Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
6922f54d478a83b43b32b01bfc5273fc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6922f54d478a83b43b32b01bfc5273fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6922f54d478a83b43b32b01bfc5273fc_JaffaCakes118.html
-
Size
69KB
-
MD5
6922f54d478a83b43b32b01bfc5273fc
-
SHA1
1e4b53b80f1214b1cd2a57f26cb4bb8e4f04dd21
-
SHA256
6b39672738a34bd00cabd32af92d3214488d8fbf9b8dd6166a86eb82d016360a
-
SHA512
e1bc49eb4c64d33415ff6dc44a38da5045f7c839cbe1b1a650a58b1e32f8e3ab5c525506bb788224f38922e736ec519cf64edbaf9089c65444566d625a018a8e
-
SSDEEP
768:JikgcMWR3sI2PDDnd0g685kqoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JesTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d4ae76cffe57b4dabede86175d0e9b600000000020000000000106600000001000020000000e1b845cb583b837b48c22dc99369a692e343cb5726c6ca99e7f1e0475d455da8000000000e80000000020000200000006d1bf9d1676c81c8818042edce23ff2ce0e9d57c590db2fe3a56aabab0f20672200000003c24c746dfe696e278e257b46ef216b988a545eb79ca37dc4e9194075ab6e6bc400000001dfbf9bc5edaad849cbacf7617679cbf2a07fdb08ab67902b95ed7c7581862e61393515699d6ac00ffbaf461225cf73c0fcf6b8fd69b7816b51eb0c84f756a93 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16C9EB81-189B-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05683eba7acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1240 iexplore.exe 1240 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1240 wrote to memory of 2248 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2248 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2248 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2248 1240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6922f54d478a83b43b32b01bfc5273fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD545d345f102fc096d22c6334ea4ab911a
SHA1d86742b5fea08a0ba3399caed749816b214e640a
SHA2561d89ac70c2c5fda930ddf4bf683f3278deef0797b96535216b94368138ee2567
SHA512f63098faf4dce959fc7c0d11ea1cd64cfa0d1d502bf01b1be28cbea0e82e3a16a69aaaa5995846d0978ec4ae59cbd1fdad00dcbdb4ccd88a9e56074a1f3af8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54724a8717bc24bfb98fe7bc05cb75720
SHA1fb93d51bc3eac0af962e00151b58900b595b8eb3
SHA256e33c567548b5d8a447125faeba944d885caa438b277d822a5f6b553381170957
SHA512b40f682e7250348da2035404b01dce1192178e77700bfba0a78ae22a16b5c87914312c5249db8812f11bf6535fc953afe8c5acc3bcd06e2ed57f1af84bc78e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD591df54cf4df71386146a1b824571a0a3
SHA1323a5eb7ea6338f15121add7c5780d793fb2d9d2
SHA256c8ee1e4224f9824d21447763fc0e6c0892f682167cbb345774c134080d4129d3
SHA512397dd6beb339bfb80e97677fd459264816387df5d34e56d41d7e0dbf366f3d8ca2d234e0e9b23b5eb673d489fd050561a2de284f36e4c5fd51af232b1aa9591f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5079f04b6a5ecc3178156152d4cbe5627
SHA1ee818c02b0a7e6216571171bdf43bca1ff97a141
SHA256a27a49cc392d024c03a3ab6f736c96bf4c9c6f4951db6ed3c4cb0bb8c5cc09ec
SHA5124a2b1b0aced28f6c58bf245766abd002022a7ca6b5834e8a77496e1a8ffc751bf04d806270a0e2d9a893f3a9eaf865fd190f8afcc2ad4a887f5178be01d490c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e9aa982c9eef7d66ce7198494e4a00d
SHA1279f9cc5519850a34f45d6df830c9e023a105d7c
SHA25683b58c05127ed1cfd4332e0457fcb7116fe027144c5a98949e3ff6723ba7ff1f
SHA5120996336e95f601e928efbb514602021e675e42bed48e927040e1b6cb7d4d86cbe0258f740b47ea56e6b76974f50041a671840b18eb8e2e5e59d2b2eda843c598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d58bd74c4f694b09d1d9fe693043c055
SHA19f30771777a31d4ad1652bc50c26a99501c4953a
SHA256d06549fd34f4eea2142538e22b32182fb15b4a74c1e38c09ec5dd80592d1e7e6
SHA512129156d9079700b514163f5212f0bed5761279f0c17ab3f94634a62bdec61b7b634f516af820fd7636acda7e3988279ff6bd2bf13df06a81a9ee52035b81f64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58bdec148b3e0e1a4c519d84117cb99d1
SHA13650df9cec140563d51b941e10d79e5c0c796aeb
SHA2563aebd4efb705e1b7ecedb9430c2f3f251ca91c60355f92bf9d859c7a22e808d3
SHA5129d014ff1e697b33dc46e0b48de725c0a89062ba502e46cadd5a8e66c9e4ead6e2adea7ecd50b6d22d21f8bb1b19ae0b8ab6a73faf708a7ed5eb400097c8ec6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d384a5983a9308ff8b8414f8a954a7d2
SHA12e36fe16619b8f40d9e01835a7b8b1d4098f26e1
SHA2565b0bfee7530960cb1f2db09b5459b15d671482170d6870506aeebd69d149bb16
SHA512fed7dc0190a08bde7987a6952e8b5f04925fdf3aab55c9e54d0ba08fa610dc238818613a1b0eac716d78c0a46da27719a7192229766a265e5523d4c051c6eaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c743e4ebc937e27c6e053df6212abd4e
SHA1959a74cbddb061a753504520e42e5103f3453962
SHA2560c130b62fc6385d037fbf68f363a1c598a9d0f8db91404ed22dc8b29d9ca4096
SHA512a5905d0da970af081ab88ddac58e188561b4a4d0d012eeb59a0d781f93c158464f3894aa986fe681c030f59d1665a76f099a11114f0c6cb4672336f2d5bb4e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53d83c148923281c89dc0cb4acae146a3
SHA14232979f936e73f21fa21744152e988802ca67be
SHA256b4fb9663c4da7cc15db69d29de37b672bf7e0665a3a541db3e2d8993930164cb
SHA512e8391c0bd9258c5f309733c94e47efd70b7f24e83912e0fdc670d235ab9f9fa77e63632d3f5687b47dad3ea0f73515d93de9f2141e232428b5f3c65fe051ec1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fbbdc2a2f995657dac09cf2f71c189d2
SHA1a067302aa68f1d1ba71a5cc7edfcbc8fd5aa27c0
SHA2568d777de38c9595a03d32704a99c78740dc63d3a19cbc03157c611e8c7f3a557d
SHA512ba21db4956d453d96e78d86bf885b3bbebcc699169720b7460374984a5866ec23a6ef546aa4c855f284e7e869f391130307f028514c24a569c55f499687ccfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5abf9756b413cd904465e84b761ce3349
SHA120f78bba17cdd76c1395861c2be98d2fa0467014
SHA256e5d50f962d246dfb6ccaee1474ef590f8283fed20a41f02e6d327d1f7a286362
SHA5121b1e0b0bb71ae4346a06641cd76a66e9e0e0e6e4adf9c57f041401a6f3da55f3eed463f7951682d76c0b2767258005c7fcb8f906810a0fbad3ff8edf96aa1e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e90b07e112f39544383e19f463658d86
SHA172ef51713caf2d69b999520ef96e0873f1235e35
SHA256aea29de235ccc207f2eb02d1fa13bd4932208b96c3f9c3821eeb6713f3b852b1
SHA5125e7b62831b3e7eb26542cf4637209d770c2526e13bbcce7fed85b29197ff7cc7db52ded14867ee0177cdcf90f2fe712b683ccf1739b3f6ce0785252692721ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a5bea3bc4d0acc318eab50aa2c07c9f5
SHA127613f6dab4e623dc9e0efbd0e7e6ce3319cccd5
SHA256d11d5fec45d5268178ccdb8293bc5cbb22f0400aecbbb09f52f0111213be1747
SHA51225a41508359ae7496f1a9834c4d30ec15bd35da859b773fb6981760f57b8020bfd4b986032648f2d00df2cb208791a82d40fe15a84380b36ebe3b56fc14a47e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f2d5f6e45889fa25c3ccee6de6f67e90
SHA1f7a93f865b39edb14de8576971241ccd1cd38317
SHA256498dc9cadb26f8b4d33ed30e8d1520361b5fe203f7da0a667c6a1e202611add3
SHA51224c45d3daab85c7c5a7bbce93f35951b7ea58dde93697a6da8d01b9469442376b952f0e86b7a6a9798821a342fda9ebb6e2ca024315212ba7af53ff7cf334b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d228cf999ebc128ccf73464947911a0a
SHA1a187db5c8c1cfb7145e6489d1290413c2b0a05d0
SHA256560ff680ddc5381158489d90a147946504af3c49d7f44f7adc2a07267cbce2e5
SHA512d869a283105e5a6a972afbfabd1fe5422fe276ebf603ff91527639d5f8bca1215a976296b691c0ef937071693dbe73344eec16c8b469e77544797f549acf1c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d683fc7cd788f4205d75c3b6346fc644
SHA1fbda73140a42701fb0b690ecae2ba5e9e30857a0
SHA25680dccabe35133880b44a53ce5802c37fc337bc05578b9932a9b44fede110e5ad
SHA5126e9d47dbd674ebdef83c2584c43ecf55a954da65e34f17a9efe92461d14854218cd97f19f9037f27e59a4561323f67a15b98647b3903671da61085305537d0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5435f1fd98a5c7e00e4203701820d2973
SHA11dfe8115e28adee13de6170be2fb47817c2ce0da
SHA256def03670efaf93086cd830364a3f63e24b9e8d259a2cb1f7b579079c71aa3111
SHA512917399e48fb583033478d12e3d6b7d7f9035b8912e5ecd2b636b111b70188f9b88450354892295bb7810c2b7abc4fa4898ce383ec25622780d0c2fab70d68293
-
C:\Users\Admin\AppData\Local\Temp\Cab2407.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Cab2513.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2527.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a