Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
6935e26f306659241174e60542d5d5bb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6935e26f306659241174e60542d5d5bb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6935e26f306659241174e60542d5d5bb_JaffaCakes118.html
-
Size
23KB
-
MD5
6935e26f306659241174e60542d5d5bb
-
SHA1
f6139d9539205f5b00aa4796983ccf951508326f
-
SHA256
8096f9d05b2611d2febeaae109776ea3cf9abe52e894e69f288b21ebe9675742
-
SHA512
3036e30d2533007a7aeaf8b5dbe160c669248ddead06a45b773341b2194154bc7dc8088198be8b94460ae5047ea33236fda2184a75f292b0517e5aa2f9dae540
-
SSDEEP
384:QU8UAUJUfU+UpU5UiUlUoUMU4UIUpUmU5UjU0UpUdU5Q/dUxULUAUcU5UnUWU+UD:QU8UAUJUfU+UpU5UiUlUoUMU4UIUpUms
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28B647E1-189F-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dc7dfdabacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c89a5cf1b1c1d44888bb6dc8af03415900000000020000000000106600000001000020000000c94490c933535fcd17d74728415b5ff5cbf8b6d1b559a90978eb0c586aa09d29000000000e8000000002000020000000004a56e88ed0852c4f6b8f78653648bc347520d6fc7522bbba12918e7014c30820000000d68dec1a95e961003598e755e51bc3b52805e2ed7be4f1705f564845dfeee6f840000000ba07334cac52fe393f1f864ab0ec927762a1a2b00d9346227efbf05ea079bf2923c0230fd5d7d6921841d6b20df84ef60e9cb6f51de35ef2b528a8e3b5a89095 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2104 iexplore.exe 2104 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2104 wrote to memory of 3052 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 3052 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 3052 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 3052 2104 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6935e26f306659241174e60542d5d5bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603ec99cb3f662d07f0c45f4260d15fa
SHA1acd3a1dd47f2a821e29e270bfff7617a0ce6cc0f
SHA256494bf19f5b076f0b494a6f598e61855c7ca8c36776e57179cb73161c99f9bd48
SHA512c301402bfa192159f14e6bc9bcb6c9aed670a666a13377c0c5cd783e6766bdc238ff8032b59d6e3f171621822133d37b8f7d3e9b67cdfa2d360f0c9de1ddd269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ffd9db350f01648fb6b11e138985a1
SHA18b281a29aff86c52e403a15e8c849f1facc17462
SHA2565216a83114270a056ec5b5ddd3bc71b8f96f6bab99fb390822e72dd3dbd097d8
SHA512d0688861f875b39b57ff3709e63553d749a8ce1e4a57cc1e035dd2c751ce09e20decb2d90f738a8bbc9d863e077206b9d06659de4164f0d93fc2c9265dd137f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270951444befa14669e466811d1d14c8
SHA11360a6d6a5289bec09f67d8d5489e492eb356d0f
SHA256d936543887adacea3a1e733dbe0fdcf42febd5c078b261d9c1351e90c1b8e05c
SHA512913cc1dfafcbb41ef8a8bcbb2fba5afa8eedb33414f24e958ddb651a1d224e5ece96379d0a1b896682c7f6996e93d8a71c30a5fa5daed88a987260a160ede597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a51f712a935b2f5409b04c12ce65e1
SHA1817449452038cc16bf1859673625ce264351b712
SHA2569433cf31f0a7422df4b314ea6169c9cd1c1725bb3a0220dbd94358e2f7fe21ea
SHA51202937b05e0b9a98f057325645143f34473a056a7f5f77f17ef23db21c36e89df0196cb1c155130ec80fcebfbda3c6d23bc9f6beffcbe9eacac425da890a1c9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53212938c0a5111b1690971535da5122e
SHA1ff11190aad3b4db9fcac3055867b9f33959158b2
SHA2568b81042d21400d23ca8a59286d519bd8250d4019c3c7ce9ff2ed191055143461
SHA512ddda9aec19071e0c790388e8a29b7fda9b06933d3ace59b3d68c268a74b3ce28aa091c0cdfba0f716bfc4385f4f5add3a6bdfcc9a15425991f5fdd26620077e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db5761a3da2d73f38a85f72734c93b96
SHA1cedd25d5c36171f133337795d76be55772759134
SHA2561961b17c87b02ed961cb4e426696e3ac51645c9d552aa6410085c889690d16bf
SHA51228387009adb6311166ca7acb2982e10f457348e748f4a193a24c16369be46357ce3ee73e973cf5fc9d881b9ef23979b906f87db27d26624e1e056b2dab0c7922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5543174f599a65fca980560cde04b415d
SHA1c5c240cf15eb360fb4d26eef865503b3265b48c9
SHA256d96e706ea223c2f6977cc3f89ddb5a93e7525f9cdb29293ad34cc94f5e27979f
SHA51242e6e23d60b146afa20df7de9a54a644f6d82cee640a0fe974f2f4fa2385baca2d0a5b59d54a58cf04b5d08587ba38480a2bbfbc426d6fcc169962ed2aeefecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52b003ea7c06a8746f94c1d7c995b29
SHA1989dcd9d4237afc00fd53db4229d1a950b787361
SHA256c14888791141fe2bda8e7c64ff679d138ac1b390359a342b97ed6efb39020b8a
SHA512d0d2c36762f47a8e1f6047c3c46d7a7022a3440a2aa467f4b4e62755c30b49b12b7fb8df26172f45ed161bf2924a4c2e058022ebb37dc5d7bd75ee76e4faeb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fabdcad24576cf8af2ca561c087c9a3f
SHA14f21e13afd83d053219043b13f497e35f654285e
SHA256a99d76cae45379baa31f89591621579c561a7b5a15629e966d2a8db13b3a4946
SHA5121dd26b2fb7eef3a0890fca6f3b31b585afb82dc00200d7521e56286be5039a128edd6bc1c18530975d0e42a8ab55fba37bde564b9ebe7fd11187b0b23e9269a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506841f0f93f981e83d37629766417b7e
SHA1e510f69f21e86ad287fc4c7001372851879ab86d
SHA25682d40957831c6eb27364feec8501f3a6e9458081356213549a8ab01e0ae9124e
SHA51274aed4de48935ac06b256bd2112cc35781c47d9de61df9054df97e6cd738a430c6700a2428c209f3969e9a349ee4fd3c61fb5d63bd12c4f4388896e483cb486f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5c4f9c1c3a9651c3e31b70d1c481b7
SHA1d315923761ea64f49f48ca09cc75d8ea1e6d57b1
SHA2560df8009d9a34d220e50825be4dbc3de9bbdabbf282d1c1740fb7c173fe038e5f
SHA512e00845f20df86297d8bcbcdd11fd35b3028604d7b9fa09a8e1bc7b8658462653ca8ec69d3f1fe93d1a08e54dc227cb04a30033fbcf74c673bfbe81c447fe559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51751a9a617709f18a914bba9e2c1d822
SHA1817468afa5acc69c3ea86a23b3f8b02900865980
SHA2564aa4bbc065772bfe619976398ffe7a26f2eacfda47589592a486646f9ff4f5f2
SHA512fcd756469ce0e7b20574afb6e49edeb5b0445712fd709d59f3cae0c49259a737f954fe83ab33cb8eec4c3950c9c8ef0b1532cf776ba0a702b76c87670b92c99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cedb8dea546adad115fffcb68342dd50
SHA105963574d3aa2f32391e70066b6c6b13503d2b00
SHA256c593385a954d95737b6fb5f7b8e0f5bd31ddaecbd0ad6fa42287cf95ca74b575
SHA512b874379c45fac617743bdcaf4fc7e4fe24d672f762de6a51ec06fde1ee7e35c03c8cbe915e21b810335b1216701f4401e93f99caf42903349e34681d7b49c7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584b8941c9d647ae2c3bc4d3e30160b4
SHA1f49126f4c548b3073a493ce9bab1d8ecb0f81627
SHA2568a618cd4c6fc3e9a246feaaa325e2d1ce73dc8e2cb1a7924d54033927511ec7d
SHA512605572a8b03def790d823cc280d40553c5be02f94274eb40c37bc6f5515b6374b607cf2c6171b091e2f3daf9e4e3ddc1a03ef4de940b60f403472f275b5d73d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096967f6f0bb9ebff063fe71e3d86b3c
SHA15619b6558b78e1846a4897b8e3d168573d7eab66
SHA25610531f21e7c13c61feff84e594ec591df0e7739dfe542af8f7363fdec6ef0d5b
SHA512bcb8ddcbd89ed4182c16828ab627c8d19466e63958a67c6f2063bf25432b8ec5452e30ef477ce7f4e408a9a1377f674d15e3eb36e4c070c53c0b567a68ebf72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52184f21905d4a7d806689ce79b7078b9
SHA1975ed5b746e45057f1f2883e7cc7e1100db2d369
SHA256b42b62561f077a8d7523b0ea6d68c18f259277e366410eedb23d7ce16d86b2bb
SHA512371eca8fc6182822b2a9232d74f33a1e37b706c44c7cbba3e4d1b3710f3466562e926102d2a6c0b299a550fb9238f0cb8d328b28ce34ce453e5f9bceaebf3d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8951a8f9e707c963e4bb907b10d168d
SHA1c0cccf0cf00cd0281c249b340b6fdce4c72a892d
SHA256d0804f6a1decf2052bc766ba89dcc11652bbc1557b846b27eaf237f3997dd08a
SHA51234cf1453177c3b65ab2e8fa1a1c85087d308ebd234ae23b38f55c765cdaed6d5d8b1477658e4cbde0c0d33afeb52634e995a0f887bd12adf0b6e6132f0c56d46
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a