Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
6951f436e89c8cb7d06c06b907fdc114_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6951f436e89c8cb7d06c06b907fdc114_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6951f436e89c8cb7d06c06b907fdc114_JaffaCakes118.html
-
Size
1KB
-
MD5
6951f436e89c8cb7d06c06b907fdc114
-
SHA1
b69894985b1b9a1502338f6130f4895da2c2d46e
-
SHA256
79241e691b6d9547156642b6d06c824c6bc3121616f650d0406baed16b965f03
-
SHA512
c2c58a511864bc9889f23283c87a7a69fee82318a2b34c895a9d95e35df47bec0fd4e09d7224ce50c82d2c3449bf99908e8b2994b5c3f82afaf87c8c7dc12445
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80494024b2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F835BF1-18A5-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f4119db8e94b0dfd8f1bee51e7a3e2054592b32fdf778efc1246814bf488283c000000000e8000000002000020000000c51fb9a847a311e7842bed2b3301c6428cc8b236a99c8caca7a096eb62a03c2620000000e43818cc39f1106d20945cdb7f4faefbb9a7cdcdd6ec925a9d0f8a86434f220b40000000579678cefca6a88477d4f244191a308f4f97394317f5da995f674cb99f048b2074b36ec49ca521f1e49b6e40793e28bb6a12397944b5f59dde93a8782f5c86a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590242" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3068 iexplore.exe 3068 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE PID 3068 wrote to memory of 1272 3068 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6951f436e89c8cb7d06c06b907fdc114_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50eb4b73c652ab641d150cf9d515795dd
SHA163d8154bfa13de74453a718475750840d9e4a68f
SHA25613181fff8accbf2fbe9ff41d4cb04c0b99a19e1bb3ac3f4f45a7f031861b2e33
SHA512e09c7a5b6b34551de90d6956217fa0148207817129ade25cd6f8239c3120edcd9f1e129bde0495dc25f68395f1ddb1fa91e18d3632be0bbb782c6612fa21d875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d3830bee64ffce5d02a8641cae1f5c85
SHA1be38da71c4212d6a48637c302f41ad22526a8f09
SHA256516fb89e8571fc71605f5262548903c2fe34147f7cd9e9c2a3c6815c2a718d39
SHA5127b2de3b1d5351580ebee26247804c083f095736e18a0a7456de1696a9f1c2e0f8eb26b7e54d276ca4aaba44aee1b8b9568cead920cef680ad5296e0b8cbb5c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ce609cb2a6d9a9fa6ab66a1153641c7
SHA16b533c3473d805ff01c73960340512b237f06192
SHA256f70cae79ce69cb3ad1654ec21cff648540a46c8cf3fd088481dac7bc683af645
SHA5126c9cbed9949fbf486ff116f84fcd9bd7b5bfaa4b341df7678c2c336bc3f516c28334e1b0038a7b2b3bbbc60b3704dd36ad5368fc421004d339d10dd433022de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b435fb5797c9d5c7d382d549d9dd750e
SHA1b993b8045eb2af88538cd3d16ed900c186f98cab
SHA256aa9a0319fa27596f3c1abba979cf8267d39ea51433969909b7f33846978b09a4
SHA512806d214dd3b76d6dbde3034c5b8137b6d23e11d9dca011926fb24f4e78620011757325b825c65b3b4d4d3fc2b3eb30d8d73f338547af6091ee6df549832aae5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54a90008593d0a0b8fd4bab32a68dc7af
SHA1f77630b6dbcf6b4d8a981307a705d9551acab3e0
SHA25690405b09aaae8abcf11e0ff1cab03ef3f33e39037b6e4e8fc48e4d49999f9b94
SHA512332e92d8ddeeb7ebe47f7ed40698c96d514e51e6e911fd9541be6047280787a9533ba7faf90c571c7c3e498aa7504bdf8c44174c84d07a2993cde8aab4225e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56fa19cf0621849b841d21ac010a77ef0
SHA1ceb5b95d7248102e08b46ac953189e6cd1b8d137
SHA25673dcd00da8615e4bb56001dd94d1ea4cd647ed722c0a52cc7bd604bbe3f753fd
SHA5126acafcef851495d4464de836903c0fd3c96822aa8e1c2fadd11bcb2a4d431f7afe01fd3eb80c4f07e950c1f15c18724cb9ef4e0d1710c2ed9298448c6f48d060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db5e768af946d1b2d64306bb4a72d9db
SHA1e7e1d00bff73ba28c02558c5813c2dcd5866aa4b
SHA256bdae7215026660f933f3883ff063414315f7bddd8c905ced1d0e640d8a19e8b6
SHA512b5e9a82b2f382c20304f2253b918f1abcb1498701d677a9271c2ae4051766136318083bb3d6d3306df066af932777a17a31da5242944868c7b499da71947bd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9cd110d16ee53e62dafe5fa297294b5
SHA1bf7baade72c270a81e6ff0de9568a8d8e5496004
SHA2564f1d27ce5fe01d24e85e3badf6940cab03e251caed5d029d057d02bce88e8b8a
SHA5129a1c0d7e4ada9091eee3a7c5640769c0e53a7c2124735f595bb9f9b221f926a8cdb1743bc4b1b0bd44f8e4a2cea244548c927551f8154264c1e899788c076297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5437e3d5461959bdaf369446a3acdfb86
SHA18db88b0c972de79ae51ba7a3590d897099d5161c
SHA2569c2cbc65a5395b74da1bbb39bbab5abbcc6fb00ed62e3c6c73bae5d8f11c5dac
SHA51281cba939e909ce5e62c7d0b1760825f19da2d9176a54208ca38fa22a67d85f40721015375396408dc0631d49207ae85e58055b48a2a942f883af2c6f9df2275c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c5e3b2c24b0c79653f0de560534913dd
SHA1809998002a02f987b1c9b79883684003f5466fd0
SHA25694a241596ec3b16f83a258419f6433a58b9ca16f8fc4ce01c2cf0b7be53fd38e
SHA512668cd90bd4eb4a0801f34f0005c08461b0cbbcd13d8831ac9f49dc7609960330548691d0d4f6b660d11a64ad006ed0fdb5dca3bf9deb68ed6e76c7fd2431df09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53c6d9fe57ddf9b9c6eb56096e288ab41
SHA1e99481833bb47314ed1e7cef6ee75d7d70b14663
SHA2564e5293e44fc6426c0918e1924172867ded104f124d268c2e6470feabac084e00
SHA5125792043b923f8d2ecdce73e8b8ddee00a8ffbe01aee9a724b63bf49ffd6e65f1b2262b8d6369ab9825e796f1c6a4c73af3c48634e8dbbe15bfcd9126391feeb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5532e86b69c33055bfa4f8de312e4f6c7
SHA145922fc05488a700d78e56f67f1972499e63bbbd
SHA256d07d48ed1602dacb745257f4992061bc6a846b52c237a218294a5d7cad1cf4e9
SHA51299892ea4d37b44c695a92b15d0d57f9457917d439956500014d0d7f81cc641d7ae47238dcaf1102f0a11b8961a014923e7b8f144a9a0a9c0c830d63f09acb921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5379865490ca13013f1a301dae2c053d7
SHA19174f497ae0a6a43eff79679cd0bb121f4ab6f8d
SHA256e05891b5895ad5fce10879dfc91366c73ba35d8a52eca7424181d58b7f4d4ad1
SHA5121edcf10ff58f8198052dab68e1b770c150cf5333392337f5da90a4e6bafa5409630a952aa50d8e05454520c2f6b215197d7b749d16b35b38067ede98398ce5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55802fefd8da1008148cb5fff75686fb1
SHA1326ac28f57788c582c411032ffdb040efde17465
SHA2569b464013b44120f5524dfc8ac78155cc7c48992355b71b153dfee7f4b7c11b8b
SHA5121048e324a09469626e93505729c12d844e2f7b6301b9fd9fae998a820ef04473fe09d6b0160b1cb61838a5a6225eb71f9fcf8aeeca662c582884e81168bf529e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5078df65696a3922688d37a1286e21d69
SHA18199b64026d9b9afd6a0cfb199fea0e4011b8cf8
SHA25689a63ee8781f198f2fb929ce70eacc7e4dc844a5c0e204f5940628c11da01af8
SHA5121d711e4891d30a800ab3fbf056eb0f3fe2d68bc601265c870785515ea98623b85db8ce4335ebf365aae2936f340c80ef633569ba2d0d29a0109fa3f817167df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5927c03553d2d1252cc9252a64d3d3482
SHA1acb00f85b23f953e1a5b383a6dcb961671dca43e
SHA256672b4b90ab87b4e7aa2fd132e4ab83875c84c19b7193c5bdf8933f4228f2512f
SHA512429d6705defe81d1b339c806015a2d536f519c2774a609359838ad2a5006d6bcced108fe1cdf3cbe6ba60815cbef7dcde78dfe2df0eba406a36b7cb6fff318ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52eddccf73308dd155f5fa03d0f865162
SHA1b75c6640f1d20e5b16d3bd852d6da238eca2e9a6
SHA256f4771b8ea682eaa5505421e6d83813f3bd443c0897f914376440effc00986761
SHA51224b6eddf7a9723027f369bd355b5ec4ddf27e8f83b4fc83e2bf2909c5b643ff056410ff038a7910d6cf9bdc052303cd1326b8dfcd9fe0c2c0e811fbfe9e06a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5594b0278e8fab6e8a6e0d3338ef7323b
SHA15947a847bb3e97aec81a76c80a466455c3bfbeb9
SHA256eaabec7e97a219bb1ffbf17e90128952303a30b115f31a21bd0d8e0f9faab25e
SHA51266923439f458cfb7fd4076a6f103b8e23a9c7a70b839e90ff7a8e4eaf01630a1acd006c379bdfa6c34bdbd6dbf899beb17086c62f6b93b28ab202eb83e6defdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f39138f3a342e94dfcd498526a8f40a3
SHA10c8ca039bf3bcc1bcc926c6fa5b68331469dcf9f
SHA2565bf7911f90cc2b5628ff56644d7cca6325e7bfbf690c4734b5261a26c665775e
SHA5128572e21ccf7d3c857e3f4ed8c743e4734bda4e3fd51264467f9b682b3ae0b426ce8dedfbdfa3826240a76c108076c64af65656aa080d411893325e3c85de6428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f6da18a62d11820c0a1d4879637f57be
SHA127e3ccbc9bb01a345f14edd734de02e24fb476f9
SHA2561dac201315dcf2758a887d3ec82fb3898d396e7051bdda1f450eb7d36248b8fb
SHA51298ef7ab404aff3cddcfc654b7c15fc8b3eca0ca3af0e11c3fe28de0188f831fea920f1c015a0e0836edcfa437e12ceab3c283949da9f1d862cdcfee632dc60c4
-
C:\Users\Admin\AppData\Local\Temp\Cab3D03.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3D54.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a