Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
6d0174ae3c42e2120fb67680f27b0fbb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d0174ae3c42e2120fb67680f27b0fbb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d0174ae3c42e2120fb67680f27b0fbb_JaffaCakes118.html
-
Size
461KB
-
MD5
6d0174ae3c42e2120fb67680f27b0fbb
-
SHA1
e404326e5bcd5500a246761d7c7c5a768af28c9a
-
SHA256
c6c51e97fa9a963fbbbb51df926a09f2378b09056aabcba17e263d648bcf4236
-
SHA512
4b721c69c2fcde2792af1d870f435dfc6c0d91f701e95deecdc70caa2bbb258a33687c13980a9b6721f9532fda52bc2595fb432b440105b615c14014dc299777
-
SSDEEP
6144:SfsMYod+X3oI+YGsMYod+X3oI+YYdsMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3i5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007f39d034c5c37041a42c719e637fed1d0000000002000000000010660000000100002000000016601b992bac2d29017a93d9c24cd44019f412adf2b5f22d8a7da5a0c576acb7000000000e8000000002000020000000a76b52f540866ea3213abeb9d84ead4dd432cc7f5311940ef5f51efd86fca12a2000000007f4cc69c5c0aa18c4f56ee785a09d7883468d381ddb4cb75363fea60007b1114000000085ac89f071facbaf86bb5fc058c3e78b9bac6c06b088f97bfd9d99cd28de3d5e66d654ff40f1e5d85f80c5edb2e11c30d724689e758328accb9428f13439003e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FCA17D1-1971-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422677862" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ef6f287eadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2164 2172 iexplore.exe 28 PID 2172 wrote to memory of 2164 2172 iexplore.exe 28 PID 2172 wrote to memory of 2164 2172 iexplore.exe 28 PID 2172 wrote to memory of 2164 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d0174ae3c42e2120fb67680f27b0fbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a30db34e4f4e210a0d3242a3f355e08
SHA19c84d6556d10fe099d784cca58cbbd91b93afd34
SHA25679779704ae31c46ee3f79ac8c3df727174c6d0930dbc08a2898aa040ede3837a
SHA512cb9f2bd34c27bcb17f238882ed4d0f8f746131af814c91ae1fab25a2cc416df3d125ed561e04d08eecc62bd788ce895e6798329150bb9be0b6ab401dad59cc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5118fc0a665d848130db0b30ba02498fb
SHA101a9708c179326a555d20cb77c36ac1646a1c15a
SHA25657b189a6a2fde28a8e7b1538f80f54ffb0e2f5086c6774ccb046c0b1dc254fd1
SHA512c99d76761370d62f7d8b9cf8fb62869ab63609fb569ba3db819f69f62fade74d32a501faaf1b4c4ce0d711c507b37184ddbb8b64ad65dd8c91d2480cf2c7ba32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517aa57cf3767de0fd54dbd76f63dea91
SHA15641dfa1a1ed31a02f718db1ba7c470d82f406a6
SHA256fe697bb5269fabab08d568ab5daefa43014451d6fff82b9e082d562de394f6fb
SHA51286f81283bbc70b68b6a27ec3858695da95043d9cf89e441eea7ad49e74e8e21d844a84921b07b146f1a65c98f10f2635dbd08caa2cd97b132e06468b2d25d51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef56fd7883692816de70b8dac943a4c9
SHA1a6245b816adeb4f8ed832612618cd248aca979bd
SHA2564db1c78124e7e11c0e329385d71062ce588330fd4f865bfc9e30c5ef1d234fe0
SHA51241497f71ebcbbfaaad06ef933502e149aa867d5d694f595444150c69fe31b3c6188e600f22c3aac277e8c1793b0e36ab7c40725f193748d2e521b1ba4f49777d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156466f7333e00337ab759ffb160d4c4
SHA1fbf9f874c6cfa5ec276000565b7257bb55b60a78
SHA25622c2683c11082551602d1bbd8885364d55edc374f69c05c60dd80206d25e0df7
SHA512bfe42d47e8aea9a2f2a1ab1396d3d1bd801cf23eb271be99aab7726412f8fc8eef26dcc9fddf18163b1dfe28a8f9b278a14b019b25715439e1b5df1dae9835d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583fd510612926f30dcaa279ce8fe46dd
SHA13101e75ee311faaabe808d2b3122886b672aaa09
SHA256034d4ca4e1d5d4879e9246d25c2ca363a39d691948ab131dfc4a2bcf84109338
SHA5127a44cd7b0ad77fd765515cf44003e34eeea771f608308b469ab9ae22746690ea5f0ec599efde4633d74c2c97e657157e4e2e7ec5b8e8faaa23bee5fa007597c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a6aad605b2d1c76be8358695ea5fdb
SHA1a87d2fb701c681496ff76c4dfe5086e06ec28327
SHA25602302a42eae42878c14d22889d14aa0c0aad230f9eadaab9f67355f46f0adfd1
SHA512e8247183c6df3d17c11d54227c95c323043b100d5e01410fa369265965b7759db4f00055017ea43903af97d21743c7e2a210c87ed86a68cdbcc20754ddc778cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea05495ba47f1213525eb428813e665b
SHA109f0699595775e6f7916023a59cebe853796f7e3
SHA256f589aac516f6fe388428b35e5eac587f9893a941b3956c417bb15d742fffb3ac
SHA5129a2213323e497e95f053aae64d64f3933e7cd0e40a444f03e67545b09b04a15c469d0b0bfd21525eac3bd940844dddb6f5fcc78c72d36e128c9e8502f08813fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14bbc13e82c19c5adf9e57dffdf6a64
SHA107e477b58cc74369bca80140c25a69355f7df62d
SHA256482234ca47cc3f302f1e201b4850a0526069bdf81a5c0f6c42b8974b976eae22
SHA51229581dcf90ffe49f4dd73ce8591ad22ba0c67c40e74c9b9211281bf05139cf6eaa8ed1ca7b8c9dc818962cbe6538be26bf45ebb6f86d7e3857430c2af319ceae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a1e7bf1ee512036a74af034ae74b84
SHA1ec377aa3a1930f16ef67a58ad3c99e975ade1a7e
SHA256aed08270ac2cf714252492f5fa3f393a632b36721bf6404194cba4899b83c4a4
SHA512de5fed7002d56a6efd777ed3e549f0c356669a8a0c7cb67d06e3e2f198ac0fa2a66b5c72ad6e26888d157bc429cb85df22f535dfcc9581873aa16edaf2a4c036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab63400f263c5c8f8bd7b1bdae41f66d
SHA14c102dd257a0660cc70f67547309cd842cef5a49
SHA2560b16ca6dec465f3652de3674c922890845b18cec8a86a2b8b4ac53e603d9c879
SHA5121f4c75d33ac543648ea0de75e430c3f349cbe34a2d268344f0a5e74a69afaef87299237cf0ced5d24ee1007207d0f92b6c6df4da3b449c8c632d3da1827191f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92818fa2e6aef3ba889ccf023eae970
SHA129820e0925d08ab863c34b6c70e917ce2f79e56d
SHA256e42ec5617ce0af6a01fb32593acc439ff1b7869d7f2c4f76e7352f97c940fe21
SHA512a9cfbba38bd7355d8cf0fdc512f427a3d5b4b3d349519b50a574b0e0cae08b24d50f8388c31c703e4d086531cfb24e730a4d06b7edcd0febad8affb2a0ffa99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d016dd9869c06ee9d969e99aa06f878
SHA1b1b7e6cf01dbcb822bc03f34797b2470062ffa85
SHA2567e7d6210f6fcebc0f40120abfd74f1128385d99b59baebd5a159f271c19a1809
SHA512bde7c26e993ea31f233457323185bf773b7301759c2e6c1548080bc27d5cd6705e7e567e5990db6645c5430cc91213449f03b69b35e6e6a736e8d30c4b4e6488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e028bf90ebc7e8f04b4b9919d47889fa
SHA175db9fdb98fca90b44b0608d2fba8876eedb2fdc
SHA256335cd5a430c0c60ce4330e2d5c08d814584a918c10f4daf56f5e7264cb1f2563
SHA512084b5a2d31a36e821dd2e195d1a6a282021a5209e62f78ee742987d6244fe48ba80cc19e46db8d07e01c07b8463be1df3eae2f09acee21aacf3957d5177dbb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed2bf18d88db4417145d96a674f75d1
SHA15d6ecfa1672855359f5c33f60fd1f77e01b4b5af
SHA25650df976aa8a830c9405b9d607b6ff173f92c8ab308d8802c0c593c88d85c4be1
SHA5121818f61202a79ac5a85c2df114384bf930a54989e5ee321224fe51a04d144b9a095c13778b2e39440c0ecb1bd8346ced6e604cab3c8c3cb69687d3b2f0176b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bbf9a41f63d76ddf4a18c12a41867e9
SHA1c0e0f5172491f3176c6ebfc87a6fc301ad33a568
SHA256c3f734fe4925f9314e5a01010e1f03f6461e51ead9a381e5d0a0ffc1a75675ac
SHA51288d991d5fd49118bea1c03eb0e04a1ade9b8fa1fd5c40b25c80d64662571c9d8c38e1595f69515fa13ed59030801f535f1001c64b7bc840cea8a4ae579144b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9b04ec93aa2c0235aaa8556019c187
SHA1ce6c2d11d2793dfdd0af2b0089b80a1a46fd6b92
SHA2561d6b382343ad5eebd88e172a64441321a735bc37187e8a192e0c8b891b8b0ad9
SHA512f328632c37cd0f63ffa8b5c818ff2bc6ce19000756fec23fe78ddd0f93ae13ed7746c8d07b17e3b1eda0e928127d95f111b8651ace492600877742b120feb9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bcd132411b5a4a8192dba3c4167e3ce
SHA1f2613808012ba5a06e6ae24a52e7bf1a0c513518
SHA2560acca6f145928725223a50de994caff9b111fccb77a438eb5a4aa5c5b04c3f14
SHA51220c67b7b1dd1d1b2c82090da0585637cdec48b84a2483ee2627bb18eb2bf3aa14b71cc86ff45545be82a4a870dbd6201ad2b4a3f53ad7cefdb7d7a150411a060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565135bcec9a43c3fd312e64bc8914937
SHA1f64ca8e8b2cc644d50787842df5c08c0acc3d98e
SHA256b0e8c07fa0e5871d3764ee43aa6f5bb7e4904621a7d79815e8c521ea5a0d7463
SHA51234755c619222d4f3bef6e2918f6c3d65a06a865fe7365880689e4871ad8c871fd2cf5a639611a24338f0432400e117b5e48e5f340a31e812d752fd5dd6223f81
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a