Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
6915b19f27cf2484423f2c4c7c9bd54a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6915b19f27cf2484423f2c4c7c9bd54a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6915b19f27cf2484423f2c4c7c9bd54a_JaffaCakes118.html
-
Size
461KB
-
MD5
6915b19f27cf2484423f2c4c7c9bd54a
-
SHA1
7cbf5066d989b7816e97cd64b9b2dcd9f312074a
-
SHA256
509c99c1b8b76a228a5c268fa24b59dda9b849f893c0a9821946c13aa70b0b81
-
SHA512
7f88c4a4226b4b11f44ef51afef2a3ef56613e33afc344693c8dbcec1904e37510a52a0a7c56d07e5897ddf04792aef8d48354c7140cafdf5beae811901d9606
-
SSDEEP
6144:SxsMYod+X3oI+YgsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3w5d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422584550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E2E7521-1898-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02dd4e6a4acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009077ee30f088ff0b8153555b95acfdc3fbdd81ed8fa3a32066bf95459897619a000000000e80000000020000200000001e1010f871874f324017082b4185132941163e18f8e1b332c64b223790f5ec5c200000004ec7ae2f804918e40dac5a06ff9307d9103b0afd8de88710b20751f0ae13a58440000000b9e08fffd262c4c61639a8ec2b01ed31a12f8d813b5038fb657ded7fdc4d522474ec3fd1795b96f871896da50f1bfcf1a157bf36534c88e16de7176ac14f440e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2264 iexplore.exe 2264 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE PID 2264 wrote to memory of 2556 2264 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6915b19f27cf2484423f2c4c7c9bd54a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ef0f0ccfcdcf88eff9cfc32de7d07d0
SHA18de1b6c6e04d3d035072097014ee02d6448ceda8
SHA256087f0d905dda6c8cb539ab43aae67a21a6aaa45d3f44a8a54c460f858a2258bf
SHA512c603ab4dd50204ec57c9364bf2ca2cf2792f040017256d7fc1ca0d6134906cb2c8b858b1119470df3df3e9337345aa0e55f868baec7a00fc002526c2d67a6c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5429e460ee9bdaf064ab4ef20c63967ef
SHA1e0b1932be0fe1e83ebda78b203c35d8c2164f01b
SHA256121875dd7e14f722960fcf0ca02227d21967a5f92971e4a08e147b02fcbcd5a9
SHA512264dbc7394a671bb25e44b1fd6951f7484bee83bed2c8c5e04e7220165356ffc141728ddad0a2bc216343fce20ba601a8263a8d4ea11dd51fb8a09557527e8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD521bbd9338ab8705926131fb9ce04e045
SHA11878c3fb77c63c59ee029ebcc0762b6ecdbd4327
SHA256aac4ed91679ede313d30f44e239b3eb1f8a663ac27a7eb2de09da829923d9e92
SHA512cd9c9f3d3820917e361107ec6459b80f6a6bf1ae869588edac2b4254e12eac6aba9df7a0b919fbf72a13128b250af46d34950dfd7fd516be2e0ed44bf37b686c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ab6a1c8b5a2c7a39db69744379f7d840
SHA116b5e4208a54b98d7ef9e607ce7a74681697ba8b
SHA25668eaed9010a68842d8839f873fc068b03c16a9fce47014b747327889a3a9ce19
SHA5120c7cb381e1d02842b40e538374ae791af31f1a08e2c1ba29e8d1d4d139ff90b83aee1e683de5467c025c9209e9ed3f9b71db869c6fcf34b27b58aff433884e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a880896e84a29476b50fd072e8e207a3
SHA126ab715cfba725057b8180a8e639656efd8ffe27
SHA25608073717e02052f598a286273266dbd78dd39753033fee7c13c4a69dd53528d6
SHA512ac5a26acc86a0fdd8bd8eb997e26e20a211dce4606e3fcea42e1bef05b7544f2e437b4ba0bcc28162c840abb4aa0ada075d949afa3fe6a68eb863efdb7887537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f701fea9769efb69568feb0583f4be76
SHA1b10914b441eead155805baf5bfc5f4c117d52b03
SHA2561fd08b9f99376e73bb4286b0b93dbb1cfbf6e782d3ff04f5c6f5435c614459cc
SHA512c6d0ddd1b2e1667761fd0a1419d9dcfbe3b5fe0f99eb81b09c02ab3b1b315f50f34efd1a2a5ee7bae5bddd64498114eb3e997d2641d6324df0e5224b8aa2b572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD514bb7102fa4ea796e740f6339d1d1d37
SHA1d5da89221614e4fde896fd4c87786dd866a65371
SHA256ed1252d6e9b4cf4e6ae854b70dcf2a4cd84917d9e009dd4f123cf39741d4acff
SHA51273725575702e5be724e3461c025782777da3a6134c231005788804c72dbb67a364395a82523e77b3fdcac97d08ac3973695fdde4cde2279ca7ce86f528365b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5504f80596ae9e8768084b99edc85f4e1
SHA15a3941cc43f1386252368ebb473fad8fa89bac53
SHA25670516b6ab7f63d09df29af7712f06f9abfcf13ef84bd3e05835c4d5ba78c67da
SHA512f1579bba17b390dbfdbfd813978d1dfcf3cd83f7762a1fe96f26df08af9e7e898dc32cd720973a775d29980b2f48e236cb2239dc05d3feb9acdc9d0b1938055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cd2b76622e7e18e3762d37b686494d2b
SHA1f2615ad68b9a0652fed1a5a56889c3cbbc2332ab
SHA2562a1d26db3c30721ce966832d36c7af91a7cb8d1a6b6372dffb69596d91e5dc40
SHA512fbe09e98582bc69872de2a35e3a7482eb733877eb2704621d273e37f755350863c792a44041166b2cfc833dff1d4ef951908f1d526a7d2935ed0058c2e1b7704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eddd4704863de9ccd733e98e2a2bce51
SHA1accf91579d67826cfb227d8ea87dc76d029c1ab6
SHA256849262901aa6c28b672fe3ded90a1a57a7654e1e7e80014ed0e09734d3e71a87
SHA5124d1a324514f98f74f30f511babd1908595a5f94e5b2ce57e955c002075837fb4d45043f066fae0e39f0390aa540da2fe3410198f5f7bee705806c8d56118655f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a1149be92d83e76721f4d7c5519d4c2b
SHA1c6c84d30f3d6621572b19b6384b111e560928351
SHA256775859ad04aab44632f0e58cc9a606c7b447bf09d47d2f310d1e9cf394a4e374
SHA51261404bb14fe4be546c8bbd9159be42f7709e28922580a571132b7fef0520470076a9c7bbca3ed97a4370d51cd08f21dc72199098f501b8f7b8a521afbf409771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD582d724a9a62910cf172a714002c8163a
SHA186cc1e56a948dcd9f08194088096ab86810b2ef3
SHA2567499a2e54e0ae9ab545ca6334145c5eee9041607b04cc6b12a544dae1c60ef83
SHA51246472c986ef4b681091720051aabb603da9c5b95439d3a8c39b1b195d14513cc32a9622dd589dff72846939bc5e15a2685042d7bafbd286cad4fed0ed465db5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a1bd86106deca065dcce688722960aeb
SHA1d368fa6d103d7a0559f0bb0694915dd4660ab7a5
SHA256390e447f34b5dab09d908cbe0eb172fb98db53fccc685b159609739f8b3732a6
SHA512a393ea9e35906e2ccf290f4336bb0113430fad046d599759ff00a93f0d379f1f5419c523e7126ae23caaf94b9333583f7f77e7e9da659073bccb48826c149529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51116ccb2d0ca2a217413b6970bd36114
SHA149728cc75b8677c5c5486b646b1dcf90f2fb0d6d
SHA2566833fe69dd87a68d93a0f8d56bdc9c39174c242f81751122dc82480d34fa1634
SHA51239e1104c1d69d5864bce63bddc6be15ba1865a8a20230a3df89eee7bee834d82fa36a9b7ec8a960174514c096eb18639bad943fc3f13fb637a55f88061e85c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d5bf60414e93109a305ae3a76e112b37
SHA19403baafeb9402ad68a098ea3751456502702af5
SHA256078ff4d07fbfc6f6d0c0d1165e9ddfcf40e3b7fc67baf9fe1de1f71ad291ef70
SHA51288433d550afbefd75d753320ca861b05f56b307444f7dc21864ed0898748b30872af56914e23981a1c47a9ca234d877274139f3ecbddc4b6b1eff566b715b68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c0f01a6d359dfc3c95ea2611ab3d7223
SHA15e4cd79c1d952433df31c50048c657acf1c4c23e
SHA256c42bb81bcf05894eadacf7211f478de93be5b54260766ed1a32a5f1317c76d1c
SHA512859eba5691427743720f8e9305536f819e8cf449b8145fcf97746f91ba03781da920e014b9876658aa95c677134c29e7bc03ab30ab54a07c9d9b8b84d1d533f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d6317ad5f1bec4f4d7de25d15235355
SHA1221ac6d6b39b7b3e01bcf939dc4660a75180364b
SHA2563161ded54e8e3d32b37e970978aa1240982b6327a455a4c33f6c27c8713b020e
SHA512466436fb2cc0f4ebf56b5aa39a1032fac8246d64dca9c122ca63dcc30401aad4ff68093547d34964e103a378bbd65a81e64a0b1b6b9ee13949aa34decab52157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5355b387c76f4f06b1b470f8fe23e9d32
SHA14083a9bf636717a3f9813a1b34386998ac8a3c96
SHA25698d8e6c0110d5015fc2ed51fdff3ad8ad9e37d20ad5dcf3c6eb7fa86c826e015
SHA5127b35b636ef48a7cec7956a865895f8357b592db62c9320e252aa793587a946a0add6d0cf1c776ca2c30c74fd658c3fd2725943eef287ee27ddd45aa911fbf72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56dae0704432100d0472bb46c208bd407
SHA10073537117289b936ee921cdff6efe4b2dbb4d08
SHA256f80e08017b399d4f89338d92827b545dc617513131b9a6614f183b111680e0e6
SHA5123fbeb1dce63836066423e07e58109196aed89437f1817bc3eceda0caa6e75c68b10ec6858c9365582c1a37da20d28369d8ffa9d07266bc6e21e7a9390d15f6b2
-
C:\Users\Admin\AppData\Local\Temp\Cab370B.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar376B.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a