Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
6afd12b2b330d86c43d0b84e3bda72d2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6afd12b2b330d86c43d0b84e3bda72d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6afd12b2b330d86c43d0b84e3bda72d2_JaffaCakes118.html
-
Size
4KB
-
MD5
6afd12b2b330d86c43d0b84e3bda72d2
-
SHA1
ba31e25b03e77f291b7ad49af803dbb4ac47193c
-
SHA256
602edcb1ea63e52101c6233b66c8fd054479f0147e21ba1e1028870d4442179f
-
SHA512
8b2fdfbbeda0a9d7764f8a407694cb9dfcb9fa9c155bde79aa8887655e5eb51596ee383ecd56931e6271d0c5130a93ccce3042669aee2f23703fafa1ed74379a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8olWd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5D6E861-1902-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ce688a0fadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068e2d75946c8ef47973d8845b42d081f0000000002000000000010660000000100002000000076894c82354f669f68bc5aaf7e3975ba7e846b048b0a7e7dc4cc67015f8e2ebe000000000e8000000002000020000000f931f1f395bc614d1fff1d6841b7abb65e03e3d47b5770499c29dfae2be5ec9f200000008b54faad3d54e359703e0b60827cec3ff1ea1f5bbadd9e7b6c820a44885fd8de40000000c4ff64b327487d808acc178892f491865d2a557d0721822f3e76cf60d304699e39142f4654208ce761d0c76f96d372502e8a4d1b61470d954721f65efe05f181 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422630358" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6afd12b2b330d86c43d0b84e3bda72d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0afb7c9fc3906eb0e9cb7a16e1be04c
SHA14b836eac933252eeff983652d19e05658dd06de7
SHA256b232e5f2c9f9107135d655cc77cb36923b8b4bc60a3d76b49fb7f0615548387f
SHA512a15da1f156f9ae5b4544a403a5d74499721ddbf49302e1217d39c42fb72ab6eedbcf03064577829e5d0677041cb494cf335e340b6e77c8dbc6f2d85d58a20c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb29cd1babe1fa52c4f20e1a5ea3387
SHA1c1a41606971579fc6e22f0eeae00712617a851db
SHA256d97bf11cd5b0bd8582f9ff4f58f14eaff3ccd0e7ca7743d35e60516e20e2a5ff
SHA512c0274809a95b88cc93cac5d1cfc2fc0eeafc0cda6c27c8ab487e5592f9eac2b46ccff10c09ce212d32a4ca9c706b1e63f18bc6f5f19bee94ad6ebf849df237b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561651acde7614d20ce1da86e45284977
SHA1e2e5c607162e1c9acba12206e39b715b893d7010
SHA256e4b47c744be92d30775a56d11465cbd9f34793c0e9b9d8632897b9b9a16241e3
SHA5126cd86133231ccbec06f3e89f691ad4e36eeb999feec790694f8f046fa6e17ea4b6c05d33614a10cf6c59c81f1adebc1e426fc8b20bc407b92c78857fdf0cbce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb0834627c8a84f88f2f26050c60bc9
SHA165de24ef7181be8507872c1a8752ff44ef820107
SHA256177c7abff9c302851c983c85d91550057de193cd817c70db15043ff759afce5e
SHA51285ec7f15d30c4f26d77384dddce88997c16ed9fb6999d04b598bc939460672d191b68efd04d57d3f6755c6d9ee4f34238c106dc2954dc510eea5f6bf6a3ece8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622a949e6f38f3763c5c221da1e1bad4
SHA1be42bb368846eb1ac694f510fa8b147353a3d951
SHA25658eaf6533562778425259188bcce38498293fb2429fabc36c57fa508486679af
SHA51210b5afc57cf81f808073adf5cd863880478788e90aa563851dedefededf766e4e551280ceba3c781b16149da5ec115de3c8edcd9634809d77d290a290c3fb961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc9ff07651a1e08e9f2e9846ea677f7
SHA1c3f474b39428754052506f2ddf35b328b5967881
SHA256b71c8d1a48d61baaab510057e8c44821748d10e094f8352963dfe98dd2ce3ed9
SHA5126dd5cb23137b4af4b42e0ab052de333e0b90c010c66c7801e2264deca14b2e5ae2333844544899531d3d89115e3bc2d7a77bdf918efe8121ca8f4c4da989b738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5576e273d0bf108f5da31c76e20071f0c
SHA1e772cfb6a0000d8bbf4d7f6602b09da7dd792bcb
SHA256ab7d9db1f95c9956d8d0fa849d08a3fc29d0eb797fd2ba7af63b78535260d576
SHA512c1ea4d167a8e69aca4fc253740e69656e7dad90c1a3e7a92f2108b96ff659e1fc0cdcce312988614fba3cdb0fdedac28d7eff6c8d7b47ae15461790bea3fb438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a3d858e1cd4d9a5c362f5e5be0890a1
SHA10af65d24a3abcda243f561967449d881ef5bb522
SHA25689673f44b872eb1666c8fe7d61f39cfc827a9737f59c8fcd1d0fc7f7c5a43cf1
SHA512be29f9cfcaa13d48fb6e427958a29091c77e1fb3fdf74a01290aad50fe67e0c0cd3a2b0e23ee559b32185a42228a3b144f3bfddeb3b2a708eb7815977e477610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50393a15dd226f4c98f1d8016e3e9de8b
SHA1f1daabe81f4fdfad187c5461806f5dacb07d9d38
SHA25673ac9b0373a3ce3da78ae7266f84920323402412ec3342c27e2cd40456b45103
SHA512dbc270ff8b09035296165b668972d336b1901217ac6e861de4821bad6258778446fb56d80caab915fbf332af41d5873d7e297c5dd8ba37299e7b66d97750bdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4abb67dfd5e354f8371a61cd86b844b
SHA19560e30fee52593ddcf0324a8c615e782b444a50
SHA256c280b49825d955443fb5f993759f54a3f930ed21d0e8e182b819e6b4f56b9669
SHA5123b0f4081e35436fbdabcaaa696dbf981671beffb130bce5424bd457667b4dc4dcd257086e82d27b54bd7520b0b708260e6212f8a3befdd6052022d4f38bb27c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f0ed3ec9338ab6cc644f0b6a141d43
SHA10d1a8528717c38dc0d6e492ee0ab4476d4128910
SHA25662e0956f4bff9c9102a2b2741248236fe65dfc14cea2aafa4df1f191ed203060
SHA512c144fd128066a179eb40addcf81cd2fe8a620d740db7292070322e23dd1c153832d122eab9d519595c5632308b78a8e832841cb9eb1701734418a328b2dbe6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5794a789c065ca2a35fbeb723c96e0d7b
SHA1095f4634637d7b703d55e981a394089a7baaf785
SHA256861d7bf02ec1372e7769649ac4242577ed6e55a26a8f805bb22cb7872f25b312
SHA512b353a15b9d4e68c5b7605e12ccb757e913b335aff45452a96c64b018e0f79a13c1db3beab21b842e8f5c711429fa91886a3581014c856f68a5fb50ea704a1c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020d87751a70d63ff9ba95289858f64f
SHA109e750f202533ada40d3b5d1b39db9de1a943d62
SHA2569d419dd88c58a29943112151794d165b918f05ca81fcf23b808ca8ef0c9e9cc9
SHA512618484f003615463c8fc3288d9e8162d80fecff6d4a27466f24cbcba518fa4247ca218e1e798808c7361c16caea4efff61cc08463d19cb9451fbfa00042665ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c4babffbcaf2c4374c2ee37030819e
SHA1f4e81e4ea14be03c28b436c5f7c7f9c7728de601
SHA256c5fa6cfc0c35eb65794205f982ac12b0d028d81249256185e340d1da36e791b3
SHA512f5ec1427cb6a3b81e2bc1eed82a8e2a4d3c3b5c517cc5e8a4a9cb0c76618daf384952c4d442ff879005ef4efd3af8cfdbf7df61b0cd3948a94c99c89e3d7abcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efabac77808bc7e26f73a162edda9785
SHA104d75cd2ac22efcf500abdf9d92fc68898a011bc
SHA2561c018524c2960d72130f4a20ef05dfd4f181c820ad4828355db4c5aabced12d3
SHA5129ea34e5260d4fde546047e6d957cf7de43504a3e51596f3304a931bca7541f7d4bd2988fe81abb149d8f59e74010caf09a153f12b0cf9014595124cd60545b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d9220db26158f1a8fe9878c6943fea
SHA17722943934fbfa0995366fafb30385ff8fc95351
SHA2561be82ac2b907b10398bb799202c93d82b2c6862855ab28d60720b61058550b2e
SHA5123d5e7398a600c2b9444da596a7ea471f2404fac88f00d601b57b78d4ead145c434fb94f57795a536ddc1248becb101839975951738d9601981f6ded79e4090db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f39bd4262d35349e1f304155645dac1e
SHA11695b3c36ad8149ce4f9621b4537355a4b1b8acd
SHA25635c6aaab683d4efc93e4bf19aa6e09b93643c1c7e2505e0ad4eebf522e819b70
SHA51260c9e883ad05e6846d9ef3a2833b00ae6dfb9b34beee687a4502e4445e1d6bffb23a2b464999968fe0a23c234bd73aa28de43fcd91e3b2c9cbf9a0abe9078518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf77a8d680f10f5aa2a1cc532ec48126
SHA1fa20ae20f9552ad13e1ddb9b21b9e536c2a64d49
SHA256435b40efe41c25073f2a0cdcbe67eab9990120baaaa467e530e8362adaa1d1f1
SHA512c5b0e5fea14ea24c3d9be78978485f13ab8eb1062e51922c5851bf36f679e34362ef08a227aeacfc0498986346706f28f40d0f916530eca0d9609eb34d856eef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a