Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
6972676d73a240bbdb8ed4f08064664a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6972676d73a240bbdb8ed4f08064664a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6972676d73a240bbdb8ed4f08064664a_JaffaCakes118.html
-
Size
32KB
-
MD5
6972676d73a240bbdb8ed4f08064664a
-
SHA1
082bf057e5770ebd194d072ea3212c0192e0e1fd
-
SHA256
5e9c023aee1bbddb0beb0103d2c60a8236a29c6410eebbd96524de61fa40b515
-
SHA512
24295ac3eb588a3f908c3073058cc1730a20458800e1ea60433ba9b29f762e3fc72bad3403c02219d837d1292c8bbdba2ed9880ef0d90ec61734603e62f55ea6
-
SSDEEP
768:Z8S/vt6+PFabw6w8F6iBML/KlmUE/lEdBlYNQ/DTKMhqkxJhqIO:Z8S/vt6+PFabw6w8F6iBML/KlmUE/lE4
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805882f9b8acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005ee5f86ce0020e60b1d604980027671515942b208309cd0cf55a7dfcc7cbbf11000000000e800000000200002000000042116ba9d0013ebb07e58065b7428cc9a509a9f677b2d953da7f57a93927a1c020000000344d0e4d8e444a25b7b60dc3dbe304aaaaf7bb1af3e3893feffedec9f5af854e40000000d06ed9f6a0318398dc48ed7295f9412f0072d43c9d2df485fe1048d9ee7056d06665760679e2cfdbd0d41c45f09cf44f6b23a5006b934d957be251e7fadf7801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24DB5451-18AC-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1684 iexplore.exe 1684 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1684 wrote to memory of 2164 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2164 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2164 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 2164 1684 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6972676d73a240bbdb8ed4f08064664a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5135b647745e522a2f61dfa7602bc1a7f
SHA1db718e0c6a2a6c80557ba194b51f18e5980304c8
SHA256ca1a21b3d043aead7275e3fa74f395fc3547052245a13a5132bda662b0a09dc8
SHA512823b53ec690c65ecc77564e5bbd8894b50107114239214a34ff46493a8ee643c178e5099498a5213694586d224fd5a695d27791608f8e63e7f09dcc2fe9c6ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8665c8a47331ecc1ae14e65a44341f
SHA13b760fc87868630f1eca408ef332f6e67c3f30dd
SHA2563ead74234633b86ff4f0b7c26f348babc6198c81fc30b56d6710efe81b96772e
SHA512a8e752dfdbeca69d9769282a3240c8a0be05cd885467ff05658a091c55af1652b7a4a87cfc93d2cbc055fad95a40551aad84ee58bfcfdfd154bb25ed8fe9004b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f5870b82dec2587a71d3286cecdf3a
SHA153340c86943df6c724fa24c9c3f51f42c2247227
SHA256b36996cd3a84004b2689878964c7d1cfe8d7ba5619dc25084b9c242421a42eaf
SHA512057b433559704854884785c78f20f59de8cf39f294e91d03cf20e52207556005b34be35668c090cea5dd1c5b116b8dd25a60618bfe907f6858c8807d6c69d7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3127f0a310742a77a799593af692585
SHA1fd210ee4f4bf9ff269576f06e1b1cd53ecd35d93
SHA25663346ecdd5145c511d8780cff0aa12932d973665fbd25ffcad0d6367c7c068ac
SHA5123586205ffd8d64fb797064626c26ccf18d24034d0f42cc34bd453360364400a8d68531205fbc05b920641bbdcc3707ad7855d369ae88064e32d4d5e62cbdc5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6d939e051ca6b08722e77bd454832b
SHA15814e61afd4ea9578eb4801954bee23928389085
SHA256aed83ae776e3c986a97c1d569278078d09db7910c2479937eabebd7254db3385
SHA51281b3858e4ca68ae01b442c4ef32bb29da36af0c24c2cced6bc22562808eca9efdb22ac79e003a24a72386245f2026568b0dae8289061785115966c4d9c6df852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eccf7ed525656eadb964a37d58a590a
SHA1031dd4de6394e6c7b2f219b7cc697bd26f9bba01
SHA25603b21fdbfe0f3d1631cfeac6fc39cbd34a91e3c8b896d839e0d5460636f9dcb3
SHA512bc31de943930768b814ae8d31ea6426a5278aa853b5600b441707a36afce64522ffd384b6fa34a85bc1d02bf3be97901c84694c80a2eb98a3bc085a475798402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff4bfa021aa1baae138261edc138ca4
SHA1db3213c5d781d28e971a8f222c7edb49b8054894
SHA25654c4c649582cb2ebf82fbc5aa13693490153117a839eab01e31c5a534e031ba3
SHA512ab9b9e7ad56370bc65cf17ef52149291d3d8a5112987187217f8caac64499daa60c6b2f9bdbe04f34e9d139a6074b6e1a92bcacc920af94f53e588c394c819ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fd8529deb9d0a26653f9f9f5a1ab69
SHA1ff9666f25e33d64fbd3c665fb1d5a5f1a394f399
SHA256d5925adaa8c344e1dc4195580a301ae619451ce764b495ab253af35df6b40d0e
SHA51232e164362ddef9f8b6990b0af4086acc6f24b35419b87cd8d1bc5a9ff6ef1694b5cfefd3d178e1f4b25541f1aab59974d6a7da989cccdb26fe4db390c5a0f1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc07d483e05e9ce9d2adc8e8c75f408a
SHA1e1bb2b347eb09e6f56a8746cbfdca12945dd8955
SHA25637407d30540ae6da24e04752a0712c35cccd441b9d74d104f4c3e6940e5218f0
SHA51225680c6746cf39c553ee62f2de9e881c0646e7be149d5e53368f9a31eec06a4fc2c6f18d145bd634bcf24675957611e6798a4f0bb5db7ffd33dfebc70b8ee8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832e80ff1204ebfc2095466faee20bf2
SHA1aa377291a7fd7aaccbfe0b0a33b559146cc9078d
SHA256fd3af29fd7eb3e0e8fd94e0faebc0c1a07f02b85c4cfb1a512507a2273003696
SHA5124e835c60f320e8053ed297daec686dd02f11e51f576e0709c7466ad00f446f0426b6e995156001bf44ad377f5d2e139dd53d22dce7dd509f4a63ad97814abc47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4ef6e6247e4a261d0b4e637f17d807f
SHA152f854de2ce5e3c57d010a32b4c3bc7141b77b02
SHA256ea56f3ec2daf1c127e88e29aa3f7cdd1c15556db5c181b97def1e1cc8d550815
SHA512098228a99828c7a1699c5e4c710b57bb97fc06c435c1381f2b3c69200986c3007317b174f733e84c67f20d8253877bf1a7c469ddfd53cee4b65fec7a1c88af0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857f943cf73b45a3ba10651bd9215010
SHA1e1cb211a53d82eba07eae3ac33e54809829b994e
SHA2563871225ae1ddb4671833eca9d3320fb2691c2819a67b0c94e81f836c4c0e350e
SHA51270ce3454df616fe77a03e1202e76d52ac7a927d6e0fc5cb73cffba10bf8ec40b873b7e2cf95a782ff0a758bdd3515fe1a624edd864687ea511dd192c9b81d231
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a