Analysis
-
max time kernel
129s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
6aadca464241ef08dc24abd307f0b6c0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6aadca464241ef08dc24abd307f0b6c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6aadca464241ef08dc24abd307f0b6c0_JaffaCakes118.html
-
Size
116KB
-
MD5
6aadca464241ef08dc24abd307f0b6c0
-
SHA1
754f63abf6658a95530ad0772a383dee94a08cd4
-
SHA256
f6c27819a7da1b19a546109b16856bf46b58c698d4489915562d6291a579fc17
-
SHA512
c4983852ead88ee434fc6f1b1b36f6102e12d15bedf9d2a14d4fe4c1dbb5351f74428b1826a1afce3b8e977c2470c63dd286a30982a454b05147448892e666af
-
SSDEEP
3072:DkADkAokAIEZkARTcr0uGNMxZPdJXxPTNkAr+SIW4+g4aC2S8EE/VFh7CKVO5zBX:DkADkAokAIEZkARTcr0uGNMx5dJXxPT3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000caef93724bcf524b9f7f9a74e38b879c000000000200000000001066000000010000200000000e2ae388e08e558a10bbe69af2ece595ad379b177cd567ca35c248b7afdbe378000000000e800000000200002000000021bb2ce18161164e03ae50af4706ab1c62732169a6937a6d6406ce28f70e93d020000000885eaef9af6ce36deeea12c898cffa901d741c24f550cc5c7c30803dee5d4c2c400000004ac922b30e9ba5d1441b3e61e82dc794e3f9a4a27eec9dcd7648fdd36697e4bf8de7bc30f5883950a06e12014902558036a3861f805102cf57b255af0a510ab3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08c3451feacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422622953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{722662F1-18F1-11EF-9680-DA96D1126947} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6aadca464241ef08dc24abd307f0b6c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e4cacc9fa4adc8a6751aaf917c99e447
SHA1d27c0b41d3fe6627c82ea3e6e762b1474f64ba51
SHA2566ebb6b38a3cab01ca3d714f8df8b1d1dc0f159922fe9ae5e104dcd27c59eaf30
SHA512fc104a463bf08270217f88841c8690dcb264abeebf8bd78dfda2dd2bd4fa85231dc7aede74e427483065ef3e6ef3f2c7e73c1c67dc274861da3421ea35927a80
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize472B
MD57fee6cd7d5cd9dee325a9d11fcd4d54a
SHA1aaf8ac6ab8195ea7984ea4d1a7710539ce91a1ef
SHA256267c2fdf328defd803fd201955bdf61cb2fbafbe63d12caafc453a6ceb5d460b
SHA512697b740ed6741ca7c38f5669b1f3cc8a3f638f11452a2e09ae8ad66428e89c1ccad10d00d5cac92733c9cd52c45d3565c64d5afb607ec78568ff390e2beb1258
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5015a393a4e606a05355d812f93cacf15
SHA1d5c3d58873e1d170574ff5ec95e0591b16b756b1
SHA256781f0a3629c97a774722d5f9ff1d1889d4d4905d52ff07fc74cfc7b019fd5bd1
SHA5126fbe56338d3b4b2fea677d19b11dba5d6915f49bb0aa64699f1365649bf10edb352208c7e0e8f1a7442d719354b85aeb70a8453d6e5ef8372bb8399908cfd2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5239fa33897e39786a10a31f2661770d9
SHA1cfbe75a28ddcf7d2026f729680a25d5d5f2d433a
SHA25694329e9ce44631daed5eaa41876156b241a51f526315ca53390fd7f76ac94b82
SHA512144e5ecc78a8a94d85619fb590e1cc4b4609969b6ed6904b39a34d38eb57629d13c73de6b40558918870c1f211a19a353fac05ef5d61825bc233100f980afb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6feacd00bfd0fa7f085a8c35904cae5
SHA1b7b1f3290c05d43b86dd66fff7887f8c1dae91b0
SHA256225ee56443b130de13994dcee6dfaf3961396b584094baa320fce7d1b304cea6
SHA51225fb1bff7626af5d1cfc2ec3db830e1ef46069b7c72a77e7cafd2fa5a64645c45c416c5f3b58884a1b5cd836a3c0b83ced8bc54b529b7ced43e19661b0ed18dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57684b723d7dc82945ebc1fb7dea7fe30
SHA17554cc7970a21b7234c86d41fae4673dd6a84c0d
SHA2566f6aba80f280b15df49b73f270b5eef6fc31c64487a5c41f2bb21bf1e121c84a
SHA512c393f0468eb7980b73cc69cf7a6488693efdb51da3cfb225a7a1e536071d61634583fc37ce2fddb735c20a0f3cfc1fc9bb610cd7d1b380f80f64a11c8cf67b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f07060628e44eac8cb1af69c6cb992
SHA1cd33731e24ca969469c3ebde9656f4f64079f5a4
SHA256564cf7bf70269cbc9d7335772c7ce626e725980cf83db7fef1f2cf8e968c02d6
SHA51236effea2431d642063d0e55081b1f1453b24c4416f221055b1ad540c864c311e5e02ac0735241fb8e55ee46fc49d720de3aa78f5005cc8eb65e6e23e16938959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb5277dc8eb096fbab3fd0486bb33088
SHA1fe4897223eeadb52ab2042970f61e07d31c0fc00
SHA256d1ca50c6ef1955a82bd7f0b93d89c53a20d41e4e00d11fd8f8472a74bfc9c37e
SHA51283b66545de17ffc8e79897e188cf67a29123d5cadbf28626da2665adc2498cf5faf5710505c4395feff47451f90b8d4d7d146ae0b5c6f7e3d11c58c0c1f56a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD560c15089ae6755e5e87c235ac519ff4f
SHA17c01bfbdce3125e4a6be63354b0678402e9a4cd2
SHA256ecffbd8a7f96c470a867c4f6d927004db543da3619c2808c6cbb40f20650b062
SHA512f9c0612732a6405546b3a9a50d2db0747fb4ba746c28361a8407ef16d466ed82aaa13a0541a811fd703dc591fb7a66b9a27a0aa16c2c3635508d7ad48dde5296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5057c1b9298661d3609b1e43ce379aa66
SHA123016c6c90833b62c7d9e63da324de0f9b5a4a48
SHA256594fd8b066fa1273f0b04743ac5cf28b1d74b67d1d161c86e5830bfab48a254b
SHA5122ce7931339a18e31e1e6220d55400bf473e4e523531d60d18fd2923c220006fedeaa12fec7366d333dd5862cea6be35b8ccb213df114f9dc01b60873230f77c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD522566d894325baf82e3ff0637ef6590a
SHA1dd852473f11e9c689bfd9396b0018197f7850867
SHA25695ddd4b9fae1d49115cf7499657b0fa241311d0057920ad89d732c9b27e1de0a
SHA51216a4f3013efbb9d53debabc69c54d4e667e8c4cf56a40c4bf7979d8181a2bed5938e9def302b0aaab588852cf397b39131e6331ef4d01ac3a97dd1759adfc065
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\cb=gapi[2].js
Filesize133KB
MD54d1bd282f5a3799d4e2880cf69af9269
SHA12ede61be138a7beaa7d6214aa278479dce258adb
SHA2565e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\platform_gapi.iframes.style.common[1].js
Filesize54KB
MD57ef4bc18139bcdbdd14c5b58b0955a67
SHA1afe44fd9a877f81a3c36f571c0fc934324c6cbd7
SHA256192bc707852c5986f930528442d88a79e5bcf4513aacc2b722a3c5e964501838
SHA5126c2920e80e4d5059588a32f75bc2b5dcc19f8d68224c0935d74f9fbf49476ca5b1ce43c279768f3d36871dfcec39f36db3fcad559c2f93cc540154cdbb04dec2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a