Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
6951a71597fad9746d0e22d2cccc62d9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6951a71597fad9746d0e22d2cccc62d9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6951a71597fad9746d0e22d2cccc62d9_JaffaCakes118.html
-
Size
461KB
-
MD5
6951a71597fad9746d0e22d2cccc62d9
-
SHA1
767af9695a9920d9a27f7472ea0994b29c080f58
-
SHA256
a7c2389146a9e809aec16ea0141eadb7601e51912d2d3f868172cb2b888dbac9
-
SHA512
58ada8d42a6e40d54126702d5da1601fa8304bee36cb0f0a873ae46a827f623b5cd992703deb0dabfba8183c537b40ac662ce0cd1090f8a1b6f3092f619add3c
-
SSDEEP
6144:S5sMYod+X3oI+YZsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3z5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{310B2861-18A5-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10848109b2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000901b02b1d75ac2418f57044d0a01876f00000000020000000000106600000001000020000000ae763ad4d70708e7d2d121992344d31b1a5e1ff056d9c3713e4b4016d7f0cbd4000000000e8000000002000020000000f884cdb7d60e813fa9d98f5b56f210c78a670571d6cae163355b58c204c5444b2000000002e43e4cfa9c9c8d86fbee080e009a0cff60b51b91ee5fc79766a179fe605081400000002cf4b782ef4a6cd0ce8f3c805967903263a7552df66c448d8416655b57db081395e72f27bebbbac108f607effa29a5506a45c84df0669521876db687191a79e4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1864 iexplore.exe 1864 iexplore.exe 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1864 wrote to memory of 1300 1864 iexplore.exe IEXPLORE.EXE PID 1864 wrote to memory of 1300 1864 iexplore.exe IEXPLORE.EXE PID 1864 wrote to memory of 1300 1864 iexplore.exe IEXPLORE.EXE PID 1864 wrote to memory of 1300 1864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6951a71597fad9746d0e22d2cccc62d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc50b9881e479b073a3303ba7e02327
SHA157960bd3da53b4756b83849d5c912b37df5d3eda
SHA256d2542aae86ec3f77889d4da52a1131dc9cf4edbd7fac62d2775956bfd3ded707
SHA512331cdc2e2a57cb05d819977ab3165ffa72fcc15fe32227e36a9d0f3a6cc8040015c3616a198a1ca407182700d75659f1884b1c17bcd05a37ad4b29f5c66d3fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53c9ad61b226a7aab408a49009096ac
SHA1a47a05b0164db13f8893f9b5df0340a964f06c28
SHA25602701b2d3a4124e92ae15af1895126aa527e123d60fdaa88e7c3b2a4dcc16dd3
SHA51295880bc9559fbb27a959c39210a94ca194f2409163d676ed12013edbaa6744b01663e9689297e9f4a7c308d10db83f1a7773250eb624be62990572a9a5aa9b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da10d2146b6672ea9e305d09077e8d20
SHA1e666f75813d80488317fd1c463b6253807314921
SHA2566d026f3ed467a3bfb9bbb313fd73c879108b71bf53af1362ef9af0740c6c1316
SHA512e30d0d9f39d7c6fcbf10f38a2f936236c8077107b3a79e142d91b857611f590c7aad624ce61d65c5ae43ff3f115ef34e7533d7d6847e02190843743f408d56e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8bb79cb3c76c6db439c89db23af58b
SHA1f3c0c463289ff15c79c0dd530b4945c1bbbce140
SHA256babe385ff9f747b085d8136cc966aab994520dd6b7b6aebeb0d2640a255331ba
SHA512991ded4010bd6b1efaeb6d727bff6dd3f754f4384e9441141c7e8ef3e0c2849a88ee75b8be1172694469043a1c10fb5124af8af494f94823d85c546bab150d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac950d3c23fd007fe788befa1f23c0f
SHA16c437dc0b99d2faaced10ff558c1a4e11d5d48d7
SHA256167c10b18ec611f26457e957be747e5e02f50d212094cf88bff8d3c17203e33c
SHA5123d042d12d1045eb0518e3fb1afb1d2759c9f63e76f68c646cc092791cd0def39bd72cf3b5c0c63cfc62aa314d2a4fffa4149d07fd67161f14cd23469d468bd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ed99ea35f76ae741c0e695a0b532c9
SHA16f38258a1ba5693de6bdebd0998a5aae621fbe41
SHA25609d7022686dd962da3a0c4abad283ffc5f62b5fa002ef9f7403a58a1d217fdce
SHA512c9c1ffb3dc86b5e98afd4c976e8b6c9975e32b05a30e4a1bc5eff830b94bd9175153e80c3b09ccedc4338b1d9b1d574c8c0f8b7c3de40edb231fa699d4dbf0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b28f33cbb2d74a658082cb567c2545c
SHA17de884c156cf35696f6f40860114ff772bd5970c
SHA2562165141500969f035c708a0370e60c35a61b1161f363af0ac4c4a8631895fd2d
SHA5127bbcfe76587d57c235333bc01dc31c0aeb15b7003bf0173c158fe59a4afd1debf12e6e9149b02e36641e2719ddffdff9121aeeba087e85f7f192f7649a6ddf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b575377c9d289077e54608eceadda4e3
SHA196df20ea288d21e61bfa4e7b54b7d6fd232a866c
SHA25652335c9f2899645115b38eaf87fed15b4c860a82d780676d63a0dfbe6a0d408f
SHA512349feda1a7758244d8c429b60a034f63d9f5df9c86d0d2b5f08c85c492d6f1363f987ba651e2ef57065cb2ceffb1c6e4de979d597f4938cdee10324637b034ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1db32485c8c0a939e9411851947646b
SHA18e52b41585c255906101b1fa2368770847cb7d7f
SHA2567c09b38e1b59207a2f27e1404bae479fb6b3bd573292a4ebf692522c2fd89e83
SHA51256d7146a5a84776c6118ec2f601252eb82fe0763558412c65a0ad9d6771ea4eb214e8171c4c4eb6f3a15c488ad890c1140f4581da148a6a23f2b2d1a5738dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c259560a2183a0db58d6bdb2141046e
SHA1518361d75150ac57e0b7c628d391a072b96de225
SHA2567ec27d30eb135e9051b9bfc0d11ed0d6916a0f6bef009b7e9c51b9d3846424d7
SHA512f28e3ca8881a62f286adb86e39a93f449befc9ca57f91b0332434ff4c2c7dc9d32fce4d7f332fb1f7ff1ff6b1c604b487facba7021363b4d255073992740462f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca7d85ec64370338b51d7e069a52d86
SHA1283f38372a795ead57947713edcebd0c1b7ac9fc
SHA256209b99a7f561cbcb3e4ee0403843dad196e9ba7a896388947a8a6bbf2a5748ba
SHA512f952b1d7380d82c4949a395737f2bbbdf13244762ebdf101d8661c261694e15dcdb9eab0025dd91c8e41c8c165b48aba56cf41e037befff7f21b7ba307f3a985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ecd1fdcf8ae184010b9769c9b877085
SHA1cf9d4eb0966545a8883c9b8ad4facc6398601277
SHA256203316e26578fb2e86b33600d82f2725484f4380441d28a9808c2e5d33534bae
SHA5123d42188bc62fc16f5f8eb461188d104128b36307d3bd5beafed4f89aa9ab697644912a961573c21067c9c73e213138d72b6fbea3ed6bec6ffc7600a8d9264318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c94584406c4dc14db66ccf1e5bbb001
SHA112a450455106e6b0a38f9317f1aeda0d14b2cd7e
SHA25624a2e05b3e3f6ea3a19949dc17b9db4c067fe5583d3af1bdd97d5cf0c62bdf39
SHA512edf3bee1a33b40572e9cf9941142615cb5b6090124f725fa2e3fbf3be1d83f6f73d9bd1600df768a29cc342879d598cbb2edfe19e94b08cb38a273b16c977f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8d98e7f72cfa4e9641d9fb4861f9f0
SHA1118d5df0bbbcc1059e7d9027afbb9f293bd5808b
SHA2566d50649e0987d5c9a144dbed739cc35db6e2fbb069ba79f6b83281aebbdd4875
SHA51233936bb781d5b5969297ba29764ae973544c7a3fc9b7b0357ddd957a30668d67704504241a3716cde975a583b4c21a2deb86fc7bc0503297924c3cc615b35e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56f21b67e294eabac9bccdf407f5e2d
SHA191adf994378623370d983ada4dc49540bd34146b
SHA2568675c616851e01febf3ff56546c4407a69180034d4c4a0951f3e18fdb93efef2
SHA51228c445f9ea6865583fdf129e9d5dc1514dd1f7f2682c187c6875ead812e67d3115a33621aadc4f56d5fe6a2d94416bbad2162597f326edd9954351a097dce0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f7b5a382340e86719d28946ff750cf
SHA13d09125f00815bfccaefc51a19cb48527f0a1679
SHA256cc081665d33edb4ef790721a234e20ff90bd36bf0918dd8742cc6bb0b51d317b
SHA512e67751a5edaee06595e39c5e21be69af68a1ba9e8f3f15c07171a953217e88f495819a5e78ca1cbc8692a873fca1f4194a824cd8c11cff19f3f36500d781bfef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c708f7d8495deb1cee014cf7a2f4af65
SHA1c73a17b8dbd6cf293642b9af8c5db5a72b15c960
SHA256370449663dc2d574a8e4dd0421491835cbe275ba71ea73e421574d870110a522
SHA5123ef3d260f7f8127a8e40a489669511d14c68fe582e48e1b4fe7aad59bdb01f4aa82acaee7931dde97d7c9dc5e61275eef9daa027870b6b32362b02a9489b7857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc47042f55732b5b4fc7e55d185ed028
SHA156845c943af433eb7ae9d991b272441ce3626ebd
SHA25654fdf8f9d013d5490655ad2d0bb63c63b28b259119728018ca58b37ba81192b5
SHA512e14340975a8fb0bb11433fabb1d1313290b3d533afe879ac713bb7d1ea11fdaf9434708495bcbd1fb644ac5dc8e77be5f0285a84ec0f53632ac5b61daf600719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571dbb414fda7442023b34fb1498fbb1d
SHA10d2996d5c7b980ea093a913c7634120862e66cf5
SHA25677043cbfd6e14fb1c0f74b230376ba41c91a580bd9c8a6e95091e5b7d344e050
SHA512181276edb44925b1be210e950b4c41e166e1ce7f08fb9fc992b88e3abaf99b68dfb5c443cc2982c3642cd25679520ee4a7735734f260e4a6656781a1e705e884
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a