Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
6bddfb97c36004abb5f933a98def9b60_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bddfb97c36004abb5f933a98def9b60_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6bddfb97c36004abb5f933a98def9b60_JaffaCakes118.html
-
Size
194KB
-
MD5
6bddfb97c36004abb5f933a98def9b60
-
SHA1
53d38bdfca1b328eff001b975cef2e4ba421269b
-
SHA256
046fd254a35d01bae5efd4f4c7b17cf7f4bf8e5af271df0d2d94cb953e36ab60
-
SHA512
9e1dfd0fd9d519cdf7e7bb9a4e60a43b6e4ccd4a8e91968cd6658cc68e57c31fad2b603326a3c584b7893ddf33c73c9a3b889aa2ad1ba33446aab3fc96416155
-
SSDEEP
3072:bsyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:bRsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30db87443fadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000001ae0d415a2ed0f1485a4de91f96030165195ec436b8178d1aaf6e9ee2c9cd496000000000e800000000200002000000071a394a89ada962b2937e7a5c3d5adfec46698ef14f2198d85a288e92dc246e020000000eeae04231398a6597d1e6f4481bbfffd71a825ea40bbadfb10bdd5670e5c0c2e40000000a38b62f044529968890a9d4fffda519ee55f074f9ccccd4ec0021b4219884ae44236485e7e95fdb3798ea4717704c6105d7b6c94bab086d672ab3b5618a8414c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422650751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31066A91-1932-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2188 iexplore.exe 2188 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2188 wrote to memory of 3068 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 3068 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 3068 2188 iexplore.exe IEXPLORE.EXE PID 2188 wrote to memory of 3068 2188 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bddfb97c36004abb5f933a98def9b60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59103f7471b672ab3b4f8f124b14f3ddb
SHA1b5c4a5206c0121c0680aca3bdb2886d4fb4d5c49
SHA25690456175d07c119d1d94fb8391bcf2e6fe35716a1268e89eff780797bface623
SHA5121ef1d77255ffba3bd603a8bb02959c39a0bfeb291aabf019c76ae7f9e5b7b25166210892f62c3c0d2f1f8d0c31a49badf686be278c084e0c1d21ea5fb9367bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58f16bb06c36f375a16d46bf4e45ab161
SHA1c4d27509d56836847465635293b8c750baabb0c7
SHA2565bb40d86fb93984699d52890a1003c462c4a0a1043dc58b60b20ae321f5fab80
SHA5128fa7399fe9ee5323d78e4db39b76f8fb69bfef65663fa1c61dd8e3e5cc0ec39cbb89a8ce87b236205eb3288ea8ce2c6380da731c444b70fede41383fcb4528c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f50fc08929e38214c1f601c03f6d8b48
SHA1fb0e03517a91703f79cd3d6d2519d2dc40156851
SHA256b73d1cf4b7fd66eeadcfedb7b7296048caa029189ccb7f81f32e1e217f161549
SHA5124b6b5721e3729e103fe78ce596eca2707cb4128ce596f31c0def645b6dbd8412f05246c7c6ec6ad3d978ef01bd844ef906a05f78134d418a923a436759d1823f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52d765b50caec08b5d4b9f1d3f1f923b8
SHA12c350633dedaadda1150436356db112c8c37fc5f
SHA2561c1f63185346495ff8a08e4632d3ba746fc2b13fd8f2dbbe8d8d9d2bda52b822
SHA512ae9ceca9e828766251f9af028a9d1cae77831865ba90e488cf5af416f44c1d98e1faf5a8c5fcc1862312833539331e895180ec9a1347897ade1b277b84eeba7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD583609557c0a11fda4649f3cf3771800a
SHA18643a714df55c6f02695aa96fabdfd1aa6876dba
SHA256dceed4de9be9a546fe0f3761277b32e6a25dbf7ff86f8cd0ab4814e19e08459b
SHA5125a02aa48ff212c56e972e1ad30ed75b2c5d2c7e1b4e47134b11636a5d19f022a643a80080c09a01020dcc7119bafcf7aae32efb3913770ebe2531ed56d12bfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f77ae7169917b7189294c7e6bc9bc778
SHA1936faa5f97cfa5ef3db12872f0201021cffc6e2d
SHA256ea933239231d78a87d1dc8a50ea5c666a0cf4116d42fa743ab35014c8822395d
SHA512d2f18989ac0f5e4abfb1cc9236068ee8071df6bf9d08e9ff904cd43cd87e5d9dcce5b85991ba2abeba8614238cee65e652ca7e30b0e8d53170271eb91fe6975a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5860c36c2815cb52560bfd71e4368384e
SHA1ade8c3878bc783c66d283a195ecb75c492d5db57
SHA256b29bc83695df65142ff7bea111b9fb907fda47e5f57942d51cf6acbd34905df4
SHA5126538ff0ccf9b45236de88965e3c431db2af8cdd5ef0b785110b31810e417a0e9ce6371aa238021235c1502fb1a8c6443f59cd667e5fd3cb05a70976add36c054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ae14ee75f15213fde37f1373884fe5e7
SHA1ac0741bcdd281e916ca7cf2f7ed828aebf130cc4
SHA25605011504410295d1bf2b449777741698e604fae56a12fd177665054d869b4d74
SHA5125eec68339c174ad70bee09fd44172342d38d52a55372db1fbcf9878e382752c0c16b9b2eebab11db0a2337d917b7080b0d7d88138a6738a267d2b6c8ee511970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50b488737bd1f158288e249dc5bed1dff
SHA109314e1300da0aa8021b0353b1b9637f70b8dc88
SHA25687d6976ddc258bb54531864a8d6d210856388c9eed46aead38e8ce7d2e342e1c
SHA51268e5e47e7d1b39e3014575476e21d14cfda8a37d458499a86c0d744aceddb80a7daa990f23a1d2777ed2d205d21be2a4fa19e24a075091aec18067cdc4b60e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c85377c08f746fee1599880405a2c6ff
SHA1457a935fa7222780720463a467544d42a4245176
SHA25628a4b7da374102ab7713d2e278479ef66829775ee51895539fa77cbb16d44dfc
SHA5129a8a311ac4019b0e19103c235739ea9349a94c231c7471a93a296afaf767736f46301b2652502c5c09b205bdf35f2416183b3fe377948791330e5f676962fe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d97883c69c41c567229336ceb9ad6b9a
SHA105ed846117a054abc52984f1b5d4c47c069c455f
SHA2566384c8489e2cd1f3b9ad8d5d514648d06e64f02275355e4ce72d7b95d902d553
SHA5126954f14c3a95e7f33be9f84e9a46eeb4e26670762d3b44fdb89b12e952a82f898cc8a28d214690d9e281a1fd8d48616a9ae48719835dfba2ebbcfe2844acbcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5062dbd7ffc1ba4bb29265350cab9609b
SHA125f5cd7daf71958755951799653627a3387f7436
SHA25637fe604bfcafe9efb86a77a32fcce80352cc281190cf0805e24836026d03dc3f
SHA512b7fca2860974c835337d785c1048402c38a5904e816a92c44c97a2b1d6c1ba6ea42203f55928007da51342fc41a60ff90ca9d5076f32b376bc95157a4097ff3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5caf894c5afe2e5e8819c1c9b1c8a0e9b
SHA1c2f0d45ce35ee46603be30e27c3e6b16b7fb0c2e
SHA2569832dfb76ad128bfe25520c5aea13a87069c27e01faf03abeb35d8317eb83369
SHA512dd02dc9d4d2f483aab67fcf4f3fff7007a1fdb80d5271a8ca6917bd336a3a3397acdbce5d494fcec2ebba3cd4fa4e2fd6a01d700b918e177caa8a64e827f4c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac91e9f2d5c623b0492d15218ff98171
SHA177b9142e828edc359441f6b067f2e648fd859b75
SHA256a9c92c366bb9cc749352cf620d9acd120a110bc853dc6275c70b5e85ab1f77c5
SHA512622e835f4e3a31f20dd53307d31718279428bb8557a93641cba9b80edb9b63cc60bf274bda52323b230de33c3607652ed30717d79cec786d5bf502fd364ece60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e9a3bf55eae0412171fda88c7b216e57
SHA180d7b551b2640e7e088219a0c4e41749923c7ee0
SHA256ba112b90d87c2642f331368330c9bb90a30e03b7b9ad24b6fc17d214ef388c54
SHA512e636f7626545b043e3d9e3878ee10c35d552e87bf78564fbb640b12ef862cda1e77d0a40a2c1a787f7042f21d70ad3eddca279c8514c08d552715d822c3f9ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e680715b6f2a96c12ccea58c702f4c5a
SHA19f9b4d8bd3f232bd0170518c4b5647ad0ce5c36f
SHA256266f2a3076a6961f39f93fcb939a1955ee92d1ddfc0d647df5496dcfdd5b5df6
SHA5128aa02b107c6934335643cc877096f04c473ac502803ff1265aff9b13e7a32d14546cb00436baee528e8dd03cf5bc37b9f3821345cfcff0c6650a3e5a80dc7480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52990bba4faa0a5db26a75c9642d5b122
SHA15f668d25797f1f978772074e8ff409fe6bb0af9e
SHA25671914585314065153d0e6d7054e1a3365887f86dadf943873ed008ef113d4389
SHA5128fb8278d2a291fe1800d1ab15c5713e1c75d809a1dff749a506ee1dca2690233f2c919287befad00ac1f7a342bdad10dcedaa47c827ff05cb1c751fa7e5d27b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54490d8319009ebd122d8ebd8c0729f84
SHA15b7d7424d54b5f3cce7265d3792f5d1554514732
SHA256d005e80ec40572fe8c327cb06b3d397e1bae47c93347520c477a727b70aa1f8c
SHA512ab116a156c91d2e6ac22a3e66fb08720db2b1a7ab1e388e5ec2ad130dfd6e782c02a2f69e41c19b59bb9bde51d67083ddfa9f1755676cd9077f65f59e856dcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b2b448959b98942825a4765350258718
SHA17e7d4ab5325219061080b51cfa931a8917be739b
SHA2568ff89b4d02c900473894836d4050bf0f9d02ac71c7a3d295d0ee0483f7628998
SHA5125681deba8123e158e5e5e3ffd6cd3a2af9fb077d8a421baed016255c141c9f8801096f21a261af6a532752a98168eaea53d3a2a27237cfd6fe2b484e7075ee84
-
C:\Users\Admin\AppData\Local\Temp\Cab13CF.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar1431.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a