Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
6929061cf2ef2a963d001b2a70071d92_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6929061cf2ef2a963d001b2a70071d92_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6929061cf2ef2a963d001b2a70071d92_JaffaCakes118.html
-
Size
19KB
-
MD5
6929061cf2ef2a963d001b2a70071d92
-
SHA1
2e88be9af47cd401b86c40f266f0a0ceacf7d855
-
SHA256
0551d4808373bfd4706c7f5101a57681d7cbf3111b3720c847493c175753c63e
-
SHA512
f07c54e385cc60497a17906744886f587670123c9cf51ce99008baaddffbe10224a6c4669c6616252f0be6072bb6f43068b15be37ef140797059233c539b484f
-
SSDEEP
384:zikKhgESZVBD8c+Q3R/nGaQcnemLxXucfIk99heaQ7zVc9+9q:zitSZgcR3BQ9mQOIk9SaQXq+9q
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0654609a9acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33B69801-189C-11EF-9D76-F65846C0010F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056e27d7815e60e45a9b00cd16d2416fb000000000200000000001066000000010000200000006fe961eaba7167602412010c61cc5ebcdf99492a0a1aa93e518f1e493b23efc6000000000e80000000020000200000000c3e791999992f37400226abd68511ac427570e47ce29dab431894570c9b7d4290000000aabe45bfdb7282b659379ea28cf2f99b9bfa30ffda7ba07b3528ddc20da408f06fb53a17116646c36ea27dc4f29238e3c0b791befe6a68b897bb3023e84be3fdab3202db52183d96926453e56a6e31226d72ee8acf9de2d1d9e993e350d015b4d7175f89d287a98672ca0ff21249d22d88a4a288f10b623539771407566912c9ef89183766ce721aa3714860e89d291940000000139bb65ccc0db3ec25dc32ee78f7fcfa3d3d941e349ffb466481f46ca4db6ec5f3f729f5974dd771a5171df8b65fdeb024e803ea558f90243c84023294192b15 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056e27d7815e60e45a9b00cd16d2416fb000000000200000000001066000000010000200000005f17307cb287d097ed254d366cc117442e8cda41c2783bc304247082066ce566000000000e8000000002000020000000c27d8186078ef537bffa73f7f9a60dff659ee5781a112c32e8f221cf109b78b2200000004613472779dd59b253b93e1073fec48b80d49cf8cc6860bb43381b2e2422f1bf4000000071f17fccf176b2e7911a077994887eda2b2776a4eb1f2b6242ead93b7bc2a346fccbd6af30652f0d85d693d76ccfbd8428c6deb3edc614790b94b5f0e5322917 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2352 iexplore.exe 2352 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2352 wrote to memory of 2552 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2552 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2552 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2552 2352 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6929061cf2ef2a963d001b2a70071d92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530f12db55358ba62d6a513e3c1b110be
SHA1127eb6390063965ea4cc1fe98edf083866fc8ab0
SHA25627cdbc463455aba988bb8abaff6d7675780c49942ae3ba96fa023ec4b73e5318
SHA512aec6ec07ed0c475e543ca19088a2395f2dff73cabc37fb859212bcdf8909919cbe25aea9c2ec75e8b581130dd9661d26fb6e3ba77c24920adb72ab87dc6c970d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace205c5022ea10f3a5430ad363d41e0
SHA1ffa90c0310b7a0953a3bf990b36bfb7f558a4a10
SHA256a6a33f0c170f1844ce56dc7e71bef45a1ccbb9cc8bf97a2130ca74d08ee26381
SHA5127b123ce574dd919554c29c5c48d183ba4a883af2572655e5b74368ae0f5f58e4466bd012334fb9f6487fe9cde62f65e3b70c9dcd1c1430959bd7b47372b62f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea85b555c4c3f58c6660a721b390ba8a
SHA1df538f65f78ffceb06b5dbcc03146ef00c8781a4
SHA25640c81a562561b6e92a20ce9f698898ba0e0b4be59ebbf34dded2edc61e8a0ff0
SHA51279a99f374639c03140b84f1832790dd130257e1e121e9084ec5597f82be4db9b20d6d022219a2e0ec6e40473667c47ef6d40fc083c791bf325868d6f8b05ae8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115e90f3b46f1f02dfa76e61e9e1a328
SHA135c233f58973e9c0fae5740d24eb33e69ba57452
SHA256abd52716b6540a872a33f6db94d5f8b431e5ef44a3b86bd57cad4ac6e1724c32
SHA5125f7ade70bd1eaaab519409ea8732b94f9bb1617dcfb7ecf3872206bbdde2a146d9066e358ef124f4ed17ddd33ffdbacf22b6ec7e510389438eaf51b0de68e03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ce088388d7fb016fca77f98ec0e11b
SHA1bde240283a0e07fac7259fb9c2e99a8cf749165b
SHA256d3901522b77465de4817dfed1c81cc7cd945ff753cb67010882c8ab6065fdbf8
SHA5124065ec15bd35994cf7e6f7e1167d4e56120dc67e3426ef8f5f419a0d84608a18333dbd5ba2bb418c1c544d0ec0448b9c822c91bc1d407d92d46658422d47f4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42f49d5d57e2793c61193f8eb9bc8eb
SHA162061d3a05c109cb29cd4820a13ee2f3e4a64440
SHA256cf3367b6a8f8cd82db1d1f1c0f70354cf290d9493339a0e8a07ad6307bd064a0
SHA51231062c3d19da645d4c4b77af48881b3b4e15a2db32474b93cdf9028f86731a7b1619b759e1077c986909aaf262eb5d384ffced5a2fd7158972f662e3568394be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b026ba1871ae14107ee48d2437e03465
SHA123d9c1c58004a33ec27c28140c898b119ca958a3
SHA256e24d9f1b632893d38191142cc1209472174585d78f284dd77d2761978f0acc1f
SHA5127dfd770d7b0c8c648c560d60cabc83f21b761987c58d427484bdcfed7b1e1be685786fff4bf96dca0656ec1eaad9a11d1d1a4a4cc182400f6275ac69db24870e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541cb15d5976f8cda515a6ebb82cc68e8
SHA1337fbb10908713d2040e161abbe48e7032bba55e
SHA25626faecefa989b2876c3bae74d13edcd91c420396d9f40c488fd550df31e8db29
SHA5122e672c2577315e5a43ed1160d784ddc76ab6dae5a357efa6e14cf5b046cf83f08b938326efe8a5005bdf149019ce71240ddb2e93474bc4e942ffc51c4c1cccf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3894befa8bd5b63e17b9e0f61d4630
SHA18b495b34c1b2c3e01937ca26edb4a4f6ac76d9d6
SHA25656142890787973c221490b95d5d7abfda7451811baa9738c729794e8658fb8ac
SHA512303ceb8d5474b0192dca9e4a1897f53510baa21c5956df252ad77a3d19521a8d71a494dd05d90c56e4406c23c357d0553e8378502a2e3f1801dd13ec32930e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d043e714638b7f9b8e1d59702504789a
SHA1658e5268e496c055bebcbf3d18f43822d7691f73
SHA256d8dabe5dba0d3df3e3ebdbbcdb1e80936ee075392b301bbb7fe8a607f0af5b9c
SHA512bb2b211ac25f48daf088e9cdb1ab2f9f7d6d11b21daca31b601fd86a1648b47ed38708d6e5b7fd0350fdf942933437bbc08a79f316861cb562e775587fa8bb8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a