Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
6bd6eddc3eef6043814f46e7c19f04bf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bd6eddc3eef6043814f46e7c19f04bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bd6eddc3eef6043814f46e7c19f04bf_JaffaCakes118.html
-
Size
461KB
-
MD5
6bd6eddc3eef6043814f46e7c19f04bf
-
SHA1
7125cdef6510625a7b59a229cae7de86c45fc443
-
SHA256
3183312f1787896fadc68c9709c6f95eb33fc74bc80c1abaa10da1934b800454
-
SHA512
e2df21daba5e937bcc5056a4eb27ae6d1f71d5014791524c38a4bfda8e55e836e3bceed975a3c7124cbb0438079257c85fdfcf9f670fefdcc752243f27a4a368
-
SSDEEP
6144:SAsMYod+X3oI+Y1osMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3+5d+X3B5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000043b06c0a6172207b940c1ec19aad823162e318fa5a57a644d41a34131511bede000000000e80000000020000200000006a20b5c9e758acb5a5058c5ec705fcb949c42946ef94389ffa40e37ecf23623920000000b271752a13beaba16940a1013d6f8ebf929f3d9987090d39124f9efd2acf4d5f400000000340328fa35740022b9551999167b75ce109ef930293eb1e5c9239e29af4019eabcea41bbff5c841e3615c10f98c5a2c740cf1b64ae04b672c83e90654adb9d2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c013cfb83dadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E043D081-1930-11EF-B2FB-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422650194" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2172 iexplore.exe 2172 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2172 wrote to memory of 2808 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2808 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2808 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2808 2172 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bd6eddc3eef6043814f46e7c19f04bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5771af8dfcd5a05acdf5906ddd56fffc0
SHA1279f6025b7e62b10a37e3e0e928adf928c015d0a
SHA256c7a64945e426b1756af45bf20559d45963c7bb034e50b63f0e49c50ae14b6fc0
SHA512192ab326cec61704057b2581ad70d2278b9db82af56d6ec195740b6b1447a2902d8f9284c80543b3cb0a42c618c631a5d5405246a81fe23778436073e47fe224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a802bd950f879d265ff53aa4a5329948
SHA1fc8925310c12dec787ab21975497fffb7ce106d9
SHA256fef44d63bc61ee3fdc50e2e66fe3781ae62e5f817e66a97dda33e6ab2a795496
SHA5128d624fe4e8831d8b9dc3706ef8abf4438d4a9202b0d71c335f08155edb4da711e754215bd233e426d6b198c395efc22493301e903a4ea8db91f4ea263f9447ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f5e01cd01efb68787235d9162e176e2d
SHA13f64274ca3152ccfdce0c0840b3d16be7989296c
SHA256ec9fdbcf0611b45e2a7ef25c69357286804b5e5b76c6042a7b4a7e282a840daf
SHA51252b65faa37982e2f2fc98ea206609be8c81b0958b878a045038f9159fda78a51e0264141c31169869a80824fb9dc97e488ba0d61642b60dc8d93b9ee43d3974f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51a62890ef7075b8241f789a9a283c46b
SHA160f0b0330af4677cafdd4ea348f34e1533380475
SHA256ad2170ebb58d86619fe128ea09606c83f291b958d264f24e4b5b184487da8e3e
SHA512330a3f86eaacf9be78d1ba819ac928ed03c3034ea6bd8a1b613cf15526d97db40e87213e58bbadce6cb270c976f77012cad438983b4760096fa75ed43df81c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57111d53ada985c89c3e00b65d30f5507
SHA1d745f6446d94b10ab2345bca62672aeafe0eb6c5
SHA25617e2062ea3f33cf1aa5cc7283a5391923e8ec0c8dde76e1c3832497bd3c3edcf
SHA512d29b392c52b43cfd9a00ac1deff504b54bba024e6db19deb9bf1f1cc5d797f412081390d659d03e93d54891afb964fcf4efc0f9e5504fffd3eb17b7c6c454acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f4b355c65e2dbacdb285d0a9803d0fc3
SHA12ed237d0803704d9a03d999a0f2a658e9aca3663
SHA256eb7de290c05ee7e926af1a43270b68e58e3f9432c0a0f70676cc07f030e8403d
SHA512d4baa8069db40a997d6f6eb35b91cc249f6e784e658ba5ab44bef0e3a52b45b32d47b9906b2d202d67da9b93c8111e9373b2b96ba2d548bb766f40f2783b400f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f1b55b4bdb93c8eb967bc0bdac324a71
SHA127a3b170bc19e05e25e8e3091a4a2724f7c7f777
SHA2567e3b675dcdfaec47351c6d4f750ccbce290619c45166dcade4f420e8f7743e2b
SHA5124d6b7c6c1794b2d908a9980132709d370938af18ddb48d45a50148236d8abd6b473172efdec1ac4b452d3aea47d8c1899338fdb981fb71c483f67fd66a5c18da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b733497d04fae4154266d64c74253ca9
SHA1611754172fb5beb8c04f32c8923e09f7873f913a
SHA2565088852286f22547195adb66f0f31503b43082807df1cd4999bd006ddf9f154b
SHA512d25c4fdfa66420be2056542c519c28e2374c0253d82cd3d4cb04b859705c44bb05cb591917e41a72d000da8e54eba876521b98bc692c35c9a6e6e44b5c22a156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d215526f83650207a538f578020c942
SHA16501ad0e60d37c4ec9e768be012149c35278c673
SHA2566ccee6aa0cf17f64a457311e85917e88b3a7780147e8b9daea3ab6e8ea452a7a
SHA5127f49c07f9197dc2ad03bf6e77caa4ec721251ec7c44241a53fa565105a0f61891b8582914e4b60e0c2d0674862bd6b4285a7dbd0922a359b378dc287c4c467ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56966f6e00021df9b43f5369172f951a0
SHA1514e17063281a336a87d9da8d81ef3dcdfd3ac0b
SHA256c5ababf003ea96d6bbee58a349dfbb41197b30418a5d5790e80bfeb4f9bd591b
SHA512c1ea8cda6a6c3060b368fbd83320041ea436e7a620380dfa0e71bbde721adfb01c0b0b8e535c08701c832f1d227e0eac332a08357839eda687b1cf163f5cf23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52beee6a159aa74498142a79251837fdd
SHA1e7465e8f2900eee02971626cf6f851a140539752
SHA256b024f40300ded1f39a3445251457a9c13ad4943731f5f5797f6270c9733e68cc
SHA51200e5e485bc1ba42a72aae68be23f8a260e36405863919da6dec3ff7e6a9f124680a6057f9365b4c36723d7aef37a4b3eccf98dd8cad309a270bdf5a7e6d2a148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD592d137f0038475d486778ad2478e83e7
SHA1f3f8d41f80d9d84f1ef01bbe8b7a3cce95234666
SHA25610b68f6e447972827ffad10b1dc256aa35e275acc951db2c0e3b377314d464ce
SHA512ec890801b8805c4f6264c67cbd7ca8d8636ff7ba0a1c2040341c87f8979d4124b09fce6a1c9e37d7e8f39ea54d754ecc5cc21ad32ffa23af73c61b62c3f1977b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ea3b116121c8315cd07c90dabc8547cc
SHA1710190498b039a4126a5dad30976557a4b976039
SHA256b5161687f91f1e031eac1dd9f4c4ff3c759a58481b8a9e51173fc4c18b86478e
SHA512757691dc4977de812cded0c41eb04301deb48e52d235ff09dbbd84709c55b2c7c6ae5059d1020a07bd20f524ddb2d794583ee785334159f9127c88bc5f6a768e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ba73d7365659a69afb8f18eec8f12994
SHA13c17e930fbcd9ee8c1adc4cf218765b9fde6d606
SHA256394bcace97aea221372cc0c319de77b8c56c9b28663883e275e9f479c32a161a
SHA51251c8ba0e5cffa14960d2b817b91fa3b8034f105c373fe9afeff83f9278d0b971e9f30d233a62adfb1320e260cdb525b6faa940d60c3de5f954cb79f7084efb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a07a1ab727f7d73f9fef6c0acad15c60
SHA1e9f646c084023aa6ecceb0fc4b7db77005256898
SHA256183fc25e285fc6a588d36e86a2a1ef15bd82f0dcd51036f333954e0404e5be65
SHA512406e2765f08576befbfff80b61b2d7118edffe53613780875d3257fc2b2a0808336add55c6a6519042cbacb3e1dec433b299268952203232400052ff62ae37cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5089d9ce9027cf29754c3afb22fcae2c0
SHA1df979bd2ae7cff87319879393634fa7010197d65
SHA256759689a5ac5976ae708fc7f1e7f0f913ed1247b3e4b666a199d50546d6bdcb82
SHA5121542c5e8c1a7430a3d7fcb6b3b783c86317079f99a542071560ef6fed8e8ffb20f40fcd47534480849cee7dddcfff2c293290ad12b9cabe51705c53df8fd2b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54e689b417d75517d2fb07c3347cf3683
SHA14658cd179b9748e1ee1d41f38c0ee57a291176e6
SHA25612314aa63d29bd2c23d5b129e15389e8ee810d3675bec377ccd4a6732b28e681
SHA512f2ebc62710729a2a9f810ed21700aa1f3b4e03403fe2d14f6ced58e65bfeea3fb9bee4093866966e9096f9552d9808f3b76f27e23fcf1b0a2ef760359a878a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5327d959f7a23ee24042d7aa777942dbc
SHA19c74f236467ae3e793bf817e2b9ffa5bbf4333a5
SHA2563d4bc58f400e74f9f19d5c1b46f99cda13d8fa7e871af6466c41a1192980a16f
SHA51296d6e0c1105fa84f132c770fb5af17b03e81faa58717c936a3444c223fa315883ff3c327da3a143442c6a5c17bfefa24019b134af4cd47db9aa3cd41d3fe70ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51d07455068996792134cd06607202e08
SHA114820f1779d28af008bbe4b6e23d478f3f9bcb80
SHA2565ea23beb89da0a20e36ff379f86103bb8f7d5955ef478e04fbd11873f28e05bb
SHA5120187d13ecac7a7f04d4600ad539874279a9434be3e9dd4745c020a51e87f4281c4d45376612b8351512a96ad0f5a22a02c2dc289bbbca3dcc95acb96499c8d56
-
C:\Users\Admin\AppData\Local\Temp\Cab5499.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar54F9.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a