Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
6b4e587aadef8c3b5534b39ec2746532_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6b4e587aadef8c3b5534b39ec2746532_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b4e587aadef8c3b5534b39ec2746532_JaffaCakes118.html
-
Size
69KB
-
MD5
6b4e587aadef8c3b5534b39ec2746532
-
SHA1
c3732012a130ef97a6ac420ac2c6b10434c89930
-
SHA256
31cbfd8c33c1700a7369b44ad806599cdac2965625d6c8f9c7d728f55d544950
-
SHA512
f48426eb68b13398d0ef0026e4edcc1b73951d4faaae414928a2c6f7319369f524d108f50ce7aef6f3539ea61d2ee19098fd2679dd019fa943cec7ae1fa6d383
-
SSDEEP
1536:JZhS9ovGuia9TvNen0tbrga90hcJNnspv:JG9wGuia9TvNUq0hcJZo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8a6a48bfe16674ca9ea9cc8f2ec743600000000020000000000106600000001000020000000a02396f83f54f044b109e13bc90570089a43f9f23c1f5c23bd7fc94b5a4f1f08000000000e8000000002000020000000632e9b103660acb4c947e4e3b046ae5755e7a19ec8ed08a07dc7b617cc62089f20000000e6056be42ee5f61b20f53fb699cd4ace8dea552397bc31f53aac6c20aaf1c7f040000000c6e5585d7582839a506014b11edaff90740d4441fa464b039f578c8d18b36b10929b2e02afe0c7537939428d710a7f54d15f2e11b43e7f265724bf1dbf4dbdd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6056fc2921adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{555978B1-1914-11EF-AF73-469E18234AA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422637927" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b4e587aadef8c3b5534b39ec2746532_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c28e225c6fc4dfb64c272c4cee5b4eb
SHA1e11f1c6fdb06ba2bd921e11ce0752058aa1a2175
SHA2560a3613f266c0de178ad53e4797b839a74278cf08226f4ce58537940dd8b54340
SHA512deeec29936a3ee1fa8bb9efc44debce3a80ce21ce64e9a4b03629137b8811144459f672ffab373463efcda9f0c620b3ac2dccb5a37398da68dbd023a49f78edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558fd99f19f6679d8eadf7e1f3eba4e4b
SHA145cbb286d1e4134ee53507f8be50547238c9b9cb
SHA256db3147a3a5cc036444366c2a7b267892e58914552f2336dc90a9b820885cd664
SHA512c4afd166ef30dd475d1f73c4945013dfcccae05c3e5e4591da708eda4435e640bb3e1ecb81143acf35bda48db0b7c70597be48c44abf9740fd832b8294df8de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f04a90a27a2baaece42c68d4be74a577
SHA1c7db94e6f34ca1c6c366605d416e557006ba5226
SHA25603e4bd371b5a069daf82837ff71506bbe9c50b60ba51dc61669a5b75ec853567
SHA512151457548398c149b0945089cc8870999f3a12bebb32fe2528c77584dee8c82b6623b9eabf983528162dbd66189c5b1a36589eaf7c20f147db3ba878a2ce0f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5744c9fc0e2fefacdadc4b79b2bea6cca
SHA108cb18bf61d04d9c69164ff1b8c35a12d3fc52b0
SHA256aff10823fdabc994d0046936578fa60eedbec9621e4811c93236b4c98c1f138b
SHA512b921abaa3a035f467ab5bbea0117d756a3fbe7b4f924a7baf53332a89ed51a99d79ff862fe8b199f940427298329a48f5d464a0f927f0c070d928760ec675c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd5ff4d2a7ffbab7035077e6b158d92d
SHA113069d04fe92ad6368f5a6dafdc2530e267d34c0
SHA2569b5b5345b6f5c5852fd8c63002a3dcd7c78474653a1646b7552ac8f405d49551
SHA5124bbd18b0404f6bb08887bb6972429bbc159dd0b8e6165d3f43734f1f0c8f5ad0b9c935aac309dc113cc2240d998f73e5dca379dc0c795fb8b449a68a49b8a794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd15881c6684aff3c0b045c5f27c922
SHA1050f016ee252fe229d0d586f63a3988b582ef4e9
SHA256a3b3288e8173c555c35e5af2e7eda3d763c34933f6f3e032643dfd8bf1a275ff
SHA5126a6a571aa98b739aedd865f4688d1829f6627eedde328d37b3016ec37e19b75b607fe9f3ebd1b21cc0027152b8df36c652b72085687827476aa6393d60fc993f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72fde166ee09ea2e32eb4f385797217
SHA13e0572f9e679f3d8061557ee170976f6f9ac778a
SHA256b85839a0cf1c41e26efb6f8f449bf60443100e8178d527b53e9941010ab17bae
SHA51220bfd94e19c6c7f4f4d61021cd6028c61d964eabb7e674d194c255a87f19047d1ab5d3897e77f092d32a71221fcfc8874279269e04b08c5bb29563ff1366c366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c613c1969c0e1366cfa078ac3d585f8b
SHA1a17f548bdca9664df8070c886c36ac3c22f23468
SHA256ffee46d37eda3aa008a4f40a0c5c63d92ad79be64005176676504e0ac259660c
SHA5126d95246cb3ba1dfa3a67847bae184693605d7f85857bf0439dbf454090aa75cb7c4979d39fe428625cb7715ecb3d2c2e9952305005bedcf55835939dedb20101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166ee9bdb4a359507dca8eb3fb2fa0f2
SHA104fbc85823e5077b29aff449cfdd87e559e8c813
SHA256b4749dc5b51862b6e3900588d72d4604ec69029e478529556048c41b76a8672b
SHA512a3ece18e50b8925544833136678b9cb3c625c2fe634476b9a6239ec3469f4a9f23fa3a6d450e5efdcafcd715009ebd28b1685aff0cf1388ff8855efc6c917ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b276e1b62780ff3f56fe22640535fe7
SHA16413929987af234ce212a02488f217b8a4395f31
SHA256db8fd15c8f4d3e6675e16fa87fe881c44892c1446d73aa4ff0d0fb913f3a3ca8
SHA512e6a3ce8f3fb179c58748f6f279e8b42146ca440fddda3feed16b31bbc87270f937ba11bb0344e02865dec2c4430d5ed06f38c3025cbbf02226cfe6c2b2849e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be7577165556a300ced3493222b18e6
SHA17a1238536cd816279a5a82e6464a4ef33c2f1d4b
SHA2564ca20927921a4a260f16b5f4173b82904c0d744af06f8fbe9ccb68f10515213b
SHA5124caf5bfa77215253568160f895bf1189748287b6e51335c5731037efdbd22b479bbc71d624d45144786ca34b1f05b49f6386c81706939c8ec44422d0dea09c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f76c3376d1b5fc5681bf4e97d092c21
SHA1d13d82c6da7c6719fe9383a634b7dc582d2acf5b
SHA256ad192b8ececf8fdafa6c9566d0e619dfe5edf1c41eefc7cc717fc884b0aacadf
SHA512d12e870ccf3cbb6d4d8b976625451ac1ecc559c1d4287c76f98bbab0e19eab8001eeaceb646f74ae1f95e4a3b4765a2ddc6a12ab1a29b96b08ee587347ace269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572eb337657d3ec8cb20a913382976bc0
SHA10057fa3c6ef398051906defa1e446b92fa934c02
SHA256c6f9a64894548d3b59dda5c80c0bdfaab2d6bd18a14765c35ee222036585f334
SHA512fabac38e63765d100887125e807c5913f59f81cfd2858620dcfd2133d1651777cf6374c5776443fb2cc7f1e33b775ef6ed65deb4aafe69df77cc539a2c77620b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59070af08b9de1eac702297e2b997099e
SHA1f7aea6717fd696aa037d8425dbcddaade1466850
SHA256ee75323578356a8af386f28c2a64f71853ee5d700c408e4a5a291a72b4e5d735
SHA512de91efef36f410ad1f9b3853bebf6f971be4486008195290c1bf025b9a674581e00cee7c966e9619a471208ddf75ba4604a54e8659adda70bb7a8d71df95425a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426a73da8eeabba66195f161d83e796f
SHA16051c25f7d3d3556ad399e92425a5d80893bee4c
SHA2567c6350e08cb9ffa2721c0a1222b8573f27a4c95ec33e4659367b147fe4272899
SHA5124f5db4f86af4a52cd74005e933ee16ae57616e10ebc76e062fd44f6a3aad73a144fb04005fd302e1e5eeac07406249d2abcd8aa9617a28e72895c4c41a7a6a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c9ffa122b0204b2462ba926dde25c3
SHA1eee5df49fd264dc3b99bc664826ce25d85c10cc1
SHA2569106b652a2014c15229cd6e5f0362a8c32e9aa2af3aaea57125ad9793552b1bb
SHA512d0829bd2bdb9d48abe19283a3130661f40475a6205fbac8d87da0d1ba040a899f6f0dc5fad6022ea98de45f66214d6a87ed539ec5fb43d3b3bfc021c6f77db36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4c74346e16937d01c3271436c69e3b
SHA1cb1148d297045b8023d38a8813879e12ec2f5ce4
SHA256a151ccdb0d759e8ff16237d33301779f664a8a44a1867307a2f8a34242c73114
SHA512d53c0b6b8d47567f6b84980dcc2f434707ba12b2450678496f74a29285211d45d0cac880130988ae35c06e897ba9e241a42d0350848d934c9787d078f998f5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e8174f5d776a3b0d47efdc06cd5c06
SHA15481f4bb5f786fe715e8e880be4f4bd0e51c3698
SHA256ad70fa64efc360e08465d8cfeb0115ce847cd61acafc56c099e6bcff56856983
SHA512d389d869997152e99668c63d382e0d646896e99a266d0d7c7b535b870bb64b5eebee2a6049f7f551ff4678ce9a4b6c70a5c4d2c3c1e067a17b8679868af457aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534953d937664133104e407dbbde1e0cf
SHA1392ae2c2d8204276714c878f73c3c9170da678e8
SHA256fbd128e253364b0e07b1d1cb7df8cf711c03e7663c8eaba17af8b3f966831bc8
SHA512718f8e83b4cde41e7c7537230fdebde7ee06409391a34a34069f741b7cbe6e21829b2924767a76cd7b8d0feff353e2df9e2355985d991b3ab77806da75e084b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f146da8500a380ba068314215f8c55e
SHA166fdaae0fdc65242109134f6a20723598e956677
SHA2567d9e4d97d626692b127c12947bbbbd3741ba433fd3a11292baac1725bec8358b
SHA512c03c0baeb8e4157153658a0a08a8463ea1213181507733bc1ada8f6f12a47cb70ea95912af2386deb48504f95b7413a7ab513dd4409934da000a15bdf85f26c4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a