Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6bb52881acbc9d26631672796f64818a_JaffaCakes118.html
-
Size
66KB
-
MD5
6bb52881acbc9d26631672796f64818a
-
SHA1
8b559382514d427fe89a79afcb85309a578e8d52
-
SHA256
04074696efbe7f54805ba5959158e9ec8526c4bd74349f810415fb92d25b073e
-
SHA512
33f747562bf4cb1f3c4b3b100c189622d771e69d2c6d46dcb5ad6d4579976e60982d606dd3a712afe9e92de51ebcc3fe63f09f2602ee9ef90983567f4e120fb1
-
SSDEEP
1536:oYDuMXfH/iFHEWmf9b+/pElNscVEu04LuO+scVrAkdscVEIBscVeVXscVO/ItRsh:olMXfH/iFkWmffqnTuAwNUmGWY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422646960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400a0d3436adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D684211-1929-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006e022f83aaa93bf63bf62c0adf36e6c9b49a46c032c35193a9f0bbd2cdc4ec84000000000e80000000020000200000002635ef91d7ea73f9ad3be1dff8d67ea2725184360a23841d361e65e2e95f5051200000006fad0695835bdc69ec0c398ad169741ae2813963a6204486d88cf97b4342d7c7400000001b42183e7f6ab064ded100e400c5c8c7d8cd064737bff54e5c819a1af769f90393be18f9929b405befaf73b64330ec6d9d9b2ea499a892ba6233c6568efeb334 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2564 1904 iexplore.exe 28 PID 1904 wrote to memory of 2564 1904 iexplore.exe 28 PID 1904 wrote to memory of 2564 1904 iexplore.exe 28 PID 1904 wrote to memory of 2564 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bb52881acbc9d26631672796f64818a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8951debeb54b0f6a0fca308e3a3f7c2
SHA1ce9bc9b3f05b2dfcc8f06cac67fef0dd6b4f0b43
SHA256737ab83024e25b31629853a8afaa18118029275b90eddf65393b47ae88b9e2fe
SHA5120c5a677f24f53af9492d3a2d246c1e7f1be8d60a9251595e981c3fce9f85fb480f43ee71d7a19d267cbc9d86d93a0c99d6d76f80a32cccbbc51738fe3ca1c94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7ae34e84e4ef0980f9f7ddea6ca689
SHA1d6a32a0fef3a8bd5bd42e67b8620cb7103105ba9
SHA25697c039a6782ab1f2ed40a725b3593c1d7ce0d05581c144d2069b1696d402f92b
SHA51244dd3d006c39a223de8360201f08f969182c5833de47b250caa33a66ca452d65eff2a079fe36aafa8e0eb78fc2cfffd58117f898806ec6912ee2899b66a447a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54431a9d767c406ca659aceb87f99b906
SHA14356351b00d305559fb7e8429f16e05f9100507b
SHA256b2896c3b729ca950e2e04d14f5d7b36cdfeb7111291bad82bb6ec3df1fe41b5e
SHA512d4d9965c923061d429c5bae6e64bdfbff5394515399fc39c954a53c2917369764b175bb796c2ffdb87b2cc7b033c049cc31acceae79c33793ad3d76448e68697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c349ad23ca924812190e141e3d19da14
SHA163368fe1a232e1d3c0d36e4042c808e9d3a37b73
SHA256cdf7607eb40ced3fb723bb786d83ce80e578eb8d41ea0359c93193b92d0d17df
SHA512b8e1bb46c3e7d3db3a5b37e4ba6609722ac332b2edf672a712c21cbb1f68a17f1b41320d90c9ff4fdc9b3aeccc8f63d776ec5ba5c95431688dfbcc25480d80bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d026fb2e15aa6b7aaa7d4fec71664e8
SHA187bdd362522180819d1f2689a51f7f98c185dd10
SHA256dbf908c82ba91088c21534141356dfcb60f0645749a95f49b5a8b4b226679175
SHA5121e6a8327874cae0af34b2c7631d37b4efb87680ebe627961061ae1092e6f34d6549e97905cda3f00ea29f1d0ec2188b055683c8f934b1861bab131260a6f5d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8ffc7af65105abfc3438c1b74af7d5
SHA1c0d6bb1bc88c84e422b1451a6a934dcc628daf87
SHA25667e9de7cd666cf91188be4ae05be1a722800cc5b98f3e30ea62b3a20671c0384
SHA512cb387184e1bc4d29ff6b9c2143f04b74e46a9a91f68638d58b73a1dfd2a5e7c049e584fb5f658702f14682df436484186b6a9ab46d61fd84df6b2095a6ffeda3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d1a0e1c7015b57f91ea106285c5bef4
SHA17ecd07e6b9e96252e8341ae131451afaf9ce00de
SHA256e34aade3af9dd77750e6c36c07dc87e352f382209e3680a3880297a181147be3
SHA51235a8a9bf65407db2dc4a896a3e7eb0e48fe7f1adf7745efc9099f807926671337cadd531b09f90008e8c286b8950a1909a7fd1da8a65ed389ebd2c27ec226ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520075c288bfae058f3aa5470bab16e3c
SHA1f97bc8573e478c93c5d1b08fa66292dce7ffe612
SHA256defb8ff021c379ae001785624cd215968fb7e3282b9db211c2bd1a2552578454
SHA5123575e474df744ff0782ad81e512844561273e64897dcf1de83d5f3f48f3267778ffce895c083ecf6ebe54a0a2217ae4be09fa0f1aa0c126ef4022f6abd071236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce2e98221517bab848b067d649e4fa65
SHA1bbd2b25143d6e674a56231e7c573ab98d4fd297a
SHA25638e87e0a8668b93c8c752e53bd8895bf3dd6f6c04158a7b1e9390717841bc6bc
SHA512f317e114fe892e3d34234fdd4640398ea3d58910251a9d3fc439fbf27e6889728261f121088f7c4caf5b4a964d7d8f63d9443093a11cf46697fbac5c658a6213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5d3131c12d16c9c082c10ed36c2aecb
SHA167e83c029523c319b1a87abbafe63fd3013e6088
SHA256dd7a95b521d95f711328c5cd27f98abdd9c019bff49feb39ce6fc85cf797a22b
SHA512b2ea33b9aa0780a370852c592cdcb5ca4098303edba7f009ca1b8f7b86873dfcdb5b5399c4bf5290db8df54f74cd380701b2a9682d2461b9bb0cfc30b1a0352f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb529ffb85f74ec31b048d3d280594d
SHA10294ab16eeeda8d82d9cfc561ee9ce19a80552bc
SHA256350683adcb4a9e39e2b29af99d1c883b9abdac72c38ca25b25e16f5607951d1b
SHA512e91b4d6f0999052a6f4d53f33a7f15f9e2dd3ff21bfb69da7b00eb09d6502c526e71c9369330096ef4c8017dbc9194ea6ebdc16dacbaf33cc5e61eac3499ecb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57166705ce3b93c71a876a75b50451564
SHA17d74c22b9fcd47483a95da6e87c9544984c90abb
SHA256b9fff6366d9c3fa84039abb0e672647cba9a49ad7cea6a4125563885d0a3d9fb
SHA512f63aa20f03968f718416bc6e0cf8d322f12cf539bd39965d4547aa96421722e59df3e40d0c7ba7078b69d394729c04518bd10c5b83ffcc974e05a06f0ebd48b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58872759fbc6cf2f2af76abd2b930cc9e
SHA174136b83d376623d6ae6fa3843ae8a552a5f7c1b
SHA25682ac506c3a296918a43a70ef6b4b82c66f80ec978e9781c6d60b22cb291052a0
SHA512a4d7e5784dd071e679c6ed5e801825fc4e0637880d3a785459caabb87ac6867790ad723ec87b4a0b7243940c754a0c0c199280e3796d1bb8ae555b2efa1e8c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5652879aeb9638a06fb6b1b0c94fc2ed5
SHA151168dded95e719b26ac7c9d82b3c22086893dc2
SHA25626555fb9918623d201cc0cc21e49391a86e8565935cfa51cc69a8e761a7c9023
SHA51269503f8d80301a2333341ae544e2d2ee2c91775641c457745225789025da53a7822b81563b3ef84de438229d0580a5f1d256b32925c5a7090f65a903d004cbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d565c0c644796968986ece205e97c56
SHA13e3ecd7a64717a1a765c41ab11fc80ab962ad2e9
SHA25643b0679a8da819f48fc42510c7d5e1ee6d22a49f02ff327d900b9d882eed80a4
SHA512caf81ef888aa98d366b8661b0e9d5fc42e9dbc71c5d9064ad83d0bc1fdae3963df5bdf1c12905466952e79088dc48a5a2b08a6fc9105210d85f2ee5d021f9114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f3daa7db917216e496e886775feac32
SHA1ba14cc20e3681808969d1fa782b16a54f4ead351
SHA25698930589d96b0858a2cd5d46ab56b375aed678673f4e8ac320f44334e137356b
SHA5120f6c9bc94a14233d6ff8c99fbf39acb313ce77b1a83f8f5bc836c3ce76bf7663464855cf71492ada436c593dd3a044f9a0ad8ffb260ded5db4551a52b5d29e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7381eb40a5763262fe9663c835b2dd
SHA171f48ad8b81f63e9529737cc92a33ed07a2b460b
SHA25643dc8d0994627cadc45a4e6eae953d8c49f88cc5a0dbcd6d443be90f667e74ba
SHA512efccd100e44b11e492866f3c24ff0c9fab7a985dc0907563fb61ae4301ffcc4a807676b295d935f0a638a0f2a1556cae374070f2f2509e2f5e12801bdab2c68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571918792dabcafd59ff38549218dd84b
SHA14fa59757be6664b8ae0da863aecab5bde871ca04
SHA2561b092c726007700c5c3714d8936fe22194c5f7af0fd801b39a82d508411fdee4
SHA512a48af8f2d8462c9dcbfba2a6dd09b77aa5e3482c1b0b49b244ab4821798b3d0eed49e4bc6b2bac8c88832e43c59b7769164db7c0863fb2d5f1ef29aa8a9b330e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ee31e76f97524e77acaca15e3b512f2
SHA1270a9bc8a742b638474f138ccfe1d08bf2af2e20
SHA2560efc11d640e03a6921f88e97ad10c77442ad5e2c79aebc7562a454dec23033b4
SHA512198efaadd3c0174b8a77591bdb428e6c4aa15b24b2df5acc7e293299402e3b1123fe2e12437f8eb62c47ba07d1526fc882415b258b56a7aeb55c285b46a158c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0b4458f214a26fad5de344dd75bf18
SHA1e070ea0d7cdd60e747ee994a0f0d5e512cf8a566
SHA2564048504c693f3b61ec32c1698de354a1462f03e4bd6ebc0c22282d1f424960ed
SHA5128427c574a36b6d2b153b32bddf8f57b24c185aa87be93cb29e26949a84471bbc658024dda73a01308afc7ec85ebaa8ebf8202404ab429fbbb7c785933a311882
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a