Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
6b9e07206bb1a1ccdf9b8844f2a15fe2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6b9e07206bb1a1ccdf9b8844f2a15fe2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b9e07206bb1a1ccdf9b8844f2a15fe2_JaffaCakes118.html
-
Size
22KB
-
MD5
6b9e07206bb1a1ccdf9b8844f2a15fe2
-
SHA1
c32d08b8c44266c71f1706628e9783d9e70bd825
-
SHA256
307836c67b8b684d926d67e53d34719a54b136f012a1e2262b0fa03f33107913
-
SHA512
4c88a0cf477eddf9f0e56d44a9af6c6eb525f6599faf904a6ccadd5e0ab758a0ca4e2f99885717097779457ab580c5b0e205ce96c65e94fa86426a069203cc71
-
SSDEEP
384:Dl1XX6Bl2ihokt9Szold/jIB1aDRWPBMUMdwV2/px7IZgsFA88syOYBFsW6VGuCf:Tuz6kt9SElVjITnCl//plw57jLMLDHrR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fd5e5b31bee00042ac61910059bcaa6900000000020000000000106600000001000020000000cec1069168826a0ed62294d01f88f96472026b123d8a8f119f06190e1eb36f0e000000000e800000000200002000000045fafd03d759ecdb320a4693bea1d8a7ee62c59da53bb2c2cb42cc6e539f79e220000000e7553206c98ed65cbd81352af6fadaa7227f387299eef99c26a1ad49cd59b7dc400000000789effe8e0b6ea76969c734b56e7abe4eb2e5173e6615958532069f34b5a3daec2eada7f61dbf67d9d738584a06ca36e2be5c84e7a4e303a6df1cc0a783a55a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1BB7441-1924-11EF-9D76-F65846C0010F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422644954" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301348af31adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b9e07206bb1a1ccdf9b8844f2a15fe2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c3b31808cec1bab68f9594cfd32c007
SHA1ee75770fe0de8958c4c818d5f7f89d1a3834a7e6
SHA2563cc7f157ea22c27dcf81ea7a53aa5c93867382e3ed25f090d0221e4b096b6753
SHA512810902427e19165a62ef07d8a2d008fe56e11a2a048b8046e6b9e7720c9b2b35d3efd141505fd569739d943744f146344670ea9b0d707348bac2d255eb265844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5206e8285f49c1f91e4cb8adbd96b06c7
SHA1c24f91e3f078d849f07d2336b54b0825d8e4c107
SHA256f2ba7450434a06f4e2e8817a8ae8b880051553be43e1a671d33f08024327c1b3
SHA51202a23e952955e25215567396d6f6a31f55551b916c29f1afa68628b4b6bf9e2696a258b421652d7e1d4d15a5a3faa7fd9a2428356531ef425bacf40c603c4369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50368065e271dfaa58bec66adcc498bd9
SHA13ffd64582ee348543e61a67e7c1b722a7d539afb
SHA2564b015b15f9533ce89a00518366333d71f3f874997e7a30c173746dd516333f56
SHA5126898a9a24d218f15794cf956ade935ef6d76c1a99e2983a90ed81682311ffe73f8fae873596a54d29220db809d8a00e186d077e6198682c67897a6a726b8a614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc496790416b9ff1ebd8b35def7ec91d
SHA10ae1e0223fc168b4f60bf2885bab031b6048f766
SHA2564ea43a40fea17a75e5fde0cfda35805f3e4de93e52976de65d7ef7400d209fcb
SHA5127e9581769e04597ce4a48913f4fb38a15789c3a3919db3c6e7c8c169c98a52d13749dd66c10ad89a0d2b5a6c68f59aa8903e07403f7c73f9e29fc161bee0b92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3da6bf36a925858b7890428595711e9
SHA1aec4eb6592571d413224a8e615e5441cdaed4e7e
SHA25647bea84218058266f725e46230ca42a2d9af561de832a77ab9b0cfd0a5847281
SHA512ca2abaddb92fba95d3c74991aefa8171e8e2a0474a5a9497d3eceebffca2561a6ead1f38a404a178cc60113efbc401f2961ae82a6601b22c974266ddc65d741c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9082b13271bab0988381659078aa51
SHA101825bad04ac48e45e8eef944c8abd1d9ca542f0
SHA256332670195048736f63f9ddea4712f5b524f7ded29630005b5ce07f8b2c0cfe00
SHA512e8ff71a2ce33da3b1cc05732e9475998306dd926124a7bfbf6e07479cf3e979be6087980943db259a11dc9ba74d8d92a9419c6c75c152b42d2fb61f5b9b8074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc6492eb38401c61ee53f2162ad753ca
SHA141b77223bca60d88b48dd804b4456b1d977b446f
SHA256a4a706dffd3b2bbcb424bfad85d9ec82b9254496ba83076d323edfbfa3bbef2f
SHA512bfc605f6206559ccaa1cad5da1634da5d207cad8c1876c605b8d9e6765f7b21d63384bbc96051dd500b15fca710f18abe9dbc2d9270d18661c0ffa7e0614b6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356330ca02185580d5ef7cd6545855e0
SHA1b1bfd25485eeb86957a61123f35cf96030cec333
SHA25652a2f93113efef596cfc78084f0ef5889041f2aa10cccbef416f17f96e062597
SHA512fe668685c8e2fae9d55d94b817d3f0cf2b1a092275c29c8d49dfdf62f45bfc8641c8207f7df56329a6356fa8a2eaee094f68b34f8b4adedc13eb206d7744abe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5280a717b738f38b7eb9ac3d9a539c
SHA170e4a9a0c6208c38258aff0b3d1293021276bad3
SHA256d55ff923b25d72c2b27d1a71a6f11c69f406fd107d3df1ddbfd3deeaefe4e8fe
SHA5128c339fe7e568f615821b4a08f50662a437aa39fae117c17c837492609d4e7aca43d89ba0616e46738a888d978ab5196b31d73bc00c81e0437570ff0e044a3aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba67febca950af40163679df0c978a3e
SHA10124f302d41aa70207625b3cf27b86898eb92b7e
SHA256b9ea6db8eeeccbc3d1bc341bfb530657624cfc06f91b95705204a6cf38de1886
SHA5129862e8b0ee47bf65be57576a2c2a04b9751b990da2146e3ab8e390728fb998f372e76bd10aafeb1f68fd6739fb410d3d79f8283b240e8a61e1fc4b7abd357c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b2864c5a8e2f672c0c8740b44923ce6
SHA1c2a0c3bbeb4417ba6c01031cde5a33e1dfdcb327
SHA25624cc202f0c948cec363a5dfe1e559bd6974428528eb6e4649151fe245e9d681f
SHA5125a4768057dad435d9497fdf9087f80c7f5eb1dff8afd0db516d7e91073b89c9e469da279167f137d8f81685299c2661cf019de62c31eb8ab478f729dd0a3aec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546502caaecc859812e3f05ed04a8652b
SHA13be9528a0e88f3965847a390eb1c0a06ad7f541f
SHA25686820a66541f9769cd5cc0037f132d5a0cf2aeb83eacb2b8849b65fd6a22730c
SHA51222e908b468ac204d90ea27607638f6b73662a2d2c3d316cafd2a604a7265fb7517b5b59a9cae9b7b2188ec08b6209f938dae871ae3fb3d3008498294680138c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe712161004366112b48310c8c421b0
SHA1e3dec6fb27f65452927b18650c76687aeaa24c7b
SHA25669aa4663c89f20d6b81d0ba1e9a3e283e6015675ca781d63cd91b17c0a8f6ddc
SHA5128ccbca4a778d1ddf5b61fa6d2eeb86ee5829e9b9278024e325eaceebcbbb9eccc393b830397c7d1dca935f79c1f85d1b70b0fd9254e87f3f2e1e214a37b8b29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4678f841dc8193ddb017ba119e9f19
SHA189ad33b8536c1d72ec425b9e551c01feb71279e7
SHA256669449697dbce88e1727a1a7ddb8229f9eff90ebfad0bbaae8eed06d05dc2adc
SHA512c5900643d00f20235d4c82cc644f5a24e58b407c2c5f5fee7c92aa22d4e3509515391e1816265b5578388c54815e7ae0ff74fc53f92f35b945dafcbcdb695430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578def09105d56e97fde1a2711185efbd
SHA14843c25701f71173fa37ac3b03fc37c9ffa6ed5e
SHA256e41bc1c0887d1c0d24af0136a5854db5b9a9a529f63c4c2616d28341c54af65d
SHA5123ef662690914563efe7222150aa3ce2abe59fde3067a93758c8e821d0318ef28d2c7e9f098aabf90fe80799f82d8a0113b1dbc7547034758aa625ac56bed3b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576041fa9a9de8b3cc279b1dd61d9a92a
SHA1c3704c489a0edbb11daef977da129283e0473fe5
SHA256e8c85de7019ee65a6c4f20fb39d8793c8d97f1f8b082126798d3780230faa470
SHA5128a6eb5870792c8f27d689cf759b44a4870ef1c6adf215d454fa4bac342bc5a4fb2fdf756067c614baa6e74ce14e60c55cb72aa441b5680751444d16f8dd242bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3288b8e34cd85c2b9e4aedb9105226
SHA1919fcfbf53cb9775e195a3fd28acd9b1e406ae69
SHA256ed8b4508339fedbf6a9499b771607fb0bc4a6af549800a4958a4fff0dd28931f
SHA51209572e20c7f1544bac467b0a7b4fb66869c80fb93baff266542b7c591155ce2e84496f431bc14e9e8d06ed5182d9bf2d81e21a3308acf6f3ec8915ab7c7a9717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a12104fd81d0749b8b3324dbe8f805
SHA1c9f9789e55cbaad083e817f5ce0fc85f6139e838
SHA25655c2da39a26756e53d76b23a61f20f0b712ac2a7da31b1840266ae0dc1759f9b
SHA512bfa428eb8e387b1f44e4e46fc4b84b744fcbbee5d80d6abe1e733311b4457111d8fab7de6d3ef495c0ee2ea44f5152cdbdf427d79b3d8840c2b96b071587876c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a