Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
6934be26b4e6ed32c2875fdc15b83460_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6934be26b4e6ed32c2875fdc15b83460_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6934be26b4e6ed32c2875fdc15b83460_JaffaCakes118.html
-
Size
460KB
-
MD5
6934be26b4e6ed32c2875fdc15b83460
-
SHA1
5ed9c61ff6b41bab125169ae9c38506b83b42efd
-
SHA256
8678de68a68a98acbf807ad2c5663de4b451ca15c4a9f2f9869c7a9371385a4e
-
SHA512
cd438e37be030dce26acb7c12b6bdba6a64ea12f8f3545f93c6a378bb3ea82f95e16cd5d9a9e7ac38f2c0df559b21ec106eb854df39ab5d24c980fc8a41d622c
-
SSDEEP
6144:S8sMYod+X3oI+YSsMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3q5d+X315d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCFB68D1-189E-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003e0a35c026517fa5431462724d91e4a063cd5d2b92731f4785e012e6059d1309000000000e8000000002000020000000e9fb9d0911befe91af335b21a1d53db74b16e8683b49c01089dd90eb3354519820000000d93f10a1f8c5aaf24550f59d790c04dadb30481ad3528e244a2f0416b5d40a6740000000bb5af84c6720333741ab908f116503006642b74d5c685c4e4a7bae20d488614d54b6c495ce36de30ed119d9d59dae3f7a03df648fd8a56db12314d1310f2dd92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09e90b5abacda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 2024 2428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6934be26b4e6ed32c2875fdc15b83460_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65ceba5c1f40d9ff9b725e688b29132
SHA10a1d2baf2bdbe4dd438e9ed207846ea5d0b36d5c
SHA2560e73a9ee972f07c66313d380490d8bfc902e07e736452423d1857c3d4dd279a6
SHA512ad46ac732bc237ec9cf70c364d9e7895e60cc16bf8d5818fbaefa8fae11ed06d316bacda96cba1cdde7a337f55c44c7ae1152516b37835ca9ee62873ead381b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a909328541e41e6ff5d16210d25a055
SHA16b5a8b68419f6cbb5a062a143b3420bb3da3427e
SHA25608592fd742f623cbb46be1eae6e4483d7ea334c7ad1af4a18e296e67a4575e6a
SHA5121ee8d25e5a575c4ac216583db6ce82d788eba2316ebb3ce17618c552b3067cb3aac13ae6908dba234a4dff88233f4508950e006ae7c43ea40433840e91cda339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6910eadebf78d764ed7a86eac4cd8e6
SHA1e3a066ab91a9cb0ebc170823281a5c2ff25b0007
SHA2567b0dad2dce174dda5f5295cf67178562e870f443cf378855cc0f7681a121f500
SHA512ffa0feb78bd2c78672c1f5d30a7d2877d581e1f0a3debd9d6eed3f67e364307794a09eb9573f2489366e946acd458fabe244d96e31d8ef273487218f0b05695b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f550e935da6ff6e0ed3b9ac5b303f725
SHA136455049dccdfc9b01ef1b478141557209a56192
SHA256270642a9700f25a9b8111c3ef042cb61c1bb773aa01bd705d8db90f9e142b9e9
SHA5127fc8990b6eb53034c0b86792030e34edba587e7275cfbbfefa9388cb1c0bf34fa0d0c832e084ae08b7f624e49cc906d2d3b0593eb903f9f4805f2f9b8f18547c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7106113c3c67e2145084737abe4f389
SHA1e8757e473cebdf1da668994252ca54867e0e58fc
SHA25624b47ce6e0caa6f7c08933e517d4a6ce37cd9f8c30aa8f714aff99e18d5517c3
SHA5128d9535a21bcb85826aa9f5cd3d5f281d3370283f7509dd035e28091f6b2297c302ffe165c3c256a79c4c256019e7d88e8f5d499cc43a7b5b60eccc4d90c549e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfac9acf6d813a6c8f49473f35adf657
SHA132cbca569df69eeab80d4cec539939b3375aa376
SHA25693ec3a82e6eaf5e422ac15a8ea680186f2c359ca60c2e93d5e89ae734f782ab2
SHA512e2518064124cfd06a8395767de2de19d94fd204d9bce00b18fda881934b96cd689b4ac2cd200b75c6ad178893b7753d142d121ff3bde5eb3c80a9358b56d7e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f591ab253f980af40f4b121fb604f89
SHA13306255edbc79de260a1b0264d1889a9b9d141d3
SHA256eed07a69d72f1e68a63fb8ab4b8d4085a608f51cc919c0a033ba6bd0a209e8df
SHA512a39d765859bd7fb41d86171541659a81896cbb16068d92a8e56a45b1520728b8b98dfc87ab97b25e24ea117b2ee51538aad438af8a9039fce56f4f30fc59205a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ec7d60b4b9982f16a9642d999faf69
SHA12cefb130d991eb7a801a1d9509f5c2969e0680d6
SHA256d50177b4e9fb8efda755a4b6e0bec52c03a523f3c476aedb9f1ffef65d90fd37
SHA5129387b2d06f403bf9edb315525765d4c32cdaf122efd98f2209af52574c49d05da19762d1cd79f047fad102a8bdf4dd4f19ea90162afe0b5cb6f723da9165587e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517a693f068d571c9a4f48b01cfd1e28d
SHA1ce49dc9ef8a244343cc7244e819fa844a3dd5860
SHA2563c623abb824e4dc56005a8c0c66a6f2b3ffca982ecd9d02c3ae7188e7c62b394
SHA512fd983d29a4fa8f5bc00cf58d6db6c7703368f9903c99452e6b3f66691d01e344f14988417b9386426956fb3dcb24d2eae75fabaa4e9faecbd6bcdbe3f45e2fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa2f5dc0ab8755318ee58a9bd24a96b
SHA15cefba27a5561b1c1d708e817c661dca53f28a9c
SHA25690fb0272aceb2eec56978e5649abec4320c42d070b8d12204d5aa31e3545f6dc
SHA512214693a64e4fc6e6792872af490f01838f03dc8d532f701c2f7b5d7aa6c7b02067393d349ffcb887d24b3773083afa217d30274e739b82d94395f478a45919ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b84b65062d9e151370c90b790ac391
SHA1f7d11d03f5e7d81380c4dc5a66d382143b7c4fb3
SHA256240689bfb46a0b9fb941727672930a312d931d2c62f560aadf14e74b2744ef5d
SHA5125ec660dd49a9d84b8e18148d6df678aec298c6a7c766ccfb4ac65a4463027f99d3ad3d87f93b1af552f4bd65fe2260c9ac825505553f5125ba168f3f5f9bb5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d00821a1a69b3f885a4165b3189d5cb
SHA15b5a1baf86e67e13dc65ebc6a67f06ba3005e8de
SHA2566725a82cbe21afba1a52bcb45ac9f91e9c8f986f6c6abbb25aacfbc42a8088af
SHA51286791282816ee95c16d6b616723bab99fc8709da5a8d46be78e8737cea63928e4f815c8da48910beeb6df58e0eb3c537c76568feb66c35150e787f013b9750d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37d9b4cc7d8be2abf873a2c77faa76e
SHA1724db28da16a94b5425a33496776250a95dac705
SHA2563f815f086543756cee1ed8a83e017973039871863fcf2fd3ef94ac657885427a
SHA5126f57c428cafabf46f70d3ac3c1682041484554095488d2785d3387cd708f643edc2309dd076435b8649aa12cd5887d62d961fadd08747f872f10e9539b808bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5109dc1d9f8c66a47f3c47471523ce5ee
SHA1f0149393c1577ae2596dce107cb627e35fcc7b6e
SHA256dcc36debc96b9ff401677cd105bb6083b09cd28359058dee61526d11d7e3fb5d
SHA5126c43989ce817d96b445fe952a1560cfc62187c81581bd5cd2d1044d13b39f3bb9aab1df0357a35dcc18602da485ccdf5c9a9369042350e6b377a8d78b37a277e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1deccbc7a6e9ce517ad7be824eee29d
SHA152cec9b0a6322895d2fc03a1028a2fd5e495e628
SHA2561058beebf690b849b90843f4a6f85a2f537a1aafe9f0409edcd0582fcfd193b7
SHA5121afdacfbbbb8c642c678a080ffeb462944acb3ec2a5f1b2d116653dee530613653b9f2d2afca8c1c8df267f97d6343b6aa04606a726de4961927017693b2a060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59853437fe4c8f7de756723f285b11f3a
SHA1d8fb5e2210a06012dd52406da1332ff9e402dc9a
SHA256dd77b10a095f07fee97cdff54ce6463458d1006519ca05ffddaa2d8c674f430c
SHA51232bb7072818ded43065351abf7f84ecabe9b32cf22c906e9b4d526383f655845ae56cb87e190a4c8db338301b0f279b955c52ea12bca1f72fec06b8775ba8957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5ee7a1a1607000a3b2a20382f7c00f
SHA13d3ec2d8ce55afe3f09dde4f7824f8f14a5c611a
SHA2568951e1ef9b5098680802447a0b9e59ca330e86b2a323d3d798583061e441b3a4
SHA512ab9179fa693f2c8f70543b7c7b7439ea00ad58d6c9f5667774df137e23ebff7fd6772bc0c22f53a8ffafe507b4eab3465cb88c50ca1b6b15920e7378636324ac
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a