Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
6950d9757db82d26f238d36339ea8a66_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6950d9757db82d26f238d36339ea8a66_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6950d9757db82d26f238d36339ea8a66_JaffaCakes118.html
-
Size
6KB
-
MD5
6950d9757db82d26f238d36339ea8a66
-
SHA1
443f0e8ebacc6b98562d52be6efdbe111077ff13
-
SHA256
4a9a4e3e6c1c5508e8a7e91a461cd2a93fa50afe212e8fbdcba9476b84693f04
-
SHA512
eb48a2bc125e5cb4286861e6e8913aecbee0c41c2aa0fe7e56849eb49e9d5f6f4e1fa3433863fc9611682e449b1d1ccdd820202adcd34238ed40678ad9d823fc
-
SSDEEP
96:0hM3sHfAisRiFsn5988yZIhQd1WNmNGFWhWJFcIH:0hM32IkosZIQdwNUGFWoX
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01e94ecb1acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000032fa849e8646a248b34a753bee656a1c00000000020000000000106600000001000020000000f0ffe769c677b683ec5d7846ab3ff2bcbfef22ed44731c5eb1004b7c145163cd000000000e800000000200002000000033a8d23a3c243692cbd82ea7c1bfa4d96cae1a56931bf99f290e5b6ad7e02fd1200000003bffb5e57ceaa8ddac80f6c9915ce6c67ff92cb2ce2e29b64fcde8e96575a7cc4000000089cb0e7f45259be006c3b4a210440759e329afcfdbf91e2a58756a9d75067b4258bc12f8f49cddd5974e2a01bbe03abd13651a250d8400a1584ccc06a8a2329d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000032fa849e8646a248b34a753bee656a1c00000000020000000000106600000001000020000000de8f0b5b98432d9914a1ac88dd2832744b6c8b8f2ba49b5f09e8373bcbfc3583000000000e8000000002000020000000cb1d90b0eb7e4fd74a29368b31b05daba89b49e899556381e90f58d08ee0d430900000009fdb777da5088ce9e6dd1a49e3cd3b75c8f2745c1e13ebef9e4b665e3bc9b1133abf883ea139e596065e5be8f8cdf6b7beba398c81462b0769a3c7171ee7b6dfb6ebf18efeb09b2a769450938d6d6fc56e64d671ba5b059cd3f2ff5291ffd82be10b839a26b136a3c870d06590571a23dbd039c69df5d1ffad009034cff2fea3e73f27136de2aa2440be966689f3c5c340000000cd2a361dd93bbf44529a734e248e2789bab999509ef9e18cb28555df9a453aa6434990524e0de7bf56164cc34f0ec6128151b8fb03b21915b0a4afe7aafe57b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18053681-18A5-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1744 iexplore.exe 1744 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1744 wrote to memory of 3000 1744 iexplore.exe IEXPLORE.EXE PID 1744 wrote to memory of 3000 1744 iexplore.exe IEXPLORE.EXE PID 1744 wrote to memory of 3000 1744 iexplore.exe IEXPLORE.EXE PID 1744 wrote to memory of 3000 1744 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6950d9757db82d26f238d36339ea8a66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c801172baca85783a99687e01405478
SHA16f7997ce3875d5837114d89dd2e05623abf755c6
SHA2566185b6830e9ce8c08a604923dca48f6aca0c43a30ff5068826bde940578e01ff
SHA5122032705e3ee0c34344cd34113bbd9f916624c0b59fa442f975951549932e1dd8ded3785b30c16a470f3639334b560f8dcf12005786662d7a9f3d931ccaf52ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de817c05bc5043cc9a92574575461180
SHA14eaf3ccf44579eafbce48661bae58e5fe75336d7
SHA256705f77f7db9337b2a7dc75076eb68f185e3f4e4debbd72475a10b8eba0a78217
SHA5122ec171dbc3d8aa5211144bcb02ccef49b15c230bb5a2489654a5872e54c22ae3920c0c939ac3f847717971177c66e07a78208c6180ae73a4214045d20828f6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6f519c36a5078b035955ffad1bef5b
SHA129e6a0a69d6114940eeb4266857d23b68b2282e2
SHA256fe6f19f9067f25bdb7c8651dbaeb01b8cf8f744d8934f3e39165ed02c627c895
SHA5123ecb0c083c7ce03c2f8b552111068d2c0d1ccd727bd49d412e32b05f910e1a287bcb9bf73a28722b2691ea1e518c57b069ed8488b1454833f165a8dd3ce5a8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b051aa51139dd1ae0f1ab3bb880a23
SHA16a0e435d7e591e17a7e2c6bf0217c480673c728c
SHA256a24f370e87bbe1c2fffcc58061720e9471e95ced2a7d33678c392749581a9d55
SHA5124910c93eed90d13585356148e259341f51ff62e4daddcaea2358582f0a66bd7c5bfb5df2a0c8f2f5a1ef9e279237cb8374343cc87ce0d2b1590c003e25fe3b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c01139032064eb90923557534e25ccf
SHA13be056b1f0ec7520f5e1fbca982dc3a7c1c16c11
SHA256c52bcf4893f9b76db0cc0338bda7bfa0854651fac2e5fe036388e52a392a9d79
SHA512ba191b5c44f72ef11b46d14708189987f3d0b7fc007e0eac880dc28741290ec784edee6a9da0ce131d2503dae0dba5f6ec457e4512a7b94bdb74ebdf75b318f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3486511a43e605f3f44af721b25445
SHA1f24702243e1d6c58769a92f0d22d06c858b2e545
SHA256fe3879bac6b18ef94b12fc6d0cc78cdf677e11f39847e2113abea494cbe1ded5
SHA5125a42dc309bff05048878bf3863604581526150acf4b8198555151022d7f7edde29854e99db698911b270c43b9fbeba7a890f17a7028e90f94a3960d0e76fec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2deb3e826faa7640691d7c076979abe
SHA1a991003e49830cc56a6a980abf026c1e27c6c529
SHA25696b5437bf39affe7545f62440bb98de4bc74c423ff97b53e17ba5b54746395fb
SHA51288bc43adc0a8f59bd7c0212481c09771a1ade52b974f9a1e3382ae4590b329de3bc76f7ae85dd7a9300876106f395148438a68ca77a8ad9a463216a1f923545e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e232f37e726416577652cfc447228e79
SHA13d764fbfac7d1a53f874bb0680e71bcfc2ffd047
SHA256ae8f85b87b5d5379588335251d69872a2d1dd432d1fa26bebcee14fef2589461
SHA512b98d42f6d6b955332c1b5c4060460ae5ca673a1d0d0c379886ae786dae0a2771070ddb06e1951f567b7929a20fba525863fe9170b703f774cfb7decc2484f2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cebe6da344ffa37dbbf3c9e737863b5d
SHA1fbe9e2892f0b21080a98ad891b52c9042825d563
SHA256d181077d13eaa887af758b09f10919b0a0445c89fe579b3f03426cab755dc1af
SHA512e1efdcb28dd8d90d83e146ae6b2b9e1089628f9bdd63ff8b0f5cf1df05358fb7615c52e92e4f2401ff0bfd3bd37188da54f0a45715ba27d8bd941955070701d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81998b12e53ba0bf32232347831a434
SHA194183166af03809984cab40f148ec4350511aa8e
SHA2564b3b9c819cdd53bc858ad206aae63483be789aa982f0794b49bebd9069711d4d
SHA5128eefdabd59fc8a62879b20914e948291f607268ea32e8c27ece81c20ac8a41fc8e767320a812efa47449a96c1e224c117b134d465a49e7ee67c538bf07b5e9f8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a