Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
6914d23976f30348898c392a56004178_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6914d23976f30348898c392a56004178_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6914d23976f30348898c392a56004178_JaffaCakes118.html
-
Size
2KB
-
MD5
6914d23976f30348898c392a56004178
-
SHA1
088e4b6af83fe4c551f67fb0b5222034b0c43f03
-
SHA256
f9f4618440d3753c9ba599ab26a5f69f167a7eec1211ed73cc4166eeded148fc
-
SHA512
7c12fe1b572f720a624e6cdef4c8742ff027ae5f76f6f3c3626be30c2864e4141da2833337a0c24b1f405c2775ee6ae2d416ef53d30466e770f3d9812cec5580
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584426" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05bf787a4acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000dc69877e457e974b3f9084c86fb430d4c48d142bbbb02a38855e077946b1c677000000000e8000000002000020000000828fbe756eb984dbec7318d1a62903ecc9e495fde51c16ebfa3f584b99bb2c83200000008214457f90cd03feb7484508f6f87d9ecc2689552d0ed7c3cc891bb4cedfa3a5400000006d8d0f4842c4f7001908fa85fdec08d0225ac98b43b379b73e56190115a3f7b060b140f4077e885c5aac134491fc35eb07fd4173bac47a0c9295273e964c1dfe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4CE9541-1897-11EF-A4F7-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2244 iexplore.exe 2244 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2244 wrote to memory of 2092 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2092 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2092 2244 iexplore.exe IEXPLORE.EXE PID 2244 wrote to memory of 2092 2244 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6914d23976f30348898c392a56004178_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fdd32f142f8401c4456f754cb3e6ef1
SHA1f1555163af6245d3a9f1e6a3488af7b33ea64eb6
SHA25662c6e1b07ae706a6d20ef3699f919f9f2cb2362967702c42fd942b700d6ffdc7
SHA512fe8430024ea4a918c56834b8c81aae53b4859b03968da318df4aac9777e63d49f48490f57301734534f2213e8877fe4e63665924c8b75db5541e379270cf260e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c677e4719a07d095268f469131e76c
SHA1df2e6e3f6176a4db930c562697aae4999747616b
SHA25670682636d145a50bdb867df5ccbe75ef75a1d21920ea4baaf4ba3aef93482ba4
SHA512d2a1b0591b5b368c673bc3afffe796f17ca749ffb89507e3604f57d2fe48a9c9b9a157a4f96edfc6e999a387fb05039730d0eff8f115353d8065c61cbea4c4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef0bdab9fce8f2eee5e95fd444797c2
SHA196567195aee5d79b4ece28d061570ff7834d7839
SHA25671abe51b6149d4a19d844fa174c2fc19f7184768ce3569e54871709f7a404e56
SHA512165e39489986aad82b6197f392592c19d9f097b50c39f9418728f84008f1615368333f92e0411ac6c6fea02f846203edd352b92418f1436cadcade789785fd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fec09843748c288f056b078028fbc34
SHA15f6ed6d7a02dc354ac285a2ead7dd2ee4e121e85
SHA256eb3ccf8d3592f52dab9d5db3b8ce3c42189b9268c32c2f4ad62ec7e7e32f0c29
SHA512b9aba3a5209640a0be323359c6edae6890973dd02041ecf18904c04bbf3f1f3969f69734b94643c98bc7d29eb84ec0148a09809c81916818487e566b65128200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d40bd27d0d57c2125101787d9a4b74f
SHA1b93cb6813e213d2ee43e386a957582c7aaecb88a
SHA256c281ad90e0ba65272c078ad0c1a232fd0bf1430069e8b48fe37456d369b4995a
SHA512f149eb3729b991534e6316011eb50af0f9d1b1f6863ad31c6e1b0c0f5f6454ad1fbce8e92cb905f2603ba1c7f36e4084980057962e2924ce19ff705a5572ea29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad8a121f795b03cfa5642ad60da234c
SHA104467a030f1d01caf67d6e87164cf559814e5bc9
SHA256a6e1ff58fed772d5438460e2dad60d73bdc78d275ba0e9f7c50830ba236d3812
SHA5126221f76661f460fda3cd60cfd6b03c7028b0f16f3000d6662ae4bc957e385d8e173526d2ad4c29a41dca65ed746cec0946444c297496d3745b4f175cae9a2afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc80e4a0db119b23b1839d10d800bbef
SHA100d656ac40d3e4e93edcb590da3acd599a692bc7
SHA256198ce7cb2048be73926328284798ba1b373f8ebfac91ba1262428ed0f87fc38e
SHA5123a1bf37804c50fcf9f3edb8f6a7214af11ce58498e04a5504b335af23cc3a65dc311c0a541790e5ee0b73cf0ebb8910e5055c9df4d8ccfe962d917c546f3821f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5905815972a6d852f56ab20190c2fef33
SHA1af861dbb6a0d1e6e2d8f1602466fe8ecda68befd
SHA25603e48dba050410d2a140332093e7432f247cb058ec930d6da6c2eb0b9e6d3f5b
SHA512c0b36726805972a32b810f7fcdc6298309372b174143c892828bb2bcb0338059536e913703966fb95e7304cd0a18760d97a9db9afe8fc6178c5b4613f75d3507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad13a3cfdc31eec5a73a2b2e4c2c8387
SHA1fe3b64e1360028916a48b0d2d827d9192a689886
SHA2567bbb2a37707be862a172b3355e5e21206d05f435d04451ddd004e99a5bf18949
SHA51256b4aca53f621d3689b756f00f9ad33dc914eb14ce94cc7e5ea7a1ef6ec0174816ce66af2a2d5c88a8124f333b479298c3feccddf6b4456b5dabc89867a6a2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b052f67e20ffefb761d06b70a624d590
SHA186d26a4f87d831d12b72e0e61cd61828fa5ac8a5
SHA2567270812926d349589fe0947d626a26e45a1a6ba0e653d2d82425440a8b861dd6
SHA512e1196052115f74542f5caa171f1a7b71cef1b799e4b841d677d864f091df006597d30d4a13d2bcc75748fe045f905516e025339e6fcf86c2005688ad61013a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53268dd72eefaa67c8af8fae89a5c1b2f
SHA1642acfd271c62fd401607334ccff235cda48d59a
SHA25615b48a71fe1008d8a30dc04c9bb5af1699314134b6ac19bb20876dab28c828d2
SHA512913f49e90ceef6b4849994e284a97a19feccd7d501c576a5f9eab22a4d0c3c45327b9443359aa101d77946a030f1440dbd0c1748ca6b671f7e0ae55e9a118240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304338356ade406209007d89da4b1e12
SHA1f4f0948367d6d514dc678935852c2f19dcf50505
SHA256b9e4151d16d3ba64c55692199e6ffce739faeb5abc2983174dd6447e77fd6361
SHA512c7d358776923f5823c444cbec19719b81106aa099933061ca009f6d186fb8370af5571687130b9e43a00a09b9bbf1f23a19ae0a32878ac30ecdfb2f3056c9f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a488dd6a59a60e029a708490f458c20
SHA17504ef5b8da0baec8d23e83df0cf7286e5a02073
SHA256099befe02815e684c72a03692319a17c0c6f641da7f2fcea672b9bc5c4cb8fd8
SHA5122263c006da2eec3eb8865cbc1f5b4a94ce7714fcc06ca0cef8a4756909a4e2108e0e96b485c6113ce4ca06ee8f30dc6f579e09751a35b6bb7a87c09d02d43d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a9456f9bf03188467c1e4464792e00
SHA18ec6cfc7e4a621fbbbd8c9524663e7e77933cc21
SHA256c44746bc09293637cc0cd025089b8c427a2e3fc9d8e14255603ad7dfa2113fa4
SHA51241ffafefe55571190da0d3344c5b6f8a47c1aaef3222f80f00b4fc1a2ce490a6037ce6edb3df4d3370c0e9dceef25bafd5e36e147e0a40b65a828f1d9dcefbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8baf32f201a4b4e5511ef030867d546
SHA11cb7d4e34a74230c631410190f248823fb946320
SHA2566c48ca796cb5c0a781cedc6c6b81610c3a0598df7725d6bc1574f4636d714dfd
SHA51286346e5a97c99211bcbd3dacf7241bb5291c07e23639430b7c620d3330fd824169c7cccca85753c50ea2acac45e498c43364ee70f6c4f0584e09aba97dd7d785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51145557c7a3ec4d3780e29f003b781f7
SHA189ab2664a0c5aad9ab34b8be53005bd88ec3db77
SHA256614e3e6b2052b98a544a1c2a20e097d61ea7dc1d0ede4828d1d0c64c0b79edb3
SHA512b5dc2f63c151669b935e3ed5a2abf5b2192d1651a2083cfefe56097aa847fc8ee4c6af1f370241e0b9ab205f8e185eb88678c70236b2028258079b360d70f12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1dac21bf087d387d9636a0813258db6
SHA1dfcb4a71754442de4825e6f4f21f2827f3a84b25
SHA256a7d38a6a7d6ca3560f46e4e4405864fcb02d22f4fa27ba4cd963f4f468dfdae9
SHA512b98676c24fbc40c4cd754fae70e667ba7d49bbefd508b60725e207b0ad03b59d077aeffd8b806bead960db75e6f78cc93ffeaa68a6671989603e49f42622363c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59793cbc69fac6ce1cf6c4be7b0efc27e
SHA143b22c2309b6ea42b647703ae55d246962379437
SHA256e0f2b1a6eb72a7b4c97159bb6ef3cd25df182272d831fd9979b16bba6cc5af69
SHA5126de5906917d7da450c0759b09251ac584826f95d2034fca43dacbcf8e17dba76e2ce92283b5614a84c71d872225c40ce5152e069a8bce89c3c360d64d47304ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704e5f4a4f8cd0a4a4c856d2bdf26a1e
SHA1c1724b3a89801242463a4bd1624640eec88f2b1c
SHA256df59a92ca8a24e2d421c71148c56292b876bcaf7337184346108b1d1fe20baaf
SHA512a8ac062b989275b94c9d650f8f6fc682d22006a10a9d76a6da0e21a0a59f45f22578e4c484f0976e489cb58b25f14b2b6604cf1683746d8ce1c10f7119738d29
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a