Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
6b46251bda61ffa670ab1f737460f2ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b46251bda61ffa670ab1f737460f2ca_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b46251bda61ffa670ab1f737460f2ca_JaffaCakes118.html
-
Size
461KB
-
MD5
6b46251bda61ffa670ab1f737460f2ca
-
SHA1
4080c8ce095fb58d7155111731b20536fa7ebfc3
-
SHA256
0e8a75ef64ee957eca224957fc6df8bb6fb54fae2b9172068584ad67b81ac1d0
-
SHA512
3751833530f5ed0aa1ee0bea3071cb3e75b1ac2cb47a3db7fc272986fb8282f174d7ab47a3b089ca5a31f4b76ef1c47f985f8a0d573c7cc0fff3ea3dafe9e8ce
-
SSDEEP
6144:SwsMYod+X3oI+YdPsMYod+X3oI+YZsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3D5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bdd3d10f6ecb594391953982abb4a61c00000000020000000000106600000001000020000000993f5d47e80547fe282715533042578f97fbd07d55dc8291c93509af2ac5fbce000000000e80000000020000200000008253383fb15c183aa0e83ee83408dc67cc8bf54602bd9888e3c8b25fdfcc38fa200000005d9c2cf11d22156b88952e988a2354da1e50e276381a7d4621f11fc471dc30ac40000000d545c67d19e0292cd12d5e7541c4af940c1a315228976616028bc2c35f5a9f97d5c367b1abb47665177a4a8d278db7a3684608af178cb7f68b27a6520a4b420d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{935343A1-1912-11EF-BECC-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d7d76b1fadda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422637172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2760 2928 iexplore.exe 28 PID 2928 wrote to memory of 2760 2928 iexplore.exe 28 PID 2928 wrote to memory of 2760 2928 iexplore.exe 28 PID 2928 wrote to memory of 2760 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b46251bda61ffa670ab1f737460f2ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d31a3420e0824854177b71725a41aad
SHA17e9814a78cb1449003857cd7445aaea6730dcf05
SHA256480852af79e8ff2db6b020db55379d44960eb7e513ca17dd8c4a5140e32529c0
SHA512246d8b41fa6be3bba3ae145a01ea9f0bf22ed2531463a8221c3922c468305ed7b43b057a77e61967de9f4e2fa89c5e4063d0f8f689767d88777838c23d55b95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5546032b1197424d4f3c97a95864e0bd4
SHA19ea8896bcffb485ca4eb85eaac2e7a91175caddf
SHA2568c78bc85968d2dd752dd08ad7caa18565afe15f46f8cf2b577b7ebcf04817c55
SHA5123c54adfaec9be108878abf538bb935666bdfd577d16724ec8eb2666ad3bd1e6010e504223989522d6f75e9ac2f2fecb1478a1f135259108532743ea7e10b1304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bf82af9e70bd1cec76ad84a7004a69
SHA194d6558b20239f66d66295d643d40507675c14be
SHA25602439fa7b186a9632b9ebf5275c9bda24914a997a222e02f34bd89d87997e9da
SHA5123c8cc145ab62cab8fdf8ebe86315504317dddc6b35492674479adf706f3a54d85f9753fe65c167c487fc7e412e47a207380ee85b05c54892526a57f25ec8e390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503596c71af8531d97ce296a828be4084
SHA10eaec5418b1fef3a77e2d00159933c7b66b005e2
SHA256b7c46ee00d85b2ad5b6660e9b8babe2ae2c805c198d030ff2c85918d743de15d
SHA512cbe2217658d96ca52d6418fe88322e5f1e78ffe6655abdc95662fd37a1dddd60bf89163c9f20f92d2d0ec15ef54894ae83fa767875ada84d2e937d7d2bbec1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15a8b950c29e92fbb3c45f6976becff
SHA185df0ea2373e180ea5b4a3bb23d2d99c3263d85b
SHA2569d8795627240029ca0f8c88c0306be32dc7fb4844055430b1e292ccb833988d1
SHA512020c129109cb27d1b165201d42f9058e0a089ed718043f96923d15ea64db169fbad0cea51af7c6f8b98604a0365f0aec225fe2099a93d774caafb3fdcd4138c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc50397b59c1460b37ac1fec51bb6e0b
SHA1aad9295c1b356f484e0185f7fc2ac9904b910ca6
SHA2569fb3aa58776729fc5724f3e5cb0f289ec0aa9169a83d9a54d5eae314bdee9932
SHA512459a4d4c2c66f7cd8c4002a09c9160ac1a3932c9b7da12f13c4a3d857827e254e1a1aa824d80f8da31d683b6fea727da49b8ae147684a072907ec85d8cf69447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aced5d6543a2cbd4999b8d32188c42a5
SHA1e61edf20d6d2009bb67364a6602679b61493a6fb
SHA2561192525ad69655f727258946ccd46c6924db2b0c15ed1fa7227af54ea37d66a7
SHA512e00a46c5b3cc5775e62ca629740426d2e9757a75de3cfb735cd8d977f1ea0ae4da2deb15b2a287708a48302c7246b59b10029da1450c58162554bef648dc7139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5461db5bc5473b0350a8872d0122a30b8
SHA15b8728e479f7268592854d10761a31d68c2feacd
SHA25602ab56d74b9ef1614fc17852193f7bc99f8881a9eed4cb9f582c5e965ec1ca73
SHA5124e06db4196cc8b297225cd031c49d76d50e1a2be6ba0daeecadbacf2a29d633979123aa952f045101cb6085a8eb80a7d37257cfd530dabfca1350770347681fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d664b0bd63309db1bec0cc82188b2d
SHA14789d6e8bcd2880c72fab6c516b66277638e414b
SHA2560534a0b0189769d00aefa475bc685e5bd0d8dbfc89d4adef44e5e052531d595c
SHA512bb4bdedcc78659fe0b6e3e873ee77f7aec5842fe7acc941d97ec3bb593275da699f6b6b1a2cbc4367fd4cace5e8e9fe342a1bdf8612b0743e760e94da17c460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dcd21db4b7fd5ebad59ee380ba3c579
SHA16c926f80c7b0d4063dbe41725fdfc574c2810be4
SHA25652b815451f5e2f9041e4b29da02d11ba50d66a50188120c8df74e4c77698c926
SHA512943139fb957b01fcaf6c160a8d0171cbf7ee0e8d4b3ce0206b5336d9652520d0f64f4df02815e93c7de7b313adad4461abd5853eb7748fe9e16f2d81f382f4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3a9eeb13c155d9933d19eaf3cd25baf
SHA1657b75eaf2401a3a5ba870f276a110ad47c616c1
SHA256dbad60a6d421e8004c06fd93a801adce4163841feaf40e33c90b0a074fcdf339
SHA512cc9228c84ddf7e2b4454c38ba7f7732abd55333056c87cfa57bb178e5f368ec98448e0bdd75803780f46af51ffbe158957843a814310d41c09cc535eaaeee24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be13bfb03f05283112a04f77471f1eff
SHA1497b62e517c5f4f862bbab462d15e276203cfc13
SHA256ec25b9c8fb62d5b552f6ed2ff17145ba32ebee10e72621a0c4d17f0fe17b9982
SHA51227da83b2d5f3d5b6ae542a2d3de42c0b8bd00bab7dd4cf84b6ef1de8089e1e8f789cb18fece88e31b62f263dfd9fdbe1dba9d91aea906b5fa064380b418a2cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9eb6d0d3ea83a49808562f56cd33d7
SHA19777a88e051ca266e25385e11ecb520f4c3b8d78
SHA2563afccc60301d76d8a2b4d4e293fe13669d8849aeced4afd977f7006a0175b25d
SHA5124612219afcbcd67703b75c9fc3f5163ed0b8195baf9f84476d91637416afbe4db84fc675f603582f699bbaa25a1eabc0279be5208f466d0918c2df3542d9a4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7b2a1d711ac8e7b8d3b9c22bc4c25d
SHA1750a0e3783de23b37970e5c1bb6bd368e23d2810
SHA256093306fdcb2f018b06875cfaaf8ff682cccc7c0c1b067f2f36a19c8ef85f7551
SHA512d84a252a1751206858e9c877f5b961e060517fed0e8c7dfd831a2b715895a0fc5aea2d39a288e5c624048492587198f46e31177123c43b6d07aec3da3e3ec2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d311225b86ab73ec054902e54f5038bf
SHA1614a5dea032feab9f660dad3057ae84b0f4a6e43
SHA256243bcc9b9b917568a08dfe005c75cd21dfc17ef23616a4cd00101470e4d81e91
SHA512319ca501e983d54dd6632b49b64958401cd57932d0d6c9a167899585a8044615815bef4dcd06b603a6d0727b2f54402b21494f48dc202c34778028f0c96fd39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593570183a7becac8cefea52c14b5c713
SHA17c7164873f2c885badbdd4a95638366f335b6c04
SHA256ca63469d735366247a4bd3283fe2da2ee827b5cf1a367490928c2fac7e2e3b2c
SHA5128ef391f2af22712d278c7be38f06e63d31bb46460a1f950c8f77258654e72016cd402c3dadc516fa589d1275c87c14c1f5aa80d3765e8b12f2411fdccb70221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce2d5378eb2b365892d9279fa8e85cf1
SHA125a9a39ffca76312fa451d9d1928229d21bf2a0d
SHA25677947d9c942c3bf52dcbe24fa9dae00f330810e0d63b19c449847611296c6958
SHA512f41cc26c16f47cc5d22f6467497bcfb7f2e94c18243adede26b2660c3c6d54055894110f2abcdcf12a8d971b3998ee36d280222a54a368510d2aa14a1c0a5d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed88be2fb6c1e3e9e59491e4409b0ffc
SHA1e89ce021513f0312bf4fcefd69438a247782f508
SHA256996d868a15100e4ba01cebf581b7d5ca20c6433eeede83ae77a5ed8444399b9d
SHA512b225f2b05c282550d78d672680a272bd121084d17446b1ef01f6ded6c3f84feafbb0f774c0c1b41d7d1cdd1788fe1f77be2a17ea169ce6095aed08267b6f7adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1cf3675040ef3bd2b5193af6da530b
SHA181e16f93d34d33e46796eba9b5c5c7179aba3c7a
SHA256407dfe2970ee394852f6cb3ef8c126391f35a8942ccd85d595d8712045eddbdb
SHA512486d7e0e46a30aed7c88c76f3542d82e82ba036f755c2abfd92cd10ff6bf64c0c6627bb814a6c2eeefa25ef74cdd23e6a44c01c0905fab2db2e96a462d650d54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a