Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
6d11b7f6db9ca5f963d37795e6a82b4b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d11b7f6db9ca5f963d37795e6a82b4b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d11b7f6db9ca5f963d37795e6a82b4b_JaffaCakes118.html
-
Size
461KB
-
MD5
6d11b7f6db9ca5f963d37795e6a82b4b
-
SHA1
6ff27cd428594c5f0d603eddbdfd2a1493838b2f
-
SHA256
0c8392ff28799400fd1538f163fb46067ad11b5893f8c51b81b8bb13f767a12f
-
SHA512
588d51f452d7bbb590b33f04043625d35f5c4b99c5fbd44983c1927f725245c929779ad9624ea2dc24a1d0bc330710c4ea8398df0369da4fe7773d31d08fca07
-
SSDEEP
6144:S0sMYod+X3oI+YpsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3X5d+X3C5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F2E2B31-1976-11EF-91AA-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001cef361c6ce85b811606c139858d3fa71075d83c065ec7c6d0dda56700f6e61a000000000e8000000002000020000000e6cfee2c10de5147634a678208986b556525d93c906802c129ac888db42f7452200000003b9a2240cbcd92653adb2cd62f8faec5f126dd8967ba626acb1a19f0158cf61e40000000d0f2a39d217201cf1d6981a72ec5244918630ae5feba2d178871b47dcdb0092851e21945d0a849b54f2f2216d784a6094b4550b44631431d47730dff8c5ece64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422679899" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a078b6e782adda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2572 3012 iexplore.exe 28 PID 3012 wrote to memory of 2572 3012 iexplore.exe 28 PID 3012 wrote to memory of 2572 3012 iexplore.exe 28 PID 3012 wrote to memory of 2572 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d11b7f6db9ca5f963d37795e6a82b4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5531f763c0af336ac61ea5913b341b
SHA129ebcc45d43c70813ff5d469c571064a585c7461
SHA25678422b95e96f76f9321fce9fae27df019041781edb5dbaa95686ed378e970610
SHA5129601c693686cd8b392a376f34f95fefa4b845578a85df679d4f6428f5d377fed30020dd5f29e55044bc14a03eef66e6f34a12f007cc0af928273254c6c9bdc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ad82b56f350c7457702557d2743179
SHA1fbabacc41e6513ec62d3f9afbc46eccd84fa6749
SHA25652b2c73bb6f7a49dd12f362d4a3c332e79e8658a636235d16c84e8549286865d
SHA512325bbb59e67b8dc4f452bbc728a36e9cdecef2c7b3132d8d8271398ebe633fad9ae0225701b1d8a2bbcaaed83274ef8db53963fb5583f1dc8208cb5e8a43b548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4b68e08dab76d4f4fd9c165364acb5a
SHA16de7dc9b0eb888dfef75af0cfdd0b57e16fe20d8
SHA256ed81c2a82e98946b45dee05a11011e3cb586968cec48406fd7ea352fbf7a37a5
SHA512cb6e2027493477b65ce9d52e6ae83d8bfe9fac10ec8de47647ea84f5e920cbb088a3aa6d01200405e5c15dcce000b124045440e7fe038fa6414477408f6d18c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55573a76aa1030d2fa08c4c7647770756
SHA10ac0c4ea6713e5bb2b5b60171a975dff75242f1c
SHA25672b88c32c9682196dc312bdb1003fa34d1f87b80eca7f23e5e3a1228b80ab099
SHA512c625a86531e6eab79533fe8b120be124f0014e5d65e13a069bd31514e4a89739805e4ba921c6590daa547fe0715a1f6250467e7416f18f8980ce61dfdd8d29c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dd3c7c1f4fd7740d78257309a56b8eb
SHA1dfaad8b2d7ed03d4aadc25ffcec9f7e486d04917
SHA25650fc7d9f35e632fd852ec446b6480941be9ca56f4c5a689704c96097affc313b
SHA512874107efb8ed25b4841e7acd2177845e7cd295cd17e173031da83f58603e908dc4aff1a6da5c0165648a4b02e72e8d0f0d45b817ee0009563efa92112dec2620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a371cfc35f8932284709868a67e699b6
SHA18b1a0ad7a367380efb808252de0fcb402d4b0879
SHA256b6f6c7c1b7e5d0a5f5bd7bd812818ba2fde732e46d1620f78d72b8d90c407ed7
SHA512a040e31f7db7ad68e72bcafcdd3de9758c354bf3fb37d5d20c72134726f17b5551c5a229444421529b02261c7591177da252a8863484f0f62119ce57b1225f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e71d6feeb9f9ce1517bfe0ba8ca0178
SHA12a27efcbefe18f5354dc011dc9d2d944c4658e7d
SHA25693f8af781037d4485ca50df778186c224d50301d34714d50694d747201bd3142
SHA5125b2e1739bb5d6078f6636979c204b1b99f1831f00523c7460950edfbe5fd155207344ec2761862433c9fb12b536c58c5eb1ab6ce0e2b3ce943da5f16dda20387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbb5dac95e9d52c1c67cd134e705d6d6
SHA17471bdff5cee2b3b3e7ee36580738165fd5b8e50
SHA256ea5f241e23b3156781d0d8366c5dd893801925da4695e49c6a7a624c3938b1e0
SHA5129d6175dfc16fd7685a3624e21d5d2cade420b8cb15f8ff7df31d9c827b16881c15df8c1bfdd3b4e32f44d53d8f86184113237a52a3aa6da8a4e07acbd77eeff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560316af0ad4255b48ef8a089889cafa4
SHA1bda990856d034bc2046147d45a44e08746ceb5ff
SHA2569985543cf095241a65ca06ddd32906f01ad4117b95cfd62ee5a0f0c8a70fb1a1
SHA51253d4ef935bab58ef145b48145e4114fbd4d2afaa84e8f636c5eef3231105b274c55c78f42d838d14242fc0857ecb0e31a3cd1fe3d9e6261384658a009f4c9307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c92652891662665fee4dbc2b1cf9378
SHA1b9624286126e6897a16322300e71dbb2aaed1381
SHA2565c4aabea5950b312cbdc5040fba6fa238f9c866c1d6b0eb90e7f8a3174dcb4ef
SHA512658d41e7f5ae7e4a943efa6391976859fd4fc436fadb5653f7c8023b76bbde8f489e6f18ffa5d3fae8680636cef8554637e18dd5977116170720319b3e9d6839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab8897e62a204421e8ba87a5232040eb
SHA13d02a66032d42e0cc9e19b44af8d40179eec7df5
SHA256903ad5ef9536e1cb6662d777ddec9ecccc92792f35389c30499b33e52c13e672
SHA5127b600a22ec26c3eb32b1617168260f5c3cbfebaca01679046f897380e9d5f8bdf6b47d455ef87d2832dd076f1be31c24cfd921d62f214982f0b70b949b6cf5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f0f1a294ce13721cef3ea8b160fc7a
SHA12bce3bd10e0aa7068ff31cbbd75be774310a3b3d
SHA2562a28a422eb7440204c727b1f32f3a36d171f2db34a0b8cd464b273675d700261
SHA5121433b4a6e58549892f70eb08299e9c656ccf37210778a2ddeaef88747806200f1d94eaf39c3dab699238efb50c06d7d2a89f4bcd7593319efc9101227c353a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5607a755d657383b8e044034f34848
SHA125ec64abf4abaa115f3a769c8f29f6229eda8513
SHA25684ea5e921789371e8b0b899541eab233c79914326a988759e4c05d2b74d79848
SHA512772c7087ab639cc9dcb94cc70bd10758efb7c7eafaa76c9e4f41d08944a7f76697910ff342ed63aeda6bb71a3309d98af5fff6e7eb85309fa704a4759850c956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596cbbabd4b42cb207bea13a58b6c63f1
SHA1f18b1e40dd6e09d5a884cada63ad5d829edbb540
SHA25637fdde7f249c04e34784f2a30f1901bc6ff5a816ee34b93576e6330c39fd4610
SHA512fecb6813fb3746d11f5903e2bb78e0e0979b69de07b1dcb35f0e8a4e963201a70b8480b43181a036f6d378e994e7447d382cc555a0a8f7453fa9c293c3569a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fd5551c80e073cd32ab675acb1931f
SHA16bd9a6ba2b5b4550816827de6b838167f6c3ef71
SHA2565845b4d1cb7f533af786a66b2b105dd6b5311dde4f4683a78782cd5987f64513
SHA5120589a20b4a08445389359c3a1120ff36e150d5e18e441d540c7e85b63203249ec2a3dd71f1c54cbaae79180e7c12003231033c635176bd329341ba1b0365d37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502296a6891b1bcddb3343af164f4f748
SHA12bf8d23d7a1c76cdb9c23b60b7676251cdece294
SHA256da30571ee54de8f50e56d726aef528ef7f6647b3e4a7465657a56c750463634a
SHA512f33b31348001f8e2d79b7ae750793cf138d7d0da16d6da5dbc389f3b4f1d35525f174ef9bf1dd709f502b8d5356637196ef12af20c2ef53f4c790255a667fafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7917a3dd50a3910174b532e97202a04
SHA1bdae2e2f17b60d5a104024e3846c94584c198ec3
SHA256e4934b92988e09e65e178052e9b3b28ac680891035e5538edf26ad2babbc6892
SHA512b6f77bcef5312c065980a60a796f25147c89c71e93aaec820f929d56d59dcddd6fa7e54c894edc2e5286923f27935a849d801acf27c56242690e7ee83569ae84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54181f2a3fd6abfc0318890523ae519f7
SHA1e59803b11b65c38dced4e845ac1de25763ef9f54
SHA256ad650f5fa14031df04d879a1e734f6ebfb5ec1e44c615e4b67b23c105b6e5ba7
SHA512c08d7455af34ccec004420e8f4f01810dedcf8a37c15991d8212d6772162e620ffb3a14336dad921ace0c78f4df912af427a098cfebed8f5d39cf18fb5cb0da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30dd330e2786aa71994830e16b546ca
SHA19cd5cdf98aab72b16775d9955efa69402c688ffe
SHA256eadf29628ac57d7b688e3532bebc7a1128e121647c0dd1cbcc521c3ea89fa3b4
SHA512c9a0a08e06cd514ab3e974ad72768ad984a4e14273df88df62d9f98a667d8afcf1447f6a004127953891346ebb127ce738006e167851a14a885bf7e50a0ac7ad
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a