Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
6b89dfed215c441a5cbe854ec04e4195_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b89dfed215c441a5cbe854ec04e4195_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b89dfed215c441a5cbe854ec04e4195_JaffaCakes118.html
-
Size
31KB
-
MD5
6b89dfed215c441a5cbe854ec04e4195
-
SHA1
3efd13797d893c613b237da9a91508895a95f805
-
SHA256
e71a8d0b54fb7bf07ddab2708aabcefa60fb7c62a895dd74a5a81cb3d6be4dcf
-
SHA512
8956657c2bf8a4d1c050a1301e9152e8ccf63dda9982469fcfb748fe73cdc73b94212a95146ca144c3fceaecbf9e79037abd18194cd4ea3dacec94bdacd48b64
-
SSDEEP
768:DVZlgqijI9GgyruFy2rhOR0rbpvRPRYADeSUNnhCyqaUps1EH9FYdGn:DmqijI9GgyruFJhO2rbpvTDeSUNUyqaw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e94f67975050548a6f1f781ee83b9480000000002000000000010660000000100002000000047db2c3bedd2e60f46406a403467dee7ac1a4bc730a2c6f2be1cfb3cbadb6e41000000000e8000000002000020000000423fceea905a0f0241a03e7fdf155dcca8e6ff433ae0f7c7480a295806a3397a20000000ba07bfc25ef617e356e0d414537ffa954e6e1f8108c129a5e343be3ad5f81ced400000002e3d3f362cfcb418930f2543f61c6a2c3c3d3710c07b69874d116ca0b5adbead36c64937e60b63d5b8273e91b0c060a6e547fc835130d345903509c4fc3e794b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f619ab2dadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D60E73F1-1920-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422643297" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2784 2300 iexplore.exe 28 PID 2300 wrote to memory of 2784 2300 iexplore.exe 28 PID 2300 wrote to memory of 2784 2300 iexplore.exe 28 PID 2300 wrote to memory of 2784 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b89dfed215c441a5cbe854ec04e4195_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5166306ee9e3e296fd3a32d34dcf237
SHA17646ef661a4e88d8736f17dae4e68879a8b0acfe
SHA256fac61eab3467ba1d833686572cbb20ff4765704b58dff8a65ec7bae075a94e67
SHA5126ef7b4e6dc0be84fa9f4a920bab95203d38c1f19a8e52a0109af93c5911818ec186c7b6cfd843daf8ba3c4e5e3d4029bafa8f58d9e0fb8b1575e7234c48758f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58045ef945402247edde6d422fab2ef67
SHA1bac6dddd21c90018441aa9d0cacbcdf18ec345be
SHA2569c3de33648889c8a585ea4253fb1d97fe3ebfa9c66ccc5b6a38294e86d7e3604
SHA512986ababa1343779c4d58908dad950fb03a4134b3283c3882186557c107dceefe3a25b396aebcfe5e051866e06e93219fb4b772e634005d594d05c2c951a99230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e246c8491e77414a98b33b74a6d43f0
SHA1f42eac8f2683d141e1b51bbe78bdaad6429becc2
SHA2565c2fb0af8a1e2a42da9d6a4c3381366910c37fa91f229f4d4e096eec5347f0bc
SHA512ae2933563f608063dd2001f87cafc500c686e9276881d555fe4c480ef0e50cb73ff8e32b0b9af22477a45dc97bfd0aeb8ca43383726887cc58b5bb3f21c19d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b5cd56588b96da2c048db5e85033a0
SHA11af822847248e8b25d5c8c9b7b0bd4a1b01a8df7
SHA25633a24cac1e57c91f19f913f54389f383814f074ecaf14a117430adf4e29f1198
SHA512dd8eb30e7b77433b8435a5e40414cb3d0e53408061d0f9336576f4bf9dff2008565d6b020f37f1cbb80cca9e0f894e4a0d0f8401629842a993282c8c9a9133d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b116209a0cc827d291e911bddfd7ef4
SHA10e8ada05c32f0b30a56ecb33f17f77ac02e74ab6
SHA256c0bb559ecfdaa58c46839fa2255c183fe47763bd0af76847a41c7477939959b1
SHA512dd38bd954745ede194e0e6abac8a758a322e6f67c03013b13c5fa61a068853f09dcd25c2eed2ba7a0b4c894499d0237f35b572b19ceed5e924aa37aa54e4a91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff8cfc6bb092033f75cdd2b1cc1bbdf
SHA18a523a400bb98b85d6ab567c8d7ca4b9fe26ede5
SHA2560c9b3888816158752ac4df173561884fb65a6a1302b7c06e62df1af7b9f328e8
SHA512ccf5f4b46d7a705926123b93ba35e6748304de91e672a3ef290f7bbfc9ba6bd01789a4814f437f70dd249de95649402d2cf5ae1ef77e84e4fe2c5c2e3787cabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab965e88bd85d1813b68d7a0c98539e7
SHA1ef8d57ddd429f10c7cf19611da5d04178c1ced51
SHA2566cb7610138b0dcb1ecebe87fa3514ad8f5cec09d7b229c9e62af092d7ac4b642
SHA512c9c01d0644969ba75f57a50c0e2fe7e627d04e272c20b79b591a6153a94078f42246e03473362193d008c378e60d479b2a7337df7f8b513f35e1b341b82dc5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dfbd13d09c11885903c36472b04df55
SHA1e888e49d75bb4384819ab48dae374436d6c1174e
SHA2560c88a97ce274964da8df9504f52efe1b5a485a694b6350aa453c30b4d1a38a9e
SHA512e504c19eaffb68d9d532192e2b72de8f1eac5b42b0d5790addff4859c513ea8ce5b7ba62a9a44ac1426f9c29e38494b12f2b9e6607f68ca523d3773e96f07256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516caad3ccc33dc413dd8ea26d617c095
SHA188bb1dacf27498beba391cd15d5a8316a18ec961
SHA2564c6556ebe1a811559be4c90fd68457ae92013e686b635df8a45a0b4709c4cafa
SHA512194ce4dcc9f505f8e7fc51fd92aa3bd75f688b69a2a96c26947e390fb0b2dccd1346413b06bd5d8cc15c1737cf7dc0c67b21b77ba9795f3979f431fa84150485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584647397e885c766c88153b519a64875
SHA13a82c8d0ddc90eba080d20b4aaaeb5f19f92ce23
SHA25615d0775113606b61575b8de98e9cd39e6c355933b7e229e1f6b12bffe42a20a2
SHA51201b569ca22a8d38acd9dc021ac46f4f308eea143bfe291a48bcf8ceca09b04b69048484772ebab5ad6aae3a9dde0493d447712fc8be6e3054e2056233f86cf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a72c3f046b08e9304a1d6f8692eb97c
SHA1a258ca05fe4489ab3f9ff8bd100099da5b7065b2
SHA256f22eff2460f3a760b133fca34aa24bfacfd7f32aeeccf39c8cdae2b9dd8662d7
SHA512ab3a9bfefc50347c8945914acbbe5dc4e2d2219ae142e8ba9112aa71ae7ab036bd79066140d3268b83e409462756e313436eac87c8576252a51f8c907411e5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c6db711f0d5144b97f5f14166ff604
SHA1948cb745115f6664a4e1ce388a56c59edf3a00f3
SHA256ced97f1c265e1612befdb24ba8b1b20fb8db41cf37730854a17362bd6b281c31
SHA5126353daad73000804d320f8890915afe56c05c0bdc140f124fe4d32e7f62e29427ab49bf36b68ac9ecf6bc12d0009dd1018412099c47f8868ee02fd4b98a10032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593adf923721dbb10c4337f69c2fba3dc
SHA1d13ea7df0c11fd2da4b87ed44abc281c0e6829ff
SHA2564c1693f48a08ca988f61568d262a47774d5ce1e7fdbc781ba39d8838d9ac0601
SHA512f18ce6449c30c0ff77a66f768722f736b8a4ec8d694a7773ab65b36ac2652aca81edbf2cd27fcce701d7eef7937a442e0fae64a2a807193f67c1c4baef5ea841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc0e707ceb6f90200d035471342d4e5
SHA1c81aac27155fd3ae091e703d73ac005ced1dfccd
SHA2569c8b4da7496cfda1cafffee42a8b7b443bbabbb60befcef81ee868069b5e5d42
SHA512b49c4d45317ad06ea48d1c020ba6f03cf9f8ebf880e7d187dbea5f83ea82e937d5c40272f42b64f560153faec6bd4c8a386521398dc595e9272812053ea6be54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4079e475590375311a2f867a118898
SHA16af9dbe28dba2db05b548a9b093e6584af72f764
SHA256583d2731c2d9498e89630027b00b7f1470b9e2d9350389d208269cd363c4b80b
SHA5120720a6ee291e91153e50d5cc58347232aef99b7ff0c36c550115e5a8fdbfa46a65c4b3c1099353047a89f319a3793a701ab60cc4da2a3b1bbd67cdfb8d1aaf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d8a71129652003acbbf3f251ad94a70
SHA1957e39e3089e268c69c786b4a3dacf988f0c7710
SHA2564d28200d67b243688d1e3c26492b8474d37fbab4078b4a570fa5c32549ef399d
SHA512d4b4367f53132af840e908fb9efa73853d5c92cc1b314f218770c7350abe9d09b5af47c36c9e8bc3ac189ce93631aae4b5f211e20f391081c83d3dc379fe199b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0d59a75f68c5d86132f2372ed308ee
SHA1d49aaa72b005feb8a16ee68fcf6895d514f9afa7
SHA2560c52caa9f2e6b62293d804832a5904dc42b095eaa3885137bda2d6694ca2b73c
SHA512737e34f8aa4748372aa024ab6bcb05bd392e344ab2c3629e5964f77706993dba1ab7ad14531aec00056a7c85814b0d74e38ab38db7e46f4834b5868c09665d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50966610d4218c611b47fe6407c1eceeb
SHA19c3e6dface49d081c09c69584dee8238c0e9c15d
SHA256140eedce9d3eb7b1742b9616d4b1863e95989405d108f1293a54ceea823efb6f
SHA5123245206fc8f01e97b34a5f293137012a39cd59258eda8a6dff4a3e28b8034ae070276665ddbbc1d34d99b9d9945390d20ada3f9e5971f41eda971f5b9ff42ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83857aeecda634af33a556dc29939f2
SHA104f6cef636588b45f87d97d88e64338843616420
SHA256641de37bff4e8249f8d8abab8769ee803ebb8b216d72d5aee739bd222629f801
SHA5126d7ae4ed7383938b43d443e669edeeaebe8177f9e8327808ad0edab12636a2732451319c7c9b7ccacb89e4eb73100d8634fa8ec5d1d1fa5108cef2471ba1fe05
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a