Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
6dff5eeed4de426d20b80de3b4598b46_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6dff5eeed4de426d20b80de3b4598b46_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6dff5eeed4de426d20b80de3b4598b46_JaffaCakes118.html
-
Size
4KB
-
MD5
6dff5eeed4de426d20b80de3b4598b46
-
SHA1
e0cdf1eef9dc7456238bb0d7b9dac7730bb31d26
-
SHA256
9d18910ad2d18b9e965c339f253389dec6f90e0762f86c2b04f0edbb53261182
-
SHA512
6240bcb4eeb33c92ff1437c48d39ede67890f618f639aa7563b2b703c7feba392d3dfa4e41fd2ed48e1da04b38a711a415947cab79339900c2bc003b11ffe0d7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oVCF5TKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606f4c2cbaadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B1E681-19AD-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422703648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b41845193b92a4a9f5ed8ad5aa34e42000000000200000000001066000000010000200000000c3ac5ddedd08f130c3a62e68f0c9780627ec660c896ef6367fe7fe8eaa63f4c000000000e8000000002000020000000acd840992fce1b7618e380529057c7edcc18d5f694273b9c2f435850faf44af120000000cfc5072ac853e733a86b730121c2f5aed917cd5a63d46c4a8d8dd7abf2bab638400000003cf4bd933206f2d6b0e1b4d01bebefcb817de929abf2b038027efebdcc144ce733cf953af566489931e01140936b847a90bc98525e02f6bc223bb9553d46966d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28 PID 1728 wrote to memory of 2548 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6dff5eeed4de426d20b80de3b4598b46_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ded94dd67de3b0c5240df848c079f5
SHA1a93209c759700c7bfee47db12abb419833108ba1
SHA256f320c2b3e92221a3390c565b4adf1cc6beb161bb1430cda24ba844836608967f
SHA512854c36283b3896b49f11173906424611085b605e6477bec590f851c5091c2ec1cd7397cd480deae57f2eebd98d33485e7e5e723c654871165bf4aea34c0cc835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aea269e1a53c561b76eb46ad52b8d5e
SHA18b018c9406665b44254c7071195ad70cad4332d7
SHA2564788833e8b20b81b985df6b2fb683da7285016664b0db980a80bfc68953dd4c3
SHA512d5d6340a65b3b0cc6674b9d5e1f9f8443194a6bd66e729f3a336df7c418259ce601e92d40f0d994aabc07289264174faaa356c7fd1ff8e112971e6b359794a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6629a70c39f359f8dbae5e9d7168d8e
SHA1281bb1bdaf61b22ab3382989b699cebf452b5e34
SHA256c8f8e804f8531e226914db7e7d7d28ac60a589750981eb9516998dabd533938b
SHA5122e16cbcb77a3a9efc9012435829fa2faed4f6b8ef3470ba72f540d8a56052ab2d5f0eafac8869166005fd31cf42459d865c6b50e2b257699ef2d9ce568df39f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545df5d21a98a66efbd6e47241f8053c5
SHA12196979fc390fca372ff9e67327cbedb62f6e19d
SHA256ee03cc4b97e488c3e6de4c7c3623aadb7ffcd2523c72680921e5de31aa33ba06
SHA512571ca94f21409151374f28f92a32293e4c20203e2946fea453164d7aaf518c9e10c08e27a36ab3d75297d8c25b5e8fd2e1c03019db5b14ea741c7b0c0078fd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59346bd60e81f3f77bf12665173647297
SHA15aec863eccdad20997dfac874fce00e57c6eade2
SHA256c79dfe4fa46d45869d23c0bf464f92f1c8a4d34c1ccc23f7ec9a1a1d14481a87
SHA512f56ffbcdf9eda0eef0daa219c58fab109e7bc609fff8f2a8727519ac20160cc80593dbbb308f6f11926d83c88f2da5420f9c736b43833a33a2c226099723655f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852ccea2ece41692482139b5e7c66733
SHA1075dbd32809862bf6188ce597d580f36fc002232
SHA2561f6a8cc17be7fc155ce5c2f27570e3c5b645194d68be228502428bb006b2f694
SHA5128f0ffd2c7c2bb4754540eaebbfb4247a526d4754e1adf92a185959ab2a93e0984a998f3155873facab66fc7c25526f6875d6d11a0ba7824bf642b0e7654af671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a26a39a28ce8979e25b2d88143817f7
SHA1b85b9a3e756ac2e271bf6b5410f4651cbb3e910f
SHA256285dd188b65285915396400f355143e569a290e2f8adafb13119085263847e4a
SHA512458dd616f4f7cc5fa1e4ffe089cee45ba9e6ec3a4e9fb6385b9d0f72d717f94187980f0a27c8b73b7c54b81dfff7f884a4cff3c3e19eee22d431302ec27cd3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef6cd8a6454974e08de467224e59456
SHA1fdea1e2a5f5ed9db784784156950bdeaf0ea8ad9
SHA2569874c2e2e370c3acc07170310ad7a02c0e190f8271becdec17c59a02b27b938a
SHA512cab86caf59610d021c9bf70ee70e030a0922bdf79538b7df3f68e873b79c3bad1d3f0dc9c91662b49d9471774545240bb7147df83fc7cf58a095612b70fd994b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54242a90be89e201816302b338b0df9d3
SHA1f353066cd1223457182678836bcf1fa8cc25f57e
SHA256741f050d13ff2b96375f968c61796f7d051f184821214004ba1a0e4e26af8826
SHA5127f5a0e293cd6626d00ad36118685def2b3d6a0cf35b56c05e200319e53e4034ac22262be5c49f30e5894f2aeb1a1844659225c0e0ac7aa9a7307c0c7d10a346d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f703b94dd845f9a29d256a6b5a24d033
SHA17917d01925f52c7709ba2d6f4fafc1920ec015c7
SHA256f788b8cbff6a3112461b1bae2751067e561decf332e896f7eed88712ed8f7c46
SHA51296e570b093583159848a3405113e51ef228a421b8331e868ba42b7bec3505f8fd0e16e6290f0990bd724a4fd3ff4f5462221d5aed1496db445d6c7698c241eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea4e1e181ba0a38b5d40559650a8f39d
SHA105551878c9b2ae1d12a9a6e067d2dc57ea7ce625
SHA2569230ae5d8d55181b834df9bdccb00ee5eff6f0c869a2951f135b2d9cc28f5493
SHA512cdd8bd03189a0a6879b5da7e1a368879a57bd7751029b0ed35f6f5319f7966f4610aed63fca33da5852873166289cd72059c316c5c8306bd35460b10e27c8005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fd4510967cd53e98c0d8872d5511cb2
SHA161043c608b28f8c404f632949c8fa56183e2b9f6
SHA2563d2b184a0f934aaddd51db1896532fa01e60cda3fcade4575f4ce77fc6452491
SHA512a1c64d1847ff1b71bfff83caf74c2b03d54f6d68c4d576f3ee6706dc39c82e6510d785249c5a232c46fba1483d02a66f7c2d61574f0e625ac546d30230505078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531782531b112f3c15cbe010025148f8e
SHA11b2f916a18f05996bf1bfe10acabe285dcff999a
SHA2564b6edd74539c154feb635baf6d68719580673e50518f8714b636fdd0abb06d24
SHA51239b0b686a9e0487ff865f5ef1c0d120d71ecabf905aeccabf32986766e3b285c805e2d08dfc9f4f2c909a3326109fad0d070114d0407cabb3bcf3309b7a9e5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535a02029ef707293e950b1c170ba4c5c
SHA11f5db895f0c100da8aaf81a412aca79602df3a31
SHA25642c77732b71f0bd2526fa036d3c9de3dbddf283f09c5dcc0a9cfd4b134add802
SHA512a2b76b6de81d28c35bbed367e822fc40301be55f9e3d3dc9ea24365e712342809bd5c76df549d75418931b61f239d2ca58f435aecca78aa9472c015f146cb447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8f06f4d4289da69471a830ce151a353
SHA1927cc34ec67d0084598f458ced610dc8f769dba2
SHA256958397bf13f8a2412f82d8ea6f47a88a1b874c5e596bb051c6a5f5f794380593
SHA51220021c2b9dbead67a54c27f52497fb1049bbfed8c366ddf91e84c1b7fe6c8d4c86b7d0ea590ec553f4ccffb033b33f94c8f457d3553d50f89872478dc225934f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581486e6fc3b334ef8d463baeb26d4d26
SHA1f00aad06078d055e3c4b6de1fd2a23e144734958
SHA256abc33a685e8697f5c6f32fac1b55442389a23e723b1bf301d437c24db407b2a1
SHA5121e7762c2bace1ed346cc2d7afc89c0c14677e42a599f1a96a94362935765c1c487324e1bc4942b9798d627f1dabcc84abfa25c266d37a132b27eb65fbe169920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b46b3d951d276681c03d8818d20438
SHA1f577795edec30e562bf1df20030f3a4002d1f8db
SHA256bf081ed7d72d1f92d20277cc42fea47c62538b85f2b8749839e4f4abd99e8958
SHA512e096e0332489ee28badee0130b749da5545e27e0250c47b7d63a10aa4001a6df30eb53066dbca4f183fc17f51f32a10ef65ac7f8d4c0f19b8f26cb102cb7749c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57100d288d01d3f6221cc1735486fd7ec
SHA125d11d97317ed9aad27b6721214a5f5c0bef7155
SHA256e4f1eb8df3d7897d0a813bb0095525b080688f2f6a826719410289df2ae5a42b
SHA5121bf0308de30b79ba52773baec1b1619fa903bd90b5121fb8b5bdedabb279d7b8bc69d720d1bb6ced8174759df5f4f67cc2527385351c1b4976ef4d2df627b521
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a