Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
6955bc6578c6ab664a490595bde14eed_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6955bc6578c6ab664a490595bde14eed_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6955bc6578c6ab664a490595bde14eed_JaffaCakes118.html
-
Size
461KB
-
MD5
6955bc6578c6ab664a490595bde14eed
-
SHA1
5e9a7cc3df9e12132e26e91f099b192b584d8d22
-
SHA256
90704aba4a5cb422e9e67665caac5c47faa294f4e764261822f4030492080bd5
-
SHA512
d418ac0ff9e50fd3c6207b17f5c73b7baf449edcb16b5e9ffa2c0bd44e2e37d58fae86be5142947752f486fce0681077dc84b6777f27ca7d7eb1195ce106446d
-
SSDEEP
6144:SJsMYod+X3oI+YJsMYod+X3oI+Y3sMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3P5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31F25EA1-18A6-11EF-84C7-4637C9E50E53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b1577a018e4f53a8f266ea131d82cf351c89cab6eb4bbe33f13323b6a7ba84e8000000000e800000000200002000000067360addd277913b89074e02ecd1006ebbe025db1d756f95a571193785fa42f120000000ab54327f9926f13151eae3a339a7ccbbf584f9507592561c475b8531627f2081400000001bbc7cf297fcff07fbedbc3c0deb0ea1a8d0f441aaa65a0800295629638f1530c8e6af18c28130b316abf46a34c6a41ab77cb0ce112e7e71df4a1216854a4225 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70017f0ab3acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1732 iexplore.exe 1732 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1732 wrote to memory of 2056 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2056 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2056 1732 iexplore.exe IEXPLORE.EXE PID 1732 wrote to memory of 2056 1732 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6955bc6578c6ab664a490595bde14eed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a2084c0e9dc81621d278bbeff76a09
SHA1aef3bf9f647d7d05b7ed24c89fee37bf256ed1fe
SHA256dfaa89be505eb67db2591c13dccc5b115e610d0fe305c3e08d2f2afe96440c88
SHA512f62f4b3eb384d66a63cb1fbc5615a2dcd17fb03aad394aa97a55b5a82229b05b248f2e120b6d82417d79469b2ed3a0f05d42c8ddd5504323f55f24ca7d7a8b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fcd209529c12952edafc4bdc5f5cc0
SHA199d6cb23e08fdb26c368787c0cc2b8c7d5b81af9
SHA2569d2cf643869437faef7a948e9b1795330f8b6c5ae9db40e04aa84d058d51a097
SHA51241cca6c0496817b20ebb0d902117d99db546439e911a4ede39c5dc644e9048e3d194aac443f7c66c59aa0dade89848d40014f489661166c3ceb6e473d9401425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e2863af6f99c83f975b45051e7cd5d6
SHA1a07b45c433d64edeafea80b80e84bb6cc4427068
SHA256585d46e272dcd82b6935eeeabd7862e8619471f65fc2c65c16ec52dd49cca6b1
SHA51265ad630ec27b1cc4b08e6cc088dff152105dd125fa94b7d49ce6dda073ecdeb8cb82b82bef88740cfa28d0d2c962fd86f654849959e3a9c15dd143fc45382fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537cb3a7859068bf53805c52bf2c95b1b
SHA11bc619e7cc93949076dbd3a5682f000fc952a987
SHA256518db8a6ba11d6859fff1d78f852e730973afd4d50cbb8c40ada896b4d44f812
SHA5129c5ec773cf7d115d0438228605c8e6f1ad82fda46db2804a30860aed02eff39b672762215acaed50d279eefbadee10711f91773202fb944b4da2a1ea71617f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58759095b93790ee0d521791d0961f540
SHA14ed959b30fe0658b4ba6b4a5b627cfbfe84aca5b
SHA2562480447b54b5b14b5bda1ea89cc1818edf2ee4a7ba187dec57a2169c8aac78dd
SHA512d31d7d9fdd76ec60daf3bb50548c024b7669c6c34d80165e60b34ce59794b4a2ead0d38bcda185514121d649aa1dfb1acb405cb30c5ec4569f5576ad6601e9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513abf03c8863c00b25d2ea057aaedff6
SHA1a373151a39f502d7b55a7ccda4e38858bc6f7072
SHA256b40785f6991946001f3c9fca1fa6b2d9abbaa50f032c954a1fac2289862a533c
SHA5127277a4b5d6be8eceebb852c7bd7c02bfe234de7bf99d27241adff5d5619756620260787c2a9fe9a5c4689198b6f93f21c470ea8f76ab13e9c8986ad5463980c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56799c94ed0be9166bd3a639ca2e04a52
SHA1fe8e55b930c70ff9bea82ff368c62477ee5cde31
SHA256a280796c38cbcf022cfac3fd957dfce59201212e9875369b7cb2e69a6cd067b4
SHA5126cb5d75577754ffde44f5b87de93d3e7781f378d671ba98bf94dffc4d4427e43a21e5c0b4a2857d2ea64bb295a700e78205e2aa9d5004721cf7bed9e6d201057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757756a818521c4d6cb3ac858f5bbd9a
SHA146163b5b92c24156c90f2b49fe6c5971420d8a42
SHA2563bb62d221a0d84a69c45286a53484b568c8f0d7137cd21f3f8a678fc29a9d534
SHA51287fc1c586bfe3ac6d0716f843d92fb4c1e0f3c474fb18a5be23b275f8747bba9ecc67d1b1d518024e67b00570116a5b7c441dd6c0b1a243e5fa58d41a78c8424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eabfb9885474fa340fd8557b63df534
SHA1be671c6afade3ee05399f76b50660f353964dc8b
SHA2563c73ff982702d3ce7d599271f53c3d0b67bdeea16b7a671dec26d9dc7397b0df
SHA512b0f9226706311d9a30cb339cfac3b0828e2f449c5e3a313d081f26ee1197e3a0d16ff83aef31e82944e6282464c6532a5041b4af7581886cbc565bf78b79c74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8cb07f65c888effbc0a3c410795067
SHA1329bb906212b3288e08c81dbf7deb90f2f765587
SHA2564735455ef1dbf4aabe6626d2b70bf2c98ac9283eb1699e37ea8528bf29ff0565
SHA512d1de7e4476b26aab29ba04db51456f876b29993aee3466a853ab0c6428b9b3be40cde8bbff80820d8acd7f1cb69797512e5c0515f98d745df1984ecab5f3aad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57710e9912a6c390486d331c5fd1aae19
SHA169ac05723037ac38b1f3f7db3dee6db0db673259
SHA2565c3e7ea5a33dcd582a21d3d0139f9b96d5bfd130f8a9785d1b07f270f5ed6db5
SHA512a8a2c169b42be735d1d2c3af8f931bd4be087175abce988682a8901dce6b81e5f51a4abbe180011154280c604446bd654781d8434972cc8d047aa753a3d8ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e90275b455b06d9ec177bb4794566716
SHA1ce30372876be41383ea2214cc92842d069cb7d70
SHA25654f91a9bfab2df0821dd90abbfa68d552fbd18b01b62aa8c746435f06e29d3a3
SHA5129114d1703d2e042c7bf304610cc10c3d3b83eec07c0773755aa314ade4d8acb50948d1cd5e40a8c8c242d7f31a30474942938878412b81ff46c42ed1f42e2611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563794aa58506e3e5cfcde7121518fd4
SHA1fbfa985224019c1bfd0be2032be0ac664eb3acc8
SHA256c8b69621501aa1d0f4e890a883b76dc6bed5c8dc1ced248c72d74a902603e794
SHA51287ae3c574ce45088918b8caa4d93286a408f7ade87088be2791a80bc19981932da105fb7b882dc85735d3b5ede6b7a172de5890100da07fcdfb3b303f9c8bc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef55bb2027fb0e23234b497452eb96d
SHA1d6661ecff177fa1889cc14a8dd39689f2bfcb149
SHA256bd14e68431f042bc92fa251d2e68354cb1d82dafc8ff2b9cb7c5400470952c4a
SHA5128a2ce175146ff7941bace503a633356413c0fed56491a45c075bdb8d39f0027ce9fd218c41d3c886ae327340e3a0bfea1aa7999e3ac085b817607970365000cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6207194aff1841830dc4526edf2f10
SHA1c65443bfc037f59717ab7c6786dd3376dc6af324
SHA256e3386b9ee4ddd5553ffcf2e6658fa10e61529b4b6f4e780275214ecdda81dda0
SHA512af8ea93880b911650e0e87556e4b8677b26765fb63c9ac52511d9d2c2b960b0f53e4624b36a76e58853eefdfee1eb56615f38a29be00778fb50df341925e5445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962da7f7b8fb2fc8dc7fca06fe2a01f4
SHA1c5a3504af9dd4fc61dd80da2dc0753ec97cfb920
SHA2569f567f4dd06430263967680b18c565f91f84d096201f97ac1185391f347db1a5
SHA5122c2391334541d29efc7ac2d187477c4a68d22001e68c31b884eb5033ddee9d703f580f74262c12e0f8d246c439dc2f56d35de5f89ab9f107fd57e8613bd52e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c4210b8fd3cae2eb6d728c389df88e
SHA1fdcb091b59b23cb682e29513214d55e2a08e475c
SHA256c890215e38894cc88d945517aa2d8abe66b6d235010d583268ed462d6608573d
SHA5123da4ad5691bd7171637add3ff8712f5d5d02c840a4b2069b32c4e94af60c3e0810501a90d79ae9c9233a2d7ad7be47b5d5be5d0ec580f9afe20de670bd1fef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a354ed6a8fd08294fc3acce41d77eb1
SHA12e93bac56bad24e374b6d94c7722140be239c1a4
SHA256e366bc62be23f1617656d17b8ab50b29196930ecfaff5ed0a968092010b00e21
SHA51238279fd317b81d0a1669404692c57e91826abea3f08c7b26d531bc85fc407749a434e2e6a6162c034e3c935875e58be74ebfa2e4b110588a65697755a98495bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad2c71bd3d5e06ddaf539bff34a123d8
SHA1eb023aad964ff4ea8b8bcdde999d25c2e7d0ad58
SHA256eea2f28fd2556b9617a7498b2c413e0764d70f2df0b678cccaafd685ff39ba71
SHA5128b785118d3f1233abbd313f37d867d9f0799ad030ea55e1fc051d7fd33f72b7f152e1b78a43b8fb77f148beb94ff51e76e15d333e3541ecffaf24f93d9705950
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a