Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
6926fd14e6ea013194844c5cb162424c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6926fd14e6ea013194844c5cb162424c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6926fd14e6ea013194844c5cb162424c_JaffaCakes118.html
-
Size
2KB
-
MD5
6926fd14e6ea013194844c5cb162424c
-
SHA1
8038fa11997b7a4c064aaab79393e340efe7cd0c
-
SHA256
8631085a63019f7be092208796ea90244ab928d30628eb5b122ac838a0a43625
-
SHA512
3cb2a53e2dacaf26de8061f0fe17efb5dec8a7b69b801c65bc8068669f65e32baee63c7211da74bcf669a8d3c8dce528020aecdc622f4f352a6cb1e3523ac594
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b0bfb6a8acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d7f1ec0f95decb463c257db55f5ad8df85ba6b60b9800b07601cd95635c675ff000000000e8000000002000020000000d9416602e2c414e9a9ac4c8f299ddba8cf000a0d274b41d4599bb320164e6e04200000006f7df50bef6fc8b357534616744ab381ac8fe12fb30cd06fa3325cf43c27f5d94000000003d5b5785d1e66a6018db87a890e71785062b09d682442479d8744ccc4bec2336714df2077ed2c3a35e1b48c907c3221694ef87843011c45a5d33431cefa8d43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E209A881-189B-11EF-A4F7-5A451966104F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1252 iexplore.exe 1252 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1252 wrote to memory of 2064 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2064 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2064 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2064 1252 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6926fd14e6ea013194844c5cb162424c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6bff7d28fccf293e82a5d316f694d8
SHA1971d53014088ad6ed5de2baa13ba3aa2c487353f
SHA256e56ca8abc88509411d763b657cb1f29df35eb8f73b09ccc0818f760e9a4b190f
SHA51296102d8051bebf3ed8976aa3e88120c0e632dc73dd8f743fa9b411ade75e77df76960e8ae5863ae056c81764295e9dd90a7ce9acb7bb65cfdbad63a9729d4d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c8bd5ce1c1529473461b57b8fc1fcd
SHA118644d292d68421bc9a5949175028015aaa2af01
SHA256ab975d46e8659469f2089edd6b4eec00d50d85f532acef5bcbc1fa2759eccb3f
SHA5127e0ca2133843e2a8ce166faa42ff18c60143bc0a51342d7abedae1edf3cd7fcbe2ff2d5b317a6f54d6653bd6d86b97085b6a8eefa5c94639fb323627b6dc61d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59625202093fe65321721ff5e479fa9b8
SHA1e2c17af707c1f16eca8b4cbd8e25823422cedf77
SHA256f533fb6010c1918ea2413bbd433597530d42ac06ea4ec787175f62b18ce13050
SHA512a065a45bf0a9e46b14658ebc501ab7532364fa1de4c752aac62161aa0216c1f7899a0c1e6a555fd692fa6bed2aab5cb1bcb9be9fabc161a85f34fa0e8f8f6cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f08edc6ea977094ada8354950653d9c
SHA1e37f68d2df2b474f4aecba9a1939a3d4e6e96aa0
SHA2569d1040c376766a82e8eb98e260fe524622ac3335b59c08ee31fc07d60b8eeb35
SHA51247d67fb451c1cae14f2e5a9a7c8d966ecaacdf5336c09d0246ac12ab505a2014d07c926f53d52181ec139e1f3dfc3908c1ecb2f8eea3e3156171a7a41562a019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a98d527a698ea952230cb757f8914ac
SHA1802a04fb2e50cfaa4aac2b6c3f7c9cd895ac92bc
SHA256818c4b7e76c530426e5b713c70507dfc164a2da88334c7117e9e772b6b2118e0
SHA512251cffc8d3db9fe22dc4427c37345dca312e9aa5204192aeec675332870d7c8efb6db93bda5ba636a88d3f3d7f7e62db4980ba03bc39631cdd455cc611690c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530865664a029ebf7d32daa47a127490f
SHA1de7ed7eace25424fc18166217c9b9028cbe4a577
SHA2569a41a5a9fcf38455e32868966d63867253e2d8b3b4f625970d1fa447b70765d9
SHA512bd85432077087d217b090e233fe4487d9dcfae27b38814eefbcd33070db2c5bf1bc082bd3fc7b7e75d667a9325a41d2af876b280074c52d1489e763b8ae18662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e65786d5373980c50fff0f651459551
SHA1ce426442161c2dba7cf812a3f8be6e177692f37d
SHA256819a0e5399e5f54c2e390e5653c371800d1aebfdc822cc2520a44dfff2e3a7b9
SHA512566b48959e238b3c0782c3c135cccd5e9e6bdd1d9b38e89b4b7f412a7f1722928b7d2b5304d81a12feec6ee78254ece495c8b67527ae22dec9419458da068c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c661f1b9f57dd1e65990d21457edfaf4
SHA1733275f8e85d4720a485506656f2b6bcc6eaf295
SHA256b8f7d3e6079da117d2fd8d59dc7b960189fc35e26a8a875cb4b4c6eebc9782d8
SHA51275f47284acc694dc85164577aad019f8a5ac436cf57e25e03e1c8abfb0efce1f41f39c5bdbbf16e10c1a1046975d6a93a51577f2561e136ee2d25d9b3635ac85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f9eccc4d06910f74d7796acaea10630
SHA1e1349793d357bdb2960eaeb4e35406a37ebfa4a9
SHA2562500b9f8341873489a6dc9177043d386dfe40b0b647c782829fe0dc56e1fd2ed
SHA5125f2b74d7b1c430d0e73f2371f764bede9007055ff75902a64aec2b293b35085e799f99984941d9417700aeebe9c6c46e33845525078e9eec7221f43bc447d692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfec62ba4c2db77ab7c5895e9d42bb90
SHA178b3f52d4c18d849371384ffed7e9a95d27bd99a
SHA256928b98b17355e9c1e7df5da6a59ab00d8df03a57b463ca3609d6510efd16a767
SHA512b01da91e32035b24294b92ddfcf42a2c9a561d2ac05251bb6b8cc8411d5b976f66cf18f57f608d4c382d3eb4263fabcba63557473720f206ed207bce66b3c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5f0ac1c8fafd83f1366b7a4a9908f1
SHA112050b3f18ffd39128aeea016ed0e71e8134f34d
SHA25686bed9d5644b9f597127e0aa5588fe29512d619bac92b47d9c2addd38526d113
SHA5125c284095b23c7e665f503864f99f9524823292b7b6aaec183e44bd24c5da4452781c427d4b0ee678623833b0ac2d94b8e0221c5173acb629f84cae4672d4ab8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b907f7bbd9257e034f2a051f1d5364a
SHA1a2f1d9c91ada3c91903a54d8f9fc57b736cd5c66
SHA256a67704b1e74ea47741ee559cd59b3340fe6827d0239bb10414b4c38f1cf71e86
SHA512950c5689217bc1658fffb6fd492e8279a797f47a320cd60d0d95886872ff0b2970af703a6c1fb12013fcef085d93dd2ab481547baf63f97e489e58040476f187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0dfe3c5e2396172728183b4b40c4cf8
SHA14922b0a42e276dba92bf56f7c86bebb892b3f722
SHA25625cff31e20b16ee11b8761279d5a5c924881123975a6dddb3a004d98f6d1303d
SHA51255b3ae8ab0b9f3764d1458a85f8bff0c48456f86c78536323db4193016fa49e98f3c77a459fba5ac20188ad3a808ad3b0da959af7019bf558d1fb9e61f679c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8dd8a2caae95beb2f5657fc1678cb7
SHA1d3b9318554d105ef6433f3a2b3db8b1fa88d7d49
SHA256819b4a8577513f65dd301f4cc07682e4cbdbb4a31f339e011a8c27de4976c172
SHA512ec05dc2ec7929851339f04ee779ee0797a09eeba9e5dfa5105c4fe7c34316bfea62388a898844883202491b920cb0f68364c7eaea3916a16bb149d72bab7df28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147678ca53ac0135a62a97ff4cf178ca
SHA1e254d3044c16b6b5ea3b0bb6f8531b5e0aa69931
SHA256c74c8e75e59f7a3e3b85e4ac53c23f5407e09fdf41fd522206bce41b070d92a1
SHA512be6e09dd52f1191a062de1815f4ea62cc8a214a56b1b7038dc97081c1b4268bc6d929b6f39efbb1726139cfdd4ed20aecf1d68caed6563566578fb0278ccbebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfb620dfa5bda81bd7c640b1055e23a6
SHA14ac7622a44928a32ba38e56c01bb6d0c044053d0
SHA2561ee16ede6e61117484d75b8ac8cb34c2c1b50553a10a0471ff8f57ab9d7f3579
SHA51200cae8ec75cbad9d41cb777888745c01c92223eb443d965cd4b9b720102f001f569b3e0d25ed51b63bc478234bd49adbb782d7022e861a748068e70d4b29392e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a6c4a565190f9cb2f536625fffad05
SHA1b67a3dc90d1686523e9961d502955f8c8e749aa1
SHA256cd438ee4f3940725c8fc16e391c999cac82fb34bb585d85bb2b61ee53c528617
SHA512ec814f1559e3fc3b2fa05b35bea2b351a383c456dd4c41b93c320749e17d933b6ec4a6c38bfb661a891d2a7a860781d2f85324c50e99bd3d7761609c91e5f173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5284573cd2c7fbdabf1c48c68ee20e413
SHA1f46070e40e39601303a74e37072240672cefb251
SHA256ce2dc3a70ea3e45b860282e424bd217d4b86dc0017e1969bbb99b7bafd6f7f99
SHA512ec87ccffb07dc4da554e5a689549ce9bc227535c9fbc072588a7912ad31ebbf62eff2c07acf1f018755f01b8496cb9a71629160a6473de5e9c6c55573b5e307f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ea523d231c8551d7db8efc97ce60b9
SHA13eba63903cec37c6c2eb8ee19e76e6fa22048d83
SHA256812eb13cd20a2c4f262c470ce435747d23921cbe12e5a311243f73867cefef1a
SHA512230f02fe27ea32c3ff19957cdcf2d5fa134b578c5e76b7205958bab91e20df95f68c70e81d5109155f29d2623eb96df8ef7361de304b9e9dc42a2d02d5602608
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a