Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
6914b19835738d22f8186a973fad7c33_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6914b19835738d22f8186a973fad7c33_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6914b19835738d22f8186a973fad7c33_JaffaCakes118.html
-
Size
94KB
-
MD5
6914b19835738d22f8186a973fad7c33
-
SHA1
40a16e9d9727d439893188353749c8b17d58e7ae
-
SHA256
183c72a5f9ec582a20a7ca29a592a08334304a3f23243aef17feba2af0b7bc3b
-
SHA512
cb74770c73cc3c3d967328bb11de9dde0184f7313f70b21054fefcf721fcf6b8048558846396c7a5cf53f56cbc4fadfd5dc373963f445bd581bb9f0de01b6977
-
SSDEEP
1536:WMLiNnfra7Lv6pxf6af4kH8ApehFLR0mEZwyz5iBdkrY8mgHC+qpEyW:WAit/ABdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302b5c8ea4acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8E6ABA1-1897-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009c7de9521ad686b8a6271a4bb162b76c15595cdc5787eabb63f343875753bf66000000000e800000000200002000000089785d5f3eb9b8705cd6da2c2384375d4d86d00a7558cec0e3a4f77ba65bda46200000006e8611d501d9e33a18628117e604b3c4876bab09ae355bbb293f077d65d50e104000000020fbacbb65cb566fcd1287cd28201d7ce08938506e8071751693792fcc67f172a1f56a747e8889aa281ed87116aadffbd20bde40a90a69c1410b61c6215a75cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1612 iexplore.exe 1612 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3068 1612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6914b19835738d22f8186a973fad7c33_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d0badcead0b8bf680d94d817cf6a2d
SHA1da5f8d055c8c3dd7b771f6450d5ca459d98c6ff1
SHA2564efcae8901c5259f497c8f9769fcfd67e532f4c6094bcd0b0891f58b352afac9
SHA512ef9d08fe6239973416482a8a1a37fe5ad88519b21c33a50d59de8e6767b8c07ad08c66fcb4bbf0f2ba6f828f30f87f67be4c11bb41470d7ce8abe8688de40427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588eea8087179f04056676022d107e0df
SHA19d2526138c19163c3593cf7e28d9d5f303dd7031
SHA2568df5e5151823e4a00096292f9d4fcc7f6c081c85ac6cc20761f2fce6709cfee5
SHA512b8c329240285396b1bd86e75b164fa2f9c17295bee85610c900b13083bceb270c4ff0e661cec4e922d2653a79f3c999f725592a32efbdb1f79f2e6a64bcd72f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd8932742b85596ec24a228e1d84059d
SHA1a0ab84f2295229f75b083f8e90022eaca19a84a6
SHA256384784e64c9e4ba563dcf719ee4531d06fce524663fb330f83c6cf9e74df20d5
SHA512ea45f21504cad0f8d3ab8042e2d761027f94c68b4859028d3d3ff7ba4d94d556c47756a85dcb3be110938ab4654f9017cf804e5ee8d887daeaa73d3ffb2a1198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53091acdddd4180d3ca3bfc40c1f7e274
SHA1037bec226fdb3d1dc94c8f06471ab8ff7d8901be
SHA256e9327f474579518be467b9457a0040c8f843e9b977d7e0e194864473dca1a063
SHA5121c4450fa836fa65c5c13f23e74bbedd6d585e3638f1856c21b84014810d7dc78a4575f941f40c5eceaa7e237d28eb22d19cf7b7af0d5b5dddbec62b8f93c56b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ecd1c83c3433544cfb57d0eb82cbfb
SHA1637a2bddc6c6ce704ec1815fa83eca20cf914c9a
SHA256102afcd7103fc3c962b5ae10fa52b0e91938ace75f8b6d3c73997a10dd656d47
SHA512a7e2aa2b3ef7394faba3715c5eed9bf89c7aa1a18112707780ccfcc5646c9754228c041a6eed4928f9622e2db63a8dc95b3c24815178192ad7463cf747dfd036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180e7c7cc4b3b3cdba8204e1c8525235
SHA1ec674189345583d18ad103e1d7082001d51554d2
SHA25600ce52a067768cf860c68a3979b54f64de34731c5300e90b9a658c6408130f9d
SHA5121faff8ee0ec709269cdfb8918bf7d581af1d21aa3d645bea7c9cfd0bd12ba09f9ac2372fb674274e17a27dfb421fc63e47e752065075a7968ff1b8b60f54a1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcaf8902b226da97dbc044d793111f59
SHA114cb24a7352874b34a7c36e439e29aa3a817302d
SHA25673d0d316df861fb0aa6d8566ada0859bc67a377652c5415bac2ecfbe0e3c9ad3
SHA51257631c3b71f063fa24e11b794f9cf71d5daf87c59afc17d40ab668c3e0c5a21c31973d1f33073f5782911bec1f829c8dadf3c18f80416a373ec49a7ff9f89ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5626da6a8bd65d31b52626bfda1be83
SHA1ae1340d9d4c69cb6b6faafd1c6122268c31da267
SHA256d984f988dfeedd9c2f530ef716bbc7ab9a00704b80e9988c7bdb3262da5a284c
SHA512df2a198fe916a3fc03907416fd2a11df3519ac45b2369e7fff6ec7d11b39bb3c98e6f904cff0baa5c6b04d4af4c674cdd21aec8c08afcb04cea26640ddfc4ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dec041ba1ee61440edc4e7e25f6c800b
SHA1f39c3cc4220530206a15847cf4f8231c4642ce4e
SHA256791ddbad80a4c03cec1fe35391b15570f370116d26e179a134fd03f0007d80d5
SHA512005c051793a6b31db7b19df8afcabb91d6d4e6a7e5314311ff63a4ed3d2d66163e45920d9935e08f9ec5461f8bd1cca0a607757a2b673d5b0e9cb398dfe99b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d98ed0a972604bcb2cd5e8c4125292
SHA17c0d61dd816350efbe3a8c945a355577b2f0338c
SHA256794716f3cbc87e6ae0f52d2a8635fc115e88b70a745ce1177dc9fde8b34dbf15
SHA512c27b019580751a4f61e1228c9d9cc49c3bed730baed62f680f64061b827a406ee32d2edcde7e5780f3581a6ae3eb539c19efe537539699ddce052b5f2365dfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa811f8eed0b4e1edb2b33e9d06bf2b
SHA1c95cd3bdb1b97a0c9dc3607e2e42db8adfd3d4ea
SHA2564372a28855bff8d9badf61fe5d4cff2c8766d7abd06c42afec55f95da72ea87a
SHA5120b8d588680fc0f732f8aa355fbcdc3842e7c0fa639e924f909db79380ca8d49a0df3a0d11fd61d51dfbd743e10c3c64d66bbf70f6b84ec475d36c05e6016059e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537fba684709622faa0809f1dabb9cdcd
SHA1d90c3efc0e629633e1d8224752187f0a0f89bd02
SHA2564f5c623773ea52a512fd6710d2a7049924bb64dc09afcbb97baadace555160ca
SHA512f6c23d7ef28d2cb0348796f941e249ee5a2ed2e0a83c1716abd17be80d2a2bff5511bd193ed3add1131f34c5d558c7d3840c89e17d84b11dd00a873bffe015be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be5225ac66af3f2e7222f798531e8cd
SHA1b2636558479d78277ad302659f4eaf2c19a716b0
SHA256e56195fada5ca6d565283c08ff71fd9066c9f4eba82e417a49062f2332eb4a17
SHA512c14c5814143c86dd956e3d4e334db156dd3963650575025d6c8b65c8f085bd0af8a3b5ba75a44520832009caae91b696110e34b4be52e77f744cdee4abf95d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526ff2a298a78febbfbce3433ee55819c
SHA13aead055bfbedbefec3fd9a9d78c00eb83c505cb
SHA2563569cc77ef5ed984407d45496dbe7d7d5829ccb5af1fc69b0b3bd9c6262fe84d
SHA512a9e8d23a2db6daeb62382b72fb3a457a258bee64ad193e6f47bb1fb828ee392094a4a7e3273e8184ef6b28a2d7c433636d4de2cfba57e3af7d758a4e160d8d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8a8cffd73726be0dfba5137ab5807b
SHA17fdc17a1119800fae473cbc7e2d06f4e376cc10c
SHA256c41b1ce3ca715b3b5231b5e3fc321b596619d5b6e312141ebd5a01a02d9d6e64
SHA512b6f7c30609f16037b0d29221ae9e3a3f0983e881e501918b42c77bd2c726e879ac988f6fb3e5ffccaf0111cbc6a8fa09070049c946004792a876147b883d0f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f34fed034440f0b96988bf9d25698058
SHA116ef49731cb37775077ada82dac8f687ab45aebe
SHA256bf10e5d6c57bff4dabe6d132b2ccd1327847d8e56fb19c752b93e28cd4273703
SHA512b51d1995eca8cf7143897d87c0ae56013a819e64f6c49a6df54cb8a558ce26e9a16111cfce1704f1cc5e2e6983f36c5c6dc37e8090b1e0f2344f1ac94b846662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4edacd6a820e4da9eda102d09c50fc0
SHA19a811d809a64941dcfbf9e33a51fc756f18d2e62
SHA2564fa7b604202cc17fe2250587ce6ba4022dcc33776b15d4e3a09144700c496074
SHA512f46723ea36ec98880df13931d43c914bdc616f94e82087c7c5223f6f6f9e83e0f9ffb2f09de87dc98d238500ff560a9d016b4bdb6fca0050b24da4a1d7f01f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a661bea364c3a059e80370725b4121c7
SHA144c343bd6e400dc665aa8d9d1545f96961de62c7
SHA256f82d913eeaec6db702d0d331e8458229fb3e88263c5be31ffa3030cadcf5b5c2
SHA5127a4cfa50b403a8d73a1e0b73be1e1ca7554219b6edf30aba645d3d8bf2272bcbf409aaf7668ce928ee3bcf87f57dce5fb8e85fdf43fb940c8ee68cb18f5a1c68
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a