Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
6b5039c31a1f836e41aa70f3256e1cf1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b5039c31a1f836e41aa70f3256e1cf1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b5039c31a1f836e41aa70f3256e1cf1_JaffaCakes118.html
-
Size
16KB
-
MD5
6b5039c31a1f836e41aa70f3256e1cf1
-
SHA1
1d9f33f6bbdaae4e0c51eb56f240f4d2f19c894b
-
SHA256
5b4dabb6ba0a3fd381dc2c7510a41439da0937a0849e398985ccfa809419e18b
-
SHA512
87685508fb3a816a975023a19b135c5537e1c140e5bf440fc7ecdf731eae630ccec4170abd1815ee305d0ed73d124c2d307f1bd8580db49b2d71c3884de2b723
-
SSDEEP
384:WRTxF61RaKFQQTBVZ5DcnDBgxal+2bIzd:pvNyQ7LcnDixallbIzd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d937421adda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006beed06304e06a44aa5c616d79237290000000000200000000001066000000010000200000001e217abbcf8b527a6e516c7372a6ee043935f9f9d1abfe4aec686291b94c4405000000000e80000000020000200000009c4251ced7a2761735412891c9ae924599a3e57172a4cb67f3ae237631a5b6d9200000009120a19a4b7ba0db53e5933b5df5259b249d2a6e08cf9b5e08594b12d0d1b32940000000e2c4778bf4133a17e149782582d5d802ed2d0f392b02fae3dbc8036b2da10481b1ae0395c452385ed28e82cce2ed28fb17a195c1b2b748119f25987ca7641f11 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FCC10B1-1914-11EF-995F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422638052" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2128 1544 iexplore.exe 28 PID 1544 wrote to memory of 2128 1544 iexplore.exe 28 PID 1544 wrote to memory of 2128 1544 iexplore.exe 28 PID 1544 wrote to memory of 2128 1544 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b5039c31a1f836e41aa70f3256e1cf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55faea7120d41d4058ac5460a838ca43f
SHA1032cd0c916e90a1bbe54a24f63bd96fafe1afaa1
SHA256e845b66bbc8c5570bb3a1a282102e412d646b6253e0a28672f91eca9c8403e88
SHA5125dbaa20c81766fdda3189aa08d679b09c64d48540f2777cd5d2d144e2832a0b4d8e106fe0ed633d54647f47f2b7e3e6ec006636a6821dccd29f2a15a92620f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5cce307e17943bc5de3043a3fb215c
SHA1c4e74133bc7461e16904d8067076adf791d552f7
SHA256b53d072cc6fa8831173683d11bfe9afa4e384694249f5518f81bdc31b2760c0d
SHA51251eb903fc587808312320a94f427db214f84e4d79b8c1ece174c9659abf38403ba56950c37c81e431771e2222da6c3d1d732b7c37ea3e7321000e204be04d871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56524a5fab7b4b977a0799a485ce2e4ab
SHA1aa382cc00e7941001f1761a56d3d879a210f3b83
SHA25683cf200c9a7f2861c3648d6a5880a45c98c4b3548b9acfec4951163d61679e54
SHA512677f9785cf1ca542d322fb12ae3068352e68fdf5ba0693265042b2fe3df2fe0c7a4e3380c41f7e1a0260963d9678ec26612685353e41285a72b317c7b67a8a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5117f7133f713b5f7739f53bb59a408ec
SHA1b98f44e6ce59024c22ac4ea19c925466c949362a
SHA256a2187575a755ab93f3d691fec6d58d768cb0556219b560829bc736cd916a9d36
SHA512efdf8e628057bebb3c21a65dbeb9d082c79d2e118d0876053dd6e10e851c6ab8c35c0255df7453a057d8f022523236038754b9ec5f8dc9abbfe4913a1a18d23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0a825c76b7a33b2ba59ea955e5c87f
SHA19dca023cc464f242a8bd8795e7df9b552fe2db8c
SHA256b9d163f6183879230b0f798f2dace1fbd16dbee128b1cffed7d7cfb5ce1d3b8c
SHA512c1c1837e3c8ea632e2c65b0d7841c2c99123af2cd87ada21339fe6de4e0c05a13c75cc4b5d19895ad6fbc1661e883071f476f49e778f1e17c3fabaeceb4fb138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55186f6438b8ac385559ab5bc7d090247
SHA17a4e6efcf1d4e345ab104adf252b1e3dc3b750d3
SHA2563e81039cfa46539d73d2500d36d9490b2a9bf51e58198bf8fdbbf25eb76974b4
SHA512f9db2be3aa806ba09b2347c56a2393134466b1a243c9e9218424373d93e3610bcf403b9dfa438f2d42b1a84b7d1fb3b120ebeea21b4b1328ff84528440c8cc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcdef498372483bbaddea47157c3a3a5
SHA19c982f27a95c25595676a42b8960b1958236b1d6
SHA256e43f9f07ec4a2509ec391c029873de1fe342ffa03497b2d5997ed1411de0c331
SHA5120417d947079574319be7fa4c3021f2b3cdeb00203c0dd2fb48ae1d549b7550e5ea16ec1dcecb66426a8e5be48c962f4d4e04cf10dcb350bd3e4faeaa4501f1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551356c710e4c3a7c7fd6d92db66b1462
SHA1c7efd81966aeedab9156964e7d3d4dd18ad42ac2
SHA2569863274b2f1dbf5313cc3d052a025bd5b3d009b551831b9708f0cf074be29ad1
SHA512e57c351ae9da897cd65d985902bd3f6eecf105b18ac371b046f58b63df9590f5468aeafaa0f263ded5337fc1b20cf7ce9c2e4f388720588d8ccb903c24495bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a750c08bf2efaf9cd9e1425aad198339
SHA15b2abd0823f65f34803e465c5cb8e55ea05de07a
SHA2568c57f66293501c97157afb9c72d24447c84eba0561eeaadb5237f9014c42b78d
SHA51272a89b2506121ac5ca0547fd67c5ebb91ae773639156cd0d0a0dcbaa0bea9d9fe63eef0c479bbc9794aea3e3e96145591dd2faf0f923953caaf4b55665bf16f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f4f9b33010ecc2d07cecab54c0a5387
SHA135995235d161fdf724b425150554de3d94885943
SHA2563b9bd9e59213afe2f00df923a4ce57efbe07ec4813f2b91e45911550ec3cf897
SHA512f87d61dca0535e481933aa2e6321127daf50b875acd9a12a15ca4d4825386d474f10a46195492d43ead605cd61dd82f41790b8557676f9a931411db0c984b983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594c421489e29fd611afdaadfa0edf3bf
SHA123cfbc4970f1a59942d055a67c53e770046f1d98
SHA256ceab781452fc62ab019a3af49494c3b91deea065280000eb0592ba4a3fb1bd4d
SHA5120bbe4904f0a38475221837a84e8070707c4ab787875f085c64256f30147fb1b0516767feb4956842c3ff71bf24f01671962f1f7f3c96eff22432bcd9b3c2f3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6ea6ed096d97b54db5480d823dcc28e
SHA10d3c0610b7b0e83d81be1a2219a437277a991ae6
SHA256cac3330a7b667fae724b34aaf653f984192f5b7b4a44fd5082acd0139c84f3d3
SHA512becc4cd775222b2786d030d3cd011882b3a0ae0b2f8cee242983d29f18a83a40ae544eb357293132b6b72939ea4d739db44e1ec7a7102472b8909943bf5e5266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de090e88b4c57600dc95e0cfee710686
SHA1f3079f8c9ba3f1554f18921e725dfef4cb52ab2c
SHA2566f5b0dbe358a5e78c5c94948a6a454edf7bc9adef40ad0e008f5b18190f813db
SHA512b5cc8b53fa05e74318f9037d9876e78d66ba26c07e7a6456fe2400dadad1526e9942abca0d13dfee63d009581153cfbee044c84f7239f3a993929ad958a27490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cac4f3756d82aab3396a3f796ad75ec
SHA139513bdf2df68761cdb36b13212b0f5154337428
SHA25602cc7fb5c95da2102d6761401468d8e11dd448b8c8e539d6bf277d5e09494c84
SHA512a385953e2ccf021aed6f91b1e6f1f340507fcd2a42b51dc4899ed50f9c01adf64b66d4d0286f57d6baf901e35651d792500e6212228bdad1700b0b75c9ae84da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5167b592a8e01956590f37a4d8e9cebb9
SHA19ef1154df638023aee790e58d3536499fb0bdc42
SHA25637bd8820085bf88dadd372a82e28ef5e82af432d3b7342b59bb3e8b31fc3480b
SHA512aeab4628c432d8725d510abfb2798ceb7233faf426c6c157ef065cad9e9f3914384196e75f647f5a36502c0cb3bdac4702f0206f8f934cd038444ea8a643649a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7d5732beae171ab779b074b48b9a19a
SHA167a46664c5e314a342aa3be3d8c7d0a4e6dcb1d7
SHA256dbf0e6f700f516224a5560c3c4dee34f17aa45fe4f9fb8a162576a9f6fc9ecb6
SHA51269a75e06da1e358106015d3d88cb1bdbaeb9e21ca905f37d1108011368a6ff7be8171ee8765701d180d498fd38c0d33c15e18898396ed059cdda2ef34f8da8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3c0ede2ed5955a775329ad361e9c2d
SHA1a69f6484e4b8f33bd9e058da948286007437b25b
SHA2568f1b05f0849c090fc416d2bf5e3cbf8ac9a68d7ff49aee58785a946ef29be90f
SHA51283a27d12e149be61bc3d4618ac9015cb59231557efd827b3da428f5eb9a2513e0fd7e54dae71896393d2b8867deff1bebfff0131e5e4ed967e0684d986685534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9fe93be0e1596fb7cb607920a1ea5e
SHA184db12e39972fc874407b0cae8959064e8bdf530
SHA256a2eabd51b7cfa05e83dd973cc548178dfe633e9e5923ded3178acb0d792e1683
SHA51269579eb5c3466a81a8e1307519b7ac7e8898690afaf8f9965406976ecd18526454a1107715c49f1602c2213f6fc84a346cc783c751244d080e20f531f84f8081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef67a16f17f7105f12bb5d10f319a487
SHA1a3f599ae068ddcd16ebdf04d9893d4007297fc6c
SHA2566586081b39d4ae18e4d2d30a9c289aa090f274c6edbe3f661a5aa3a56f0106a1
SHA512103397b67a3cd88712124cd75c945c7dc334332de5e86559bd006f252256fdf3c4f10e9254788d2e2c9b237e4b47928c913151eac4c9e530cea810d4e5b938dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a