Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
6949b99db992b675fe68b01f7fb51136_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6949b99db992b675fe68b01f7fb51136_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6949b99db992b675fe68b01f7fb51136_JaffaCakes118.html
-
Size
4KB
-
MD5
6949b99db992b675fe68b01f7fb51136
-
SHA1
5110dde3253ae6d63d9bb8b80b166d8ac7c56e2e
-
SHA256
6e028343b0cc1eda707ab4f87d200f1cc4ceaf81496432edb356598fc6bfa64f
-
SHA512
0f0ce2e7803ddeb6dc8c0df01f3e6c49792ba6d0534520a593330b169da0e03ee33864a408f3edbc40cc9c9113b0ab41bdcd2c9ab75c83e168f2c9ce07de3def
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oBdd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEFCF961-18A3-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06f59a3b0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbc71463ffc62a4ca188ea493ad4b0f4000000000200000000001066000000010000200000008b370e003ef927a86078066db6a18cc172c56637c2f85fdf71bfdca38f21b57d000000000e8000000002000020000000919c4c180e469a2638778ed660a6b6e4d65cab912eb1e12ba1d8592060bd46072000000001a100b2d57ed00b7570a35943f2a77283c4a4d45b3c6c062bf224d4fb159e0040000000159a42e9983b9f2e2965fde4627ee8fdba4331a6dbaa6b7ed6ebbf29477779b31e8662d53d7a9c87501aadde28913a7cc82969e4a521b529342b0a490e9c3d67 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1964 iexplore.exe 1964 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1964 wrote to memory of 2080 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2080 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2080 1964 iexplore.exe IEXPLORE.EXE PID 1964 wrote to memory of 2080 1964 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6949b99db992b675fe68b01f7fb51136_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787b5a4ef19b04c70dacd04d0ffe77cc
SHA1fcb21082678f053060990dcdf5ef0842dfc5567c
SHA2568ef36d5ab6e36dea92072559a58d900f277b7670d709c5575d3a70b06ecbcef6
SHA512ca486b13f67ce19e2fc8b8099a62838b26be1d5bef72553d0eff5dddf3222350bc5af92262db08ae1948ba823a6de45cb60eaaace9c64118b6256adce102f0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a91372752f79a4f026e4d964bbaf231
SHA157a8f1329a106cc80727485e382490eec33eb3d2
SHA25689b7ec01ca9a36e59b91adeeb517da9540ef0d1fd17a6385dc23417e20bd235c
SHA512338d450ba9c5ceddb759119fe6a4fbb7c4cf745669ed571aa420c50141178fbfa2738dd901113e1e681e26c534f15d4939959069707a46264607fbd773836cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e05f615d7405af3ec741ce5dd7e6ed0
SHA11771746fe65477f40b87424e8ec99d357aa5b44d
SHA2566f35fca71e377bc2872c8ad4c6d341c847a83ffac97387b0668533781b4682dd
SHA512936d35e7c3b444051eb216b3be3c2e6cc2cc68899f3ca4bff7a7c0c8d8f2e8cbf0f088f52ad1f3218f0d88da3b4e20c97e678c45aaba8e321890270eb1a076c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6829f30b99a89f04c36723db2e4c32
SHA1ff3b534d2e376a6f54a41b95f047b8623ed0f69b
SHA256480f3ddb6df485c8b911023cbb13c0e249599d77eb6cd0e544ce72ab1d0d9037
SHA5120f4302d3b00aa01286673703ffb434fac8c09fb6de43efdecf89dce315524fdeaad81d5b9fa42772b0f2d3ae1957f2f8bf89d0cddacb9d72fceb2cab8b35687d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05c7c70add442e88978eca0c1b93bac
SHA164a115059e0cdf38a8e2678b58b3ffea3f828215
SHA256dc1fb99a0ebeb720c52e736868e9ac47d0cdb34692ca374e4df74e61d77c23a6
SHA5125814473ba344520d63b5dee77a857e24dd9b6ada40f604cb87e9f820aa4e95a2be89fd276120008b5c7907173d3b62221a7bcc19920f04e0620d73cef08569b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679db91585dddb7ebc0b05a92ef79ec9
SHA1369aa84aa0a73c5018df9bee97e83efd3a14e8da
SHA2567d377ad20c70d36ffe4a0eb9b8fa3ade3acb586bab55cae2fbfc62f41105019a
SHA51276ee2065dfed5efcafe8ccb4afd410621d15fc36faed70b6ff895c32f34007fcde2d7d49aaf0b56c3b5e66c8d82dc17a20459dab21b66b7286de973525735740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57074030322fdb23bfe8ab49b06d4bb67
SHA1b7735463d16dcde6c3541a122ac5c1b299beafdd
SHA256932cbdb6eb77839de30ea9adbc3bf2399fe4de0ec0dd34b96cf2f79de4e501ff
SHA512ebbb739d6d9d179d9f7bd580c54619ac95ca9b93c1f57213fd5b1de50524582cbd8f2e16f0bef0de6d81e1d4f0ea37417530d6e5e1cf5f7fc1f3568c9fc95f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56865631c517bbb76f989f227dace6dc4
SHA17808ad8d7d24f80658ab1e20c40436353bd1d910
SHA256e6c4cc6341bd01c08cd428975b58fd6f0bb6205decdd50109e1eb26537b851d3
SHA512f90b8a965389a7bdccdfc0555c4b394c326b62a816a54cb5a4c3b00ed71a998f0da0e9f77c30f9c8d38f2a9043550bda1af4fc82d2c6ef896a1b922299d8eae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f722dc5b469a1bcff57fd835f680cc5e
SHA13d3161f47d9cfc43b5e477decbb8376c049341a4
SHA2564228625f04a1e9042c867edcbdbffec3b7cc9bcc36dfa903ef304e77ac3490fc
SHA5123d6b961ad483308aa79350c5669cf1d886a20106ae9027f39de37fb454302301884a91104a5142644d40e34e268d4ed64e0404e6687e14bc6c7a95effd613be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5828502a03c83de02bd4dc07f773ce2fc
SHA107c14cfb63682a391ff4af0b96b7a869a96cae73
SHA2562e9380d84e310027ea67c88a870a4f7b24183cca0b5d3028c6e4079bfc3900b3
SHA512a9ed5aa4cd49f395119c80d9acae8ecf387a23854cc51ae869a8b125a6abc6e904f7f7ba0b5dd6c56a659edd2afc45040d29688dc735f0c3f98317322812d0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb57a34e15bc0de4a2b56472e8f90c2
SHA1faa815d8e9780eb8c3afd5085a898fc5451dbd7c
SHA2566f02efc0ec44f86881016453c68e481b5eb86e4d0f184652bab99e9d4fd98db8
SHA51291603eaecce96abb13c5e2da6fa17bf67f11ffb71a4a225ba9748e587e3cacd3c075d23fb90c1c40f35c34438585501249ac5c95fae34235e7c151c68148daf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75f82aee115388e332cee0bed83b9ab
SHA157dab310bfa65e2586df5c751cd3d2f2c2c2e42f
SHA256345303ff273a41c9c47abdd8354ac0f80f3936eead800f869382386db28d881b
SHA512069f78c666eea1051d0770810fd283401ee3c110ded3073f60fec422519f74aba51aab4472fea493d414813dae8a1d770a6fde2028c950574e7b2065fc4b1209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f0ca7af7b361187544c1f38ca38fc6
SHA18c2020bd4d62ad66463a7f0d6889ba3d5828614b
SHA2566fff121fd980f563b3ec59b6a88ace2742744bd56ec284e0443c99b16397d6fe
SHA512ff1e021410544acade6b55279fd031eeba5323fbb17e4a0e9743052f07c72e3901f8a7744aae0d283b27eaedcfe34fad7b0fd4f3df9db0b1c44c764e98702aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ccd107df34cc57a584c2266dce1edf2
SHA1b4e514528e56a6839eba9f9cf38ac7246d6c65ad
SHA256dd3a52e1de9d643a98e926aec0ddd0a0503e46308c37c0d8f9a5ec171983965b
SHA5128bde08de389fe522adc9fddd9ccdb71fc5a7846f2415f387398c3f3b40a91d5797e59426f69f44d1e4dbf8486409b8edde2ed7839903d843dfb5b9f3772bc020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b86b3eec4df208db10b3d0461b270a
SHA1b59156029708c5a49ae32bd55af6e256d904160b
SHA256aa482364ef03134b57b19e6288cf474175bdb9184cdbe291f5010f9eb61be3fc
SHA5124094d8d94ef9d328f4dc9cfa4e0a90c0c737af374d257f082d7bfd4ef996a26630895a9364eba2317d1124957174a4b9073c5eb57e5eab5ad02f6bff987230ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5359017dc8be0f68dbbe74b4387d4fa9d
SHA15818c503498c86ef006fac8ac9d79b051f963e3a
SHA25618d9dbe81f1282a6a19c0c2420ebf94c8d7912c6e5f8aa730553a25a5476a08a
SHA5122a0f60ba7665d0002d8614d0fc994455bb6196eea402d4e0f4ff9e43eed2ee15dda24f197a9db009e1e1a73cc20e7d21d4de366e62f5bb6df91ae00f63201d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb266b85a468e73204c5e4ca8c08f5a
SHA17003601d6b878db19745577b2efc67a9e6a023f6
SHA256983b738880c6cb33ac4e044828032ca2f2ccf26b6094dc047f41b0d4de1c86ea
SHA512df9e2e4f0574999de333d450d06640c577c3dc80237b35ae60a03445d5e0dc8b1390c772ceecaa57183c02ce08e30d4f369161333768b5daddc447b3d6fec262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693498fe72e8acff2783b309a9da2616
SHA134ff2ab1646259aadd26fff3be72f837ca64a517
SHA256bcd50258648b30f7d2f2fc9a74f7b9b93349e601ba1cdbe6c08db7718ca9ceb1
SHA5122f59e30f7e05a107cec72b5dbdb68c5214d897d4b620b6511e6630deabe774a3fbcf1b20195cd7b0d7eb0d18a799a05bb73964d9c64835bc4feb25d886c79214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5314595b2fef1ccd32b7cc072f62c72
SHA1ee328c17b70730beeb8d1a062f6ed8d26e0b0f3e
SHA25699172897a669a1b74321611a8d629d4faf46e8ea906253d1c87d0d960f5f57c7
SHA512e24c93ac2a69876c5cffbd80ab063a17f686572a77c3debd38e62644ffb0b222d81e8496250350d9a9b0bacfb084b2790b6ba1e96acca38cfc7bdf7bfe95f853
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a