Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
6ce3ef76aec65859ff25b8a2dfe9ac7b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ce3ef76aec65859ff25b8a2dfe9ac7b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6ce3ef76aec65859ff25b8a2dfe9ac7b_JaffaCakes118.html
-
Size
67KB
-
MD5
6ce3ef76aec65859ff25b8a2dfe9ac7b
-
SHA1
8d741b4e9551f7c4f5a74c63ce0bb72181353809
-
SHA256
5cee48101d6c9556a52ef26a76c24ecfbfbfc8bfbc43ece036311f177952fb06
-
SHA512
5c3572929ed939684ffb0ff08e66b23df280a1c65cddcc124901b2dfb1a73b6e6d0f55b864b92c33e622b53153a5d97c71770e1f7538def38befb2d67725c8ca
-
SSDEEP
768:Ji6pgcMiR3sI2PDDnX0g6sc6DaoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JqBTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29B7C071-196B-11EF-AF3D-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d7eefe77adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c5df1b0063e5e5e803cb948ce796432f718b418aed34f152f6f046ec41f40307000000000e8000000002000020000000e565cc4ae4e4bb69faa3439441fb7e762410dabdcb8b95342602ce03dad24341200000000507bd427e9a7f9bb71dfa569583a4d7515c060e3983f3b69302f4708a9270ad400000004fb95053390605c489a0ebcde1325abc624d390e41798db2e33a87f20f270b14419dc1b2e80919f888ff0faa4d5d18ffeb8d85297a9433be879c04537691a1eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422675219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28 PID 1716 wrote to memory of 2348 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ce3ef76aec65859ff25b8a2dfe9ac7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e920cd47e2132844e09a782a3e1011
SHA1eb7fc8d07d1941b934dd112b2c94977811fe51f5
SHA256647c25b9215330b60085872ffef3f5b723ded28cf1f7fe72315014a41bef161b
SHA5122f499c4169e096f27bc2563e2e3fe4f26b00ba6c64f491ba2628734c162787c5f9cf8800f561563801ad40b52318008d08ab1b2d5b881550f97183d703390175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fcd0fcaeb9735b39c6920818df75992
SHA1b26214064747a47cf8fc6717974730ed41d13e1a
SHA2562cb72badbd62f6578e1deea9d623a50b53a5dca573d4afbc138ee3f8f6ac342a
SHA5126f9bf30f1fcb89d591d9c8e270719c293839273b89734c158afefa21e6ead3e7ccf628730d0a08a5e8731b20efb2f3aafbfeff915a1c4f32d84d6f8333cda012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527f8f1335a019bd3005879c01d1ddd8f
SHA1822839a37303004695f7285358674cb73fe1560f
SHA256a007a17119d7fb34d2aeebedbf05bcb7c2b3e2d89b8546945d92a7fd5676c45e
SHA512c2c02071691e5743688a9bbc5fe1a790e7e297455e481a4526b18c15ca0a43c3486881e4fbd22b7928353ef8f30a983354d46d59975f83d55de4911eac68483b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5a00b7bdeee0d42c9d5bc575b21b2a
SHA1c1a6ea477a6024b0e33a00a5522a98ae0e666c05
SHA256b557ab93f84cf03a3bbc178b8f725a6a4507350e6301ffb4e5c9cc27cc526200
SHA512b07f616a7381d57e8b7f55093f1ef823aa68a0226e5df49fdd237f570e4964fbe79609c1301d2b9bf8e905ef2003f7bd2e7b35810655f238ac4058ca354a3c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847e15c3dda2ee6287ab0bd4c7b19a06
SHA1f5e5adea13f5a2ec253871a6d090b7751378cf85
SHA256cf0afc2edeb0bf13a3a5ad13c2416d2cbdb13a7188c8f39d71215e8568d8526d
SHA5127ab82b66894a008f6dda736d4b4162af08cc988bc4c51bcfbe2d9aa8235319b93d9abbdc112b50ecf59965b35ecf051890b7eb2058e7f243373adbb3144ac9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c92992a034a2422168b79fb0f019c66
SHA120fc3f6d5227c5e84d9a2dff54e2632bbd9bfb2a
SHA256d32906e1becb04a17c28dabbf346615cbfbd705acdfea84ba1770b32bbd84066
SHA5125e5113fb13a0579c3a0002872464706708b41732fcb961dbd80d39b7bb0ea8ee7838bea410b6314a0998f33616f5e8f0dd4d33cbea3a01c7c86aacd2d422831e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a7fdd01dac82391915a2198e17ca14f
SHA1471765198b858a421914501c31691c599354b1cc
SHA2569e9baa8b9b752a898c67c1e2bd8882ab582e0eefa2d73abcbba349b395ac4992
SHA512deb391f870765d5f6863e8466a58a646dae4752f5edabd54925e7feea477481ec5867cf0510f6f6303fa73bddc039763370703046a4a34b6cf6c98ac81b49c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5decf18fe4ec3ecee377fd1912c59aefb
SHA131be500284945e5a752f3d775d8b8138784549ec
SHA256d571c6277fbff6890da47e0b1dd937d95385bda9b7d88b0b4768a39d21e2c119
SHA512df030b713b68440ef1880c9f1b15034fcd6c743c6b592fb8e2c07b9c2daf78398f8754271ce2f712d5b02be3726822162c46b511218889511d578979fd44aae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a14d936ab06d00f0f290c2f39ccbc8
SHA18a2f9aa7880585fcc4626d1f4d61461b55b54513
SHA256af64ca71d5840c87ee31c03abc3f7075d573a302789e1280ca81b2413cf1233d
SHA512bd5922d7006671c0dd49e936d6185f0ea38f39cc7a069fbc37cfe83e29441e66f2fc60f7a90508fc37338160c1b3149473ba3a5e4c8e3079d54306a57d80b96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207a3720ee32fc070e247738adb314dd
SHA14b01fe4f5d0d2bf97599d5a713a6c455277f2919
SHA256e91c05041fec0bdf72149685056c122d26ea1b52da530b1c2142a013cd89c2b9
SHA512bffda7b34a7d3bb52eae5725bc8c375799287da1bd4f82978bcd2db092150f59d3826d3aa0be273c1b0e70fea48edbab0a9637463726aad329bc127c76d9482b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39a6a2d6e157843262c1255849dad12
SHA1a46276ffefcff46b82026bfb32f789568e08b0d4
SHA256d8190791b55d47cbfed29e46f8563481f3bd5c4b254290e56b2a74a0e6387013
SHA512e64db9ff6fe7ef86ac8bf916d95f046a1a618a482ff8a372e4a328e82fb9827a51309cb553df9202f6c7d2e77b529b8b362bf3975b8a23af63acb5e6421a7a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b1e2c769d995abee1e71f91eefe73a
SHA1aed692c7da21ebbacda83693b0041a2a253b628a
SHA256297fda80c8643357bedfb71bf8c97d66c3729b59a55f4526f9d50552370c09a4
SHA512145798398bda1566e7dbb552e54421f877dafcee854111786739ff4f4c0e3bb925de389c94a31991b82567e62d364b66d2dd72215690fef32d6bb516e87340c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa76c3f0e6d6779c479641803ddcd69b
SHA19a38716efd13d50c1c6c0cb983781ad08043d77c
SHA25663ab61b0858ad1bafeae8ab7f2702441fbff865b68bc819f7456fcf5c691b3dd
SHA5128ecd5348971bb33e33e1914157bb0ff7ed57b82755fc4dd3c07ca7cae866d35b48dfe35b0009ad11ccda42fd7dfa70657441354b27fa8303d213c4c5144ab7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be34e73faff34415494196d2f690ff92
SHA113b727d1ade0ace7099d604f56a7a235bdb6aff4
SHA25691dc725a11daf08e07f9465101cba38c7e3125089b9cb4d5bd6474c3f344f45a
SHA512ce00caf02ec15a688597cc65a27bc5a60970275a0dbe7bfd3e3b691d324e541312555eab8dd7a6a3bfacdf5fa9269ed9ce3f457bafa166e56ba5980370767f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56334dfd06da18a641f28e5885c750bc8
SHA1f92820125c1fa818d51666108bffdee8db956e02
SHA2568ea522f2496b51c3acfce3153f3b6abb0f7f8620602ae7c3cf5df4e0869816d5
SHA5127d65217e53b021611db23513b2ae756a29c69c6e1b10fc66a5204d2ba7fb7373606f8ad533ed4d63ba0497499650fdcd22da61f156674f10f7163331c8d27009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57243a79ed76c979c7bfd65fb5b467358
SHA180ea23079e7da898cf3ac0aa74682c9cd211c4b2
SHA2567a841e4fdcf55915e18ca6f849192ec072b7c594dce9966b809e7a20054d07b6
SHA51262747fdcbc224433f7ac1703f27463f02e7f0600a2bf25a51c5c30e461f85c044f79ade75a782d24a9e7b74cf1cd3cf331ca2b2b01269554f247c2f9d2b95bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533644a110d84c13de8c974949b52a1d6
SHA1ce242cc4b09f5505a9d958f10208295fb7be0a11
SHA256780700edfefcf3edddff40b453902adf8986b6dc3c30cff2621147f3665b884a
SHA512a04e8636a106b8eadde626072262b905ef7810a045fa9b2d9c37f3fcc9ccf8a5b3a532483ed75aff0186f40fc536cc7c7ce5989c858cd1179e4eb4125401d0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f74df50a296292aac40aada138d6c65f
SHA115ada8198d7602119c2734045528d1734326dc0b
SHA25667d81c53a3927d384097e92774b29d4451a0e2afebb25a6fc63ff1ad4bfc3c08
SHA512e3516bea372c70e548bca2bb368480b11cdebd32e332388fcbc44f4e311f231af4c2661c33e2733da2733ac1aea62fde7212333531d11d83bf4590b2c0d6c6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52372f978232c11479b03afff7d45a396
SHA178ba8ab854772894b265b7cee186b421a70545bd
SHA25688dbb47e943c29b4301b0f4b514202fae7aed01f12b481c0243798bad9e992ad
SHA5129ea889c57c3fdcb3638940b22046aedc1ecd217fa34e2611bc55412132ff47ace27318bb8955c355facc50b2332d12ebf22fbafca6ba1931ce1a31c57ef20e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523659b4574e715640d1790c0ff54ab1
SHA1d132c1851bff4f0708bc8c2bcb5541ef0faf287f
SHA25671553cb3faf7213abfc0e3474ecb306598297112171eaf63e5e3053a4bfbe260
SHA51236c4f61b3ab623dc57fffd63dcfb4f9a953421fa6a080bfd4406c8004bd47e40ed55385f93baf6bc44bcf3e55d2d5aa56dc638f4774ca97a6d2597b71e52ca11
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a