Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
6bd72162e7c561a338d76b06b5090fef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bd72162e7c561a338d76b06b5090fef_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bd72162e7c561a338d76b06b5090fef_JaffaCakes118.html
-
Size
2KB
-
MD5
6bd72162e7c561a338d76b06b5090fef
-
SHA1
f31bb604c50725922f07246a161f11da7c491f0d
-
SHA256
132534b63303951bfc357fe4aecbe2dca0550aa837d099b8d55922da753d676b
-
SHA512
a5a9e1e9b6011ee9cfa14c99d8184db435f284a44f3ca9dd271beae5e040107d4b363968f629062d770562051d22b43d689c6243a34f6aa13203bdcd93c6a200
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECB915A1-1930-11EF-989B-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fd6f63811242449e1bf528fdaf85120000000002000000000010660000000100002000000030b4e020cf7023842d39e47d1052c6fe0dbd2fb7b898d5a72fbbffb365a0b5e0000000000e8000000002000020000000d13589239f7420a7c5b9ecf4a69ee568eaed51e6382756cd7a16ee89258f6247200000009d0ccd3e3acbfabc16dec180772e64d0432d8fc21ae5c10aeb33d0a3436bb0b9400000008e3f192f5ec2e2d08448b54036be18f6a814b986e6e3a70a39895c07714bf0cf8274378b61086541ecf3df4a4ea3fd1272d5cf457ed8ba4267fbcf0b588886b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422650207" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702270c23dadda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2876 iexplore.exe 2876 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2876 wrote to memory of 2812 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2812 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2812 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2812 2876 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bd72162e7c561a338d76b06b5090fef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ec829a1471654d9ac5caec10ebc47580
SHA17bd2e3c0fbf8a08dcab382a21835882418ef01a3
SHA2563dbce01f15a29de88915dc0350dec2f688b31f52925e24df116e199bac6c204c
SHA512070a84751d13f39dfb5ee06ee02abbd91df50b61e6c338731158cf63cac50bbd1d3c70db087d66c7fa150ed8f44a39ed734c8a4ff555ac690cc82c2cca503543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD529dd505c66c14146d74c14f7fda81ca8
SHA136a84729dc94c7cf6a50a4996055cb6720d560d7
SHA256e5664adfccc1f641b23bc3db10e61571b826c07e7e0506887c0c6f66dc21f34a
SHA512c932ae1fe6d283eaa4cbed4bc0dc946f9bd69b46ae468aeb754bb5e4631f458cc18ae4273440936cf536d414fe5f6db388b82220c67b0fb629ca8df567a5e41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD566cea12eb1cfd0c53a59d3c728d8693b
SHA156da906466717cfa28d06e76bd8353eeac81ee6a
SHA2563c907f396e04350a437df8ebdf2f78c9d5651ab57c36791380c024bf966d6a8d
SHA5124976f76f4ef0772533263c86cc2169698afb733707d241f0d33d41236a588863b2a8e5b896923c376739e38f16c8bd34ceac042ed2857758a986e101207a68a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e33c818c60463d54e0a0768e111e0cc1
SHA19f1b52345af5f7d6ee5453aa7141b2ef1d4030ba
SHA256908031835486b9cda4adb6dc8f337eaba3534a03d736bff058a2c771f44be43a
SHA51296073e169f78e7477218db41017c5985a752f7aeefe882c76fb8396346d092a9a50f7ded657072f2a4babdc726ade1b113bdd667215ba738362f68cf7bc9c6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d7a887d1f0c7c8a6c07565ddf080680c
SHA1ad5407f35c2790c692ed799ca164b892e41c7658
SHA2566200d289bbea52791396f2073e5e9492bc1b6cedc5283b9844c598adc3273a73
SHA5120f4dbb29c1faddabce0627708080f9f5d015b880e3aacbd5dfe4a324563d98720e4419dc299e4267ae5b2020a86fa30fe9f4ff3eb0aa97d0e4b14a69c189adca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53adec34101ef5565e344ba0caaa30038
SHA1984081fd6ba48d82de63454cbf4c5c621217e88a
SHA2564027f8a37d5eef471a8323e12703b9b1e4c9fbe80d6585353957fb53d2fe3abd
SHA512369bdf413381131a7b10d3f668e52f58753637d2a6e84c5f1b658e0e18581714d2454e829e15d180f3481c2fc80ba779d075ddd5d3f6c45c9136e6c3af3e4455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c517b6e9867eb22ab90283c7be069d6f
SHA19480cc1b589bc00dff1a867eafc0d3eeb8185541
SHA256f5ac9e7b10b64b7d5f7a6c755971765baef941a96d9a1083a0e2a666200271d8
SHA5122e4f2d0c33a4f3e7f47b80509026969e7ea8b0938bd188e5fa6106d557934a520aff68a949d6e0d5b1cdcfac7a073755102522fa0a14121975ac4ae2ea2912f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e3ff700636a91a5a4dd27ae93d1d46a
SHA1b7708c1bce507f64f735bab11373f14c94047735
SHA2566c5d24e2f99e6cfd10620451daf538835e7c4b197ca3a7ed440b84c1f08d4f89
SHA5129900d9b931a54fe0ac6067c047b3e2d7cceff2b54859cfbf83b838f5f54295a2824c62a1f8243b27be86f8375acf089ca6152390867f844a8b7ed1d96e4ac996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50f1715d126412c089f5a71022f5733d9
SHA151a0fe52648ca876e3ccb81f10882d0b3254188d
SHA25647c32ad35a8ba3924a893c8291a7f87200c3db851bdb12b976af7c6e986e8a0a
SHA5126444040e159208ad8b02042cc0682fa7e24b6bca2895ad35b5e4830728d0407e676c7b31f4b464fc5b647712ee2c031381752568b24174d2b9ab34fd32d9e9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5369b79b2517326bd804e0148d659534c
SHA15ae7fb582905142ddb59a8a57f587064cf8f5678
SHA2563c0cbc1819e4612c1f98fa517bd550450982047c2b399716dbc00d57d06e74b6
SHA512a8aad44187b8324f68de786e043884e03feede389a3422a21a15cd77239def6e1fbfe89bc2bfe81489bf613029e7e14461c684e6d827d075ac5f02e8f04b8718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b50a7a5ddf370cd9022aced4d6b7e2d
SHA1b599e129b4a4e4cb9523de42677f1ec9fdbfa905
SHA256220ab4d36aa17920cda73f7db6e62fbc2eb4cdcc0c54ceb25bda43c83f09d18e
SHA5123fec73762471c6a10bd78120e369b09b803bc3d24807886743554b878015450b5d9303e8608774353d3c5c66709e6606e455ea8431fae0c28a5574e3950fc050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51808e10ce20798530cd797cb7111c933
SHA174b5e7e0df4784eb270e13795bea13674dd5701e
SHA2567dc3b06344155f670142cd9ff5976b141e6968f4518b1592339162ca4a722439
SHA5123a9ab146b4361ba3e91f905f8701d651d8574e01ca806c9d37686760bd537c170f31976542f6216ae0d6f2edc0dc9791d8aef7167ae118b9c4fde0cbba80d4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af79b73ca007f48e48057e38fc12ae61
SHA1d9d72cfd5719a45a0b8de698dc95f1228e9bdf4e
SHA2561e5b49b2eb66c078ec2e1df829a7c9e1031a2746ce0f5da984dc55facaf48e0a
SHA5125379dcd7cb807b5b4531d11cb6b882ddac774afd708cf3a4566e0b8d4d96c6815887cb7262345d57c945364d73cd9c445fdbe993e03d0a6e09ba89212f5438d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588304fc50bc5a559dc325c1b0be233b1
SHA1788d973316f0258e7db829a696cb6095e64efc2a
SHA2569a27c02f12cd212e015fccd29ddd527ed199f136dcf3dd4cf17a359faf78c133
SHA512be71a47bf265153d2b5c9029e1e84debf18c4a338b7cdd28d3a1996831370f7dfe2c58ddf6a9adce1bcbc1e47ee84b8933ff9f0e326bd608d6dbe62f8af526fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51dfc247f35906f64bb22a3e533b2cb12
SHA1747dc3cb48c8db950bf7d869da92e20a063e036e
SHA2564f8595f7c240cb82e1494400f5e72b09a11fc65328cdba07730af0ea9737e94d
SHA51225fb1cdbdfb5739c9569fc9a5b45b6e370d17c181398f732adf26e1a789a9afbde8a223e88a2adb214aa66e56c577e17340ee68c1b8855dd0e1240c007651400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dce1c8caa66bb209abf749b81a366fe9
SHA1620937e8bae47decc54e0090a3deb1ba66bc7cca
SHA256aee4a1b8248e76297e414f0029037e1bc272e2a93de7088a4e83fd85d3c7d65c
SHA5126bd4b1bac414aae1e9b182896922b05b7a358e164b7a3a3d9fb3876a7b4b09215f1b49cf790d107c0b302befb635636907ba3a30191df4fcfb146e8d2484517a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b268919dd334773845ece379ca5aa71f
SHA103601f9b719d9438d7ba350d3ed72f1b1034e336
SHA256d4cd1518d4c8bc9933aa9c0f3d426935ed8ada06281493834f927737fdb8ee8e
SHA51284b7b9b2346c0bfc2353860d44efdf08f0ebc4c5d307924e6a91696ef4dd0fbb01c00e24fdf5b6005728cac38fd595c644b3d3ea1396dad468b5d9098235d267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dd2b83189ad8deae1df823c5e3978c6c
SHA1ec6fa52f6fc8a993c4804ef592dd73a73a59b103
SHA256c8b4a68007930a6a8087689c63f2af9dcfd0a96356ecf153169e5e84d5fccbb6
SHA512a6c502c4ca7a684c4062b2cd8921d3685dfc6b7368d9c0a1db1bc9f5db20c5ce5b0c796eb6663b75c9097c730b720dede5724097bef84b9dbf7a9aa563da3732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a5900f1b18c1e422c373a1b054b7ea8a
SHA19d9d10adc7de97c00f8270cbe3d36a3da40e9532
SHA25687a5d40b33f55034a0465fbb4b346eb9e0fa525e14e3bacb892f9c309791cd7b
SHA5124210a4e9d0fb9bf3403154940f06ed0d55a524f82f5a5cbb64ba1fa565e563439c9a1c0a89ae523b0d1e248570477eabec0e66b8b0a5d61722c0ce31e3f0abf7
-
C:\Users\Admin\AppData\Local\Temp\CabB176.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarB2E5.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a