Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
6a1c5da16a0da3ea7a77bf8bdd0cb0fa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6a1c5da16a0da3ea7a77bf8bdd0cb0fa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6a1c5da16a0da3ea7a77bf8bdd0cb0fa_JaffaCakes118.html
-
Size
461KB
-
MD5
6a1c5da16a0da3ea7a77bf8bdd0cb0fa
-
SHA1
9cf6e324eff2516ed03cbd672e24b4ea25a3fd16
-
SHA256
f9222608e8745609a99b3b22f376bc0e3c6689f72a7768f2b04294ec1537fc18
-
SHA512
89a9a57a325293f2ff7a3809a82895e5864bee331c793b41357437fbbe4ff666385650b55c614624cc03a014dc03afc18a24726b1b1ba6b7ec02ce762f16fd71
-
SSDEEP
6144:SvsMYod+X3oI+YMsMYod+X3oI+YusMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X3s5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03035c7deacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422609408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEAEDF21-18D1-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a2de3458472c4d4bb7d38456dea675ab87909cb88422c8b79db3daf4b1c7adc9000000000e80000000020000200000009adff734d93cd452de3273792389086563779407759c79a2d9f2200747b1f3762000000002d7c35e18b6fcb1fe6b8068ef8cefe0de4ed80ddeccb49f8c68353ff40d86f040000000aa17185631d66212d4c93a1f4e8f963c240b60c09384a997a0f3206ace24e8125476f1dcab0234490f6b6a0c36ca6954cf682edf3c629d64870395fe04b9db46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1328 1712 iexplore.exe 28 PID 1712 wrote to memory of 1328 1712 iexplore.exe 28 PID 1712 wrote to memory of 1328 1712 iexplore.exe 28 PID 1712 wrote to memory of 1328 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a1c5da16a0da3ea7a77bf8bdd0cb0fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55394bdb15db3f61626524f2ea918341e
SHA1bbf66d97b31e1b41622baf64e463a6ddc1f03cb4
SHA2561f54db46b269380fc26e79bae32663de64d86e7f70bc83f51f0a0089afb7cd39
SHA512c38169435fbad182e80c8b4e8d9c7d6c97258398e6287c925d3ae7950674a6eaf746af9e1e3199b16086b427f7c0f39b540d5f6476a5dd4030974420f2505b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ada7da1c9c597b89480da5dc41cb9e
SHA10583fcbe9ecc4051abc75a135d9200d0be5b1780
SHA25665474df1b06d944e9a633ba1fcf92ee6e2d60175a30f2e32a4a5c96dcd51866a
SHA5128a05f33ec12c4582301ab7daf1b69087730365c2327bcbcbaa050dfbb78c1b804b303b0214eec10e3ebea72c96741599af336551f75e674f47f3b93fddbdddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e634ff1e9c1379a4b4d96995380d449
SHA157922156d216b1d0d3f418ffe5069f9e8b3bb1cf
SHA2565104497ffb2b9d06621b8a8319060fc159d714d5329c1cdf036569d2cb8d3828
SHA51267ff0ae56dbce494ecbfcafa689e4e80342ed5839455bf0f48ae7976a496b90369c5804da423523b02af424e86f914512ea1008de6967cd0b14fa9153190f787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592bf2e9b01337ad7d383672066de55cb
SHA1c6ea981b81c473991a794bf82cce13782d6bad22
SHA256df3db934392028176f146f94f03a1d195f455921cc7fa3d0f8a545c78d3c3c42
SHA5122ea501328f0db4b88c75b5cedd9ec768326c4afb9e10a95b265e2ddd233bcf6658a478eb2bbecc808f69f97fd227a1a0b2600f9c7510ed80ad56d601a07efc3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9786780f34fab8071b36cff0afbf39
SHA1f7b468cf4061444ccaff593c1cd9f0010bf7abf8
SHA25676fd9fcb9462387002b7388561c68977971198b3beb8c7f80ee26ed39b5ffd07
SHA51231ab27d4de71628ea7f628f93f11531b6e8e5d18adb61bcf3daf2bf5ffab00a1b5224f7f3a78bf5cd0f67fa4ef6eaae38db6892147916443dfb874879eb45edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964cf164b882a825b174735947ff6364
SHA19b764f61966529b8249a75f1eec3a935fe966a73
SHA2569db4f9f89a364d2fbdb2ff1df40d950be2f6398119955b3356476f0c4dd217fd
SHA512c861efe0b193e0468f048021e5b080b785b4a6b5209dab846fe3cb87891239d87a2180e42dc967e81df6ee96e4763e1867a29c9cb3b65577a5c716ea983576b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c8bbe15da8405b187f494b3c4ff0ec
SHA1e18bf8550ed1be69a2129f38095e2089f8f4e638
SHA25692fc7eabb43a11e813aab5af06e36314ad0b6528aed62cbe7723c24cb711ad28
SHA512ed8d5aed1ea0c6153d4e7e9d98ce25b4e9f19e3d283bdbdeb6531b50fb8d082d1c6b0d1bac40508b84cd65dd019256b33ba490fb94d4e7fc8cbb8c7964e06cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570124f597d4b3837c69188bdeb150101
SHA1ec16dc1f08ffd16259f802ecb631476227e6d000
SHA25665552c146767df9a39350b22ab2b178c6ddf0c40f6930dddf0e0e4162e8dfe04
SHA512220e67a7a7c880f3718a01946d9cb8f0da18b8ae242eaea9083b5d748c012cadffb22ee56ae293bb9fc52d082d1967229750b90529e808b4aeef166bf29792c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5013c0e144714f6910d0710bf5263e4
SHA1dba4daf6413d1308ece82296b8bd0d4dfb6934d7
SHA2568d5268067a68fc22a087eda3e848e33437aa58e65f7c8d8bbe534b0dc7f04836
SHA512efc1bd5b1c86cb0b4e6b7ca0e37b333fb5925fd4990fca925027dc1d5146517c5859e34f9ec3ddc8051bb0ee13eaf2c714fe03d7dc1bfd32dc67162a41c5546a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ecf4a3c0ce45a9898c61bc8cc69b28
SHA1c3f1c3f3df466ad6a7d1179ba026d4da65beb265
SHA2568be1162e845a4ea3f4287c95cfc76a4985ac370e73a8f69fb35ba191df345585
SHA5122f2707a2c54606b45f7efcdb930dd8130b00b937702f83aee08f2ba3767932d4b97bdd8998bcf5bf7e2eb9270575a7f19d77d5697aed9fb34e149608b0e885cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e00c3d04e1caa77e045be6978591a34
SHA1a4169e4e2863de0ddf72086a90606ddf8201ca5e
SHA25625d96e42e96e1760f666b1cb284de23f76534a7bd6f68607181764638b7e8786
SHA51244133a41c18d43d05524c5c7e2916d979ca4f431dbf36fa0dad94537d029f9c2d16d5bc97fdba08eccf8f9f8dbad1a0938f1c7a8ea013df42ff3e9241c231f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a51f03491a198dc1d113681ff847c43e
SHA1c8ab5513293322eb816b380a3575d555a0b72348
SHA256c2417a4e0f46e4a2b5befa3e403b7eb56d0df8073020b84c8a85918f068bef6a
SHA51262f6e2c5d539522a2f1c1249cef656b4b8faf919ae687fb6562462736aaf5739ee53e3eb0c1036c37109d2a9e49d1370f5df72e11cbbd8775da770a8b6ff00ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5504e3fb2e9276a86ffaa0890a6a016bd
SHA1bc5d0f333fb03ab405df15061c4ae7724d93beae
SHA256e4a508ed1ccd68f216226f31f2206248aa5afba6034f2afec9ef3b85deff5d63
SHA5126248ff02173f24a8017af4495c270401273e00289c72124285e0e846a61c767803bc9ae74937c7faa222c6876a7eb41054925913a6dd80386334893906c50da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16599b5e022ca6446de4ee0f8171234
SHA163811ca5658a94f94649dc2e7434a597f818257c
SHA2562c734ac762fcf15eac9382ea9153f686fc5e236b67536a95d73046981bfa6c6a
SHA512019b89810ac2690a9a19fe8a4ef755eeabc20598019a441a56eaae379a83a3e04bad239a77ba3b10d3603f20a5d0cdd9e6ae12cd92041174af4aea923afbbbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a909deab7a8cb06baccb30d6a673a5b4
SHA102cbe404a1b39bf561b17bc58131759d71f6bfa9
SHA256580e8144d79f730ba6282902b155cc8a44afa5a11fad75c681c25ffb2d00f4fc
SHA512ec5430333890463c70e28cd9ee3c33d2fa37f8a7a758f3fbf3193400255c8a878d66e495caeb6a28f2c546e5c35360bcb9f138512bb72f79243c8fec41907b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7b3aad0144f387536752890171f1ece
SHA1e71f2c3260eb94bed2e180f26242de4f8bb3277b
SHA2569a48b0a35a9c6bd752fce3e8965ea2e1c3f3061e7801c54ca1e41c9a811f2e93
SHA512027aa7322a3d751d6ebb5f27a908ac4d5fd2fc1ad4595e9fede14d538df94667fa9c023f4c59820f7d5492144c399f56d311c8b5e9bcdbb8a2bd9e907354166c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c037d6e2e3a836c79a9cce58a634835
SHA13e034d2861d660c0a6f9fdfb0eff11430f74d809
SHA2567f428910c7b8eb942132b86e87413ab9860144f2c6908e45f0d0065072b47369
SHA512a86fc5da6fb438ec0e9950d29cb034d02f707ff4062fdea68d588fd140266d414689d7516c28352431ac63667d7e6a46c4a3ac776e10010d7d9ff66c5de5dbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5271f1f3a2ede3754a72e273b008e8134
SHA1f64e58bd7c02ded9fb1a4822fcbf05e2732876cc
SHA256b8d98a301ce6d6e6df17759e86779f1337add1b3979ce3f8dd4a3f8401c08890
SHA512242dc03a29c942a44eb3e4d26a6fdfed056a5f03bad2a5f8b295a5cb8876078ef9d2dae169e0b627afd0589527c819171f72237f0d14a37051cf442295e74896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb40d138d322b60a3602d899c72cb6e0
SHA128aee2a86b13ef0d65cc0f543f79dcd26c07cbad
SHA2566afe1bc998706b1baf4948c09b4f35004982917fff9b9f87a6806df5666b7c12
SHA51271792da95b25ef27948bce636dee22fd387e5c640d66ce17213b7142781cc99d69e9152a5aae3665815e6ba4b760ec6c50976e5f51bf766fdf9ac0a526fc8ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52772e9e9571b24c96a2fc01bf6f09fdb
SHA145d88b4f701c4bdda8e1008fcb1dabe47a0d0033
SHA256772ac9755ebbd4cd69c6a0ac3bef74dad344c178c2127ca0e1f28a66def2eb5b
SHA512c42828d48c794982d94293c915e6acdc37c7f1b3fb24f92f9073103a18eda95f7addba39f43f10878b0d3dbac3e44b3301be018a813e08e5034cafead96299d1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a