Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
6934d296843ce3a9180bc1b68e729996_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6934d296843ce3a9180bc1b68e729996_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6934d296843ce3a9180bc1b68e729996_JaffaCakes118.html
-
Size
3KB
-
MD5
6934d296843ce3a9180bc1b68e729996
-
SHA1
a5210bc8f6d6fb9ee03c1d39d879f20f56319eab
-
SHA256
ab9118c007b9d2dd70e8c4dd43471768260bd1a8a6cdd57b9682c1448d1828f6
-
SHA512
9b92b6c7efd1f03bc4ccef005f2b16fe428e45d0623994813bc7b977013ac90fadfe824db80c62b6fecc7be36ce6ecce3585bbdfa3320a5aed6d252563275ef1
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E25A1AB1-189E-11EF-A339-D22A4FF6EED8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05a9fb7abacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006606a6d2c620d743ac2a4bf4224fbb3500000000020000000000106600000001000020000000e52bde0f6ab4e3fe2b9cc63b3ddb0215b1e7e38c993d596c3b11e68ca4208ac7000000000e80000000020000200000009631f7227ed1a698ce59d6870b1175dabb0b9119829d5dd0e4e1fea8bd7e962f2000000013ace7a35cd9a6919b74a7feb2fff764aa98dbac7c49f4bc92ef9777f896fab8400000000e8c9bbdd1ba696f2ce15b4684660852ce290b2759dd35c3a541a56664e0b9bf4ebfb47ea4b6ba2ce87d59af1a2266c7ccc6a166b32f0c6cdae549df5f05b8d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006606a6d2c620d743ac2a4bf4224fbb35000000000200000000001066000000010000200000004ae449a8163fe534acd123f9c460403faa60865f2f76bfd32d254c2e381d5709000000000e800000000200002000000033842c8dc2b24b8c8b6ed5098b80ff1178d4e3d85014917ca34d3cede0584ed190000000df1e76a8829b03506665e134ad45b7ef7cd1a12be1545e40e46443c15507ccdacd265cbe34965a403e04a86453064ad1c92ae8a8b73c9259844503546d8f8f8e22a4ab72b89e1e13495ced640912c179f035c7d0c6e4eac57f394d8d4d7b8e5f53f97b319257ea90eee2f8f40ad7e08de9a5a20ac88d1483ce1be9ee653072006437b4b5a9e45ad7305d8a8ac8717061400000002ee334848077c16d06dea1adc0fe95e0f5248fee044e3a598b853357ae78ad031d8d7cc09771f5d9d8c2633f46f6f7d0dd4a9cf4fca865f1bd09e168e3be5d8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2484 iexplore.exe 2484 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2484 wrote to memory of 3024 2484 iexplore.exe IEXPLORE.EXE PID 2484 wrote to memory of 3024 2484 iexplore.exe IEXPLORE.EXE PID 2484 wrote to memory of 3024 2484 iexplore.exe IEXPLORE.EXE PID 2484 wrote to memory of 3024 2484 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6934d296843ce3a9180bc1b68e729996_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8f655a7251757b6b72f82a27966a786
SHA1387a6d3a7e25c834e92de6da16c5973cd2d03cb7
SHA2568398ea834cff505f5a0a50178dccdf0795a24a6975ee061932af3fa538d5f941
SHA512f526d30dabb52054d2e362222f769cc37d268d1335d4cb0cf0e08678528df437f3568c7cac189f3a0580d04b532a1c326da0b170471adbed76aea140765b9b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff49c63e1c1e0dde7068c7f8791a0318
SHA1e28093f74f7eecc4bfb68d076a84e419e13a43cd
SHA2567efced1431e3cd700a24bed7d75d7b44d52d3dda1de29d22ab368ec8ff0e5193
SHA51237190627da07a405e2ac9c555eba1c923c356295656db8b0cf65d7a42890e98906f04021bc977ee0fdbd6df3c2b10e1bcbadb72695f27f63ef7c9efd3a9877df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fb012ea11ab2d4863b7ad534d38279
SHA1f90f5a50e8f41461053cccd2afcd450856c1159f
SHA25677fc38cd3ed4c8a6536e67be8e752cb7cd8966d9d94d657b1a3213125a3456cd
SHA512dc37813d3270244700bdca0496b945d30580d618648495b3fb590d70ff123587a5dc5f0ba6af7e09a4d7d8ff4c6552ccd8add235056874800027c718998d9862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f4e8e6d243deb7786bd3145a32c626
SHA1c56254aba91713af42992a1cce23d62e790b14a2
SHA2567e3d733ec5ea4e58136ee238974683fc0536f31cefc6670fd0bdd8faad194a04
SHA5125c48a1037ba661173dcc64a6fee4dcf500bd6d575315664144d2b2c1fd2760366cd7ac518216982972cd705d475e23f556c23ce9c3b80d3dc0518217c03df613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5306a7bd423d03907924f6557d2ad0972
SHA1f228c1f56a052d4ec811b671edd07024fbd60dcb
SHA256ac9b6ada3821844a13c7eae047b6c283abe418f9ac54155cbc79399a54246128
SHA51250a02687a4eeb589b8c45b44b0d2cd327265e88730d8190da6e0c3d3be2cb19c216a89a77f3d6f3ce6c9d428cfd2137f54d1f31c2e90b8b3c70b56150c2ef2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58248e94c421eadeb8d4473f05478df11
SHA16e96c5b0fce7d39917cbae04a64476cd0a534c64
SHA256be55b2ab045b39ce881b42e4bcc9c7902aaf3cfb9164319529a5e1ee0f01e763
SHA5127cb00b203cd4ea79a213d70f2fa7c24a492a5d9cc8ce6f188fe8913e879aa82644a7e17d2c434b5122d9d828e4850581f9db860986118218e03615f14665b2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e186d6d816dc5ace97d1571b0c9d2c26
SHA1eca955433eed1325f458c1904129ccf7f5307d53
SHA256765fbc0a117dd7d484083ea98293efcdcc396169971a0433b45e10f7f46814b1
SHA5122ceae366cd86c08fd96ad151e43d0fda036920a24198eaab0ec22a1c42ec156b7abbd61874a5964c1d4a3d09ec734cf757cb9944abf9b2eb5cdf4fbed04cf84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546077754bbf0ec29fbf5ee43a5b3d035
SHA16225265b614e2e71e06b17f81aae99996f4f9eca
SHA256baf9ac68758e3c5ae15418ee0a01415d9ab354d79f81bf22072ea90b47d374d0
SHA512feddfca3f271ff667ad42b841b919c3aec3d422e531ace93761629d199420ed712494c87cb85fd78cbf192a97b39db5f645904c5f4400cb49d8421bb22549459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52390e8a996f6525a73630c14856fe3dc
SHA1eba557b4239143cd352927977a95a0b494a05b19
SHA2561261f1a5de6bd3ad21a447b50b1bf9a2e34271178e8ae8bf50598017518ce6b5
SHA5128e4108a0542d64ee9ad03353f3e055abcfe8c1c44fd8836ea3b6ba5440b7843f6cdf546a2c9c73c4790aa30aae5b1964227dc835cb523e26d80575c87dcf0221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2f47282d9f49ce3993c22aebae3a43
SHA1f6707522d9ae28f0f80c04bc25bd6ddef7110ccf
SHA256d4dce93e3f41c1507941d8290f890db738111170d1b7c6c413d93e84a29cbc56
SHA512703e7ba75fe1e5bc2e0f6e9033b9f03fe492dac9caa1725361fd347351f2d394ac75115a764727ce2246d47d75c59db762eca1b7f667dd3727b056a967e9ddbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9158a0daac238608b00dda32c7e196
SHA12b576188a2799b3edd104f4ebabedbbd2b953d89
SHA2560a519ebecae4e9b4028564b9feb6ce95a630a11c98da11fdfd97655061b39a3f
SHA512d6437445dc0cb34242655a9078022144bb095ea8b5a6de2639c69f78a582cfe0a5d6c3166d42a9d5992a4d284bf9e80f9627301e354f92bc600e5e04c892779f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d58ce1b45825988d9176d5841df59f7
SHA1095cbf8ee59b71027188d222b09fe55e10f2be98
SHA256a08b32ec55298e94748c8016a3a2800742ae107dc99377cc1179b05d6f19afc7
SHA51299991df0c14a05adb95b2311fa2b59c37abc1dee370ce08e648195e1c9e2abee58e4e6b32b342e6dc81bb3a85a407ac9b8de9a9abc2e4b9a41d29b19c526761a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704fcd0e5e3dc3992662ef9183952fac
SHA1cfec8be3a7ebfa1a9ffac7d0b1b75ae12e80b837
SHA256c25e23844a2aa66d1942e050c4195737f312e7bc21fb0f2227919d45bce8ac34
SHA512a8ac40caa521e4f9b3a856ad29d2c27cf4bb6c9c4d9adcda4d6df79dd4803a53ccd5e90ece696219bcc86da5722db657cdceaa291a08b5c2fefc4fb73524dcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7ea9d75e499411c462d82e8e17e454f
SHA1f4c532c1b9c1c17ef1e17630c7baccc8d9023241
SHA2569607905cc65496fbae3a6d0a4b15f7a681a241fc02f5b00f8c5f3a3dacdd33d8
SHA512a207abdca7186c617b96cfcee5372b3f9b9fa92a2e18ab2bb35bdcb3e8366eeb1cfbff9117396d8fee2074e7745b6d5a12e049cd2d4225b20842653a6da9dc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5812d1dab479b63aaca58ed761e03d660
SHA19fe2bd860e9d4018f45687c4bc03b9174e5177dd
SHA256a0156e386c1199f540bcd5061bcbbc21a7ed2ffe72e9d5b534179b7766870fcf
SHA5125df6147ef67733c9469a6acfcdb6cfe4dee65cb23cfa5e850fc78c359f183323acc929bde823a47399465e32b486bb40a50ed52f7c00d1895c7bcb410d6a95ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c8a5167c0c654a13dc267e8e02320e
SHA1db04b92205a84a90dba78ea6a9037d967d4cc958
SHA2569342f0a3cc990f7e266239f2afa97a689c3d7473bb832c7fb169c2f13df88558
SHA512a202ac8d5d0770ac235944df6196cedde0ef367b79c24008c838635e372a2aa183694bf50b4cc17264aae264ed601f4e1ed2f43876f9f4197e8ec84e5e70f0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862ee11871114a6e609f58cc3aaf4d69
SHA1c79d1489e903167c29ce3f2d2272ae92372da084
SHA256e962e848e329a7805135f5637db2a1c9af1f58d07c5866acd96e3f77ff191264
SHA5129c980cf3cc7389547b7399ac354aaf5ae97b23a918cfd3e69e28d4dcf9faa4bbb768ab3c61d78e27eca6258ad6f06aae53064d90ce955061aed10cec09db33bb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a