Analysis
-
max time kernel
129s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
6c005452dc17ed8e3d27e4027bb89837_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c005452dc17ed8e3d27e4027bb89837_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c005452dc17ed8e3d27e4027bb89837_JaffaCakes118.html
-
Size
46KB
-
MD5
6c005452dc17ed8e3d27e4027bb89837
-
SHA1
149d3103b445a12b0707fc6637bf860f7f44f00b
-
SHA256
ba6e9555e05255e2f06b51ec5e34711412ac58260330c997f485ddf3101c6a83
-
SHA512
8b11824343057751d4d38ba1999b2ac60f5999bc2dd9e21adf0670b6d88e964937ad79d6afa8e74c93d7647c18a7d9d030c136ea516b7c52a3cf5ef13bf93c5e
-
SSDEEP
768:U+RjIOMI4s1gkVeXkQh3rCYCrLJ1yHqaqAQX0QxFn+QMCUzgdhwsTzw:U+RjIOr4sql0Qh3rCYCrLJ1yHqaqAQXE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2BDE181-1938-11EF-99F9-4E559C6B32B6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5000100246adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fc5224702db1eb4cf5795e8e6b52d497cede26ff8a69b4f1c408b8861e668508000000000e80000000020000200000007ac776852713763ff5387ac6e74b814c69bbeca711bf1e9fdc1edce49c4eeab32000000078cc3f295abdbc0b70ab9a0c4afe590102e763875f2fca48a6e43c8519b3821e40000000472e72d50f74e8ec226a86075f2bda5f0f8667ef84a06c843ccaf0504affa94f85df427438bed98c5e4b25752ebcb4c14e805e0e90db51ff32847f13bdb47768 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422653652" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3004 2420 iexplore.exe 28 PID 2420 wrote to memory of 3004 2420 iexplore.exe 28 PID 2420 wrote to memory of 3004 2420 iexplore.exe 28 PID 2420 wrote to memory of 3004 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c005452dc17ed8e3d27e4027bb89837_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584f1ef791ed9a6adb1a7792d92b214ff
SHA17c6ebe69b72acdc0cbb2de19980851a94c881c96
SHA2564b6d89bfdb4f5b03dec2889c28aadc8f98a15e12e40271e5eae1c38233c5c084
SHA5126062ebb7206fb50240ffd207c86a371a9f6b8c64ece68883e4e7ff0c67731cfab42c2db0189d419efeb3b1533a12836ca474d11a94adc3a518ce579e5e140b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577af1f4be36412508bade869b06dcba8
SHA1468aada9cc5a1941a98c7d68b8cc8a8576e96410
SHA2562f39c97f5817ded211f2ece931a99adcd5fbbf32f47e7551fc79d336e82ef1ab
SHA5122d10661985a5e41a591c41de74b980452782fec30b62aff1cdc61f16e6534e36e785837be3698fb64249efb78e90675b17ecd04723d5ee9061b9087648f9725f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aba80ca644645a9fa111c768accb817
SHA1f70a756cb25be45b56a9861005f43ea3c764aba8
SHA25618ffbf9e1325fc750a0670d710317e09a9f4fba894d439468ac28cca6d0220d5
SHA512cd79217ea7dfa810cd5adcf10c1c97ced11569a820178336c123a70331cc3f7f8d88ae779005a3bfa28e74dc5a20a11a43dbb1aa724ceae97c38fbf2d102b246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58651874392e2442595e4708eb6dabb8c
SHA13595c28d58aa0b0b7aa766c78874298fc39276e3
SHA2566c3311f6c8725719c469d2992dce56a7118c26fdd57d7e0f1c754b89443ae83d
SHA512d1949d6800c32a5460a8199240a54314c2f3482aa1ea595790fd5a4de2ebd5310ae14cd722b38e2fd19b0bfe08dd43163654bdd433408c12152b52885006f319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525554d71ddf7dc11b6a0d86f0ca0678
SHA185b147138e9b28f9381acc9c5e735c0f4f3f44f4
SHA25612b9e3994e13d875529f6d97de0d01b1ee763fb6ab2e7a62018f4c74e5e5d131
SHA5123f4a0fe86d226c0c3350f72d6e945ef924db25660e16d8a323f16bf2535f50a47cdad94569cf478a2ce6a84cd0ed40a8ca4ef431814a56f164387e9210c507c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a9a34f85094a0af46421d29e67d737
SHA14225f7856f4b50cf12e74cb435edf8305a0232fb
SHA2560cd42b2bcf9d3b993b6d2f4ab743dcf1de64461b06162e7d9698fd34499d0560
SHA512dcc084e8ad82ab1a5d1ca5d77fd96cb2bd155c2f40f311941797878cac76071859afa897a1aceb46faacef42f898f89a094cbdf38817e6415027845c6e7c03ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f474eb0e01536bfe1d6dc15bc7a606
SHA1441be110183b7ac5bedba1ac230e6a75bf4f48f8
SHA256d45c7bbde43f893839a52ac2aed767a6585f9cbdae0a7471202eabe9a83b97ad
SHA512fdc99666329cbe1be0be7ab88031ef264ae86178a66178cffcb52ecd1452cc6dc40976843012be4257234878193614469aa7a20b7c7cab2e2def25253e83e4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f9393dd307d25cbe7a137717aae5d0
SHA19c869b1f68a791a115958a627f3654f3e6be130e
SHA25650ffe3738e5f30a7492656f04e893e845a127cffc442ad59d18dedb663a94d9a
SHA5126da182ab657def371a6f81840722919fcfea8d1425060daae4fafadd3d25253b8593d665ce0f59a59391f293a6c500749ef5211e2cb526af6457b4ebd10daa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5011d481df3cee89d654b6a9eac2b09c7
SHA15c74bdb2d6f69605120f801ebc6b45383caf0ef2
SHA256dfdcd0236849c6cc2e6073ea4da350473246a6bcbc664dfd440a77c9e3c4a0ad
SHA512b7cbf33868ad310b335c34be934f786a3c14594e0486d4e54b7ec53fc69ab1e429bbbd0d55e2d493fd842161c351bbdea441c1e1b749201c7bde136028ea95da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f85403876a594ed8627b85bce328e9f
SHA1dd5ce7a14affcef988cd6a377019b3979946648d
SHA2568894677b53da438f862dfd3198dcbd49648bf8b0003b66437c4c926044ee1668
SHA512ca0587b2b465e840eda17cfb7eb8c99064146a50d74d361045ded4e28e9572adfbc04f361c0f139ae5b1d7ebb4709dc2e56df00e69c4554a76cef06e427d3f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5451e3e11af788f631546e329640f632f
SHA12012a4320e80903129c7aa6eff3a0e77684147ee
SHA2560d9c8bb589395358884c901e64b0bcec37e99e41e6da54bd3f0b7e50a15d81eb
SHA51208efe83f673bcc606ed5d530dd2c6c84bf5ba72cd09dee3acc8ed6811bc7cfde5913aace4ab56e60a4866ff5e3d4f319ea2cea5993548a9cc7309f8e5293ddde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d67ef83ed74ed5a66926d0f604c32b8
SHA1d1958ad697842ebe59072cf1979f28caabff036a
SHA2569ea39f976c37079aac0cf6ee746876bb77dd34ebc3f9c50f5ce76cbf229880d7
SHA5126f43c90118c0a4a684fe27e748b06956bde378e340d433e224989eec7f2112181b3691bb5f638ea45cb3bb15f5705458e91a78507aabe7f47040af463116aa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e827469706d5ea185ad0ec8d9bf42e87
SHA166bfdfe56e674c0b811513b47f7a39eaa32fbdec
SHA2561507afbcd179f1c354d50c903507c488416275eda6f70733724e1f111443c2ff
SHA512b66d918602b9898c653c8f2de0a040e78dc01883cbe9fcfb34f8df629836e7c4145851ce7788ee31eca0523be98e5ffe238e1cc7b119dbe926e7c329e3b1d000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44fd08b49e43ec9f5c665da4ae68661
SHA1d74e595ccc1a3f2c3b6d26e81a05b3b53013a0d0
SHA256d93072c439c16f54386f171709182d03cfeff4f5360e72fb593b1921e52d36d4
SHA512a3c2c1ba80d27da6112075c1371211dc33f095c993a98e4546e1d5ad0322530f9982c8eb75165a65c65bd29bd5e0513bdeb73c54ad7351eca1065638598a8079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314d069c8d955d55e57d123ad3b1026c
SHA1b5acbe4444bb8e123f3bc2a237217e33cc6d8c0d
SHA256fdd2686bc8d0d94105e27fc8b4d6e263683e461e558d0308d47f93713b18b6d0
SHA5125daf9d76940d7d3d36f16912b3c009fa80838be83eac457d0d7833e16c4126fe359728764c52a2a95ac87c7d7747bdb622eece5b276aa9dbc7ad9693c1a48329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfddbc9976a5e1fb8be46297f31f8632
SHA14eead91c211656064ef29e7b91864b524dfb2402
SHA25645f5f9cf5fd5b837818de8116a1a39c590f109e9f7251c511a80b8158f8de448
SHA5126ed4077a3e7f9f64af0dbf57043daf34bd101204fe0f38789c7cbaa8208a4763a0c28bac574380ad9a6017b748c1349ccdb950408d68577960e9aa87deaa6033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c0c05b7fb33c2a9f8be493837efc9c
SHA1fd86e43a6f4374c0c4678107a23c03fdde6ce1be
SHA25656ab958141c729463cf253bd5a6e4a717b3f2d0513d8b46fdb3f5916bfaee842
SHA51299b43c1b95506fd0bce27bce03e2eaec13852c1fdf85dc446cff5b01958b429d7a658504fc36d690f5280ccb98367a23aaf28e417c9b493b82905c9776f351d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0add9ec44ab1365781d13445435b6e
SHA112fae3fec9a2937e23af9f44eb64b22a6902a98b
SHA2560574035e8bf54d1a03567103eeddcb6a6c7560f0e2f1d9656b8480e9bf2f8600
SHA51238f5f13f2129046d0b1dcb813ed7326d417414511be96e6b43039daa90296f6a9736fc143f286d098293689ff2636f8e36c271224c8fe9ad7419d516547e29e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd6e1665bcc7a576dd9634a0e75a5c64
SHA133ee7a03f31c69206abf7720ba5c68bd166711e6
SHA2561fa70b606047b98ad17ecf4cb918a89cd84ff4ffe725c6e0d480f3116f0eca70
SHA512b249772f08f6e836b11f3f2c73b7c0a64f8912267510374124c55f6a2f718fab4e81c45a32e3ea71f24e7d80712bb20066350d41620c077ec4d9be04a4e4d818
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a