Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
6921ccd02a1fd36405a8f8ee4642a65a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6921ccd02a1fd36405a8f8ee4642a65a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6921ccd02a1fd36405a8f8ee4642a65a_JaffaCakes118.html
-
Size
9KB
-
MD5
6921ccd02a1fd36405a8f8ee4642a65a
-
SHA1
c9251764db1cbff1a2632f03ce44e53500e30a03
-
SHA256
2033cc8cd922170c092c07f27c9890201ee60b13e5e6eaefe91f44c8d26ecd74
-
SHA512
94e256ac9ceef4bd04751f6b42d0004329ad61e4b7e655120b6c8621d5fac1ed4240d9b74d17156793f83ff85076fd039c443814d10a24979a58ad2faf4413ec
-
SSDEEP
192:SI0rIkapnW2T/L73eh+QS+6VqlpoAj/9zmCI:SI0EkTFE+6VqlpL1KCI
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ebe0afa7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585753" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d08f373cfaf85d95f41419d763ca34ac750f595d4a08d7b0447e73e488266bd2000000000e8000000002000020000000f276a85e20d4ac75373cca5c35fa52f690e0270d86757e34610c0219846f5255200000006533ab44142978898d7daaaee4dedcd7ddb5a65ba82379d79cf49281ba9a67544000000027829d021be01308cb4be2906d73b52628079698737338971fe62973dd5668a06d13cd39b2a067d1e8b814dbaa3eb4eb9b32814ab682e36289a5d08173ba1258 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB319281-189A-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1708 iexplore.exe 1708 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1708 wrote to memory of 2460 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2460 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2460 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2460 1708 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6921ccd02a1fd36405a8f8ee4642a65a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a64f8ae818819f966cc3dd7979c9bac
SHA1abf846030fb16dfa6c49a3b2094553121158a926
SHA256b9cddc9a15871c24b02894c4fa034b99b0e07abb52da523071e4ccf32ca1e422
SHA512565086895feb6570db13f0e06af8c5bb2d79f761cfc71d0a0517ab12e9e4dd7e320e61c0c277baa3a9120c9b22484be50ec090c2325eacba7781aecd05ed829f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fb2d58d61ff96427f4bd4649547200
SHA15b7e1e2d456e9919f7840463c2062771ed5d34eb
SHA256889cbe94a4dd455d8d353e8a9b4ce96041bc7fe666ab7d09c0a850220a4eb529
SHA512efcee39a23693c744efb4a2b54ea391e6ce6939ae10bb6bf0f9d187a69028861c298212f04b3b3c2a112b35be5c3e68f974d65b14b7ea832fc8c9eee58c000c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a614c9cb62f8b00091ae2097c4744aea
SHA1e3ee5f41797ea64cf1d4703baca81c640fc380ed
SHA25684c6fc3183138cc9d0056d7b6cf95846915eec8e82661877d22e98331320777c
SHA5129ee75d2e2ce0739ff88add8c106e66a37020303c025a12273bfd7e86556130b218ea27c4c8ca7f7f45490c4c970e346e5d6d4b8d17a82db379ffeadb3ae03a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ed138ac2d9d747af3c6f159cedbaea
SHA15c096f31c34c425da9fe7291fc16015fe5a1d6cb
SHA2563fe9a0bfdc9d57c9c56a6bd0c80c8be23589e7992e85b9139f6739cfce5c3d55
SHA512e0a8bba9093bfa9a34a0e0bce784d28621b74f12e5a8666968d0a9797aca7db6b850a19c459dedd9329116c5e517dab44b844b13ef0149c63dff1ddb1da56c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6bca6879e61e5bb6cf3368e8f432f7
SHA1cc09d0d356ca35a483075040b8814b047f5bc77f
SHA256c449501fb8f90cd321cd74078ca6d2a28ee0d0a788c6b34df74897d3c331bd39
SHA51297d3a4f1fde49043e6b1925fe06f073432293c659de7be8110355dd969068e1188d40d2873195eb3aa0cc4c15e5df263dd29b1e38e90be55699fea833f4a5479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4025cb4cc7fb612f6f4fe0586d2b6dc
SHA1c93ed5f1d669fbcd4ac91b2071cbeab29b1dd871
SHA2562627f03b0df654491e64f55736738fe41629aac7dceabab6d45d26667d482650
SHA512bc640369df53237447a39ef2748515ec2950d684f78a0181537a51717f333f0b6e2480ca191d9b6bd54349287b2dc9705077b14123844193fd9170b66f5c09b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af2c696dbe157e2294411863e226048c
SHA1b5aa89a721fa9c6d8edb8ab822cf5cfe92cae8bb
SHA2562bc7b70ca8b5ed5ddc7646a1460b81ef2a77cfaa84cbe673d311d73f4d385148
SHA512175e5f1cc4a8f6330f246069dd3a18b5372d37cf4ce49708b95324d9714318bc5de657e251086dc4dd9a202d208931eb1db53418794c92ca0a44973956600d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb58a21ce9417ee299ccf3a9b8f244c9
SHA1fcd66860c4fb7dd18528c078ef860ecd7429e5ad
SHA25655ac529e5ba067068cd647d47f8c24eba8d12c8a781d3774021b29f2408328a7
SHA5128046750d0f7c96d7eb9053cbcee9ffed79a1bae471335ab259a0244e7ba29656411471e34900b96e3550a959bfdc556493d28b8a1f33bb35a2471bb0c12c6685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2295d76d164158fc3f13f89229a64a
SHA1ac22f5a3188b5f4fa0eaa11cd653ba242b6080c7
SHA256032de220dfa5c9310a8021b0b7608a1c5d6becb2601236b7591f0671fb9f802b
SHA5127c01fbcb761a6168c5b06935bc3a10ac6cdd267943182a582b32f7145f76ee4107a55793a1db0d969d15d30f0fd9ac1017eb2f4cce79ce7bf18c858056970d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f05286a8a81ba5f7ee24159c45bc452
SHA15bf108bed334c9e21ccdd7b9919fc3358e0817f9
SHA2567ea65cab63f018cac78f801c1d74a1367c14b21d65980ccfc70b556fce9a3f24
SHA5125056e72b60e5bc5f5fe3c90262ca7859aa4af61781039e55795180f274776379763dbd91e3b9f82e71602ee8004d67c0c0417bcd3749cbe64555e30f20c6581f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0359a350b9feea4b1ec55d40fdc062
SHA17c5f158bc5b2049b5942586a3e62661b63566b14
SHA2564d69325ca57ffe9a8d980259cbebb9c70f025896d93f375f3bd1bf372d64e5bd
SHA512a4105cb90940b25c4035e37f49c0f2166fa7a80e50bf8b54d6d9614c2533ec6e4eed7ab22113bc37f541a038c0291a91c04a9205e0af8522d9d6686b9ed08f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57672d054af8af22232028668499c54ea
SHA167e3bde6d35130b8fee0a40f784457f8ce96c74e
SHA2561d97ec3f0e33827284b4f5bf7b9af755c8bb5bb17fb0ac35043f2739a8eec2b4
SHA5123931bc8062d082b854e204d473555326a48d6e030cec3ab058096a977c5d49d45232195bc46d98498ef0e3ab1776f3d4ea0577b71bed4a06afa18f69e7af37cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581093dfe4057124e355b90f9a4d432ef
SHA1477cb04db28e20223eb8538e182cd5a642c1dce4
SHA25691383db3e80d76ad653672a4f5e0f67a9797b06298e7d1ef7699a9755127edaa
SHA5128569584f237b67a072a917552853154892a377eb4d4f9b224373d71c34008850cb721fb0d410fbc32ea873ad3ef77c5ffe50cf87e630856bc1fe224393074d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53972579960437d747717ba5ada5be585
SHA1f1b59ae12db936e118c5e97c704346d3ea259121
SHA25696bd722c2ab0d6a7bea6f10c5b11b2a1f4980b90319d33e291bfb8208b7a897e
SHA512f0558d9a4eb735f752fce019cf2b18c07ac81fe97ac6ad39b1b9c48a2835c2273da72a3b0f8239389ba949302bcb4e72ee425629bd76017eb58276cb0872d7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046130fa6055bc018bbc0118883ec1f4
SHA16d3624b8b42ec09ee9770ae882a61262f6c20969
SHA2561f276defb269e8412182943007de3bcb08bc690911010869652f769a8ae09560
SHA5121d370e88b27d3fa18f7496cc0e0d58a2b7155c8792e8edfc2ab8dd75b532094b2af5d54811e8dfbff4fa8d07ab3a43f58f6df6ad93c46fe73705540597d8dc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b701423af7ce2b065c20d9890b30ea1
SHA10329f35b1ca74cc2e2a38ba6a492dd40f40b2c87
SHA2566c50b5069688f0ccf99850c95bcd5decde51c5af5aab95396a7fc9ec1502d265
SHA5122ab762b996b84083ce5b70d05a047e378847830fb3763477356c471ff9b83069e4eecae9bd22758e78fe550715f63df604c332889aa52cdb8dd91dde0e396b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3fe0feb01a54d78676974c4278aa206
SHA1441ea007fe4717dce7addf539f441a42cd920d75
SHA2566828df977d6a891c3235a5a52deeb993d064266ebf63d8498e7c72911ad04a40
SHA5122d1468aa8e69c5b6b33b92d4766d3545c14388bb89da01825244f4e0d3e62a7bb7aadc20753c5560c2889696b3a8b42e1710ca64d175d8524fdc986862bb1fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5ae275b3b24b2caab518982ee76443
SHA1f6091bff854d3d38f0390320c507ecc5911008eb
SHA256f34f65a752443378ff358b969bbe0ea8714fa22e16aa4a6c47ebda1539ce35d1
SHA512f63c3be21ae654f00f39fdb5608994e3a0f5f70cef4dd446f2a1d210219e405b97596ee09204055873083939571a595a251460ed88677c91a523be3f2dbe0d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147557d02344fb681ee394cbc141fa1f
SHA1ff6f6043b0f8383df3005af9df7d400c7be4a9ba
SHA25670470a987a32a423f3a943255b8687a29a3f6c7e3f110faab96db83f08665033
SHA512590b122c2e4d879c7483b8bc68d09a2caaba156ea4c5aa7e024802d154f548e0c80ff324823e5537046a41362e64e63723185bde911385740de14494cb23f84c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a