Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
6927f9b2b096a9713a935fb4a3cb3538_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6927f9b2b096a9713a935fb4a3cb3538_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6927f9b2b096a9713a935fb4a3cb3538_JaffaCakes118.html
-
Size
179KB
-
MD5
6927f9b2b096a9713a935fb4a3cb3538
-
SHA1
ef3b1c1d62b1fcb29a47562bf4ed8ec253e141de
-
SHA256
0916a293c5b49d69930e5351b2cfe7e693c29f2a21b6884e2c01d91b29fe796d
-
SHA512
b9f30dabe17189ff75830a72c9118c1b3bb3327655b57d0e2c87a5bf7e3ae9547e61433118be753eb8bc62eb02bfc398fbb85886882d470cafec23627d886f79
-
SSDEEP
3072:gzUmct4w4X+jdfTsFarJq6zzvS0cyZMHgNTGO7f5O2GzuQDE6ySZX+gbNkF/:goHHrJOAZaa
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11BEA3F1-189C-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586278" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1976 iexplore.exe 1976 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 2972 1976 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6927f9b2b096a9713a935fb4a3cb3538_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57575c39a544943a68ce6e709c586005a
SHA14874b30bd1d455b28a95c4e21c5aecd1ea043d7a
SHA2564737de49245ace1ca1fdeaacd5feee9bbda88bc6f42c84a1ea7d316383792cf8
SHA512abf3d85393725113e720cbe8980b369236511e3984e8cbfa795f19bb5d6e39822e80a835caeb498581797a74b349765ba1a27f26586a17a66ae1c88bd066a3d1
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize472B
MD5572ce74ba9e3f6ebb167fa9963207f6e
SHA1278aa8ba3ec53d91fec84d2529ca4248007d5b30
SHA25617520108d1756f8ae26f0f66aa0b175d9f29e93339c4fdb67d2687906e3e917d
SHA512fb8420b98a725c41301795fcab199e6bd8fe66bccae39b3d1c296058d4be49b6eb2dc5a48aa4f0ce62424c13cb16e0672af381f3834f35b25de6a88010e7a9d7
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52683a194a40faf072a30bdc2383fd9d9
SHA1953c67a5c13e7d719dab29dc38954bd73ec97d76
SHA25662ee92b011ee233dda21da4394e7465bba30c754efbf874384e2713e1b4b8bd9
SHA5126c6013efd6154711a93f6e7983bc7c58386b2499d233ba45fd3e7e000e51f05077b8732bf53739338d7f2e7cbe1b6072b7524bab05a6d419bbd3d140ec0ca9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5344df72a35e78a5a277968011a6caa65
SHA1f82e022c007d958b552f0a57a6dfd1316e319ebd
SHA2569c0aa55e867dcc5465eeffe6aab1db9c1edab3a4837ece46670dd5a49e054da5
SHA5129d94f403f31756c405cba83dbed294a85633575879914233e8614b3d4f8531cc8d90cd7b7571fd03548ee2f26d65e6d680a31445f475bce6de509ae57af70805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d07f8d0078cc9ba9613d488873dfc012
SHA1171e99ff59ab523422c52de9cecbc14b1169f60f
SHA25631cc72be3c40dcf4f3f3985a8a65d7bf7355a2249394eeed9fffe4b7c4397c23
SHA512633afeaf1a19bcb05bff3789c9e7b25802cb41bbc48c90cd409ff276edde91cc73d1d5e0662f5951331254a57da180b9f6e54ed062ec441ca0967a6a15894420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fe42851aff49bafaf6f630c465968b
SHA1282ee5be8e931fc526a781ffd57c401df3970bcb
SHA256c3717bc453e7fdd68c5f0833d10ac5c6f22e41c19314b291a9a203aa159ab23e
SHA512bf264a514813f04d8b745878162ebb14d5d81c38f595fb3c4f6bc98f8bf7b5cc9d8873702d070b32e13d322935d9d35d946698d9b66e14a5e7f92e5d15b651fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b13b96b696e712236cd414e69cff7a
SHA12cd6b98f17a8800b24787dd9cd544217c206d6c9
SHA256bbff629eddedf263ae2f3cc213ac8b4f83c39183d8f733b5a9c3630d1531d9c5
SHA512295cb215878c1df836600aa0a2381979eac4af88ad8d20d66e7ba75a794f798bed322b27db15d13f50bffffd6721407c0f2d81ea49b3f2e5ee627c7b59947d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6f87c04d3821bfada2c67166bc7b8fa
SHA1f4a7db777d70d532b99afcd816cd147da5cacd58
SHA25605e18b7e657c564b10b72af60cc2a613f765be7a5735498eaadb6415017deabc
SHA5129262cf16f7924b15157c94c5e0050dab5721967114e9d39887a8f57f55e1f4298685f9eaa347eec272270887b1b45a2b9ee263d00110509a0a632b3e99cb011c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c545593e8f54856aae9f483bdb89b2
SHA150d20f56ad5a21e663ae22938a67cb97654d9720
SHA25647065eb6f312d86dbcfec6e8d757711fedc2bafda3ab7da99b8b750c7f6bf747
SHA51251a305b175170a80cf15db1637d43bed1f2cbe2f1abf2dd0ca847f9c2a53a27c55222174703a5b40ab942dc5833b32112925b23c4da8b5381243181f08876a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54da53314ba39d099e89d75ad7756470f
SHA1c7db7201a24db06819638c78dad67bf34f6e0344
SHA2565b2a6833e125a10daa7fa45dbf62e2dd2428b734ae1fe4f5db431a0d262eddf9
SHA51261f32eb88f77f24b011f8a522c2cd09acd591ebfc2344775679c488d544d3a61c442ab03ab51e4a1f1c7ac317aacbd66e050dfc2c24f3586220f09496f1cd171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d75cb3f65872520e38cf019cdd6ef0
SHA1c1f48493eeb9aefed205681135032d2bdaa13c6b
SHA256c7ebc9c4a27f844201fcae0cb3fb9f4eb38da96060b89a809f39274874a3a0d7
SHA512a70051e507d8c7702847af2672dc58b43ac6c29cfb6dc92154c9a4e7d41439ce9e8b3a3004dbb0f5c8e82f4b71fe813e3b5739132f66ec409e454b3576eecfb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c95adf78e3579a70a323c81029fe06
SHA1529d0c5fcb5989b43734593325b506bab364f6e6
SHA256956d55de976c1313b4a729efd708a5faab95c86baba2814d1919c97c784d003c
SHA5121bf655cf3a47175b772418688246978ebf63fa96c85f2f18fd934b56eec03f6bf2407b458bb0ab8e76f893c6cab62c0fef214ddd390b1d75ffe0fa2a39690fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd38a4db560dd6e82d8ae0ce1f98d956
SHA1dc033e50c29296e94ff79a9bfdbc892964ad41df
SHA25626964191beb7b6c15be7374afa54258f9df4e5a7e58cf002252241c323d7347c
SHA512fc9478934d1363cc7be144bdd3aae108d8ae46b7e63efc7f9977067b2065d8cc0b3f3d11602450c299eb58b186a436dc87f5a95367dfcb06adb80bed3cc9c0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c39e4affb5034601916777459d1496aa
SHA156ac1e6122c5f2d94f8e54cfde66a1559d1f0a45
SHA2565887880415093b4d88a5ed98802c8dba1dcc85943802d901c1e82d613b77e6e5
SHA5125bd7c02fbedfb9310d641ea49f63c40fec2be2e43035c590531d9faa19f159d534e9c7a66ed8ccfadcb4a2e8f819f53484ea1f6d15adcd07be3137690b16b2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f2bd04142df3f124113bf77da22a13a
SHA11cd2f209ae8c1fba4b238f9225483c8ddd34c9bf
SHA256470580cf599d8b12baaef6b47e37b43ab84c3f9d5bdd31b16fea496d8baeeeaa
SHA512c06ccc7ad2afcc8f41c809e2ea792edfe76049034e9f4c5cd53d7783c47aa1ea1e744014150a9e0aebb16e68cff05300976c84491397ea6eac64d5e632f141bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8d8df4b7077f187a74e79a4b948782
SHA11ae648e84b041321c864ef093d66be6967c6cf9c
SHA2567d6298d4442bdcbfde58bbafadf79895aba0d55ccf19a26474986be93abe46aa
SHA512a1a81a8b34c47b337659c9c88eec493826c25d4d5a27a873be4ed6b4ea979f90fbada382ea3fec1087536c519d9038c0cc95680eac57cef13cb896cdeacb80cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5b31469843ead5fe2909cccc9b62d85a0
SHA134dfa2396c7b243ffd7106d586efc27044034dd0
SHA256263af1a40cef19e780034c67dde896ce24025da5b5f25e6b79d03e2e1a0c1f80
SHA512152ca89b6677a5f0b72efdb0d8017ab9a5b400ff267e321bdbbf522e8398effb25b8bdc2e2c52c891c0e99ce2e569d0e7ff9e6fe39dfe4d478abafb4bf42afbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD52c9cabef7f98627faf46d7269d456257
SHA17d689205303b7afc1c61702adbac5b1a464aedcc
SHA25662e75ab2b6eac772b1de4eafe42be0dd42112e2c820aeb9cb5d6b8ff0f095462
SHA5129298753ac54dd3d3b29d62410a00a513189d7c5ad4983b9b7bcddcb382018364c2ec90519a6ac8dcbbb201be63a66ed59ea7b923a57143a16df79b3adbc23e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5092b069e14c91eeac073055670488251
SHA1af45a097f136de714d8ebc94fa929aec6987a7dd
SHA2564368b33cd3700076026b97228441f8cefb0bcc4fba2710591330e6d7504611ab
SHA5123a4e79fb6f12a78db183ca52d2385ba2d7c9c640689d79a8235c98f9d2d4d731d08fe73efa444590704d76b863a3c01048dbf0acfe2c0558546647ee6b08ea63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c1a1fd30f341b1c476a10e70837b43c6
SHA15b94c86e8a90b20e422a0871e9ec370c24845de3
SHA256a45719cba2dc2284981f2c0d2f1b7c8619820e90f5210da6728e452908415fc5
SHA512de97c5c4aabb4084d13c41b1d6919ab44bf4274ab0cd3ab5fa152f2e28673e0e36f6c4d49896501010c51713c8d8cd1c0251d4c46cb4afb12357dc6d4a8e2e0d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a