Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
6a672d8bc68cdb622bd9404daa426a19_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6a672d8bc68cdb622bd9404daa426a19_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6a672d8bc68cdb622bd9404daa426a19_JaffaCakes118.html
-
Size
68KB
-
MD5
6a672d8bc68cdb622bd9404daa426a19
-
SHA1
e4cc0fa5ed9d4d3a2eb3fcabc555f2b6c9bf7036
-
SHA256
e277519904aa70c6d3e3640f7921d3e6f406cc24cfb0be9e39a50c283b6342f3
-
SHA512
6c45d8ac8623e6b63f315c2b57c9d8b5d7a1a13fc45ba68c69b8804139c8ba4dcb8c5767720cb0ddc7c79a801d0aef72a65d69f490bf6dc2fe0bdc3e7fd5be5c
-
SSDEEP
768:Ji6gcMiR3sI2PDDnX0g6PFq641jbloTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JOSI1jbiTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422616312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703acfd6eeacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e0ecdca8d89b8dc9f6fe0177a6047076e3e8c06dd2566be1a4e71042a6e4ef0f000000000e80000000020000200000007234ce9cebf7a3aef16761e308de94bb5b566d8353d273b65cd9440e70756fcd20000000745df15bca812669e29ca2365f4a1a8e8049be7d682ee090cd50f0659c75ef6540000000c5f1b2a53ee6144d2060e0f0030807f03ba2fd0d74912efe301d7c41396ffd4d6208c174591cd2894ff1d4e70a88bf810fee56e47f691421208c67c327f5ae33 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{021C5F01-18E2-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2168 3056 iexplore.exe 28 PID 3056 wrote to memory of 2168 3056 iexplore.exe 28 PID 3056 wrote to memory of 2168 3056 iexplore.exe 28 PID 3056 wrote to memory of 2168 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a672d8bc68cdb622bd9404daa426a19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366518c5259ed6b2cca53f4304d1afa3
SHA1c549202946f6c904e528549161d1068159430ac0
SHA256af9a0d086a2a172bd3dabe167530fa42c6e653c4b7db566ac5daefee9f4ae630
SHA5126e148468690ecdbb239fee9750a897895251c222da11d1e8fdef9e2f3f30b9503d392fc1d66d280f3261d51b7e00baeeaa43e28e28a9367d04b4d6a3aa159336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f12587f02a64e9d13f822b27fc38d3
SHA102e26c6e9d47ff6a497c08bcdd335f1da7b70f21
SHA25605d2a8e049b979777a7f333d88b007d49496df09cc0ec85cdbd0aef71de94d52
SHA5129cda0830139f3d208a111e3bdd6c4a06fe5f955541da053ee83bcfd80ee883faa2a1945c89a914781273f875458dcbd155d1da962b102100b0f6fe99f2604117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99e99770abbb542f542c5a1e3eac99c
SHA168e2582173655c16365a178640f1eb5e54c3bf6e
SHA2564c80bb5b197791acb1955b962383d0651cdda40cce8741985b0e3960ff950bbd
SHA512a0b20d16232f0b55c958720929f256fdad24312af6814adf1dac46edbd580cbf48cda7e013feada56de8cf894df1707a54743705594c5d36fd9e1a21da9db94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c4dfb6a8abf777f1925ceb21086373
SHA11f65fe8cbe341d0d9291793a07f3ef043eaa7d0c
SHA256dea77c562b69b131be4eedceae7355db1fcd92be0ef52cc150b6a8609df8622e
SHA512bf7e86903b1f5ea430a595eddfbb973c8f4c05ff02a9ce664b97e04465c57051a86503ec2a8c29e43107127f4c2ef32bdf0ff645f0197c3f7d89c539b442b2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5104b59e32a0fa06242e29525557ae445
SHA1c31b602b6b3379739b347eaec6064426e1fad571
SHA2567bf751e2d717b3c777cba9586b0a4b6b5a7d30a957aba1112842d2e1f91992eb
SHA512c0e247ba3ed080c81ab2e79b0073a4c856a296962a31c96781e14ef1d7babe02fdf4246028041bc98f358b98524bc2f9273d5721fcbdf62a74c7692478d0100d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539567302c205b765956e84bae91af565
SHA1346cb8289fb9cfeb6c4ede3fd6aa713c6d502c44
SHA256643d998c35596fd97a62652c2c342e61cd8bb87c69f0d086f08b536a59504093
SHA512c2fdd89b81429c0fd6b0df6431eaff9cc0dbb975b908cf46052731ebd787e9e1029a636f7c3410fe674eaa22432809e20b552cad6d54a6e561493143007ba1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78f409a51aebe32dc02c71588937671
SHA1703c67c98cf839cd1c5d96c422eb842eacdbf7ad
SHA256f6a58c7586ef3b89ca429262b3c33056a34caa446352b997842cb43b60e2c796
SHA5124ddf6373559822ebeaf72092aab27cb483f8935ace7f393ec7f8e7693d75a3b9ca0085a1f0185d9cc378a0c318931ce37e1bf166015a42b1a345e407036ea494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263e0c35bf28839a42dee9faa13a58ff
SHA16b4d9779490a487fa34609c9ffeedd3e55add756
SHA256e91eead332db3feb3292c9d9230b93d9090d35fce9a3c76eee86dc1bb2f9d569
SHA5125388b48f61514722790a6c86557de63e91470201262740a17097a73626f6ec6cd4d16a320762a7a6607736f3045986b1198d8b8b55f8c635bd32bd4e63f644e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c6e147e5270a19605abe160e0dae7a
SHA1e20ff57758b4daae5a538fcbef0335e087b50e92
SHA2562210361bde598466e86d43ef368558c4089b9b078edf3a2d4c7fb4843d0b5fe1
SHA5124ceb614a69eb3fd65fa1f56a132d1139c82636b62b8e7ca452cbe5d6a2d18e43257aebc86536c2e23e9122e6578ccb2f9ea2675089ab9c4b551d9854c02c670a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b1a006adc47196f5622e5648ec6556
SHA19e990e128df1ef5cb1d231697e000274765ceb8b
SHA25621476168827e2aace6ad38fc90c2eef569f557bbad1a16460ee9d225fab77d52
SHA5123b9d474f857952f5babf7f6f709ca7cbc79831da34ee00425ad44747be75a82531a58a802c134377159941d1028d8246da1b5ff7b6b5109fec1c1e177abc7cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523cada854a90143ea1af4357d777a4fc
SHA16c8950f1670dad40c396673f7492d6d61e7483af
SHA256132c8b5b9e02f8605927f800a770f4957d0f654ffaf33741fb093053dbca660c
SHA512073341096d1de469268e168851f750ba4c08ae3b4da44959ebbe7ab73573e53d41c3fe1b0db638ee3d987cf7ea3b908555661cd59dfb595236e4e85d0da1fe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7c056a0cd0d89b2196e5866bf1cccb8
SHA1c2917965cf56c2278a6f3bd7b7e46869f4a7f561
SHA25683faa806f438b1d24744c50e01c1b46e0c0cb4c1f08cf935f3c1e41a6b27041b
SHA512764b41c5fb0f8676da06eba93377711e057289812cde9e4ee2ea43ad87d7760a474a9919fd34ee227d8954a5ffbd70e13219d7dab116cc3734ebd4248e06c059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530c46504ec0742690cb44509ee60edfe
SHA1bcc9bee966373fdd640649bd2c4e9658ab39b578
SHA256aaabc5b3d120e83e83ef9d60b89fc2258d7c874cfb7763c92c6637e99451579a
SHA51285db64166b56e15667910c29ce47f786545a6973882a64cbb1fc0d524e93c0050513f11a66306f075e23aa30d27cdc057d787a8b1486d2b4b4c97c07752d03af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e975163c75590b5b8cb30d2c2ad88862
SHA1b1fb093f0e93023d8426d98cd5f9280634a7e4a3
SHA25621aa8a8bc3f4b83f145e07c7b4dd39175471784c136b3eebf79d58e2a07a2380
SHA5121846f4331fe55fb55dc7e8eb3e2683dc0da1c7cb737c33bdadce0d41342b7119032317683686e645a88586ebbfb4c2a50409e82d585daac00979d6cbdd82b61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff0853b920e7845137973dc93574a23
SHA1c9a1a5e59dd438bb895de7acd8570da7a52f84fb
SHA2561353208f0154020a13539631551fef294191cb76e2777b8b40125fe87ca8990b
SHA512c24f3b3866adf7f281e55d27ef84dbea0af10167a07cca049d7e6eb69ad406aaf76e3ca7182b205e0aa22b9621cfe47f5da363a3e881b2c4be8b949977e3f559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b21972b2947d79af08cf32a4dfe732
SHA1b6858c8704cbeec23fc6146d3acef074ae3ede81
SHA256d40c6405d5982ececfa7ff1746b51bd9900f6303f815e3e96630e4abc12d43b4
SHA512187d792390f3e16d8030ac6319477672c16f4e62aa6dc5384a2af2da45450490a918eaecf23dc190e6ca4031cfdeeb5def246b150bb6e38937be1978a8293992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dba324d5139a7c1270464c127738903
SHA153a02a854c5676161468bc4ce9b2e1fd66e24cc6
SHA256542579c3fd008e87730840d5713321bcbdfc7406a75f7baa302ab839809c5518
SHA51269033dd45f338146bca7ca20d1521438e4e4f66cd615a3c985a51c1377317aade58a79dcae7f9d38e3aa587f896f06316b0376c7aecf3cb57979947992e3fcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f075b6133b1b8c83e7caad1f7e200f86
SHA1541ebec91b28dee05153634e37de49a58cc5cebe
SHA2560eddaaba328f6cac464986b9d8f39727e6a8acc36e0dd88f80543ec3dcf2752e
SHA512dea9482e9d2e7d79d8f384f8ee4a3675200b19643387238c1c4cbe3a1e1b18bd9aea8306bb2b59658b35243f44f534385f3ff4a9a5abe93a7cbff5114a21bfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5355ce0cf46e94eebe9f08dd537bc4bb0
SHA186c6ff761dfecba89861916481b39b8e9d2a37fa
SHA25668b4185b39b77c20b8efa81a52c76cfe0d69b1c52c24a1e1683118110b6bdccd
SHA5126de1d1bace014df02463fe765305cbd7ff4460bcee18de242186cda9209d2e30cafe22b180fe4937032d36e68a93f5d1c19dd04bb1549401b67b71587db59793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585e21a47cc0bbae4baac2921c188fea9
SHA1dde247d5a9f4fcbbe0befba0826b2889b073637e
SHA256fefad59fed6e57c0e8579e637ae792a1a0a41f9e822157cfdbae614cbca5687f
SHA512858cd8ff96265dd4261cd182df7c455965b1b490b09b57ac077ed55277b1babb118f185ad4ec8f8a8894a30e5f5ababa9134c3e500e010ec7b1ad53540a20c49
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a