Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
6919ba735489a20dc2985d143283a0b8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6919ba735489a20dc2985d143283a0b8_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6919ba735489a20dc2985d143283a0b8_JaffaCakes118.html
-
Size
37KB
-
MD5
6919ba735489a20dc2985d143283a0b8
-
SHA1
d26bf7230718444fb5851dd3e25cbe7e0e3ffaa7
-
SHA256
333fa918999269601be2e70dd03bf8a4c4fc79d5be06ca836e93922ebade2314
-
SHA512
db03e77c1bf87111862fe33d04caf413e7ae07582ce0321c78d811ad6fd76d4479c78452d2e7bf278e11f18f0eb56b8514b67a099b0621d5e0c3d10ba2d672c5
-
SSDEEP
768:dwhY2WKxZ+HnXnZfuWD02AhBdwi6pk0OVl/IGSdMEN:ihY2WKxZ+HnXnZfuWD0Dp0OX/IGSdMO
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b3df12a6acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e58c7837c19d1a522bfc8747d2d91a84ee11d6b14aa7048e6c092ae3b6c695fb000000000e8000000002000020000000346494aa6c679b0a63662b1777b2a7540f6ba179b9fd4f449bbfb551d7962f4320000000b4c7a9a9093d9291b33013ac4e7670d18a901191a389a6592ebf379df1462073400000006d6e4325b02bf3f4c1469febde938bef5b418fb6997dfb6e14aa44b860a7ee89f9a8014b811751beff1bb636a7c3842657440541c73aaf61ad69a07f65640c2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26446C41-1899-11EF-9B88-D6B84878A518} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 788 iexplore.exe 788 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 788 wrote to memory of 2272 788 iexplore.exe IEXPLORE.EXE PID 788 wrote to memory of 2272 788 iexplore.exe IEXPLORE.EXE PID 788 wrote to memory of 2272 788 iexplore.exe IEXPLORE.EXE PID 788 wrote to memory of 2272 788 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6919ba735489a20dc2985d143283a0b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:788 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ec9c1f97d332671e9ab9a5de8465b5f5
SHA1fde0636ca5a0174014555504d259983f27aedb2e
SHA2563e343bbc8be5331c91d3a8e1de39ecff23f8ea41f73b5ba3f886d882bd77e2a3
SHA5126382437572ad6545b725462f7c742e99fe65e3f352628b8b25271c40f695c7a83f741ab61a72ea42b28194e3af20463f30a1fb41dd16272e5489fcecca7bfc08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52ba35fb42f5ce5d680b296ab89f6d670
SHA1e0970411fed9ea9fedf566350113dae1d2e19c01
SHA256b262d0cda87fab5edcb9e7b7fd39a86aad3876afaaf937d93a2a0700e467a93f
SHA51289b42de34b007137668dc0a446a740949fc94b1cbce291d5c5c133938ba63707349ea723ec09cb3bcb5a327d98e3fe6efdeafb891c31ba331808a4174478b787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD501cea82bee3e8d495c7cdcbc7a50a1ee
SHA16261aa1a1adbfc544b3bab7cd64b8029e698befb
SHA256a7171c018dd97ba8f88e9f27016639511f5c38b54fe2e229598592940c6e0f8a
SHA51274a278d614f9ba7212631aecf853813a5208f344b8b82984733514e1a9f5bffa41f9b6699665649c5498db746be645aa99357e4f06eb734188ae0285f31bd4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD559fddf0a7a35abff2ee1d8bdc61a7d86
SHA126cafdcf1687bea4f4b7124b1a2415d4e863eeb5
SHA2568a8c55a50667d31975f6724c3f4f3f73288caa12c426850a84ed9583e1c86471
SHA512059a150a893d6d0f64af0e3ee484213e15504942280d5e22fa27aa55715dc73deec74b8bec6bdf56e0efb66532e455bb9bb42bd407286e2051c7c0358e06fe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5416cac4de4108dc280817d940b89cc6e
SHA1914b145c0a9306ddf2342ac838803dbbf888711c
SHA2565c7f774b5a39a257793b0a5d2c5b72b7fd641b1a08033099ffae98732c043455
SHA51209f60b694f9d2a814d2d60d22a49947e57b9e67e006158f5a9982ec7a74d043715cadacb7c6dbee0ba33058758180dfdc7c7ed9bccfce591f44be4d401e7b880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54931c2aec82135f3ff1950f2c06bd5b7
SHA12e184a39508cedfc2f828866ea0b415a64f94897
SHA256d7f6b0b2a66e2de56295807f9def9c75cd127c4e613353be93bfb0772f57aa1f
SHA5128f3f5b43a9c930d7939aa05beb92dee42b6c752304b13fe16ee6fe1334f4ba06d63f5531324e4f72bc285c888581f307b9224e43636dd317da87f85afe7b4688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac69ca765016064470cff2b6d5e89003
SHA1ce06619d4344f45a7e5fe2acf4c4598493285532
SHA2566893a87c01f5871a1c62fdf988d38aa41e3222a9d5fe77a270b51a1930bbb2b6
SHA512576d5ef4dcd364ffa25f9c5b118cd7cb948b6e3837eed2092e83b7e03b8ce3ece357f7ca4483b5562547c5a98623d5f2a9874b99293bc72adae378d801488286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59addb9695f472c656b2102911744528a
SHA167b5c4f7533b7fbe390f9b1a959b1ece3db935e9
SHA2561463bee075a2c288377993a6c0981082681def5683047335e402c5d4545fefbe
SHA512da6e8070f563d43b6202c0350080bf5de08487f6a91947c69ec3b9f45685684c955a85d876471f3861e23100f448468636976e344a22854340af3de119546c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a10e41d0624f1168440c2aad3856b00d
SHA1bb857592e63b8589ec90f9df46c042966c469c58
SHA25628f686e4b64dbf03796cfa8c9fa5d811563229af32fe0d5153e926f7ca39b8ed
SHA51246935559dde97e59ee7fe2407d0c714940170a8533e4141cd941cdae7155e834db7b288eb3de7bdaa155ade045220d1d24d2d1c0b2dddde764652b36cb9074bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d7bd7f318920fcdca79fc786dedc05f2
SHA1c51429897121471e0ab8e78c2bd94d2d06596a7d
SHA25604778ab2f6db0f9405242e95571affc8a9f732487835b1effd4a5ad339a6ff31
SHA512764bc9196c86d5fff457d2e4956ba50da54b30f4fa698ce3aed95344e54f6df70311461e238f4d3e4165b0810d69ce50ccc7002022fabd5f1472bb72c389c678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51333e1297058db5ffb318b710fbc01a9
SHA14040381dd466a6a1a3541f8c4018ccf01220a638
SHA256906671e89170d487b85cec565b6da7021add26325fad5bf9b6740178bb497be4
SHA5128f15477ff02873f6842ee262c6cda7db6d772e534de9e418236ccecc19e7264e7f6995133fe06c7c42f2eb9005156b16c115998eb1f2db4ada59e1d5aa91e419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db60b1345c9053cab903b2369da13fd7
SHA113f57b6138691177a862b0b952c0fb14de984441
SHA256281d633843a8716414c18044644159bd4893cc1bdde0eaf868a73d11f6a05054
SHA5128cb3b7bd7f0b7dae51fae8fac4866cde47d951aace5b47ad64939381e14b8e952099f779cb203142faf48a87e73cfb65c2dfddbafd0f58a22f0a3d070cbebb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a9c8f276b6b285d7f95aecac74bb10c1
SHA18436ba6ff3bdc5f22690e9ab87ba052cfe0bda13
SHA25626e32a581ba633686d5a5ec628e659d6dea443953b6272b13f84c6e9bc357977
SHA512698ff6ad2e0e7fca097de741f4c9333adadf9d3006451c01eaa51e4be806913a13844246e1982ec233ca0c279f19b3586ff3a4fc6329d0381ac78cdef42a9666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD595a4e24d4c89f180e9ec3df106d408f5
SHA1a1d8382e49a7e228e2023804de752ee1d1cffddb
SHA25659de0ddd78d280e99b35d83954a5bcd32e648fae3eaeae8642cd5f36ce7c8c53
SHA5121776db5d7b141fa083ee736174436d590fd43ad2ff8deb50d8d1a8dfc2280622ede9b3705541c95dc697b1c1ec2fce63eae49a57984ce6fb5d5e3ea59b686901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d60a5bbd95d5bd1a4faff90c8a496a7
SHA17a0ddb59f0705f1397e4112e8c002ad3ed5e933b
SHA25688056dd26a99f3f184228650a34e2d74031c4bb3a12f1e06b351b181733e1380
SHA5122fb4eede6ff98efdbab1bef8ef797008a89dd138760dc95c5710538a8a7bb92ebe9924c8e2569ab941d59cb2dad912c4ab886cc08083d057dac76b52393f9103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac1c3706139d2f20f2cf7333e1c725b2
SHA144e68119465d0bb8904f65303b69b937ce796ad0
SHA256dc163167a6dbbd0fa28179a88aa7cad573e0717712af3e15620967fe42b21153
SHA512c315bbbc6f686bdfb78e4b5ed56dc0374839e0838e0786492b19f138a27ca19e6cbd2880bba892c6bc9490110b5603992128f84d012fdd2c73c86f87ef605dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5180c99ebecfd60faee13aa5562663a8a
SHA1e44fe4ce6e3d15384e9185b68dd4bdd55d640fa0
SHA25638df9d37095b3e7544ee800c925207455edbd8e2002292aec93d2652a7b3e909
SHA51218bcdf07dddf6640e1566acda0c745f54a747bbb8a1b26b9fb0ede71058dfa552f17c885a351e35f71d15c9036f965d445a85388e21d53161b9c81a4c17b0121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5680f5520c5de50c366705476f4ee15db
SHA1cf0c3ffd62d866cb53446517d202b44661420910
SHA256d6a0df5f66c3c4ea7f983858a9724e5aeb24bb5a4b3e4848aea2b50fe5ebc38d
SHA5128128dda0ce86831bba6fbba6581d4ca131d95bad00ad295c408b1856aa400b7b80b0bc16895f2af198a4780b70afb99b4da7a2be0892a6119349cefe2a53e69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d2ec9e39825476f914068f329f4531fb
SHA1f09af1c9ceda3ac05512e3d3728d519e743e42bd
SHA2561190f132b43913f657054eb793d89673f7b7128d91655790816ec4744bed5c5b
SHA5123009fc13f793e278251f97583753860baddb602b06d7f7c02d85b004129bc0f3e446b413c85f66a37df7c4902947cb07302c90e74b57dbfdacd5192a2c1a3425
-
C:\Users\Admin\AppData\Local\Temp\CabDBA1.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\TarDBA2.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a