Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
6cf1f9e323b761281eb070c4f159b842_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6cf1f9e323b761281eb070c4f159b842_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6cf1f9e323b761281eb070c4f159b842_JaffaCakes118.html
-
Size
272B
-
MD5
6cf1f9e323b761281eb070c4f159b842
-
SHA1
5c241b42482a40259b361d4dadb0c8481640da2e
-
SHA256
37b8f781272fbb35c3e4c0505f2654d52d1d2d16297af442f4721b5b96bd41ec
-
SHA512
8607238d606fbd8185832cb178559d9afca049b2422e462bdf1ac296210f2b89ead2dd188a16bcf2eff4977ea6baa6bc7faebdb732b18dc8ec94a1914371341c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422676580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b622157badda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000891289d44cfa4b43835bbc8d713f5201000000000200000000001066000000010000200000008cbd1d2f4708c18f764335a9448647cca5c8696560f0c24625357bf1840786ac000000000e8000000002000020000000e1c2ffb814696c38af7a712809f2b04d23907785978d073fd41a403ea4faf5a69000000041cacf8778c80e431a61205a950ed68478b786c6a089850a179cf9639f768313f2933c7bac72e0ed485aa58acc6212df803ab1a73d3ec5522fc3fa6afa87f6f5607ab59686050d69452fa3d5e512b7fec438bb7436a96c0a485a3e14e63507e0f25df6436bc25862ce7cd965451a1786cbb312fb0d42f691347c0ab3e64c08d5a3f086bbea65f08855fb6abfc2a2534a400000003201d6b106d418b953d43450bc7b80eeebe53c720e77f9e112ec51a41fd1399d3596ee43d2687fc3bee1e4a9910988ebc0282f833a280d34acdf413edb1ebaa2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50B67B01-196E-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000891289d44cfa4b43835bbc8d713f52010000000002000000000010660000000100002000000062507ced6f7ffe29d4aa0e7695e7908cc7a2a9e229e78a6d295cf89f7b8baca4000000000e800000000200002000000043b3ee02a2cc03dd366255e9536391597eac9a4cb375373f9373e5d859be75d120000000e7d2e9d1defc1fc91f428a8563ebea5fc1e5daeec93f9c19d59b8b4f08101168400000009dab9578e835be08c316dd25ff882f0897c547196eec1f2e501bf5ae963a313dade803e12c01c36873bcdf3c904d631cda4305c1f7149bd4cda29f2b3b5a6700 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cf1f9e323b761281eb070c4f159b842_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_8DBDB314F582CFB69D8C0359C37384D1
Filesize471B
MD560dda007a31bdfa5f9f3aa9c1be17e99
SHA1fe0fea8df00bb9417998feefdf37d2165455eb66
SHA256c3b88a3798d6ef0c629fc30357d394f99681a2865a731726c853896712341b53
SHA51206a9a62b26360cb5a4c7c1f56e124db7a28f2045b343e227a6aee8da9d3b6795a71f0f155ed4417999a8bce00ecb568cabf7a2684f4bfd7f5a8d5841727a0ba2
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD544c59f7e55b48da3c688816f37d07e98
SHA1973c41c823a795ee706c06913f1d81813c32d094
SHA256c4998402904920b7b91f9ff41713e831268065f1afea433cea6ee03340543b30
SHA5125a2f5fd705a2c9f9660010428fbc740515c807c4a72e697c65f0631bfc906025833d77c2f25e4dfc2b3115fab8c9dca4e6c23b1aaab2f0d7c5f69e950b2dba42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558fa77e4f77285ecde0e96119deb380
SHA1b76d72223337fc5185bd653b856d87dea9f0ae19
SHA256a51912c0d6fa9924d4a62a76c78860fba0ff521ea1ba6b2e7eaa1177cfdd8d90
SHA512b2c7630eb95cee5570085ebdd124cbac343bd5c73adb7281480436d609490fe30092644053229822980bfef938592d7e666ea5fdb3798aa6901c7cae6fab3c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544349faee0a3efb8e4600f8a90a074ae
SHA196f9f2950f20249b32d1b094b89984b9b9ce314e
SHA256ab0703fa9da3caa600cc4dc924b3a801d0c392fe8f39e32b2c82007889c295b8
SHA512b38e1022ce4754e9d67d1f4008aa988d771585cb0e4e04b9f6ad17bbd648e79ef4f7091b41265e0d9cd559c4674416543b5ab0e610ed7ec3b26611379ccc5648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840031bd6981691a131f42468185e305
SHA1b48d8981f0dcbf5f4ddeb96b5d068b07ddeb1c8a
SHA256085319c1830075b050ec20cb1a81688438453aaf4d5e0f699f8c8ef65e1e44bf
SHA5125c57d0b91c89fa04b4abc31d976a1b01e5d37a928d55457e21790207327f3be601bdc6fe95580b0c5b1fbb7fa7515fae3f7ca905af89a6dd273f1ef21eaedb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2d2e74181e0493ffc05400b6ccd2e23
SHA1dace85e4ba07c0aabf353ecab7e6190ad6a6c10f
SHA256e49ff8c420b2ef41412c66763872c70e2d531482834ef63ea164161148201bb8
SHA512cd2ebeec9a18506e860a9224c56b4895feaa83c096395007213f0ed6a364686fd738f897a119de7e5bc16fc3b719873809cfdd9ea015a04c8fa281406825140c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf9223e5ade9c4814e8f10b9146b0b5
SHA14772d6763f1bf654f25f7ec86d2eee953e5b3830
SHA2564aba25233b5ca823e393c39ba299b082a38eee3c939bbfcdce51109993d08d14
SHA512ec6cf02a8bcb3a415b4faf75ce59ae3d7e40b58d2aee5f33d3ccad5ba25fe54e6896b87b32211e0e8d793277106bdf51e072b68acc342950001510371687462f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a91295b0c516c70641aeced213e1314
SHA1a037035618c781a196c28407cc6ec1dcca03ada5
SHA2566a395e59947e855f9d4b85b498dcc65fbaf7052f14844d05d639f7c177ed203b
SHA512614b6671a59bda2f61c26b247135f9f367d169843f5c867e82c48b7a8594f08aef747af86a1ec0a1994cba89af1e13b7bd2f0921c95c946e4e9786b2db901ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53199589d7c6e2c1a0f72fb7f34098963
SHA19fdba9327283561a45c1deaf3cfc9c492175f0bb
SHA2569fb04479c374f19c6f744deeee09141d455d0f9050fa24b1994e64a0a739ec73
SHA512a09006286dc8de534ffd9814ac02aab31c7b9b14bb8b358d9f15a57e4d891b0a390ce6c2a8b8c100187200dfe254757d2c8d21628227dae1dcd6ba2faec9e22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db124d724286a73f493a3855b2d3a0a7
SHA191ed58f04560088e0812fe432aea143fcca2d001
SHA2560c9904c5e7d4e4cc12b3656031bb317c14b27819bbd7b60d7d0f0e25e76d9473
SHA51285353d9a8e7b40ed833e836f3e7a61493deef6793c47db18d68e79e706adb464a6affb12acfbfe75343b3587cd2148e80685547b42435206ae098675bfbdcb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7b205d788fe7634ac4ac529850154e4
SHA1547d5a733bedfe49407531ba6df3c8c4232e588c
SHA256b29b3d2d7a6b1cb03e8588b97d35dcb623fd812314f444454dbcf7a035fb9e9a
SHA512970c8742b0692cc2efc4e79f2036d62026ffdad35797b3e9ff9be924945092456af8f95c896bbebfb5e02093897646bebc21dd75b9fa4886aee982e1a7d1e7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca074697100db76704a13756707438c0
SHA1136b0c76dd48963ec528c329843cd5c713372cb7
SHA25638c2e58bf633fd4da828db7043bfe5f907e4e1ad41874dfbcda3291f15dd7bd8
SHA512a39dfd1fb7c985da55d86375d5f943d350f07bc6c2ce52de7baa4e9c24aea5b443cfe5dff470b4773ca3ecf217052943f8c215b1f0effbffaa1567a79c46ffbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_8DBDB314F582CFB69D8C0359C37384D1
Filesize406B
MD58743ed1c8e624bf05fb08e7f6f4f446b
SHA1abb55717da34b37168bfab773b949a1bba6ea3e4
SHA25611ff109d586237792dca53ed9d3b9b278b6587e7c0170e37f59016f4e8b9a6c6
SHA5121734b596c68e0994ecf2cae84e86b4ad9611369297375bcf6b7e28eb4731182470115d787704f85668bef64991919d9f513fed3c36e12a7ac80c6d23722da0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52f98aa49293bed185f7e54739c4bfc1a
SHA11df9e64ccd0d970c33112ef8ab45e0699445eca5
SHA256317aecb6d34305b43019c391c692043165c63e067a7f2766b570e6d4698e20a9
SHA512a168cf8dc8c0299567e98363bd7e6a48b0e79a59ef348c39f8d770dfa5cd0b7aa34614bc6159262d3c74c3217045f44f6dc5f3e2679793bd90a8fc0d36cf9772
-
Filesize
9KB
MD5906cecfc283c85779aa952dd928fda3b
SHA17efa86c837c9c5b10df96a6b5b7174aa70f81421
SHA25678432b78aa77a07fff262bd4c36c57d7aecb02d84248841a3cc4a6700ee7cce7
SHA5123661a33bdecc1911b2224ecbc47178ab892a5d33c00676a4c647e4227cfe3c071e41f5dab6c4e600353d529471a7b8f3adb59fcc75b097ff38e8264e9fd0478b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\favicon[1].png
Filesize9KB
MD56da7f14c7121fcc05790947ca8897271
SHA1c43991cd3ee304550738a5f4a9bc5af38b6222d4
SHA256e632a9d7f12b6c369d7f4e3e04e863d850fdc8a37235967a314bdd79e75afeb9
SHA5126212b2ef0c802cd08b051cfc37c1a9f8dbddeb2a407149f06083b46b4bec0bbed09f6ed57020318f483e18eda68cbe69c2a96ced913ab74f0cb61ece7eaf3ad9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a