Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
6c4a7da588e058630a63673e9cce5286_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c4a7da588e058630a63673e9cce5286_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6c4a7da588e058630a63673e9cce5286_JaffaCakes118.html
-
Size
3KB
-
MD5
6c4a7da588e058630a63673e9cce5286
-
SHA1
bca5798243f2988d5d20e5a964511853049562dc
-
SHA256
284fb20fbe44b60238cae82b11b026cbd7bfb9058346da5a7dcc783ad7db578b
-
SHA512
a70bd212b0a9d5a0879b6a0db8723f7e81e5534b9ca6e26a3efe52288c015117381dccd97f2505791bf3d7b9ce6e3032fe1ccb971c847022c9193425bda2febd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fe1fe656adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef3354696dd74fbc33ce44c010c5cc0000000002000000000010660000000100002000000006c7cd354f6ccaba207c313d535f89b19cb689f8bb5f0501d9995040f8e129cc000000000e8000000002000020000000f0e6be8d71fd82363fd47eb468c475a6a37421567d6fa162d30ceff9846bccaa9000000058c2273fb31e7b2e9d59149ba61e7f7c839102e3cb9ffd55f45b1ed502da8090182d4b4f2625b99e4c4285daae8c32d53f199c46dd705f88a4c6f4a462330841dc2d38a5618c62900499c315e0f193db12293463c4a0d0d3b5d9fe55f42508a6826db9d1faecf220b5d38b1a06288b31283c17b98dc5edece9f570d2d4d8e5970c63b5254fff6903fe2696fa0e3f467140000000a9006ce502f9be13e1041a1a1fcc8f88ea41552b983957918f15a1a6be46263282f07e07d02094587c5e553a3961c5dd0420fb113c76768038b97eabd99fec03 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422661006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef3354696dd74fbc33ce44c010c5cc00000000020000000000106600000001000020000000ead9844abd64b159887b37a5d2f0ca475b25047ae228ecae331739a8816d76b0000000000e8000000002000020000000fb8e0d3941d4c92087e72626a3cb2ce548369de8613c3c19484a8c3c6c8400a1200000009df359516a669d25519203e08754cbbce4430d5beae6f25da37634f6bba4821740000000b2ce137719ba7bae11c382da2dbbcbd8b8daf6fa99dd2002c3c7537ea39794bf4e048f4838b7e375799e5d993092f134cc0aca6f2e1c17f68952d0634fae9d25 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11717041-194A-11EF-9969-66DD11CD6629} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2080 1936 iexplore.exe 28 PID 1936 wrote to memory of 2080 1936 iexplore.exe 28 PID 1936 wrote to memory of 2080 1936 iexplore.exe 28 PID 1936 wrote to memory of 2080 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c4a7da588e058630a63673e9cce5286_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589438c3259bff68e0d4980fb7793ec54
SHA1cd0b83173734d4ef9e9226cc2c906e58e9a40afe
SHA25689f49beec4d87fe17a6c586af853679fbca7c22f45144b769fae24eca9fe3940
SHA512567332d41f8981d320a578decda4835895f5f1529bbbe9f427031e6e3ae6d08d32e675126984ebcdd5c5d4f7cf5eb82ba71c06195f6584f907ff039773780ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee3a0a55b25aa76df79b73b965810cb
SHA19b7a3e122afff1f5a98e2fc76950da7fe18524a2
SHA256d5813fbca5c35acbc4242000ceeec076ab03062d4e786759204aaa10c6e85173
SHA51230e2e4976d18ad45f1c2d39ea54a74c4a8af9468a743d363df9a176975dc5a09bd1afaf90a3d3851837573f9785dc08e1945cb6b45bcc651a39f4539dadc8fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb7bb8cc0fe60ec8bfdade860131e55
SHA1f2809d4e5f61b331a2128c07c6173d1da77a1f3a
SHA2568365a00daceb3d858a2978a2c8cceab89f1b6639ac0860ed85d415073e241c76
SHA512d6f8f757643af9308f78cade4664e30fa74657391b80069406ddbc816623c9df72c797378ec4c5dcb2892a1323d65bda6fbb83a31004b8cee98dfd978382b58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6f4d9fd2cbb258b0efd92f618cefc5
SHA11ac868c8631107c6e76cbc2e624e19c895b859c6
SHA256f73cc685907e3f650d3fccc56bba8044e3ec8e256807ce0a78d0c965967785ea
SHA5129a51334f9603d09f2157899751b51714eb3b7aa36897e95de497045821aac5bdfca6c31d4d7d78fda83dd71bc76fa47d9548caf1b2dfbf0cd7092c970e6fa199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53672281accfefafeebde54db0e35dc9c
SHA14c432360aaadbb8844bf2159dcb559dd93898287
SHA25622200c54f06fc1aae09d498cbbbdaa7f88010f2dbce0d8343a9995d832707895
SHA512db70839a59a7e5668d855629c4722f897737791001f0b2d10fc5df796b3a4fba9ba6821620e07f562a42907b1652b66dd75e771631b40dde4f840d9f985b09ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e61edde981a29b27e7f40214c4aecfa
SHA141e1281dfc669d3639891885baaa4a05722552d4
SHA256f1d143e38d79d309453eeaadc2c3208f4bdc943c86e3def218633a40cb8f3de4
SHA5125bfe61148ee711b226a5b4364ed121bfb1dbf26272976e5e43be1f95029172fcd3a9534d36789d97b7b349874a3fee2c91fab75e1a17637dc28025cf41dedb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f600e42c7bb70361e29548ef9beb58
SHA1b61c2a31bcc43f0eff44387c7022325606ae0d36
SHA2561bef097b5c1fc5eceefbecda3396edea5d1dbdf867837e6987d2a22eaf1b2b06
SHA512a9e3268296b0c8f602c728d7690dfa7ae8f43d0150c5c9f958fa9289e632e446afaee0d5e51e5b708e6837ea0af177ed74ec172e904016a944dd49f341ed7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f800847258e07685590bd75f089d444
SHA157482b7bbff34955926912f4857fac6a31c5e02c
SHA2561714794fa433b2f756e2ba2a79ba742966f23f213e7e1812d84569f6f160b163
SHA512eaa703d2ddd069ec512cc00c833e6bf7b468e5cf57be840be54ea3abccc50d90e2273fc78e62fd7eb6276c3bec3dc6b1982687e956936dbe5c85adcb7fa9660b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc4952fd84e761d70007a2b2727bd4ab
SHA1ef6c1ea0a4c38228aa5a2c682b6e528045c417f4
SHA25614e1b92ffd685681bfe260ea466003e5b0375a169096b8b4f53b495dcb6b79bd
SHA5127ecf0b0c01d627d906fd380979f3a5b71f6c54a1822402dd22b9c2b5e3cacc3ef350e06c7c3451a62a7634ba457a4926c4f22eb543a16b5144d32b09958902d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e9d091f8388c7aab30c7d6f4ab259e
SHA16b732460886dbeb6a47e206afa88717e85d5c291
SHA25675869d9c8d6f53ef9e770851d43dca3d77f1f29761ed8713c588f3d2a11e5a09
SHA512e2979f0e4e948c43a7e721d1badc14529353871797909e7f11ee5de250bc44df0d87e4390b34f6214b970658591b9ca1a93f1f1e04476c362417a82c6396ca07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d057ce87ac9f70bf991f35b6ca488e
SHA19e4e807f07e23276849084ed8ad01d4e48b4455c
SHA25654da503b9e635a0627e5144f309dff7a3ce7d09ed01de3bf7738ce0977bb2459
SHA512b18ed5c9a6f626862563c1a9707a5f2e1d1eadef27754e93dc97a8536de00241c18dbeabdbb3ecd17c8753d526e3e9d216823b777cc976e8ff1c2fea9748889b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a02b9b41d435eafe5384eb6bf9a2189
SHA1329ca4990e7900e9c3daefdef75c73917990e282
SHA2567d454a0f82ebafef9d619923c469ff1838133aae29d0abf09c3edd7cb12b6def
SHA512b133f3b4e0fab6f038d500112dc771a492ef5495bfa8459c14e662c9dda0ec43c3c28f9fb7a71d5bf8a82458f34e5b0e9b50dbb3ccf11c4dc58951e0f2a2da34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517312ca82977a3b3119605f41fda44ff
SHA1283c40e66baa2aaba58ee150124c0baf57afad0b
SHA256dd00f249870ce679a40865dd37c495382a0e65063b8c3a9c9b81b7517b77d214
SHA512404a7328eed61652727c4fa648d90aba4e9d1694ca7b5f6ed50be4752403e56fce75324a9ce3ce641e75c19fab37223891f0eb7dc74afa062adc0dc09ae65259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526cab9b81c983a6f103ee59daf2b245e
SHA1525d404ee4aaa7d24faa95bdf57a391a3cf746cd
SHA25697391ed8a2dccaadca327f32153bfa27e4b0984135a39d589493100b2dd2e4f1
SHA51267fd4022c2023dcf844121c25492c5821073fd433aa24f9632a113f97e8ee8961acbe9c1f80032a483a5909c3f743ee37a0d2093e3be1bb783685b0566fd7adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e0051c191efb6970774e3952c5fb17
SHA1747579c6650f4eef0c7fc9c100045031be37df03
SHA256c323a77c31a9d3a7d8d8628909e4cb50a1f361ae7cadc697876effbe859d548b
SHA512bc756a52b6138e964b7511acb6ed5658bda39e413011f9ec686bccb45d31681f59338fe632b4eb8f6806310aa10f7e29a9f4c7ba5e608a50ebb0c2a384e826a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47fad11ff1a15f63424bc5f834bb19e
SHA1c16a938e52ba5d1b93308f17b1c9b00c12a4782b
SHA256374ec2fd5b0bde845efb31cc5315d7a752ccd2bc9a70f9cdce6b85ba36e5e3b3
SHA512d1867cee49ccca0988ad659a5f71f64b063f35ac24d02d10b24758fd6ae1c6d8253cf83527248e3b28afd6ed46075342bccd6263c8171a2f5f13ca444175e5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb4874bfe5e7acb03168550704462ae
SHA12873977922e5720327a232a66bb8e215cc81592f
SHA2569e0951af211ee28d223cf2ac6515770e4fde5e1ad3b0872d238b092c5c5b6586
SHA512665dd3a2fc50d2dd990d5d4564b6a0f6db58771134e59318e569b739a1753fc634a10915d70e288ba161019d15b0f3b38b1bf5c9b6239fb6a90054b1de951685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f6ff84f292e68a87037435174b883f
SHA1b6f276dacf8aadda9843fcced5752759870b00d3
SHA2568b33947ba6cd46628b254d1b3c0b7740b82d47d70b035ff43148f2c45a9357b6
SHA51281182f4fe0b3554245f5aebe5ce9a34695fca142ba0582e871ab8a5937622411f5cd78be7e74df22de630c1580e7410d971b32e8bfeb6906e9500116323d03ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a