Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
6bdf03eec419800856f8b6e08291d65d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bdf03eec419800856f8b6e08291d65d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6bdf03eec419800856f8b6e08291d65d_JaffaCakes118.html
-
Size
119KB
-
MD5
6bdf03eec419800856f8b6e08291d65d
-
SHA1
f54618bab0a98f9f00ada01d884fe8e6574f7329
-
SHA256
447fc7ecc6e2933e09b3afd12447a26a9c9e23d044a361a5a5b35cc4bba9124a
-
SHA512
c7a8995dfc79921f7d719262bf734e3d17e5f04ebca3b1caf2b7f89a1d4d9ed8115d4b10f98aad676a7d4ff18521585dcc778bfa3e68c9c43569624ff98270ec
-
SSDEEP
1536:S3kvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:S3MyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cee8373fadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{630FCDB1-1932-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422650834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002cb74c1ee8ccaeef0c95b6a14cc5b7f648452d011d11290320a08afa21a9f854000000000e800000000200002000000076eb390d093f18bc2ca15bd0293807285998ee6b6f1ab066f0f7025a851747f6200000001abd061e3bbf1af6e60e5bf11fd91ec576ae9c5968fdd71377a8320b019775a8400000004f97d6669120ebc3122a7ee5029ba90587871f04664eead18e720526da7c1df2d883689450d659a6fea2c2de16563b523f9ab4df3ad15425a49eac2dd94d51ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1688 iexplore.exe 1688 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1688 wrote to memory of 1864 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 1864 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 1864 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 1864 1688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bdf03eec419800856f8b6e08291d65d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58893b44469e90c426fc8a526b1086246
SHA1b2101a8e753bb4d27613b5f704fdceaa26dd0d5d
SHA2562a5f147cb7ec0e1d5bd31023439694b8f32729d4e3540e4b528eb320cab7a350
SHA5123fc22263245ba0eb9c785af084e9d5cc3f9e400cfaaf58235a69be77d7905bd2575919ddc25ac2dbb4ff3357b010021b3d323ca47b33814c86efa78fb1a2a1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58e62b2e8aac66f7e6ae0fd466a8f0ec9
SHA1c25617ee3bd007f9a068172a3bbcac75aee036ab
SHA256e68ef77c71a466dcafca6d6e1ecb0c1408e1b4f0f306cbd97edb8467be1f827e
SHA51224cdb980b102f997a68eaa200dc0d2b8ac34550c53437ac606235159acb0e19ace5e4ef5d85d80813e77b01021afbd4ed1177bbbbe9dfe667b9569513afde61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5155ebcec042943d1d42b855227ece383
SHA1569fa17287dd5c61fb06a8759ab1d9a413580647
SHA25603158b7698242ed2be5abb7302896650141b80e1fe62e412190d67b12c2ce7f9
SHA512e352aa4f31ab72fb53412c11bc63c60630882fc0ab4a6f8d5158198f2d36ac80c11338f60c2642cebdf5cefba55782be913025dae402ccf8c686d83193443abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5be3375b23cd11eed84326f9c7de306de
SHA12ac499e8435449cd241811007d099c3f3c8c7726
SHA25628549ecee9a1f10bbc5e89009c32ffdcc2f90270377c58e47650eaf05a049186
SHA5124bd60f4b931c6d0bca568b67c92d5211be25652827b140175d4e6c454de0adf8d71a2f3990b8644785720c0a17cf103da7545e4f50161e80d26968504d7773b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54e0c2fa508450748a74fe1fc8208d26d
SHA1e9e33d06ddc1d89e20d629139af7356f21d7d6fb
SHA256ee2b7718bd5e9255e21e9ad554cb6c5a90905f20a223fd82f4f8a4b754490ed8
SHA51243994047db171ae05640f0801a67f5b6059b8073b944c1bd34d3b827c75ad6b34a2de1fe60bbb9035a42e5ac7e1f52a89636ec13848f08411cf735b1d8f6e1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5501b072a79602b7a19873b36df5faada
SHA1734210006730e75d2beb319c6c197ec45b8e99f8
SHA256ae765b4ecb21e254a35455fda9d5fecbb8dc9c443160af73befd9cc4a9e0e51d
SHA5120d0b4a4289a1f7970d5f7d28fc3aaf13911c7ed9ea2bb83426f0c6995f1e4efc93da0f0b3f5b7aad8a9533216d60153ebd5c03db435a5abe7303bed4975161c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54fe33de8f0ef8aeb7082992b71d45382
SHA1916b790b8924f2e545015287bb87d12c877c93ab
SHA25693e5028a87f64fef23d90093fc5f1a863189194d0fba2731dab0f12daf0c440b
SHA512a2ecc96c791b12b8ad0cb6b47d4261c288405705e0abfb150d952f6fadde4028b56e2e824d90f0b988c2b82d27677b0bfbe29cc7470604974c24967389471fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57f274d25515beec3d550897321b2ea4a
SHA11e0d1ccf25c1cd8cde9e6fe52fb2976bc362afc3
SHA2561cb2d99531ec792a449e265365be77b196d009f38c75ef65c246d4655c79757d
SHA512c64417388b4ef926f85c2aad975ae8d058a4f6eeaecd85acde71dd166568f0980ee1c6ab2ac7802983b5dfce9925c500483ba5d7424a83f7c79451e46167483b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5264190a51f18b2460d2582edbbec6279
SHA192db0d5c162abba0c8f9805664563b9b4b1beffe
SHA256b4c97442343fa8462c1d7cec458b095326215af1e3e8dce91a2b3862ae41bc95
SHA5121e310d680a12269fd630e62163c6d2f4fe95b04db86c2220292e846642c0d7339eba540de99cdd046a9efc9e03a3fdec6bc758534e7f9c310a360030c0f360be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5803491f50bd532e322c64ef9cbc5a668
SHA1ff5452c1ec898b89b9cad36a46b9c94119c03fc5
SHA2561fc8e504bd0336b066c32b0cb21665967aa4db47af99659053756d36e8628a45
SHA512051d8db9c0674c6675d492ab0be4bfb94f5fe9a12fead300faa8aa94b762f71fc0ef3e13e77c9b6b81f7d661b08bb4cc9c64768fa464492fb074dd3e8dcbf31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5129bd57c11a514d0bb94632db343c000
SHA1fa06ba33a457df711558433bff04c0b75d13d45a
SHA2567c98ff063400b8fefc0bd3af1937dd95acdf4d1aaf775f757ac5d815cb4cc06e
SHA512d9cd4aa292885f3aeb46280b5e1f6ef11a70caf16dd158c0258fd089849dd544684f92947d40d16868be043e7c993bd8bda4974135aafa793ebb53ea535216e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51288275990129895349d13856ab350ad
SHA168fd1d469b61c087834c33cf586ed99cfd4f344f
SHA25616f1c4a605ed290e5ca95f4b30dbaa6735f792f2acb15b75243680a88ee90d96
SHA5123dc1ab0ffe125c7b881bb431b8babe2652bd7e6f653386fc1c3787e46c94445b4cca74bdd061dd35c5043df44f64372db1abe3fff174c4a9706bcc9841223694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55aa415d2d7d96bcd77c9870a9600a939
SHA16676a7b03481e5963177beda9d7e2a90fc7e799e
SHA256f88cb2250863f6d28ecdd02740b2fffa1c3c4015a55889ace740479e63af1412
SHA5129da0b30200be069ab41d5f3189ab97d1ef191519bdd1ce67943928e23bd1b7a7713eb328b542f0bf4b0686c69bc82cfd9a1faf2323a18877deaabdf4b25656c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a898b29857bf7b3fe0e03c7b120c6f2b
SHA106c1c0f6e7dcbe95ff2774697e254e2694e8762d
SHA2561e6dbd10cc24cede9550d698bce2f325c46e6df7b5ba63887de16b8211151b96
SHA512ab620fd6b2816699caf48f2de1d38272acf6cce38b4a6e834c68d4dae79f49863b2d1b0df7de12e19bd29bed41e63fbf2cc1b3783685e957003fd088f2c94f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b1452d556795179c930c543a2ad1691
SHA1fc53175dd8e4a6c4490a46db2af45ec467184a35
SHA256ca78e5fe14c75ba5f6b0ce17a8982f985a5dde48dcf84ebd1198a1fc0118215f
SHA51259797f84495403ae083cd0cc2735506fb82658a4b8bef08d666720d8e2402b6629b65ec6153080812e5b19e26f4f03dcfbe254e0ddb6dda98d5130c9f1b41ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d675b936ad1073c7351ba7f0a7af549
SHA18d418fa1800e0276b05b5e14a26a965bf49e45cc
SHA256704b08fce1a66d9b870457650cf3f8ac1e110850f16aed309db49438011b1faa
SHA512270cd0428b1fd766a9ad7acc472efa438b5c762661866242270d067bd8a78e5a3250efd34c6f0105bc0511af1552d892c9cefcacc4c97c01eeceaeb3bd987f96
-
C:\Users\Admin\AppData\Local\Temp\Cab4A1C.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4A7E.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a