Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
6b31af9ecbc905e0bc0c222924b8bfbf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6b31af9ecbc905e0bc0c222924b8bfbf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b31af9ecbc905e0bc0c222924b8bfbf_JaffaCakes118.html
-
Size
8KB
-
MD5
6b31af9ecbc905e0bc0c222924b8bfbf
-
SHA1
37af70d5b7e14beec25c296da05b33cb281ddd24
-
SHA256
cd9a05dcf740ea582f96d03f0f822dcbf960d0d6c4e94949902ea784efa0b571
-
SHA512
f2be9d45c28a321e3f71e2570b5286b76e240c71e37e2cdb1c02605a70154dcbd1c0655c218ebdcb546e12b9cb41b461a195839f2a55b13ea8c9e8fc47024a72
-
SSDEEP
192:cihKE7Pc6QdgjyMsMtcikMhN4tyutgut93GMjWJwzIzn:4dguMsMtcikMhN4tyutgutFGHJeWn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b037131badda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E10CE21-190E-11EF-8E9F-FAB46556C0ED} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000091fd809c6e717d65d2d946e415e6868c55b84995efe90ed502c02b6531d35fc5000000000e800000000200002000000058472869c0dcbf29203ac248993c38e0eff55d1e5d1354bc0efa7e2a437247d3200000008f9c8be394fc804144cf1058e8926b72d9a424981b42c6666f3ae7e12e1cc9b74000000081f2473d17f3846725be6d7b1483a2232a502ff42fce6f6cff50c93ddcd2ef749f05840b48cd71b12f352322e796d643f6f5f1638467b37775a062c7ccb1c3a5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422635311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1884 2980 iexplore.exe 28 PID 2980 wrote to memory of 1884 2980 iexplore.exe 28 PID 2980 wrote to memory of 1884 2980 iexplore.exe 28 PID 2980 wrote to memory of 1884 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b31af9ecbc905e0bc0c222924b8bfbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b62c2ac7c9a80f556c2364543325e0a
SHA14fdce5e20ba2b51bed84d7e46c37e742a6e865e2
SHA25634d406cc6ccee5826199b5b6b2aa9acac44a6e46510fa581f7bc8ceb0c617a10
SHA5120b70534b4bc987acdf48702aff76b5d8363eba110d00ddaeed4b6b8eb3372dc3dde96fa5d0bf11a466402005926c687a1395ebc72de2bbb3b6e7cf28d097a2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb2a13930d95c6a7fc54549d6ef3c86
SHA1161fa9b3b81d37a109b1e5c3306fc12e33772299
SHA2563e6eed0d2631837747d9a124965a5a46273353b6ac3daa2912f494dcf01787f2
SHA5128df06dbb45454e06bcd3f026469067cfbc1e70170649a63e2c4a03df49f20aabce68106fc810da1b4d1aca4c3d052ccb3b9dcf5ea239f1224382eeaf43b9f93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e58b98a8f42e96b817e327067198215
SHA102948d64668f7b20f05b723993b21f41b7f04cd4
SHA256a0150e03a6d974fa0487d799e270a091da1daef4c9c19948b4b3b26aaa121074
SHA512850e1b3803310d6ca495d9f8f455e4ac2cc64c246200e327bc884cfe09aea382a872d0947f4435ab497cfa1a5b43660a19c48f76647928202ace7c11b2f00996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c59cefcebec1461232bff8dcdfaf7eaf
SHA1f2502365d0bdf1ec9686008e644706bfc3ad1ed7
SHA25616c8a303d8f3705dab6169f4216286360a67d1baaf58c93e456bdd395159ee84
SHA5121ea3dc931e2d1de60d288c35fc2d32c8e3a3e05d74275eeaac819a17be1ec91c24a5de179d3e6841f2ae803dc9561072128b5a8b7f0d16f175c17fe943820484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a0a6d889ac10e9bdc27a19efaca2b6
SHA1813d735b1efa1b5d34c2eb6162860d4df390c3c9
SHA2563401c97e222db70ced3f889fcaa9fc0000f14c0cb6e7df2e197da23739744488
SHA5126a21f498b717b3b5ab5d2ad432bc431257339e90128b943367a2d4611f4e5aa56130d3e25d7bcdb346bc13f519bc237cd50329507e76b927ec0bbfe9017ec67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d589929b78739ea52ff575190e2a2858
SHA1fde293eb570e3d0f24ff0580d23442255c6c82c0
SHA256fac9ebbb0fd0d4ffce29e4288396a6c603daaaacef69fd765aaee6995fc64b1b
SHA512c38a09a517112079fc377447ad6e1a652af5a66673bfe761c78405c358cf68c2443f8e5cc077035116b00dc0849a69f9f2fbd2bf8c98b8d3c039f1baa062ef5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c03f0c2c6454b478948122b495d08b35
SHA1f7df1e550e63ceacaceb2da484d52194e657af36
SHA256cf793f047bba679f491daabe4f2369ea9295cf169e0d286dd6dbb5e5227d5421
SHA512309f5412ac8976819035b142d1aa390ddeac0eb5e114678483f2d8e5b46e9a3f0aecf5984f17bdb878995bc997270d1dfe8c0c4d7a0be1caab2f0970d91e3734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6681fa1fe745c4cea5edd02eb7d3251
SHA16ddeb46c751b6d972a574e40664a8740aaf305c3
SHA2560e7796b191d0723d2a1373a31ffe2f44cf8cd83fdd15076ca0feb24a3115ffd0
SHA512ba0999f001aa8c460b99085e748d361e26a5b367040bcdc008f45990e281766fc65873103b56733709f2218c89d90f49ef8b8ab707a90752f44b595ac77a155a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b965349c9be5690681c07c3a5b71648
SHA1cd19d4378763d297ab9d9dfdcde6b95a150d6900
SHA2569108641123ae72c90f9ec23f51a0b10b6a67590f4d8c9be150f9316a5838004f
SHA512e516564af6a118db4953ab25dd3848b755c01c14ea10799d42f177bc145be842d1d869a2bf3025e5a5a71156a0f32dc4b874ea2638bc19471e80f5a66149f19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff2f41702ec16b4e80cf469ba7c3331
SHA1f60fb52600ca46b3f2fb7ca3a26f143a5360aef0
SHA256bb9df7ebdf44fa3b25487cce42099a063214985ae6549a1cff106bd47a0f391e
SHA5128122ac67936abeb96e59417204ace69ca0a3d7156ff2aea6c8c9ec001db8c153892c6d223ab4ceaf70c5604fe16755151d1fde9ffd14995ecc76a23376e6a6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51edeb5acc7940bf961e8f752dd394562
SHA10954c2c97b65fabb065850599cbe08ea96e76ea8
SHA256b59718af2f774ad40e79810ca9db3eceea96c50b92bfd585466d213e29a39d04
SHA512fa3255569afa1aba3fc95f456cbe097e8c83480938acb581623952a720e7e4cfec78fadd2026922048ee1a4db5f802f0e9894ccb19ba2a8f30a49373b2d7f660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5290191b753ca241e1bf38e7071fdbf5e
SHA16ad5f0717d6a96185e553aff337561cc053d752f
SHA256366066006697e4c614d6479d2e35b2171835d4fee1ee3c8ce3a3e7a3bdf08c24
SHA5129d589fa04c9efed16a71db1e1fb0c27f55fa2a8bf424286c7f4845bb3e330d095629bc8c45f3b791a46d4a52c6650f387cda82c2377ce7def7d02219e2473899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e2f451b25b00cb5f83b82108ed4bb9
SHA13d00fe618ff465ab52ff036f3fdb3261601fbd49
SHA2566d27b6b94e723a006d0f2e1047fc7e27900fe2fd52de41fc358f9da27acd27f4
SHA512ff477fb05734e69bbedc43fdad3ad79ca1eee21818774b77238cc5b464073f487078329d1c45a92dedd207e563bdb3cfe2374ddb17f84dbb26512ea0cd79892b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdff044c813db4bcdc859cfb8dcf738c
SHA143a313db23f0af4024451d7ec13d7745c7ddd0c0
SHA25678e9dc7e01a3058fdefe4faef7b3ccf256f93c399ce02ca99e8f8d9c7c1f4e8f
SHA5125214875b972d6de7dd1fb756000d0b876fe55dd214f09da26d9e3aca28c284fc772daded842636a8364820fbc659d6f21bf3bcc7c78bdab54dd10312d81423f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8bb8cc5397c351c3371474328b3942b
SHA1ccb44e4d38603785d18813023b43ee13882759d6
SHA2560638f91a38988111c27414aa8e91801f577e05b515f9607d6a2f14bf5d004872
SHA5123d39e7257560d863d3d56333b54ec9a875d056c744f39f8d6807b1c1258a1cc7dd3fe8811f4a8bfff757d66cf585db06180329c2a036c4face510f8d0b67c109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5583fce32b55a6755df5bb2a39553e1cd
SHA1c12756593b8494db58d94855f1209d8af36b34c7
SHA2565457a1f5f7d618e3cd01ed160157f77ffee7af9fffa959cb87ad3f1b25b0cd05
SHA512cfd574385f15c9060ac5c4745dce3877c6cd30360bb8e4e9f0d4d95b158b36b031afcb2b51b56255b77108cf9261c6a723dc2247a8934d9c80ad9d1068c19fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83720345aeee7516f79ce6da3af2afe
SHA1af65e2beeafcdcb05a6b54ba798101984ff7f4a8
SHA256133e64c3908c872b3d874d0848e3fcd13477af9e177ba23a0360eb3016ef8fbf
SHA512b9445a89b9cf84933d1798a69a44ca6788d9a98d4271b8001389474080db0da4cd542c1ee5ada211a4d19859dd4a06c0ce525b073c9a560548d70ad93fddf35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6a1f0b81a2e11a685434c82a02fe08
SHA1b6c22c5da278c7e197e4213cc87229abb5357956
SHA256c70af522d5bf54947dd93f119558e896c3824d533a032853f87a445302f1b662
SHA51202e4348cdd6848b6e8e6390eea20a192d5e220157bb715b5e84be55d9df5e89c5aadd0bf44c269561632907adf705f1492ad1111d63f7445c68a6c51a55e7796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580cf7f4bfb86e0c29c6bac6c0cf5b7b2
SHA1389b8ad699983a12ab50a282b3d6a22a25610288
SHA256ccc8db840b15aaf59208c579c1f5fbb5962002f0f71d65d76c8ba3bc955d59ba
SHA5124278b98ea5e3e30a0261078264c293573585dd227ec3d079ecfb4d1f06606e0fd799e5c565c685e82b2cf85ca254f5bfc6e464e274ad6d0f8e74e5aa3150accb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5664026da15281c9eae3ffee1aec04483
SHA13efa3500b5926a7f6e7511aadd56c257ef2845b9
SHA256a89cd3089e56eb4b565a11ca62c6bf7ff10efa530448aefacce4dfe5379edf26
SHA512d3c7def0c60eaee2685c5d02fbcbc4f134a08093dc3a5fcdcdb82a0e0150ee986581e096cf6440cb046d6f0442a6af02aadfa2519286c3ca99d2f21552f631a8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a