Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
6b1b768cdc5cd3f4b13009e41c61d261_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6b1b768cdc5cd3f4b13009e41c61d261_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b1b768cdc5cd3f4b13009e41c61d261_JaffaCakes118.html
-
Size
3KB
-
MD5
6b1b768cdc5cd3f4b13009e41c61d261
-
SHA1
e5876419ae5d8ca6af5110297d01a1680c5c49d3
-
SHA256
6bbf69b613846765520081e708adb7d87eeb3fd64aa69936550758ed6bf222a5
-
SHA512
cd04658e9fb4d48e518d6e4707fae65f6b1f9ae62b53cadf0212d61eef96b438bc1442135a079fa62f9ec966b379fb3c59aee3cf594f8663cd20d31e331121e5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422633203" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40405b2a16adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55998821-1909-11EF-A339-D22A4FF6EED8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000036e17b4cb8217f4e861e8da686daaeb20000000002000000000010660000000100002000000052e6f7ece32081afbe23ca720807fb4fc55f021086b1a90e9f35aa4723564920000000000e80000000020000200000005f4f14b0c3ddaa237fdf40a2118f6396d56b978bbc18b83294d7d75ad407b2d92000000082b1b23ee11571aed14dfa88c683848bd836700b8ed780703927d7763d925f5e400000005d66d3ac4b5a4470895c51528f6b06c029357a942c6be8de02b21a6ee12f991c7be498601fc4a060d8a98db323fb343fc2c55cbc265ae7757810bd37e54261f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2512 2804 iexplore.exe 28 PID 2804 wrote to memory of 2512 2804 iexplore.exe 28 PID 2804 wrote to memory of 2512 2804 iexplore.exe 28 PID 2804 wrote to memory of 2512 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b1b768cdc5cd3f4b13009e41c61d261_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf52f09e52734c192475a17f108ef97
SHA1e5df3b05b2aac45087fbc93e917b587af4a15fa0
SHA256fb7fb83bc02f100da69a8a419abffcbe937fb9b757a6ebff60d6e16f8168f146
SHA512fe1e91441bc7af56c6712d50b2fee298ce85d463dff736cf02292b8481b3176354afa4bd62a81e2e5cd9862d920d0eb17fc8c8e25df78ae1ef81a7aa98f22363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f14892f5a869738bbc81257a7d5e8b
SHA14387cc085a29cf5f70cd0a66004a1a54d647294c
SHA256029093d3a784772d6ae9e32a58ece566bdc79db82608cbd8298e5a7ebb786393
SHA512579d9cf9ee580925ce820f93b44fdf8d3ed9312831ff2b0ed4fc38164903b59f993cc284fccd5fb8b81a7a0a6390833596b6e1a8c76e1b065f3cb3bd34a0927d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c2d61921207d675e4cdcc7a9a92ab2
SHA1a61f31614858c26674c4b10247c4d0e22124ad24
SHA25607ad9bc4cdee32bc722091f679c99e41fbcda40137769e8553835ed715599378
SHA512fa5ccb6b05850823d6a3c76e3599f30df6dcdced3784053b7c5c6aad3956a91ffad9f03f3cae5240b331e1539121c7e6005eb1c4667c2a376ef781e049205b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b6d56eee82ef1bc33ed0562f7c0460
SHA16b382870480ddaa9e559de8849741d75cd980580
SHA25684fa471c19de1ae3b0b4e0ba4b778565eb9b69758eabc4bfc37daafeb1ee98a2
SHA512424c47882555e2abeb4b6cd3ae5d2cb6543d47c074b5bed4c01e07b9e15a45a7bbbd23c53e1c449425a476de6afd7e3324e8dcf31196442593f503bb3a912bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e1114e068bfc4f8607748fc9825d61
SHA1b82aa81fb5618805a61146902f332fb40fb5154a
SHA256f429e34fbfe5923018a44119ae5794fb2dbb995016c08a615a271395fe8e5b25
SHA512091554145f07490b9a1c48746804f63d466acea050bee4ce1293ce04f999b434e142f534402a213a2009a36a37478ac64d2fd600bd4c5baafbd39c944ec3d2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2dd64e33885d3cc21ede6c10ba27424
SHA17275ab64c7e107843a36507db459adaf33fc7ac8
SHA256f8850069e0f538618c9288cdc5b65ad3869321d921d27ba8cbe0161ac2234ac9
SHA51233e733adf0a4e0d8764c0ef9afd48392cd713fa7f643ac2d3f59a36e3209f2bf6d71c2257e9b04aba90e3b89b0e08c0c248cd528c2855e110a5280b4e7ee9f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd981643de5b5f284223163646ca8d89
SHA1d245876ce83b39aa452e8e3fa98051f1db69ff78
SHA256a62e64f167f44570d542fe441f6bd993b686b30e3e7a05cf13c3e62e6a2761ad
SHA512a468498bc41a0b6c89b059ff1f277b72826ce47d9a2ff2a5d0968f0481e4ca06ca4ec1bbdda31b97683f5c8b6f7eb0b721eb923be34ea7ee0fc10323ab61af86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb19557fec1c7244b2e05ea1fc4288ec
SHA167375685a0834ab35b89e2dac97a962a99450af5
SHA25642b52fb84f293caab82ac7c007b4455f9f0499001980ac7740c60ccd13bed713
SHA5122bb36103a327c55771a5f819ff8c694089f4f84fbb0fdaca2f822b0370a5f871b72cec2e9ff7b0b6c3a0ee5ab84373d72057d2233af723208b155e95d4e83ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d2d4b3dc0f875d2fa2e639ae284619
SHA1e52b51ecbf7725a5643769352c887d38a02c1f51
SHA256d346c908ac4b0deb2b1341a728b4298f20a6367a98ddc66e83422f70f135ee95
SHA512f24fe7eb58ddcec462a89a5e765e793fbb26cbe45c9eb4098e55ffb5f4f2abd4ae2ce79d4821e4416f5a0d3503d618a9eb51f4951a174967b954c2275b732586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57658492aa3f4000aae28fc1772708bc0
SHA1b3ac7a43b784c9a00c7f7d74d0a39a05f200cb62
SHA256ead1fa4c20f14c124569bce5db227fe060ff28071246801dddba98e8b5de1216
SHA51223259c06f86ac7105998542fea8a5a233bfdceb67f380e401c21b911bb23b013c7957eb5a82c29b10d44a99de3149fea4be5f20432491f69ee664150b2d5eb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee26cdf43fb2c3b482d362450a9f794
SHA16b538329c0d53f7cb0d57b8cd21e8d051acf6ea1
SHA256f9d8b680ba523a6d513433b9413930c37594b04f348d6d1c56a99af4e51ca17f
SHA512c0d10808a406c61b205a9845c84c02b7d8bde831eae24f053613feeff19570418824edfe817c655d3f2132eeb2a72da32fccc36c999284d51283b7e718084a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec000eab95f07ef7897bb5c8d4ec11ff
SHA142ec900a2e05fd0dcdba53b48fa140388b20f2b1
SHA256f37856f5463b3fdd18061c695073770c628bcc48508a6d34228a9912d23b47a6
SHA512d1c5e2b563ccb9baf7b3715c4cde8deb92ad0636a42899e9a95b4db171a92d52a7a0f7d5c5749a123bce3b0c89e53c1721f84c7b9002618d4520c1a3161a36d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c906dcee6fff0332059c2e6010353e48
SHA123041c033a869c6477834576c7f6fb23699cf15b
SHA2569fe9e3f84131eb3710d93e2efb471d6c63e2adae7ebfcbf6d6af4151c53c9c7a
SHA5126a083add785a60e9d3d755f18ad73f17e4805aa3647afce5d2aed65d3525410fc1363d66b9747327216bb9952b01cbf853a3291ad74f94f09acb2ef33144a03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f070c64a66dc57e2b7343a9a2d84c6fd
SHA151c3c55a46d6507470526f857f924dd8da33befd
SHA256e00e9f81d2121c639e8f13262bbade55a7228701be0ee96ce43cf10b33b0ba03
SHA5126816855223351e97524398eb50c7adb2e798e73562551b3bba6b5df74ccd1201d77571c70a46bbbcea2e6fa2962893184e95258675cde69b5641007bf32e2de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c70af05046ce78f1cdf809ab168193f
SHA1321a3fd82285f00182c66b46dc0ad24791765afb
SHA25681feed4330e105ec25c9e0fb4ed935634079617270061e0ed563e1343579283b
SHA5120bb7268993d8961ace064a2481c20e80acb915ab4eddbeb7881f3b68789d9ae3d6dc387ed34db9df6de086c800fe3c1342bd28a80e2985c1844ee6dbfa98c6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d083cb9847ca8ef44777a8bb96c6bfb9
SHA1a05516c93cbd3161518892d91a15878a0f5e24a3
SHA25653571fc85b598f8f9dc5b5f5476728fa1447d3177ee3608269d05fee73d397c1
SHA512e9b4c798142db4368a08ff2447d30a3360008d8fe21192b1af3fa9c2480e587b1152c5b67b0147c4394ee11a21f33560e3bcf4977e8d2104fa96c95a46180b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6da4222085308c8f178743c78bce1d
SHA1f9a3ee2252e5823f406a0256fb9f20b9b7fbcef7
SHA256074436c6b3e7eed64a26a11215127f191f512d612b4244e17d240c35b8b49e9d
SHA51272e18d93fbac6ad1bf39c6c177b86cf4c56cb77b3f46e6627c961fed6b56564a9b8b24c8c3da2345d78176a7191a8e2aa38b05026ba63db7c691d237c87becea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa5870af88a7eed44c001631f9e6d7e8
SHA10ddb78c58d076e36d44b243f1be14f346230b9b6
SHA2568f14fd849abb85bd7173e93431c2aa5f68ba43943b0cd8e2dbcad84662963e9c
SHA5126a68b98c968d6699541266fafc26135cebb27fa221c5d8245d05cff95205ce7a4384d52fa9483fcf0e2ab7df606cea3f25ae837a77454d9883459522afaf37d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d22bfc0b677633749684ecd5abccf00
SHA1f37f59847fb0c8150e612a90d8b219ee4a286eaf
SHA256ba3eba41d9eb1ad33cba41aed2a4fbd019901356d5462b6f38b8342d7557eee7
SHA512dc2407236f4dd95042f0481fe4f368ed1ee8e6b3f14821377c95fdf7fbfe594af06eb65c0cf872edfe351375a399ab7e700d26eac58678c5e36df5aafb17f1a2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a