Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
6c082981b80a149c1587836c048f20bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c082981b80a149c1587836c048f20bc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c082981b80a149c1587836c048f20bc_JaffaCakes118.html
-
Size
16KB
-
MD5
6c082981b80a149c1587836c048f20bc
-
SHA1
ec75042fbbb20ea1f425e1718d754213d52f1328
-
SHA256
4aaa923c352a0bec76bad9f73ec1b52cdd4e94479ee23b8ecaf54b781ab3182a
-
SHA512
66c95cb984297e023ce4532a174476dc4f5589269d2d95917914720117f29cec2310b4da552043e22a370df0116793edbe5b38ccdea1c7f76b1fcef813fb2057
-
SSDEEP
384:CR6A1F6DzK9qjq90X1uulePNF2NgaIIckVC:ZDmMu+u13VQVC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B7BD581-193B-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422654582" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0938ef047adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a6f1ff3a620344aa8fee01b06eaa1200000000020000000000106600000001000020000000e180004ce80c2917b1acfb20f8f13da9c0bf42b3711fa323441bf9bdcf458bb0000000000e8000000002000020000000a12641b71bb373f44608bfa5a1db851cb0533cfa761a96ea55c3d7c27f98e04820000000f96760343d49e2ff4367a4fd58b4a116e392909224d617c5ad3db4bd134b4f8040000000af87e430de984af373571983343d51e2d4388f5a8a82c82ef56e77e73e8acb7484c2977ef64e8bc72557773c648e2bea08e151470fc3a6df277ac7a9b244b3da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2584 1532 iexplore.exe 28 PID 1532 wrote to memory of 2584 1532 iexplore.exe 28 PID 1532 wrote to memory of 2584 1532 iexplore.exe 28 PID 1532 wrote to memory of 2584 1532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c082981b80a149c1587836c048f20bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760a694d92a63652d2b3560936241152
SHA18c702fe91c728af63a3a00848124c40c086fd21a
SHA2566f6001f8368626ec0f858770ad44ca973bcef446eaa139461b95284893f6b544
SHA512cfe039fcdde80b558c83eb29605ed8f7992688258ab3e4222856ff68bcce5a315476d160cdb1f16d867e9231e3b0533d0e2c4f00c4b74cec23f4466b871639fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436c239af94aaa2d8cb7c2698e9687c6
SHA1c4927969d99e4dd653bb2ad71d5befbe26293e06
SHA2560ce6a5a91d3c54da28a55d1216cdd26b8adfb08b442eef571b03eade55ec195d
SHA51247e1728a0be438dae67a17cf89d3d3662155fc0195b66329526483869b92d55de613cf3d044e283b76e86bcaeb84455e10e5bb3bfca4f8a4608c58a27c58a607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab5b3914f65077db63440bd528bb696
SHA1fd280febdf68345870f2e3f192a9b7d1918ef0a3
SHA2562b577f717d118e230ee04211ea6b3c51776675f94606ee67de9960f739437da5
SHA51213d4de690502d9197796390d7ec7c737b70d684ef6d47cf31227786949505937c59ee01cc9c657503ff79f2f8b7f9a96b65a181ec864e5caa00e9225cca13060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54865e6740630f4387c97c1ed07eb7801
SHA1050ece27947c300e0b70a3a72d5089fff7e673c8
SHA256d10d113128ac66243dbef27606bcb10a6717e512e1f9870ac57bbddd0e3b4110
SHA5125d905dbdc0a21bdb1cb332da19ae1d238dc8981bda753b857085cf30586f35a5eeb247e62fa9eb97e7a342f29bc82633960a298b3748239e2b33f20e120e0e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a60ccce05a555685a231060f5447014
SHA1d7e23602c5961f1883dbadfd75fbf5dfb616f6d3
SHA25662d40e1f0a76297965e0315a0dca20d14f75c807e1f460765f5241268316ac9c
SHA512d22e0695a81866ef714fe171f6b280ef209efcc81605b6f09c0b080afeb3f00ec59b742f2f2d81ab0f293814defb62b0806338a23ac08a9057709cd46944ed5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594876954da58ea5077f953e424851900
SHA12259d9ff3b61fc885a69ebbb7a21146e7c92e088
SHA256c5e1825121bf249d4165ff7e2fc818218683d42bec86d0971fc1443a92b428af
SHA5122b74655451c8aab29c1db655f92a3a40108b7f393e3bada127d9fc69503aad2d804d2bc46d3c2921fda77721d49b606a69a64f6173a4b5b5361fce9f75b7b187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e267b1a34f5c743162718e30fe979d1
SHA134601816efa962352e3495ea139bbfb4a6fdb86a
SHA256580b8203efe8136ffa31f34f6854753efb72c5fd6ac11d33e4d76db1d0a4ebb9
SHA51251ab312c3f10717983ee825dd5cf7e389e6b39f339a23a410057832e24fe6bb8e8b7dd68a6c42df8dc1bb2ce80cf52fb4de35f72a08373dc9a5f54499af8dbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5224a01b211326a01792688d416b86131
SHA1fff7567cc47001ab5a2bd401b0a9d54e512254ac
SHA2564499d0929f85f622d630d52629061e2e9c03e472bfb07b36aaa3df5a97753cba
SHA5122f2e3f523ff25d6fb04d853f960d31d2b97dcaced111b9df4cb1f4590e6099932b8b4fb763c30f1e104a7064a9f149b4304824e71899006f0b3cfe55fbf58f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51817146b457d6febcd15403d8aa1e416
SHA1fcb6343b87cbd11de086361f2e66e27b58022629
SHA256e6d91b0bf8784d34b18e36e9d419963f08ecbff0929e3438bb71e7a4a6caa0ad
SHA512bbb1ee28d2510e6a07724ca8a22db8d3e441f8d6a048eb2df982356e9b30a5961b8d1da1bb689ae872a50ae5a56d2bd15d79ff1e3daccee0347b131d69ece370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259cdf78cd2d027af59c77667a138029
SHA1cd48119b2b85c3efb269cb898da257212306b06a
SHA2565cc09e73e63df47e8f37a3372815f4bc3cecd74e6e744fbbbf546e501a0982a8
SHA51266145244701e95f2a7c5e8ac5362331f7d10681f939678dd3c3540045d2c9f7d1bc22daa1ceae2c359061ba9349a2af3095d5aa2982b5a059d4e1cad91937256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5d210380faa72d8b760ac8c9b27968
SHA1982fbf45ea6ad0ed6cf28b7122fe28f0b596bc3e
SHA256f3c55b784eb2df71e20f09205f336dbf99637faefbfc9ba40f04c75891e06a2a
SHA51285552ae9390621d088015e6a46f69e878bf1e79198147ca9d1cbdc77a75039a445ffdacf5c9298ffd860c5de12200b0fed48a47cd34c744e0ee22e2e025e64c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7ec084bc0c33df6b22e59878940c3f
SHA1bb1939b422f664b2dda7b43cd225c45d5ba75dcc
SHA256ef97d571b2442d92bb5c787752c1b697540ac4e0bba2609bed3202ac6a10a9e5
SHA512fb55e5a041ab67efba7e0c9a58c2e1f0a7ae45519dc5954e2de0e9f4880cdf01d3ea8545fc7737ff1ad49c7012663a64967029bf03b6055f7bf6166b223b2758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f934fd66bdd960de965d13cdc7a6932
SHA1f1c8947a6b5a7de6c1517d08bb78f58827cf5fa7
SHA2560eb4c6edbc63a74343dca0eff0d4bb484749eca389d50e40dc30b08f608f1093
SHA512859945de6310d4d7eaed1c3231c6ee13bf536da27adf76bc2286bfde8cf520c2f1fa64e3523befed0fab618164771760ce3f187ef6ce6745bae482ee65b81b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5514c9aa88a8aaa9938fae3f50338b3e5
SHA11e4e003ebd895a441f9a3019262619d2c5f0cec9
SHA2562c34c47809e8cfe93ff23c5a63670802b7ab42b1452b4c1858c6f76eacae6ec9
SHA5122d549a4eac60d9d4b0f589a1212538379d8763117c935e14c6d33b167fefc2ba1253b2a4256b44f4745618907eec04f3ec0c66941093d0f76fff007f1359136f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36167b7ddca89e2d62e4808869ababc
SHA15db1b13c160cbf8d457cd6e3f2a78a0cd8c90dca
SHA256fadfe35e1b2883d4bb2338d799f07c246891a21aca74f6c1423a101ef1745f0c
SHA512689c6f4d7d65c8535ebc9fdf88c1de04e434ab733cebd042727dc3a1a29f1a9061f1a5211791ab4f440e8679efab5e00d574ed7fef89fab758fe5794889f2421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb03ca9914c5eabbab6304ff6c9a8496
SHA1c1b7d24e8315472cd1a299fb74a1c7a2d3b39e2a
SHA2563f92fbe57ad7bed8912bf3cd5ccda9529b6db2054ba46a14bd8ae7b012b9af98
SHA512c0866ca0660302d358d49f3c2ac12c9dc4f5c33965887312a023a1755e09c400428d446188a7d12ef0062341784e98eb8b65cd375bf22b7a57912be99fdf833d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9ee9c87304287df3ed6cbb973f4302
SHA1a9530029779bcd925d8277e5efb14a3b274be3c1
SHA25622d125d5ccf910a20087e2b2bb1f45ebb3fe34584f831ad55705185974b7c7ee
SHA512758962871dcbb18d7bdf7eddaaf99830ec062d05513349920a4d177fd71d6040ebf21835964559d5afe046567794c95d7772a32198180e264a8e36ac5ac53419
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a