Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
6951af3e374e06e3e8c201847cb6e5fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6951af3e374e06e3e8c201847cb6e5fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6951af3e374e06e3e8c201847cb6e5fc_JaffaCakes118.html
-
Size
36KB
-
MD5
6951af3e374e06e3e8c201847cb6e5fc
-
SHA1
b041c4502cc76ef8f4462289ea1c857a19ebd05a
-
SHA256
7337180956ce722a6b70a61660599c2ed9b6e79fd6e991dacb805a16c5a34497
-
SHA512
3babf81ae10514e4c8cd34f9092d9a1c9496618a45c89e81ec1d1cb0df994751ef2d87fc35970bc995849de8682664a181cb87d0cc0a643fbd42447d837fcced
-
SSDEEP
768:zwx/MDTHYC88hAREZPXLE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6Tbii6eGx6OxJy6o:Q/PbJxNVAu6SQ/C8oK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A653B31-18A5-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b7ec2870fc4ed49be511cbcc3f05aa100000000020000000000106600000001000020000000e9a10a721b869e5405f2203a9909c855b8978c1abba2301c4e80ec6dbf2c7ff1000000000e8000000002000020000000415d58ee1456238415fa93cbac07015b975eb91ae93fcd34a97f7d018ecbba4e2000000028e364f09810571e2697cf82f276a0222c1b1dcad9424264aed9262a37a56e6040000000415ef532fb859aed801699228d3628c2494ab0aa21addd6398ff142145ba0a05b655b4b2511d866a935d0597c5f1ae506b40fce3bf94786555c17e5a46d662ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c0b413b2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590210" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2648 iexplore.exe 2648 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2648 wrote to memory of 3016 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3016 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3016 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3016 2648 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6951af3e374e06e3e8c201847cb6e5fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD564c143e9f2a438ddf74501d3b3cc54bf
SHA166b41aabcaa5c364d405c858b85fa7a995f53c72
SHA25602802fa86c2539668fb375ddf8b3ffa5a6c7ad8ae0050c3471dc9fca1275c0ca
SHA5129decfe443630833dfc6c4e2b728c0395d0cbd59a5d868639f300244c4c61df6540b21d33497a8dd4e1947aaef02e4cbc815f53acc21d70ba1653d9492f438e96
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56c8c453564e1b0b93e5c960540609b66
SHA15c75126e557e4a18f2cdb779d16a4209ae75d383
SHA256b28dd6c54fbf27b92152eab7c08a8eac32cf8f186dbf23af82c044fadefd7140
SHA512c8ad2b69b9ba5e1db990d57d077107c108f66671f9222b526c767b48749bf76a94692b715ceaa274d0aa65ea32c569333670ace65ce7631fe1235e4ce4eddb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ade7a329b45206e941bbe792f9490b
SHA1dfeb0e1fd39070eb0497994069191c2fa8f78ca7
SHA2560318afe4a77220aa759f1af20f0ad47bf0a8ebc917329e342b9cf0c17ee62f95
SHA512e29f611cba5c5a882fae2e79aae34e9e0fba53ce680201a22eb76a1eb93fbd4a6f5f21aec8f54ef676293099d10300355fab7c29fe3aaf3f44e9bfaf9dddc02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bc6d27ee43ff45594d2519beecf213
SHA1e391153c145a2da8e17f07bb337ea8cad5bb84bd
SHA2563b301ba71ea222f8c115a6734c4d14013c8d992757ac7412c4ff11bc17ce2808
SHA5120fd921876287461ae4f1ebddfb05fa5a059110f6c95148b5dbda440baeeac01a92645952fddf18fc20eabcaed7d5dc12a50288aade884ff865a90eb76054171f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b026231831b6128affba871dad33704
SHA178fb6344a7ecb66ac28897edb9fc7c78dbd4f4ed
SHA25635bc0518d0271ab69f030c327d6bab67c7ee58b55be926235598dba04c3fff2a
SHA512d17ec59bffdf4fdeaa9cbfc3d7e63fdc1d8d062d85ca5eafb4e48a299a68a3d743bafa7be4b31988d3bb17658ab52da615c65b4df884bda6b5c21152f559baec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e2080f5858103346702f6b650ce09f
SHA13524b46e6e2dd841c77d8eb25f84912ad8e5b457
SHA25658a01dc8f95e186b1dada44a261b14144825b86938ec0cf8daf287089fd7f3a2
SHA5124769a244ea35da5b723b92337f2d0dda69e1696fb8e6a7665ab979a79a94bc65abb8b140ccfa4c38dab1eb90d2ca9934c09ee9995572b087e95ebdeb86c327a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584cc6ead5d3bebb40c16f2407be9fc6c
SHA1df2e511730a42393947a1451e23677dc0d69188c
SHA2568c4a6af90e3646716da10d86de1f0112f2c48f4de5ba6fc81b828faf60b122c5
SHA51290affbbef29101f611a8b16f89854936ed337cf2c2f56fb42f8e9e9ff8b104a7117082eebacd5d25f1c4f2949ca9347ca74eb1e53771bfcef0d9d0f7c2bad8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc4ed27c118403440c9b9a87eaa93bc
SHA1308dab4e59568c9b4d41f474750e59ebaa67747f
SHA256abb32d9cfc8f4dbd345894b253a3753c69a29332abe35766d1e82ae13ed24b1d
SHA5125ce9bfa5d9c6d7bd7122cba4adfae523df4a39b88e2c2991fb1dce3c836a9c076c67a058d189e9604e792404a7df245f0ded98d6b2e5649c7f5a874ddd256af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc19398c2bc35fa2bc2fff12e833023
SHA13646b9d229b3b749755f16ce240df11d4210beb2
SHA256e94a5c14294f2e3ce2ee5c181a7b06871e5c7c667c176c998be97743626cbdb0
SHA5127bbb7f6ef28d18bfe17b5a081cd907ac793591d448b020ce6f7b4ce911a54af58d7ec2123a37785042e585e2be5d82c0aecf3a3cfd65ab5d39c0db70b3ddf159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b28853e95ad42ff2d1c59b355aeef3aa
SHA1215b2513bc45d2ebda26b1b0199e218d4931be33
SHA256372ed9dfd7c3cb610a6ecc7cfa1ed62462789ef586232960173c21b9ef2b34db
SHA512cab176bf2f8e6cd98d0bdea3bcf07800c14faf431af7278b4379b61d6e81455bbcdba77a164bf5b038a5f8615f5de3451170da963f1e540891fde7ebc33e43a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ed4f3444f8bcd754658ec3fe84d6b0
SHA1e351adff49ec268b5f6bb92568fef87e607ae997
SHA2566f3fe6e35bfa91a183daacc1b0655ada33bd6603648f5a053615be9ce58f7ad6
SHA5125be5b9d66f2e66d212e2250835aadebbf32967427d11c0bf707cb3e945c5f69428ee8ffbc47ce3dfff63fc761406d76979216945b06fa78cb8c2b91783704201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bec7c77fbf0af9edcbc44d75210044b
SHA1608f96d8e3199daaad673684bf9621bee565146d
SHA25631e483bd4dc05c375d9de1c21282d3e3a49d5f805bcc09c21b7e4b77f2b94aca
SHA5123f47f10ac55a6b24a225d7246dabefd7916a17fbaa941ea6dc20068bb45d3fc726927be36f16ca53f205666d666827dab626440c299df3bf87df2bd7af402255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a79390b864df8e3f5da7f275500b3a9
SHA11bd53e6d8a81def0ba355e27511602f272393842
SHA25634b3cbdcbd6c3aaa06930e201d576f7095ec48d1c2dd4317f327cc7c3b0c1e6a
SHA512cc0d26d2a208f74fa9954954dc09bc2d7498d14c66edc03d05a5afcb087928cb694e8c95e4990a4248f7e6ba494dbeb90f3b62aeaa88a3407f6f8dbc0656375d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1059c62d23eb7e9ee8cc5b9d9a109bc
SHA1f2b6d727d35bc53d6b5f194a7adb0db5d2a638d6
SHA256223334ee2b5fc22e11c647e5bd89d4055e4fa156315585e6bdb1fcab395f7526
SHA512d12ff50553aff0c30a09be0e441537d526b8e52f5296ffe9acdbdb43be56dcc950508ad7d64850ec52af02e22ac5b608584efd7b01807c305eedc4fa3a8cf03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bd9b1bab1d7a067116243682a63dc4f4
SHA12fef9f91cdb10689caad016f5e05fd00e7e6cdd1
SHA2564b426abbb19e2c23da449b6b024b0d33d2159bde2c3ce91b4d67f6515e0cabde
SHA5128a5a348a6ff44d599ebc6934e635cb222afbfad77f74918d387df6df0403045ccc651bab3208b918580da2ebdf2b39fedb5f26bf63dcb8ffde46f6bb5af5a190
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\6128162e0ab80b6aaefd01d25ec9fefe[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a