Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
6c4c2298cb809f0baabfae729a107118_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6c4c2298cb809f0baabfae729a107118_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c4c2298cb809f0baabfae729a107118_JaffaCakes118.html
-
Size
460KB
-
MD5
6c4c2298cb809f0baabfae729a107118
-
SHA1
60feafb784d3ea589f7c4998ef31796c73bcc742
-
SHA256
57f0e231580c2a0d57a3179e749aa15854bcb74d0dcb0c47c5e47ec47a32543f
-
SHA512
b3007e6b114d1df499bb04ae10935f176fc83561f3360a359daf6fc08ca9f0b37f04f87393dde6202257a1926ef24c21c49cc05d71f5b7152f4c8d346128d006
-
SSDEEP
6144:SWJsMYod+X3oI+YyDsMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:dV5d+X38X5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4043923157adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d0e07ab1aa2451499174a83e04dcd09c000000000200000000001066000000010000200000005a9573b8c39382bcee80196ebac09b551b289303dc678f4a63c2b484ad0bbbe4000000000e8000000002000020000000f59dc8a1a3ab8ee129a3198846e9d1995ebe97529f9767dddda4a7b0b5707bc920000000aedb7f0182afacdf23be5246a640dea293fc99dd07ccedaf2298501ee6abe817400000002fedb6cf6bae76c754603ae3a84f3bfe9e77b3883f03a39efff4c749156e38777ac74344539b56a097886262345941301f4134c071313d4e95ae56744715cd59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422661125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5876A6E1-194A-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1948 2292 iexplore.exe 28 PID 2292 wrote to memory of 1948 2292 iexplore.exe 28 PID 2292 wrote to memory of 1948 2292 iexplore.exe 28 PID 2292 wrote to memory of 1948 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c4c2298cb809f0baabfae729a107118_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc05fa6cff547fe559553b5f875f74c3
SHA18d4d82ca3887b58438123166af1424daec8b099f
SHA2568b0ee8774bc8220b54da441ec2afb0007da460554d851e42db4a58842ac17d39
SHA51244f96a25e52ad45e12b0bf8658f1bedf46dba846e482d24457c400e11643ad5a1b08a8c129bda2c77b23dcea03caa004eac19e9fcb09f18856ca7cf3c21b931e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c1c6cffd4a4bce9aa6eb5cb99ee77b
SHA122a3a1763626ae529a2ea581b289910a6e3c6a54
SHA2560ff8880ceef2e94909d13b83805e72038bb594c7db2bdc9643c71152d70b4174
SHA512785d19e7412d383c80348dd387af74894419fafbedded56f15b583f83ada991e7b0a57778f585e4ec7d3ecfd029e78ce2bd5f180390720cfd11ec76d97f38db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f346efd0925c2a3363e13be220a1ea8
SHA168b4b647b8f5ee799e5435202b4f7558ab063894
SHA2569c930ef47407718332e22b3e177e47e7eba5af902a9c616c1925412b4a7305fe
SHA512fbdea47a3a0f16ba6d7440d28fd8863cc4feae53049d84ee0132cfc736c81aa502ad04f21bb99c46b2b0aac1d5b399f09ee17b128d258a5e3ab8ffbea67b558f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77bf98d2c1595699e0bd0828f4465df
SHA1eb5dba11f54e9210ab121325f2ee6df0384e6492
SHA256685fa8cf47371ba260b7b1f66e46f0c7826ea3099cb282c02796bf7813c943cf
SHA512dd49ec47f968468cdf4d8c66f5d290db8ac3f193f92be9aee6a0144c38f8beadeee569e74f30fbc27d001511e271ae591b852b843b04545b5969502020c48693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552fd16210872e21a4587fec745f73a12
SHA1fba74bb3453b0c6edb58cab0e70ffc2f722746d8
SHA256fc185756a4221d20f8d21bb3b2451dc40eb0b92bcf1396debf3b75db6c736487
SHA512ca2cee50f1e73dfd816ea5b2d23ce4cc49fc1e662b111d41bd42a131f6a9efe2a864319e8833552a6c218eaa934131b3bf95ce3a070a932219e47ab515fa2ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c84a2d4cc35595559b9d3e647bf18aa
SHA1315b1e95ba09ad95fca004262312a72cb66a33d8
SHA256aa01c10384d749fed73f4700b65b62cd436b44147fd80af9e224a627ef25e803
SHA512840ab7d7a6f854a5a2cd0e8f748555c553d9a8f4104619ba39f957f68dd5e058d7dbe6c1b0b19c8b6180a12150657757036ac18d155f838d3b30bf0455b165f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500307e749d95e22fd84e2e1adddcd0dd
SHA122f54400d4f29c9a4661858e529f956fe756d662
SHA256853f0ce7494922a0ae574f50108ee4b48d42e73c4fd54e4ce539ee162470659f
SHA5127a08d83631c9a4441bf422daa2502b3849bf14d5e338481395c9a5f982cc0f38cf3c7450d5c9da2e15f26b3abfd49fa6b94e0a4e541d59dcdca2763e9609a7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea9538b9bc39979fee3be43c058b13e
SHA1396e26d463e2b548836d86610a0cbe61a631c625
SHA2567f08ca02c7eb3e5d172cf9d6851bea37faafed0f5fc1f0182ceedd6119ba9a47
SHA512be9bb5138a430c7187a0209406f33109d1ffde263cd8cfa0bf992b6b9a977608209ddb5f42646a31c0201c52ffa0f7cab76439924797067b79831d7a84c1e907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef746fdd54fa0fc199996639934d525c
SHA17313ad0f9c2f0235923fa47bf1d18c19519f250e
SHA2561e7b81a1ff3dac10a3b034392c6c7d6213fb9fb321f02480e4c2868f1deb6154
SHA512e7a2a7511cfdcaabd23f375b0fdec9f225bf54741360f6915c8be635d5b12910915dbfa125c3fb0b0ea211278f9ed7f79a8e0cea7aef462b2242e7f4f13ea630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f64a478ffd89eac1ef56127589fa57
SHA17a188f9c61f94a8f9c53c3516a5f3e8459d3d087
SHA25607580bbc8b68e44157036a3d896325356732b7e900c88093ef7ca620bf5eacae
SHA512a91be9e9b582a883cfd8ab2fe79f27d56e022ef5b867afce4eb2edfb15ed7c30b39d58a682105edbc8928d585ab14effc28ca4bed14acc6866b4f1819a3acdcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558896b07edeb9177c76746a453c5a27
SHA1df43d00bda23a49e897c5cf922f07f3f530d178d
SHA25677868b5b5ea07253b19052ec7f549bae963c4db32e6587a128256eab22cad076
SHA51295e985c686ea207db9e9c2b72ff86917420413dd0f6146835638b28868d1ef821fdd041963835fdab6db3d7d0e1d6698a09a800512d109bb3b70ea397867af37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcfd1aec0129c23bfb178d77055846c0
SHA10d2a79737581ff03c7b312ad0584aa308312c8a9
SHA2563d66be824d13fffa62de7dca52c6f17d703ad966846c560ad47dfd81aec275c4
SHA512597ae1172ee0d02af07b5bea2c794f2435fc8afc676d319dc09ee567fe52a2aac92e678ecfd02bc53249b10b39a1960c9956bebdbd47fddb497fc616f167c7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b74721271edd8f79ce6220e0c590f28e
SHA171ffb0b38af5b832c337e3bad944f832b1dc92ab
SHA256f8632110686ac92633d9cfa4b6534add842a342a2cdc23e213b177af6393c03b
SHA5128bd4c199aa6a170937a1c5d3eafb98cdde355a5cdcd3b0b5ef1fbe292926cbb5c7eff9b705ce1a5d4e6deedf714e9fd77e924cdd2f16fcb6eefbafd83809702d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5067b88f0007a68514292852e75ea5f22
SHA14ca25c5578162ed795c5d752d292f9fb66e09900
SHA2563f4055b275bd342a31567208d19a74e515dd9510858b7116208640f4148b235e
SHA51256671038fc4005b0aba7f52cb410269d5d65be2fb3dc6121d4f0e1e4867201eb862ede6b5c4ba37e89282cf8851e63ec61121631399f6df4f5a02569a24899c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d6b98c51e19368d3857fd47e746ca0
SHA15c79e5a2b0319521d195bfe2fde7e02eaaa57a32
SHA2568a8aabc930ff4430cc72883bd20f25662ad1877cb1272f18363098c59fabcaa0
SHA5124f549600da635cb17c07db2289037fd34e3be61742ed5009a0efdf830f48b1cdeeb32fbac1229e7d4b8e6a31ed4a5e6d3ea22c1a08b194b0d9a52cb49c6ab510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e38627d279faaee87191797e1017177
SHA1ac8cc00fb5a200f4c44bef57e52b5054dfaab3bf
SHA2563032bbc292cb6e3e8ff04aefca6d09fe2c332f28a2673ad36b1f98699f20e8f6
SHA51271c0d1f3733f75f3416b82fb51844b469c1ddcc700b626f4f6ee79178ef11230de21f98d30fc2f2a769847aec369dbe2c25c16cba438191f8deb5dcb067b633f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985a3739f20be8fd40633d138acbb0fb
SHA1d7e02e159c4d18958f536a4654d5c7ba972d8a32
SHA256cc5b42b348a5d9956f19d3eaea6ea6403e0a369ee3c57d1b2014606252bb95c5
SHA5129bb6b2bdee5407daa4e7f42d2cc38fc8cb6be3a09fd749dca58e1019bc21027ea9dfb410bfb26c77004ae0e1ef8ee6be74c99146ae09a8867647aba346952dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3c71fa2f5e17ac290063f7ccd51fc8a
SHA149b356dd66f278178d91c444b2991e0bc6fecd4b
SHA25659dc77d386c29fd150c7af475bcd8608111f9ba99ae0c8c712cd4cec9ccbd5ac
SHA5120ebb82d5f7ba95e889b1bf7dd2679c0ed973bb2082e24d56e52f7e0c22e61717be45b86c9bfa3fb3b052cd7421f644ca2bb99c5f9048b7632c8ec4d459290c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b34479a1a805be58fdb745d27f05a756
SHA1555ead302e0494cd43d4ffaebba75c3509e89920
SHA256989bd5a3716bf3ab1c65c7ff519f828263f3640c70fec4fbae051f4104faee77
SHA51266081da795fb6b924291054b16fba32d11e534aac591f7ba6e8643019ce22aa88b59a06cc301ed2befec13040e442716b1dfc942999960e1433d295de843b898
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a