Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
6d80202f7817ec2c11ba5fade7011f30_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d80202f7817ec2c11ba5fade7011f30_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6d80202f7817ec2c11ba5fade7011f30_JaffaCakes118.html
-
Size
37KB
-
MD5
6d80202f7817ec2c11ba5fade7011f30
-
SHA1
bfb1de81bfeb54159d6f5b969fcc5a1c26b512c3
-
SHA256
ecab27dafa3447afe2025caf943b4e9b596453edc91ddda33068482f99504a23
-
SHA512
83a5f01be26a94949bafcf816446fd231cce2a4da3b5beef1c8d8cbf519336911efa401e949acefe8090f17c5068ecdceb35e36fc6d5a39021994259fca01340
-
SSDEEP
768:FL3pmAs6LiypowQBa9cPSBeyM1ru1rG1MpqO1rq1rW1s:N3pmAnityQr6riMtrGrys
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78B5E3D1-1990-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422691243" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004f356c9a65d97abff1501fa27815f93b20ece6138dce1915e84da5b396eed9ff000000000e8000000002000020000000746fd9ca22ff6ae571c4ff8d3d11b47163e8dea63e8f6bf2b82bb6389620f8ab200000003021653d807cb49eddc19d79468af3031b850e4333e59fe0340671a9ec4453ba400000008e49ce9ff4e25504536124098806d63a9e28979616d0aa404a6eae24a3b0c3cb8c0aa8b38d6e0fb3309323e17e6a80835be9caa817ae4f5bb821bd0e7023f0a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50978a4d9dadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1576 iexplore.exe 1576 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2180 1576 iexplore.exe 28 PID 1576 wrote to memory of 2180 1576 iexplore.exe 28 PID 1576 wrote to memory of 2180 1576 iexplore.exe 28 PID 1576 wrote to memory of 2180 1576 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d80202f7817ec2c11ba5fade7011f30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391b1dc96ed3b141ffcab5980531f28a
SHA1c964c5eb2ccd95b0db3002239509f16e67eb0a68
SHA256deae678a48ebf8c46eeeb9f17740dc094954d98c4c853bb16a3f947570d37398
SHA512cecd22edce90b444f805329bc6f9ec874b840bf428216c1e9714405393e56ce869175fac6b6ef035072c034ba6f27c9424c5f0285384930b9ef5a8eee35e775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec63e46364d70b727a91e3e01afda23
SHA187af4cda20e7204a02875472b1349e24461c1049
SHA2567cf756aa28498c2baeac7a536dc40da30f02d5f312b3744eddfead9b90d9cf8a
SHA5127e56c958c18ef773e6bf0b7915db461be63e67515a04e06464e8bbb482496feec8565817648ae977bd5224eec4fdef247ce2137e4d117a07cd429b4f4cf25d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dcd0084446d9d01b68b8ce4882aa821
SHA163f0ed91f4ead95293131e2aff0f1562431ad131
SHA2561447cd3954838b53b1ab0f10f4b55cb5aad3531994e41ab69b5da6d9263e5825
SHA512d6837376134672968ae9ee0e9a17fd3daa5401e88dcdcd1e43e378c134a06eff2921b275e56b6879ce1017fa777241e1a3c317b3f036c1d6e51acd2e6a7cd756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b31de44a9b018a01ba2b77b1da2ceb
SHA1eaf3d046e546323e04ce231f7618482af7a3b5d6
SHA25641a37db2d38ab02218300b859ce9619a8b18fbea3d669f1cd29c8bb97bb562a4
SHA512aad28f173a7758e84892ff014a8874d3c1c3c787eeabb6c6026c7d89bcf5716807bc96648a66bf24affab60a057e231f1a26a97914f29e470e9d1a442c716e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f54df97bfe23bbda682b86409398e91
SHA1cf63e953842adc8e42906d4857d716b9d8077af1
SHA25602511eaf1676eab196b7c7b9039416f4a0c2a36af39ae1b734445e5b048afa15
SHA512c4650dfbfa1a4647a1ddb3699ea6733fc76675f940e786209162f9a0df3a155c462dbd3191f52100ee2e32cc66e5324ed1876a6f297b61de7e8a8ad9bd52d918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55002c645dd961dbefe040a69c41ad334
SHA15cb3bdd018c4a96cce103f1b1b0e53844153cd2a
SHA256c718b85412649b1103d02e934ad5608b82f73ee7e82b9368fb6801558d119ec1
SHA5120590feb7325352bc1332c574ba5285fbd4dce2313765dc4430a7a27071955a0721171d19acbb1ab1173818b2dcf4f3aa9fcce36be5151df4b65a19402d401831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0fc13e53a8c67c95173ee092bc5757
SHA1fcbd6e0aa7c1a0b4876f23e04d36240b9ecf1968
SHA256600bf0e8bf6e9902b33b83af051188241520fe37d466d0ac86fe61c39103c36c
SHA51256fc5d2c81c1095cfd1827c4ddec805e84b40846fa25e498d0f0b5a8d7696a0bbd33556678e166834daac232c4f7f052cd756e8db7268b432c91b1d079276571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b1e10b37b5d6109cefd0061c4e97562
SHA1ecf728332b41a47bc759380a50c75d38d5a559a1
SHA256172a27e6f13a3dfe176b7af9144a32d50f0583c0d56277fae4d684b0e7073396
SHA512368fe87f328bc1dd2fc672cd0ddc59d35d91ff316ca93f474e53caf97bc73e50fa8d3314be6849659ffa79b5c0236d3e4286a03da040759a256dbd70ef284166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff760b201c776bd70c8d9785b158d3d6
SHA1a3b5990e2a6582fb7491c1f2c18d825362ce9a37
SHA256a0f170b4e1de8f487372529c6a8d8a4efe8fa2476144ac5ba5048e99ee8aaad7
SHA5128632784ad6b7bddb4de428890d8b904bfa849dd5b9bf31ed82fca12bc433d7c062daab9d6d9d5b81a06b259614db20d8fabc48b7de882f4e2422f5de96f9527b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622c4a4ab8b96354e498d0b8a00285c0
SHA1e1b29cc1a808d9f1bed7bba1b3f81df4c7558f3b
SHA2568a915047ce1af1404883ff0e68326874e7084a85f36d6c931f6a7e55ea70d3d0
SHA512ababb1d70a399f6a2b8cc7a5bf3e2b6ba0cc6422ecb1f72ae8eeda5e39ebfcf4e00901c165f252faf49239da4dea21e2bdb664b95a7e4a2372f3d9eb900f4620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e588f80a08a70689242a9b71941151c
SHA148b016ac9b5d25224d0cd649f4fe91cda6082d15
SHA256b71f3fccd51aaa3d7eb316c0c3c76d6380f4476cbc0bf60d04eb9007fa9be4cb
SHA512189c79a3414aa520613189acfb702cf5ee34548d23bed1a69c52d0b7146cefbfd3df8ce7531ad4fe5c50ac6e1b453b1ad6a8d5b9835dfa4c8faa9f44dfa615ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736ee7c58ef9dc4705e1dcff791ec488
SHA185aecf181f840301fb5cdf9ba6c815b1be9afa7e
SHA2561cc6758518a71c09298882c28ea0e211a3332c56f53e01945d10e5b872185edd
SHA512414acb1a1c7fe021a4d9ede8a6b9c84bdce043f0d41f541d4ec9f39c0c7116737516a0e07245f0b83f1efc3485cc0da3d1622c0b1ee7ec9320ba42418c57a041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db2879e89e91feb6d6774b1647d5d6d
SHA13e9a360ff4c589f69a2866ca91493f4d9681b117
SHA2562de12e5176ca61ba2edf36f84931e6d01dcca68c6d4eff1c6b813dfc9a5a73ef
SHA512e0295d080561cca08abad98422e8a9166c81deb20475ff8ffc11a92c1aa25e35e655ed24c9a9ad6a20e971d00019b8a55e2629c538003fe74d2cc7ad734611ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f99cbd999a9f4101b138d8a60f6f3b4
SHA1fdf4e54b6c87d74bc2a55f92507eac45ed20789d
SHA2561838bf0dddde914fe542b7ce75af1159a2992239c0316e7bb9f89e20d6ded668
SHA5128f4c7da612870e6072bf889f59d5268cdbc74fd3d99e8d87d454c5ab3a35d918e794b80ae920addb0cf29d02e457d6b913bcca10e1aed9b0eaba725b14425ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c12fd10d1a12c369f88d983db3eaa03
SHA118d01cf2a164a3daf6521a347fd801467c626c75
SHA2560b0409d662ee84651db7043cc8ebc2c8ffcd9ebb9b57f6999540418be26e5ccc
SHA512804ef8067c6b16718e072a6835aaa0fe10707cd287b89396f708be2c387f2541dd7ed33e019b825e58d6c060c7e4e3355b16c455e6e86c23b0eb6a43ca73fe61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb3ca4148efcd474d18d1b32e978f14
SHA1c0e1a69660db081293f51d92e1d9ae68886fbc2a
SHA2566a80a8c472056d92ff0faa165acc9efef9e09e62207b4b27b2a60eddea488dd5
SHA5120a82fb01304b30f6580aaf886b06b83fd41114665d169effa6c53412351f7e3dfb7e108ee29be70de675ffadbd76839dd99d85cc04bfbf82cd0c93916f0a1628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5410c5137f8e07199566597890aeccd28
SHA1bf8ff0d21f5c969e18c8becb5970d0d483708b32
SHA256b79099c8191e3b0af9b024091d2dc2cace2b1011e9e8fee9874f03a8abc936c9
SHA51247a901deccc601e28e1b4a831bcb1f323b3c954989420f69065366928ab117d5c0db5837e8033874c68ac75a446aa7ce9b2697241dc88ab13cc810db55df7355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b30e27beaa756fe3f983fb6c79de18
SHA192a2a1af8b88cb5f0a7ea57c6f262232a2d35efd
SHA256490a008eac86c8fcaa7d1ba5e08d66cd954166b48141a4df37c03955bc3e792d
SHA5125cc6e0af71e5818fa34c920022717e031a8cd371152eba5ed65db74b6cf49f93a7df170c8c9b70d0329ff276f72a58661022c9c3687e76d818dc0655d7c92f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81d881b1c5f0dc7f6875d583e8df282
SHA18390b52a82c702f8158ec1d547a5f0c25c2c7a5b
SHA25654b59b1612fef66212bf4c31654dc1a20c2ba43bde51420ec33ebe2bcfee20a1
SHA51271dcf715e39f20f01143f984d85ad144a723e2f0321e0c5bf1e0568480fb61953501df2548a2f21afce8e3bab748688419a04e313f4723821a12987f2f11c756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cf7fa1276af0197da21636157de8705
SHA13a2caddc0365045a21c5d837d5fe84cbc62d5cf4
SHA256abefc6057d716c6cec601bc06f7ccbbf010d941fbf2b84a6cd295fc93442c235
SHA5123f38c2632857cc52166739a896b208c275eb06afc630851ce28408b3abbdc9485971b87a8a0d1491b480d9839a583c993da3586fd89aaa34e3d240a9b268931c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a