Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6973fed7400537cee0235f5db4abc60f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6973fed7400537cee0235f5db4abc60f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6973fed7400537cee0235f5db4abc60f_JaffaCakes118.html
-
Size
4KB
-
MD5
6973fed7400537cee0235f5db4abc60f
-
SHA1
b0c3afb03d73c33f5bab9770ec3ff5ce1b531982
-
SHA256
89bffcffd8676bdef92d27dedfebc4c0e68ea7bbd966162dd463564c145fc650
-
SHA512
d8079fcbd496804e11cc86d65bb24c2b80246c7d5a6a50061e174989ef97fb56f29bc49c6d30308a7729f6fa35a81e3823d5694f4505c37f88af961656b9a1c3
-
SSDEEP
96:ziEIuemV4MSEPBDvV0n47ej/hgOKiljoufR1QnyneQ2VoDmCsr3:ziluZV4GD8/h/KiZzQn/QHsr
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4071cf37b9acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000002d604342a74b34b8d3f1979fa74f897000000000200000000001066000000010000200000003eca5c933666edbd971b30f1da727b167bfef1bbf66e9c0cfbfeaa62db081022000000000e8000000002000020000000695f2f303f55f226ffd04c535dd3a8383a3c25f09765e6429b7d8b44a0f0a2bb20000000c0e701e2fbeea6c75e6ea48167a4e6094de47fa6d4eba5f9f2c763aa2765932940000000541be94bdbc5f1f1f190e3fef899494f651c12e814c693cbf44977617f8e40b6b5eb8dddc13231ce21e1fd97b4f2e7034b1442c942d69a2696224077dd224993 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74198DC1-18AC-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1200 iexplore.exe 1200 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1200 wrote to memory of 2636 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2636 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2636 1200 iexplore.exe IEXPLORE.EXE PID 1200 wrote to memory of 2636 1200 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6973fed7400537cee0235f5db4abc60f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5774677e936efac43443cd4fdefd181de
SHA1092260d324838016b6a25316f6087368f0835ae0
SHA256680447a3d37eb7b7eafb0887915dfd859861d83c90fce2cabc6e98cc854d378c
SHA5127d31adc5838eefc93f1c1582a206e5e037b457bf3f2bc8c5fec04b54363d283fdc4920f0769361626e69165dc3c22ef03b439c4f254535027c51b671d84fa859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c7ffce962f2e54d73d2327f8cbc47803
SHA1edef5d059d08ab007773162e41f5c54e5c80fe61
SHA25638498f40395b0b128ba47ed6721ed301d78721fa299e9255b5f49d78a8f0f7a0
SHA5123a752b2d71d590fd5a3c54c14bdaf1bb03ecc11091325a37854b915719230f0c9ebbca18fc89d62c1ec43bd3d98f016e75c5b47e6e77af859bcd404862afa969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a317d399eca0eab229c726ccef82af7d
SHA1d73134e7e232a74705faa9a82d88a36bb6e7ba9c
SHA2569191965e49f367fd9ef588b369e968d88f0ea8f3bcb7d9f0685f2d2c901e22c5
SHA512a873c2f7a5f0988d43169eaea903402c4196890c36d4922aba41e8336365c7d58df194ed0ecb4a216294835950a971b59d72b0e88a7998c4f2756dae078eb9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD519852531717080346c82f91c5eb0e6f9
SHA1cc1922970a8e5904b88a4ed874f198a803435f8e
SHA256ae97636a4b501d02eed84c1a16d4a2eff76e8af56cef487cfe5e3b50cbd94b0f
SHA512de49776916ac11b1f4407d213afe4bb88558105aa43b6af3d8f9d972d24c1bcceedb0c7d0805d937c3c6d1d07522a3b960328e30d80fd6d4cb24406f7b024b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac3e31b0985b2e3f745a3ce2ab39fc32
SHA1fa1b31928a9ca522a90e31a6b1fcf11d89dbf18b
SHA256bcdeb5208970aa789ac8c71594f6ab9b03a3da3438c8cd85a7ea737063a142c5
SHA5124e92cd40ec06413694f4a5a5b2123eb81af208e802302efb01a775e42eae91b059c4d7bc4bcca246abc8835c55a00f1457b2a4f65fce9dbb6061e80f418acc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56b6e99009b7dd692d3e8b4f830f7efd8
SHA18c6f9e27b4cd48450bcf7e5776e9b7db2bdd42f8
SHA256c9f0b72898e1d1c6ca16dedad092f4206ff8e8ca3343649a0ce76b30fa067daf
SHA512f63706d314ab767db06eac649527d9ae715b0ebe523ddd26ea8f25e6c9fc18417920567b6ea231a2635b3b44398c96e51b69b5e27dfa47194de7ae4d80e5ad26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c13747b2c7b4c0f2a6bbccc4b90579eb
SHA14828b27c6170661230615e4e608a69e8e522a4a1
SHA25614712bdfe27a3cd35638ef29f9c49ef90e25b29b82cdc51545c398960ee3524a
SHA51214a8f31ba981190b01b58dc0f44ea9dfa3c6e1fd65f841c7571c5f95fc4191b0f6edbe1ed87829a65acd0ed4d47546963608727dfd3edc669a72bab53e69bbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e69ff3fad8741e47355925503b98090f
SHA1a64db7709254b17dec4727bc0ae3e1d4acc02071
SHA25633c6c53b923f7fa22500baf6e014f6d29aca7036bd5c96a0e5fab28f03a4277e
SHA512d4bf6058a00e319660419928fa18c4218418e00f1c2d6377224cfcbfe194d915bf6b501cc6ec1e4a8dd23e7d1a94fa98e734643306da22c67f28e9abe6b29a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD539ee48c66f2d168888efa6dbdd34c47b
SHA1d79e02cfe81a4c5d32158399eb7e999fa5d3be28
SHA256208d5bdb6a9ce5332c7c6921052b7e6149c79bc386dd9cb7ab52c3f61699a7b0
SHA51223e74b1ee709daea8a64af9c33c4eefe74eb4647b01902e1781c3d1868f5e799f37a79166dfa267220cc9085ddece581e26ac23e91ef0039e6c60cbc50319ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5490ec17814abe0fe4482f309a40d3292
SHA124713d4291c6519d38934e1b0339b1f4d7eccd9a
SHA256818f9bf244e56ad2da1eb8176f28d566e3ea6f59a84120ea6968d653ae96a31c
SHA51283b3878cbd03ccc00da3ce32288dbe683b27b07422f26eeb86285c1cb37ed1296d2cf0ff99b51721ba51769b7afbe0396eb89c1e2cc9d3a42250cd457ecb4e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5865dff4dfb698c18cd434e2b409a643a
SHA1eab024df76d777128b3cefb4b187c52dae7beac9
SHA25633197a438e97013554398589e438d0b90e0bc35f8edafcb6647928cc0f73146c
SHA5128a061d29cf1fd2821e00272e57c6fa51457e14e382ae226ab100e3755cfc62d6fdf7b843550b017c524e9b992f22a454e9d7a2a4fe3384213cbf60c228c50de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ff33d31ba49bcbccd43f91b310242a29
SHA11366b97c917cf5ee242c04d6dacc0109ce9121cb
SHA256fe8af51a4ea9d323cd1f5900a516d0d4497c1880ef0d1a418c19085a2886128a
SHA512efde70a1b178f0ce78b381418d22005bd90650d7568aa9010a6ac0dcfcd9fb9460ae5f7aa0dec5af221c1bd78bf3af12144be72e0efa50a4081b8f395db0ca27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9f35d19f79e829a206b75f1d4e2f865
SHA1e220708c38b1a9ec05efbc0dfb22ffcd77d126d9
SHA256b9de3b7bb24d1e90d80f70e01e6a2c6d568708f66c13754fe10e644ba1550a0e
SHA5123b2551d7b7ff2477accdddddd052a393eaebcf1133f18ba5434574a2a6c80a4134fd90d8c22859ca261cf914ac189ebbd165619e7716a316b2dd84b5fca1c6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56a4e7ede46e20fa936ec816098ea8436
SHA1c310de18f644848cc0ff74dafdfe62df151be5cc
SHA256027aa52d4b16d8913c818c18f8467502b7addf768b9cd3fbbf0d8ea4c11ceb48
SHA512f5d59aaeaff8e5ee905ea9c8aca597eabefabc53464adda6297b569dfbe2d5edc25ca3870f90ddc7f653c3c2e621481aa6566758c10565bbe6f7cedb3e844ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5529100aa3b14044064927fc593c529ab
SHA10221ec8acb09a517a2d86d8abd06ead6e60f9451
SHA256c44e87298137db0e219850637db7ebd7b83479711b547f356d69b37c2882b35d
SHA5124db9820a29556d785d0f1fd20cb242f1688acc2968580c255b81bd20718852ad5890c7d78b276f69a6baf80f5c3a28d41feffe17cbaca806cc152efc63eeb657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bd41ec93be450f14fbbce210ccef90b1
SHA14426bf06112eadc981535cd33a96d6b3a96a5594
SHA256b8906d80813e61d379656aebd91882977c678a89a9c7e448b8342508523ab91d
SHA512800feb765db7fe30ea2db9931e598bf374c7a9292d1a4558244f6c57cb7b146229faa3e1c9c10277109be60c68953fb92c283a5fdbe778698c6f76cf86597173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD591e9120eaa97d6761fb06b40eef472a1
SHA1caae3fd3f647ff0c5c38d3bcbeb499f0adc0fad2
SHA25699e766ed2e12fa6d350ef7f1f9becf4505c0463e55e87fa77708f4c7fd172fe8
SHA51201181d1d3458fbb90fcaa487aac615d12b29f8a7ed3420274588ab9c4d46ffc60e97c6609d60324f4e4e04ee1794136d3830dc44fab10e46d159b7e1385e5244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b9f2964974b63bfc71d28b2ff444837
SHA157756730f5c4e9042428aec0e3983803f6e2c000
SHA256d0b1e8f64d8553665d28d213255c08fb2a5300bfee9f3b2ca28eaae692f2f758
SHA512d73a860619956d7a0707a261478d459646007c16fff5da91cb8c72f3b3e9593b755bd4527567460e68aa3752663ee38d9431d7512271d8dfa5fba8eb00b1de3d
-
C:\Users\Admin\AppData\Local\Temp\Cab2AF8.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2BDB.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a