f48a519
SHA2563ad509e91bcf90bc1fbe16f8ec9f77e1bc83a18c88e31fb4fb07e3a201011041
SHA512264ba2ad88e2456853ff291cdd483fe2c9ba7a6a8af30a3d21c490a65019264092910f17ef90e3a0cbf62ed80247e4299d3d25ccbcb596e28024a602985b4a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a4262faa84b3bc29964192e769f52c
SHA137eb8f258c9e808f4c69527025ba775864ea4ab8
SHA256e1152e0cb25a0098aa0c1a55f30c1d4e2eaf7ab3401adb9076c112e86b48087e
SHA5121dfa41394316994839477772ded713bc329e26a2d10dc33500d7b2a3f0ac33d1465350fdc94700bc8c579ec652d81a128793aa2bf93ab35eb2e409ac46d4f5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54544ae6416acdb88303915753b5e51ed
SHA18991adf34caf95399dab2d64f3881d6ac1519375
SHA256526b9fd6c05f47ca1949ae7c819169731013e898c59d8bec4ce5d252291aeda7
SHA512c78f20d1d01f257d90e3c2f179b894ac63e5306cd1c50dd67be46ff49738acbe66145f882e402fa146d74290a6890cd297836c7831f126743287bf94f6b884ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8c4898198e33bb8faa5c70010b9c5c
SHA17f0f1909d8e5e0b183fdcaf5ce222742377fedeb
SHA25655e191c014235a5e58f582869bc02e55f77d08475694c96d766dc6e103ad5130
SHA5129c93309ea2fffc41f4c1b675df00f8d7e12c2a04f5bca569d8061d021764bb16cdccc3b83ffd0bd60aab750c239523cc1e3cc11b0047213f3cad5a8c759de780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c256044a53167fc7bda062beef66d948
SHA1355038c2f4fae2683df074b4f02c385f6155f1a3
SHA256d8a2a9e8cf5da2cab70096a84aeccf92020347915d8f99eb697357b34dc92e5a
SHA51224fc33b87ace76f0b0c91b1d1a80c6d5891d758c3566be559b098907304a134a8c07a86358d20ca37fa27b0fa727d22e8e0b585f27ed782ac7e3205eb95e9332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce94afe28644413e75cf5033dd8cf788
SHA14b83bdbc1b852444760a03a1e12b39120eac1b44
SHA256157033ed710e912dfb137d67a3cc1aef7b280b7db9be8a9b9f65215bde622c68
SHA512e634128c1551b9f7a8e082911af5bb58135601dca879269cc4df854a30d94f6788d2b9bb3c73f30d0042d722f18ef7f9418b6cf8837cd18ecf65f90bd10c29e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f23eb461cfd6b2c699967e174866ab3
SHA1d84f8e949d51d44a9d64142647cf5af04408bbf9
SHA2568111eac4581a53563b50398a75570399b66df6d57651a0d060e76aaa353293ac
SHA5127e59f722684c60904a128bbccd273511775fc074b189cb3b078b1e3115e3bf22cc5cd5b81b1d19b599b542cef7980d575837b450293dd3f1c85c56f62f84d049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490e46059ced03ca61770a723d35e464
SHA1359199e47be6e6a3f7b7c29985e7d64b9beebcdb
SHA256216a36a6eb3d07e6b18d2bd22f837f0b45323fae8a6a561da9fd55ae203edb94
SHA51291058b5852b637e83da2c3f198cc194a2348840d7e0a45546efab11312143146debd63a0454cda4ffd6b5837a720d366e581798b30473f6d8486a5d91e0fbb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05e3dc9069c48ccdb28ed10030d3bdc
SHA1d9f1c22546fd84899aa968875e195b888aa16243
SHA2562ec64902f426ba39da1847b2e2bd71a1ec967bd3b5c691841032424bfb5fc868
SHA5123d65fe9e0c7e152637a517303a4cf9e737a5ae09e1961f59cc094a06ba96312a1627f721ae464b03cd5a59255c51c50841260b5ddf749ce129ebfe7936504ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca61e684c366e7cf387a96a9f2e0cb97
SHA1c8a7d76ba6bd1e64db50419c6a32e0c7bc8c162e
SHA256ef85bd563cbbb4ac05d58d620fa948b1e5911ff70fff7834988f87210991a262
SHA512cd54b3e67c066df3677cd52483b42d3011b34f5f5f8fd3fdb046e6e4392ebd6769a7907b259edb4b91e9e79a3e0b5123b52605a5789849d056af497aba87e93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581cb7b9d7d9a4eb771dd94192041d719
SHA14cd852fa45937bcff6da628cf0ad637fb3525bdf
SHA25653192304b3a9349ab97e8ebdb856f388f451af4eaee1282988a069fecf9f86c1
SHA512bb01d0117af4cd8860a174d063cb8e97569df7c8fbd9f9746ab20a8f13fefa23949f2ef7107c41e9b080a84c477382f807bd36ff10c63496f0ef036abb7335ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5098c188f16134a951282b3dcbcfccd1b
SHA14775ce21998596c16de1f475c9071d315f0a210b
SHA256b87d0c1cf39e440bcac8a0d0260c1876b1195a2dbcdaa4bb1edf5e9ea8b8aa29
SHA5129874eb12b9f202206a322bbfa27d8ec74eb7cd6f62421d66a924a43c02456682eb1a25899b4cf495b1fbce19d81e8cc9ec1830e409c8834a56be7fbc9f6cde6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deedd0e92a3dc11b8f6cd5eaac192e2e
SHA1c347710bc2c700e53390470aafec0750c20542b9
SHA25690600042501c1cdb6dcde10c8091331bb9373572b91e94f766d438e754062a38
SHA512634c58a80b4e888f98fc4552725ca952fdecf3d25da519e67c76ce3d974470bc02a57b96f1decd4e3117ba9f7c8bc54643dd103179bf8945e8df1a8002bc3230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c6659b10d95a684f9efa6a1f38faa8
SHA192857dd075e11ff519c28393b726a3a9e71c5990
SHA2566685a17449d76c642c9a9ebbe5d70dfa2ec114ab147b60f62ee7f65045594bfd
SHA5122e17281c315259b14f8459af12dec6989439f1734f06a39515b3a8bbdfb670122c52b03a7dd755f697c7fa3894dddc84c743a960cac41df74d35622574f67629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c80a5df56f74db38ecf72d22a00b98a
SHA140d31c491da47ffe0edd787d44ed7fbe220b94e1
SHA256b41ae89eb79c7562543e4ac210c59438bc01ba6fdf3ae461be5c5eadfd231648
SHA5125bf0df2d1ff5fc21610ad935d1d5b88a1acad42681f215c5eabb4648d06880f8793a6fd2403b7f3e11b319c7aa3c33917583e2d81dc96842648a0e8b7af9ddb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa18e78fe1698e6eb5d1412200314381
SHA1676c688f86b946bea660de1592ba36c02d9aea99
SHA256173a4bb8a770dc6514be240667800ad5d6bcdb14e6ecf499c81456cf207229e9
SHA512f96f85f918f8d9f20bfa3fa33276f24bb61ed4f3d74aeb65f275e831bf38d7b9dd61dcb51154e3e1d57d0ff64314dcbd036ffa683b8fd1311db2c1dac1d9d92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f541b30c9144e69a373913ce003513f
SHA165d3c773c9f3b43f53f22a310d16f3067b319e5e
SHA256bd00d6c053a151a5a416bb296d38bca811633029366429de0141d7df63940956
SHA512fd76fdfac7bbb5f109df443084fe28f2434a4b7f4abca7d9ce7fc4e90cbd74cc78cd7e1268013c3289a819227756e39a9eeb5ee0e992aba68b56bf7da7516ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c558d5354f3ac6604aca39807666b1
SHA173c2d4759db34c5cf0462bae5fecb32a04adc680
SHA2567f3fafab644d60ba5bde03cec0809c7717c76f153e7cee5229891be02111ce6c
SHA5122bdc3f1aa279768d93c1ade38a6df5c40bc579bb03a2ff21055da0b79c3af0cbf14194a3a1dc1e25d74e216474471f7ca819919d0686f4f8d7ad1d95133e888f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521f16cdb00a9fb147b956c8671f89c4
SHA106ca195700b0c42eb08ca1486bca4e3246dbd357
SHA256358543e8e16d6d0cefd13fdb7bcb9e210f9e3df6088e5b4be42005dcbbc162c9
SHA5122eda58280137e5093dee43726525615e3f3e3def094939e8428b11d71f48bb7c4494bd69bc04fc10bb0902084d76b615fda79711bfdce944ded51ba8d093d928
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a