Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
6a3a96090e74806d1178e6a9ea84ca91_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6a3a96090e74806d1178e6a9ea84ca91_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6a3a96090e74806d1178e6a9ea84ca91_JaffaCakes118.html
-
Size
461KB
-
MD5
6a3a96090e74806d1178e6a9ea84ca91
-
SHA1
041b6a735457eefdf9b9f1cd7c94c0c96a22dbbc
-
SHA256
aa4cca56e9d07320edc864989fa4f085b5ef6950f5ff09bfa628a4c69507c539
-
SHA512
d7425438bc51dd2b48d4fc2af8dcd98600148c8cbdfba0b9c3c94ffe913ad5d548ad04abe2f5eb203934cbcd7ecbd45f25f890d1c7612b220dfe66bf419413ff
-
SSDEEP
6144:SVsMYod+X3oI+Y2sMYod+X3oI+Y/HsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3W5d+X3l5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C0F27C1-18D8-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002807bb30133e1d4baf3df90122e9ddaa00000000020000000000106600000001000020000000bb043840cdf3594fa5635e34e16a86217b7c07d8b33766e3ff9a41b2335087ca000000000e8000000002000020000000a30c7c20e0510760b0c80341b69514f3a2369f88422cfb5a7b8a688862f41277200000002e136057b537879d5693e16fb98820c05bfdf742c810723cddd4e298281a29ff4000000072c86b562c1532be7eb3a101fccd34568bf3bd615502610cd5cd7e9686158df5dd0b7d8492cf2f42a48944a43f3a7910e46c5f15804ebc6d528688bb5b01ba15 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422612088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b39704e5acda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a3a96090e74806d1178e6a9ea84ca91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aca61c11c3f1db6172fa3159e824586e
SHA1ffc85d854487764f5268b9234a5cbd7def780c70
SHA2560d0e17533116d2d3cc6fb226234b50b9c2305a2941f2c95bedf9489501e9a58e
SHA512d9d808c03ee927637a48ef99bae994397c7ac3a5b5ab76aa95901dd43f93bb0143459b6d5fd8f896a2557694713b890d551985e175fab148a7c285a454285fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea50f72889ff4182960ed8c2f12ed39
SHA1cf3c0a40ddc5106103e6fede5d93057ba4410066
SHA256022b6ad2b9b68acfebeaefef75394f72911d01f6495067a65e8b646242bfaa19
SHA51253cbbb471787adc75ad23a33ecf9fd7d67ebadb65a226e96a0a7f5bd84bd2cca08607eb193f94cc778f825f25b162af946145984868a7ecda629483b687df89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4ba1b03e893b47c7a690dad447db97
SHA164b1b23eaaea8e05c24f8706f2505f0cdaf4cc59
SHA256ae9f6d2326d80f80222d1dec7747194a970b662a99b3372c34bec9d6ca5dc0bd
SHA512b9ae6b417c9ceb46ff08cc4c1e32eaa8e0b5af681b4dee4b2ea665cc50c9a9f5a422c276731b5e3099348b11a319a4fa79bf7714c12632ccec5e1c0200588997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f3f715e3c42721e781845905e1aaeac
SHA1caedbe675168c09a48884df1317e553fe4e734dc
SHA2565dfbe6d9aa2d0f0c397af2e0da3cc8f81044a13e94b5e68f3f978975293c3ec1
SHA512a239ca641208eedb4bcebaeaa8840aaed70667f222eb6ad1abc09122b8015911f50c48463a07b3bfa73e0679728b759aac00099283d0c3a49977756e37f150d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fad122e17c5f4e1fa6d389d8ec528bed
SHA13c1cbdc3768fc1edf9ef0394498c5ad77255fadc
SHA25677184366ff5b7c499c175f2a431b0315e62d392e7c7bcbb8cef5fcb3bc650d9e
SHA512d36537b5bb378565a8356bd92b8ecc2146fa93bcdd494df38850652684d373a43dab70893a0948595d08eab684c7798f5ae2d277d911b6142db51ed4833990f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab93ffb057d2ff1cefdb473a9f955fd1
SHA154f7a9d3e99d69d25c43fbbd3862cfb46ff152f4
SHA25668dad863ad492368f3533d1b866000b4ed9eae9b4e692fd84c3e6c6fa59a3c57
SHA512abd09a23d709f175a40582112154c13764f1e3f7a8812663fa5486c97c893c8cd33af4775458746c4677b2e8bcb21e3e6261080d06cdea84824060c0850133a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d4e5e7da5207c7760b30b581c07a874
SHA11f49f39ffedcac45fe3486e49801c3b60ab946d4
SHA2563a58cb1bcd0e07ead0dd29b957f84c20416d4e9d91500bfa07889184b497ce86
SHA512c29cb1c593bd5b9055159495723547ce7d18ffa3f282d4ffbe4965d855b3d4267537bd41bc99b076315cdc792ea0e2e4aaf8c4a0c3a9d6b5eba48f7d2bb708d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7da3910ebd58bd528ebb666b1da286
SHA1ba5225129efad1516605a787424d7df869355b73
SHA256f0cd87b06dbef5f8c0b0fc5372c6b86d8b1df38f2fae86f326eaf073122c8d86
SHA512e69a2aa677b59a4b4daac7c01e0ac3f2f0ec040cc6bf32cc87c252e3942fa1a9582f1f4b559c386cbb79b6dfe96539d2eebc3a0be30fa4cd212228439d55b93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db838ab8793271d052303418c19d16c
SHA1ba53809b56075c137c163287c17348ad661066cb
SHA256689b268b9d005b5acf350a917474ad5b54440a8901da7064b7d2ab012f63e85f
SHA51201aa841130e83f36eb8574646ba1b9400a5a7aeb0f35de9ee8896fd2912ed3884a8f222509d7606799f99c333cd04c0cdc3e737040453118840839ba679b6d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9fa5fe8c0e305adfd0f9eaf9abbd47c
SHA14550a584735ccb65a6c174cb077ded539f3c3817
SHA256d678929d4396396f286051d390fca0e91df6dfbf87799b241d6a651b3a9f9228
SHA512f0b49b1a48f2421c06b94f495f36492bf44e2e4deac300d093f0c2db9fa06b2300cee278d1c6e49747e7b650605a7a1d7685c0e2a474bf914b71baf065c6ffc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4d7b60cced62836010fe7639dbefb1
SHA171d71b8efdb88147c6a082815a187ce159834476
SHA2568be8fcffadc3885122dccfa8dfa8a0d163ec7f989a52e2c89a2c41e9f0742297
SHA5124c1effbdec4abfe9bc4749c1539c0f2f636b49c041fb55cc530180d19474eaaf281265075587d15ece0088a39f68e3e54ae887f939c7fd7838dc6c7b5351c87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ff86d5679b605daa0a7fc12ca3ae851
SHA1b84acd2d0a2c87113e4a571b53ae51ea664849aa
SHA2568f426de0c8c8166d55e0681f23af7af3e649ebd89352b456f443c99cdc362408
SHA51204a42d1cbe4e915561548832d949e9cf7a29e8d328dc81abee97eec8121a7ee1d88b5990b653c074ef46fa81cbcc06ea7b6e9d311ed5dc891c54a8cd60499e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f976bc2e57d2a4d70546e3339980b1
SHA14c45a4bfcbb2b32d0f35ac945aea1fd9003cbebc
SHA2567c18b111177839bf8f3db778f23c6a48e45a559e4b80352586d859740684dc95
SHA5128101886165bf578796c45c7523cbdef13f35a84a6368ea2aff6f1ae97a8535acc1e3f1c0c5ab686f4b814586cabc8c70d9cb211d148eb3ccf1d2d59250df92b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ac3ca35cd2edb16635d69ec4a1aceeb
SHA159fb2df4dbe091e5bb4f5f7b73c7abf0d3bd4ab1
SHA2569ddb971a58471faafcfed96b546bdc7a20c58cfcbde3f7f2db39f5a7d2bab105
SHA512eec2efe37cbfe093d4b1d30781b0a1be1cb2d442ba2025370f66326a89cac85c7c943637432b7eb57278f9b849dd7cfb6f494dd2d87e34f7f41497688a22bb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be698a681f3b076f35e31a88bece52f
SHA13ee9aafff5154068d548af66d56d8cf34d4d34c6
SHA2563b46a47c216b8d8058acb861cb33ab5f5470778922069fef6035278374673f2c
SHA512e40e69ae0c88dfdd0aa8187c33907c66eb507bfd0a2ba6affc04eb2cbb293cc40f02bce216bae27097f9ec7d344f612e3e4e07809aafcf3238090f02be49207e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59521268b509f238e69c8996666a3c4cd
SHA15518bc44f390eb7abd14da9bdc0930803a7af5cb
SHA256355b5864747a516b50dedea8cd77edca8b9bb63b5b295d98f7767ea686b84f6d
SHA51231c145a79fcd96a81375551ea6ad2f6eeb9d7e50763e6ddfd6253d652883853f5f4860b4fd5cb3cef356bac1cc529c235329c912e51edecc8b49d3d4a7523254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a97e94cd38d80599981d90aee62a74
SHA1229ed42d0a1508e035f4fa25a8cc7cd08d1f0da6
SHA256f287ba8dff3d52005c7c7ace3f1b1a09ea47fa96b7842d5105803ced902ae7b7
SHA5121db0ad618f1e05bf58ff2864b3c271cebe345711e18cba997190860e6ea97e7821954f1fcbcc59943ae22489a20d865d6acbbca24c73aa1b9fbf7369a7a8f7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc08d41e71f6e722410b13a27e6578c
SHA145ba53eeb5009a791c2c14fcc1ebd12da2025721
SHA25619972f2ef171de0de8dd302e29af5373be2f7b2598daf9319040638f2c2fdfdf
SHA512acad53bac69e656aa542dc0ab80ae11d8fc63e5f189b8b78e78140c3f283ebf9b5a4641f9f90103af2ec00ac9875ef4b55e8988880283202c562ebb8edd51640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db1f35e24cb24ccacd39a0eead96b2de
SHA1f261aebfbb45a41772330f3623c6389084795a86
SHA256f79ba959114b245d2ca7c6fb27eb200818061874c1007fa7b6e5b86cb38ed34a
SHA512dab24ee9c26a23c35b374b4af3e1b842801b97cea220bb612b4b66c84f80bcf250f1ebc8e4fab4826e57169c06fbabb6d0b6ad0af849ab2fc8b2d6daaab7343d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a