Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
6974262de535cb1acf55a7ca356f8246_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6974262de535cb1acf55a7ca356f8246_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6974262de535cb1acf55a7ca356f8246_JaffaCakes118.html
-
Size
19KB
-
MD5
6974262de535cb1acf55a7ca356f8246
-
SHA1
1705bb1582d21c2fd8fa89f6e41b3cea7f0c15c7
-
SHA256
8d6594e96b64b338b68b352474c1757ac7b59826b4edc90fc9e7d3c2ffdb09c4
-
SHA512
c5cd5841e8b042db4dd88a3f260bb46a289bc4927075764ad9bb96c158628b88c9110d3f990956135db0c199575c4dcbc2b1d07fdccac7514783acf89e43f73d
-
SSDEEP
384:zidKhgESdVBD8cWQ3R9ryEa/emLxXucfIk99heJzVc9qh:ziuSdgc53eE/mQOIk9SBqqh
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00310c4eb9acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000371f7a0327c95bdc15f86da3dbb61abc12c16528ca469dfdc39b8a03d27f0669000000000e8000000002000020000000ef4696c46c47c2ba5a1d8fe1b6b141fddf89e4521cce4b452f4f774596743dd5200000005a647e707a17f559bce5e4651855e3d9cc1219e50c2065ff8b0330a8aaa5cbdd400000001d0889838d3d36a0c35947a626413cd05c528aef54606c9356a0e7cfde3729adff45df302a16e3da5beeca29d22dcd008a05e87579950c28cc2a588571d058cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79777481-18AC-11EF-9CF3-F62AD7DF13FC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422593319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2036 iexplore.exe 2036 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2036 wrote to memory of 2936 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 2936 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 2936 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 2936 2036 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6974262de535cb1acf55a7ca356f8246_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52575e393b579e6d06a45d59f949ebe24
SHA1a61bbf75a3ade6174cf7e6ac348320e90a15a840
SHA2561b2a774ece743d942a552fc176f4f426978899192eff7098cc16ec169cd570f7
SHA5124aba8db3363b9c27ec2bd7cb6f3a24555788e3f3c80ac7ab67a3e901a767c336f345e505b22b453cf460f0bfb1c67e06c31c922277c11ac3cd7fa6f6c3985529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52d3ea2358d723296f41f097bf76fce43
SHA18e99ef3073c8931a309d86b803fd912393728dab
SHA2566be043e4702120e26e285addec17ba12f4bb69ada1c4f32d1f5e603a5db8a62e
SHA512cfd1351f0ed9191134b73ddfd266956e9d257bcd3f05154c6d14a69862e176119fdb4b708a371a58d0c288e7e2ebe6b8bcd98b2eee142ad3cd0990846687c58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55250ead667ec4de07af386b42c6b3922
SHA131da101225d0d816cb1b3f1b0b5f0c9e6c89eac3
SHA25653c6a2e5b4f5370f0871b5557a2a01b88375976647871121d45c740964e7ad5a
SHA512ec0b672ee0e4dc4375c8965307892cd3f7f13445516098e78229085c97a413f46ea1af823e1dd721449a850397e6a219aff92d659fb6b810201edc19a34b508a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD542df8dabd32c0da80a17660a9b5b4133
SHA185a5a57c4bf68748abffa24c90c5a39bf73b4a8c
SHA256847247c76cbe43c849abc3fcbfe48cd29d1abbfc881576328f6a00f376d724e4
SHA5120c35ae2e298e80eabdebb59d7443fee357b2df64812b4a009e58e8b383deec6f719aa8e2719fcd785eeac3ba1a3c6ce481193a6133fc81f28d1104082adcc0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d68c78579991a51c9cf21314e472e52
SHA1b0d2eb185d0ae7a84b8732409c9933d2590ad8f3
SHA25668cb9537971744a90a5582c7499764f9cf4a9d2e748d776236540377caa0a832
SHA5122af52618f408ce6a66147056bfbb8fe793d2fef177a6e2615631d81318150e6973547b6e7164a55d7f29c8d641b8d8710d0c14347a89b2ce08b9efb7b1f2f763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eed16f5a344dee433fcd8acbe62398b4
SHA11e62473e30b4258f3f22d25101b954f3c2ee7656
SHA2564f10dbd25ce31e1abe0804ba5ea0102d6b22ff208b25bb8c637172f9b072b1ce
SHA512e38e9e03abf5f677e0bd548a8f95ecaa01e8e6aed408efb3bbfde92f297362edc8f68f9354b41ef30f01423c439d49d72316354b3420795de26777c79030f136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD503bb255bc5ea05d856186c10ab2aefbd
SHA1b0b1cac2373fdf9d79a059edef80ae35d748d0d0
SHA256f1c8981c8cb47aa5f8515a4858dc80ba2acdbf6f806a53754b1609ccb95dc03d
SHA512bc72d869e7390b8cc31d6a3fab0e1805e6975744f134529145038316feefc8f8fb1cc3d1fc60a22400e88373be660203dff79c5049a0cb1c4ab440c784ea00f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac4071355680c31805d4e2ba06f3edeb
SHA1f25faa4e70bcd8cae8fa62c2fbb47f3af62df042
SHA256dd27adbcdcab8d7065f7c6a69ddecc235f8910d92e7e16f0e576c23be6c567f3
SHA512a46334f2b4fd7501662ee34445af629a99b4e7dcc678fc5fdd9755b5a58cb2031318a0b9618235751239b5380129cc18789b71b3d183e49b2a983e345dee707e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5927877b70021f0296bdb044b1b214065
SHA19c4302f5aa039cf88e012bd6acf7d32cfd2b8299
SHA2568a2166f8876f86d9aa60c7f33eeab403666147a6a10173f4e55e5587f1a656b9
SHA51202736d4890df3d1bb84e786cc8b82dd27c75290087af6203dffff7ec22e1b3a5fb244aefcb78b3035614d4abe92f38745989db912550ef251ca910c8569f00dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD597e8d9275e5a1d0ec70c9c5889675ed3
SHA12246037c9b3ce4e70573408d81961c12bba0a256
SHA256d1803c7d61afcbcbd47d8067b842675670c10a02ddbd0e03868fec31e56e02c5
SHA51200be2408e4e4435461e5210e890d82266f6b40b88b7b22faf0644287597cee3d6e54b92757dba2fd66c9f0523a8ea717414175d05c80f59d85dc86cb03031120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573e99ceff6523c6e4176399c7324e717
SHA1b00b66481b7e29e44082c3b341f33b36bd85394a
SHA256d49cbb3911847faa89513d6fe6fbdde2fe4fd9c606e56626cc45893dfdce02da
SHA512d1161107b370f8d14a6fd56701a93bfdb306b0c99a221bb015ff3b6a22ecc91635efff634744fd9d1ccc2ed3762cf689768fde3cbc6c2820dab928e7c87e3dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a2956acd18f490f418e3c9c8d196f0e
SHA182c01d6d74538470cd539af75fa3825fe2a2bdb8
SHA256ddc305453dcf3eeaffa03e341939a1724ed3b2ab8788c986d406b6ce8b7ca926
SHA51227989aaa3f0d5a26cc8559c94daa400602f4a8ef893a244fd06c2c631c4c6b4ef41813ee1c635725ab1b2ae77ff48cad599fa0a3dcd59a9fe2787ef209d095a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD544e8300fbcfa5456c1e1a4ebce198d92
SHA1778fecbb794c1eb514017923a074edc9c3b39860
SHA256f4b40cfeed7413183caed731dcb5f3c1cd4a481c45aa584ce565e1c577df76eb
SHA51215d85f98468ea82615bb874bf48302db78f3b42dc729be0668fd1524ef58c978a9a3f200d8fb3b603f00857f98fff5217360b1f7768de5b5a03f3d1f3c0ad17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e638e156ced196759793f299487f1769
SHA12373810b710da512322d9431b894dbd726858671
SHA25678ea0c51fa2c511148949f2821a38f8839580898e4dfb34d187bb251c713eb56
SHA51225729c58a5450fed16d8d48910422960e58acef8341e60abc3065b98def44c03e1864f790b17c82bbd46675866365fb6ab75e677d3dba01ff525d5cd6aca918d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5641eabce8e0ff51e79ea2d1066620482
SHA17dfcdd844c1987e41005177e3351cfc593e46e68
SHA2560cd608254ae938433bc706c977fc88f0525f032d5d73a115510f83477a90d7e4
SHA5123160a1285d7060911eda66ad0cbf5e5fc73e08e3409f478a55e1c7ca8d6e65db460277a16cca10258e362d509c03404711f78e27b228f68031e8b06c5d6961ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56611fae1222ba87f5a84e55b1af23fb4
SHA172019c975fed650fd35ff057827fec14bdb3d14f
SHA2563c8f45a535640e41602b3b7cf99ab5c277edb9db1157b8d146fdbabd2804dfcf
SHA5122d44042de80a5977b113e5d200855133f5a67040175db8113a0da4390a6a3c3b13473933fcfc62a332b2252e5fcd6a31c1e5edf989e84e306295e8d9c5b337ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD580a407b3be1223c9066f57ff6f619120
SHA14532f929377ea526f43d484d18ff22165e62458b
SHA256b92eedffc4345c6a655b7e6b73404578c100fb4d96cb4859469063b2f06b7ca5
SHA5128bfebe1136bb0f36c2bc7d4b3f0d3ceb71c4c89cf412c31a52e2b249f51c028b8e5306c130ddcbaeb7a93a676b8362cda212e35acb768ce975f6073f1d60d4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD511c5f6157bc919a0e6f183612cc50463
SHA148f4769d4bfd63b83b39f80614b4ea92570b9845
SHA25646a4486107fed39e993bcf936858e39e2291d35ecec1797fd2ff40a655e4f4a6
SHA51230aa176684ae96b575f53346ec905cd9f3b3bebb07beca88e342db8b7218eff61428becf96a41c3853a108aad7e54019f463cd28b587f77b0b41b12b802d3804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50541bb2d4af2b8fde46e0620290fcc75
SHA1554e3f67b868faa99a202d659a5fb60521f549be
SHA25686f67bfe4a69d6768e6abd0b4c9efe51d2c659770f868b271315bb8067bdc11e
SHA512010a06fca73f99b8da5c300c29fd3112a975a22be99ef059e063336869e5639a5d818faf86a8bfbc2a138d4b183c1d0003a971b31e741617862965b9d55e9e46
-
C:\Users\Admin\AppData\Local\Temp\Cab4369.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar43BA.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a