Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6973f7a659526ac8511022d45857142e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6973f7a659526ac8511022d45857142e_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6973f7a659526ac8511022d45857142e_JaffaCakes118.html
-
Size
460KB
-
MD5
6973f7a659526ac8511022d45857142e
-
SHA1
9bb6e6bc0e5f6492a03f2706a0da724d9f8acbc5
-
SHA256
85f2cc390cc072ab72c2cb0203b2fbc39248324a970efefc77439eef674c3fe5
-
SHA512
86d4956262adaf2e7e7966c7a9a8a94b1371d520be26fc5afd90769ec5557702082fd68386a359c44407e8766b3e51f6d23225c6e20d761733f81f2bdaa2a2cf
-
SSDEEP
6144:SisMYod+X3oI+YMsMYod+X3oI+YcpsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3Q5d+X3m5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70D03EC1-18AC-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd61181a828b604baa4e28ad1aeafd6b000000000200000000001066000000010000200000009895a7dc50460c49ec15386d1bcf97f4fb9307be0983c3383b120d5bae763cd9000000000e8000000002000020000000b5ee43763dc92492c019f361b17c975da45d65d9fdfed9eb2dc72a737bcd5dd920000000f97f3f25f748d07df450c1dbb854a5944af1ea100a75e1ce85f964f90c504f97400000005cd6fde48ae68c954610959e742cde68736ddb2ca367133fda924306668956f429fbf152343b1e7c176a641d6d48a021c8f195728e04d2ec062e60df5f51f5c9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593306" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a08a49b9acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1760 iexplore.exe 1760 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1760 wrote to memory of 2916 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 2916 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 2916 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 2916 1760 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6973f7a659526ac8511022d45857142e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e85edc5408f9bba66822121370544f
SHA19874c77328e948555db246b055cc7e29d43c90c3
SHA256c4118c1aa53dd5abcf5297c2da59517b859f883a1f2301cc23292b2f80577a33
SHA51279a658f19a80ddc06f7c4adf4ddf2818359efe2dfb6a7178a1853d23a8bd4a115029bc9ff5498e31ecef8d1bc11170a5459457693156cccc11364be47e1f7b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5de108497cd409e9d07857d9c36d52b
SHA1858c75c6a71594a3b88665cb3261763461580269
SHA2568c47a6181a278b673c5804be9af29501685001be326614f0b2eb18c215ecdcf7
SHA512a254e1e054859f9928261387cc81cb1b9fb6d346f3f513ef599b9771df9936c371ed9a5428a73076e40ab0f03187ead5313ef8e10efc7f2bd6b1dbb8245da10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f4853f0715f5be062c56c44b210c43
SHA13bcf4c1c9af9636033bad3b18230379bd1d624d4
SHA256502060cf71e70b93f313ded840ab502ae48cf8ef6dee268402a1431c163e3807
SHA512fe6a8f63029ef43bb715307a0c43220fdd49958f857ad2c11ac8bb1494ba183cb89a70d5397ba40f8e16ff226931024a3de8692d2676ef65b377cc9002a8f3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520ae25692c4eb68a90c30b74a5f73256
SHA1e525b8ab725ba3116e0b1cb5d21f29136deee8be
SHA256c05b59370dc253c5ce471689725b6a08edfaff486ac82637b65b53bcb7b057ce
SHA512b39439267551a561fd6441a8fc97165ca437107b0afffb4af886534b3cea3f989405488759d611a93ecd9bed0259934866e50f8dbc5b08fca3a6841297a44270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1c1d5bf97e9767466191c54ac1d452
SHA12667749cf78a9bdf10eda8ba92e5898a948ba3b6
SHA256906fa29b902ff8a30110fcbba19f8bfecb76ab137b49e7151ff28c3b05ef38f8
SHA5127422d0c32fa788eb7d429b4efad19512c555ac7360ec50e78bbbd757de464cce75418d8610ea3be5e8d3f1fc26d7559f96b51ae73788819874348612068e03cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0b5985fa3e0986d2643beb270ea741
SHA1681defb021775a353d13286a5b0f9930114bfcc0
SHA25617fb952cc3ca49cbe75b39a8acd1d67853c0ecf2c9b9368a11585f7e9ebb318f
SHA512801a33084675d5b47dd88d01494b32366790f5f542c49c9250366238a44bd471a5b899654c340d9244dd6b31c7fcadf3bf82928930b7e6f037eb18dbe29d9d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f977bdf858d30fb350f522382316764
SHA1fd14684627c29eb9c4ba127f374f87f25c682fce
SHA256209f2b1058ffdb6d39e7059de551617b8678d71ec2b21b263826699bc36c0f00
SHA5122d75888c583a72110e48474ebc8e656560fd71914e493b55f6b0e974a13a822d67cc27d6e68ec38fb921cbe07483d19d19e70915cbba364b689e00d8f4c85ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c658127b0819f04b393538c359de2190
SHA14b1fcccf5c2ccb14896151ea5fef84bdbb8d5ce3
SHA256aca88c689dbb67499c001b5d0a17424f8fa2a01c634698c1046bad477e5af756
SHA512bb586d5c4d162d5545b3fa79d0a973604c6564e24191fdf78c49cc00368306126c9d9468202c52a8308c5db832d9f24be0f70d2ba450c639fc3c5b5851a46bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f78803682e83758a8400400ecebfa9dd
SHA149d068bd591e7a8ea6bccdf74d5eedc1e23e69e9
SHA256e2761c95bff828b94fd24cc3edc056e7601a290f80e5413db51dd1cd9747e555
SHA5128e80432cfaa09669375b85f6cdff9e80ade6dc0505f30060af4f143dcf72480802609cdcd0764967d312c02b8a9a8c45a8eb1b6e9b8e14ed8a544cbf501caca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5611d4204ffb8c26cfb67fe5d86df2b38
SHA18a33bfc00c64022b43ebbd3ca2e860fe9c659a4a
SHA256285ce35c8ff7c18b21ccc92cf95f8be2cc05ab22f69fa397faea37f7c25587fd
SHA512913349cfb44412b0c4a51710abed626c9d3d3739b16437e66276eed8571a9bfe112ca456bcf3d01c1ad358e47e00a54d471fc69658b745c1b90f1259111c79d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529894614a242fe21a7d08ae6ea64a063
SHA1ffc45a20a0b0349443bf2177fdb493584dcd26f6
SHA256c2c25f31c8d5ac6ca71591af1193b4f599649cfc0c60f2832cb641ee79626c38
SHA512cfebd481f9de6efdeb76798895ea20b1483127cecab36837c2e450fe53588292af8cbc294eb71fda09b0e7435506ae65a85a095605381161a122e083c987d2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5914c19f77e74944a0ec52942333bf098
SHA177b2ebee85301edb3a9ee13a78bddefc97c6c436
SHA256324c5921b7235521f3908aa2df145d53a482331b992629f925ee22cdae9cb6e6
SHA51250dd0af598db944e942b5a448a24b81c558636b44f842eb9ff9126a3fc8d14fad4d7aacfeb3fcc3cba337572e3a37672e5ed54cdd2a4a0486463c2a97cc83948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af3ecbc0f3c89cce4a66d7002e31081
SHA1138951b84f769acf77f48ce3626e655c4b40431d
SHA256f8e65405c0c28f4be53590eacc6a98b9d529bfb6a6c5a38356964b2250813e69
SHA512531457df98c562f2c7b1584d6f37e137bbea4237a1b1ed9af1b8d63e90fbbc7699ad0eb59bcdc70f0a7c0c8c7d0f1993bbf9c096b038f7dac660fb785b36e62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813c2eb8b279de40f88731947048be59
SHA124464b5c421249b46a5997715588564624a60df2
SHA2569b2d54cc0f1eefbd123b893dafb492a5e2100dec88ccd3df6670082f369822bc
SHA51298452642e96033d795e87fe52a19d022b0c8d7dca72917a6b5bab1a2d04a7f4f9d79d4c6b7d9fc67c808ff59091eb0428063fd6dabc6d9cfc391fd8e340cebe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c77778520cc5a8dd59742b99f1750f3
SHA15012f41132714dc7cf32718a9f04192352ebb2aa
SHA25600243ef268aaf744694de19a3348fd9f4bcd1450e215b1ab154216ec51d8abb8
SHA512f761cabc6e416fe7a08e6f9aad4f74eab51497808ce3556f3ba58a2104b805255b0416a3a1e4ed7048e674487e281ca0812686d288058c6b5905fea4a6850a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8f8dadd0b61b3c645f6146f2d99379d
SHA17e451e115d49629e08b05eac14f7ccab30826558
SHA256b2dcbeba9a068d67f6982d27b2a0257773cdb2376f6c759e9fe5360ddb82b923
SHA512c39aa7e6ca85c88cfa12735f644a73f868deab7f0581693a4730147cb7044b881e63225aef12deb957a830792ed542606d56fdb59000879756479fc7f8ace4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b835682a023f0cb0db7be46333003b5f
SHA184295b312ffeb02ef48fd61daba765b7f384bc46
SHA25653daf6eb6fccefb627b2c4ba3fd3c26cced4d14ba2b7d4323cb3fa6248c263b2
SHA5124c17aeeea7d50c8ca89b4ce5c9959a20ebbb994bf174441b8da8532185b5289081942aa1137d028d846454d49171903aaa6218ea893e1d1f06b5857c35c57856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0099d092ac7fc7b287461f7b7123bdd
SHA1637a46a03e0cc68c07f2aa92776b8c9b29301080
SHA2560aec64f40628db01e6cd13e7463df9888554896918db0fb6eee71b4da687891a
SHA5128e7c2bba71f81a5626ac300507cd097e7f0b5f978bad2319f9b2da63ef8d67b9c8dc89997ce92f296aad651e7c777a8a04745b35649ea26511e4a3cfa5e62a0d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a