Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
6ab96ca2361bdc60eb1e45c583eaaf78_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6ab96ca2361bdc60eb1e45c583eaaf78_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6ab96ca2361bdc60eb1e45c583eaaf78_JaffaCakes118.html
-
Size
38KB
-
MD5
6ab96ca2361bdc60eb1e45c583eaaf78
-
SHA1
d969f3d2b42af89bd592eff4116b0104c50e99ca
-
SHA256
ae71edfc9756ed0d02f67c4e595b2eef9857b4266cb224bd2dd25d8855d093b2
-
SHA512
511c3fdad0bd2e32791f78f402d5c3b28656068d1e690966fe2989c1edac4054dda329a4bc81ae494874d13490f4bc1e68e6042474eecf4a6597db386e2c0d4d
-
SSDEEP
384:Sn1YhcUZzpwx9S0xyqCW/qLvIhwFB+Nr1eqZEBeLwwce9B2DalJA1G5cGqXQaK:SnqhcUZdw2ayjews+Beqb0F
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffdc1582c10f0d4386a5c34b87520d3b000000000200000000001066000000010000200000000680310f06b8f4898d33c3d47f88f4ae244f526e26129ed42622e28683465d7e000000000e80000000020000200000002dc4237ea94070bdbb1c9c778eeb3f55dee8949ba8e3d9b0d8f37ccc77ab771c20000000cc7fae6c299e93c7b8c384d866a6d1f22d5619c2b0ae67b5bce616c5aac433f74000000072197b083b991d0bc0c5e5972593ac49413009980cc60f776503776230bb016da0fbbe367018ed2c8df3ca10e7e217edd8f0d556767660882833473b0c2b2ae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422623929" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40295cab00adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDD79AF1-18F3-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ab96ca2361bdc60eb1e45c583eaaf78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b724643fabe37732f2b08f634be11cc
SHA18c9d53b00badbf534f14dbec9bbc62471d30a5ff
SHA256751c3964b2cd69ef36eafe34b4c1ab384620725e1bd399dc7c4f2c05fb3678df
SHA512a289aecfcbbfe7c5c7f9acf1f7b4f0c783ce3d17f727aeaf5de3b6e32f60982c0f5ad32c5eeee567f0638b163966f9edb7dcada85510c187ba2e5b12d1b60714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545bbdef5ece80dd6cc47030e5df44ebf
SHA1fe9a7f35e29de56d5440f3903b82c28d8cbe3b78
SHA256ba2086b6902e201651774788279219e4291dc597fe4d4e143acd1ab781171470
SHA512670ffd3f33160daf1f52334f125103ee172c2f2d1398da47d215db920eb27c8489b54f7d3a33959879968f7d53493ebe3d85a16e4c7a25615f25cf618fa90fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f64e6f5ff4dfeefb80f928813686124
SHA1124d122a2f5b57b6e72ad1144fa7e17cebaa2f49
SHA256c4d4cf41f8318eb71b6457477a57bf2e8fedb2a260e12fd4f922866a0d622049
SHA512f81be0d8ae834723d5a3d8a8e7ef017efd330aef68c773d420ce8498279946cc65e5c394d6e5b0d5bbf5c48a338cff7be904670f77bc9998fc791c7ab0ded7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced915bca0a8ee567b8e3f418f9a0368
SHA1d5e3f5a77d905e24f76cb8dba539cc722aaf937a
SHA256e66c7a472de4f3208b4c80290ef12c9ada28cff5928b6cadcd1aa2fc871156f0
SHA512ddc2caec3159225562356a15e7fe60e40bb847f4f6b929e336c00b3a959fba00985b93915c53cdb86f436a00bbaa8dca089ad713ac85f8f9b2b2ae8935890df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7548db3298ceb1239df8d7bca4e8c4
SHA16d3b9b34758bc0dc861708280e3211071bcc8af2
SHA256735b8ef23f1ed8dc3e81f744dbdb5951f6455be1f8b77bde56b163c94ee81895
SHA512318bed967226d6e073786bf9ca51bed5b9abb440f26ece446e79fbcc4545ebf85792e227a829db0d1653a611d9b8193db9b8543d11d089ba728900a64d6cd6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a77e40c4aacd92979cf618b12c8b51
SHA1cf7c5b1cbd071f67fdce53c567347f768c62ffe9
SHA256e79a3796ff895b316281c5d6c98eb524e137ecff7a620b3f708d8e6abc815c13
SHA512ecd33f6b6327988866c164bb6016b60d17d1584b9df28632eec58a9e549bc64f688e49518f6205f37b0a96be373a8b01183eedcd6155f00323bb7f9ab272abaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ca0c7567ff28dfff643c60359ada91
SHA132d67c3d654fafb3b104d5f478d05f614d923257
SHA25677ffb2ae653b7aeb06acda241f61998033977c63c8298b7f3971e8114b3e3cfc
SHA5125ce9a05dcb15135593b8c508f14162433756ecdde2405f3501344519d15eaebb8d1ba7b130e9b8cca47432628ec1a87bfd7ed32a8f5f9a38ffd0cc8d3e581fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb66d4a437f17fee322fcdda2665b42
SHA127f7ea7b2685b200935354022ad51aba6a9897e0
SHA2561a113eb1c81955950ce5d6542e79fe557a606b9abca33a642074eb78b930ab7f
SHA512d4e2f128cfbac351a2ec54c1069af182b664773c8c9c33a65d530645693dd186be53d6f8f756b351365e5d753c02426f67265725111efffacfa46334e2bce819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b55d71d81552e58a0b3697f6fbc98cb
SHA11527e00b1ca075d282b5a784b88958d46d930b0c
SHA2565c1d36341110e28ad868c06583c9f63c040c040d82f228afa48d3c3f5f79a30f
SHA512bf8281e06b74a174c0008b60408c9124684325dd80ff88f680939471c6a874befd6307f8b195ae43dd77e0b93a1aad92604c48222c0c1cd715727c700ccff504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d86634d1a0b20fb6995b6ca0c4f8ee8
SHA16d164caa3c3451fcb08e686e29042a27fb8ca942
SHA256ed943ca3d3c30463b45d565c0a5587277c2bbf23dce5ac1319a691d5bf076af7
SHA512581ce7a8af248ec9a86ec9a06de40b0a89ea32a088e1c9c67a0d5f93df8ed8ff516943874084b5fab648c0b5e41b677e29ec2323325943b69b4e62025a93d29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516fc8813b25a1fa2b4511a946748bd8a
SHA1f8e4377816cbff4a13a09da3fe7b511d9d849b13
SHA2567d9e50ac03523c86b03a376d22791c194b914117fae66f0f8a58076da3081d83
SHA5124d0b73547461ed03767387758504edb5d99bc3f6d115255d266cd9fde7ec1b7f9b5d02b89af1cf170d2989bbbb9f9067f4becc14f4d5291943d76d68542bcfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a472e8be6b2042af7c6e642284e9742c
SHA15406c403bb0a10e83d3c28eafa9bb747569f25a0
SHA256d15a453c0cd296b6aeefde6aeae9e5109fcb37b4e418eb2a9fe8fb6221b09c10
SHA512f14ca79ffd96ff8d5361ea770d0b1a1daafc1e3f2d31087dba00d3d90d95c80cd79edef890bed4f301dce5b70007f377c5203534a7f8e727356cb19e4485a8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ae86f9fe3c68d8564e399a3a8a6c65
SHA19c0a3ea843af3a8e868b715903800eec617e1d12
SHA25648d8cbb45da9cbfa1eabf5438b7e8d9dcc2fae58f05be5df78d127b4e8430ea0
SHA512cbb543faa1dfd4a885d4c577acc1405d0fa96f34738d5426e02dbdbb7c0021ff7a8de6b1efdd5e14a9f2401beef2f9d2afef42dc8c9c451a718e33440d63445c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f1f345ecafd2720b61c8ed27170f12
SHA10a0c0c653af3a1b23681b5d04104f18d4d2fb7d9
SHA256ea03703c6ca52687f518d664b5a6dcb392657ae349af0f87d67f84f532c2fa2a
SHA5122499ec979dd38f6593fce35041c34179f95185132f54b92d4f4c4d44b22b0537d0ec7bc9c1a80df2c79183b9e23b8e2612a2cad5a0897356df8425d173939659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b20bc2b320f83b71ce9fc7a3524180a3
SHA1688e35eeeed59b40147c6e01ce3ded7dbac2bead
SHA2566ee754900b2121862a13d1ad200bb5f9e96bd525e9b740094dee2c1139f2802e
SHA512f04c9a8073206e7081eeccdf68dd52c696a466a0f5a074ba869c1ff9c9e8677e529cdc94fb51d94533cf096b6c03fb54d1848a1e998ddd218937026e09fe63ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5df8cd3d8a7f77ca2ee030b4a3e3e71
SHA16a6f04abcfc144dfaa444a8414a4d40c23bb7c18
SHA256d5f426931381fcea5e808faaf4772c99be0f2254b7b51d635992922a1a6921ea
SHA512241287a798c5563428840629d7ea4faf805611b41ca3499536b66bd3ac405d4b8a1262bf480d5fb680982263e0562cc8be0c51422fe55bc416892132ed637442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544719f9cffa0e52014fcdd6c82c06961
SHA1c369655e02af2f9541dd49793b215df63210ab4c
SHA256002c9ec90b6ef8ccc4b0d3bd44e17245cc9a059eaae0a543cf05b0475fb9a00d
SHA51250369230c703ba208367b59b4a795986b87d96955fa3bccf5ac7d6618a239f2800149954a27d31be24e9b347b8cf77a0af2b1f83e372f6e07e1a09b12236137d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656a9f5981343a0d575e6f8d66617547
SHA140398a9dbf7a7963d9db95b011d96b17bc8f02a8
SHA2560bfdb0644b224cb482df60f0fa1f806b227250c7ed26490f81392dbdac108d19
SHA51285914f20db87a87afaa3d394ddc4e0903cc58ee1de82c537ebbad4bfdc9b60215d1e678a9134e1a0ceaf9fe5a92f101be715f86687386950cd1ef5a5a325ee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53621c05ad77c3ecf7309e2f5d58e00d1
SHA1c820daa98e59d90bbe964985eefca15fd3124955
SHA256c97a64aa5a1222e3a38d259ce8fd082ecd7dd00a1d01534d33ce5e74cd8477c0
SHA5127e40d6529657e20e8bfc453178532a8ef42948623ca841e85c43cd1a384e1d10b60cc122e32900086c9b5007574e8cce0c6b3eb5c054b0ed84af86a0d26bbd4f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a