Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
6e18a76b42e0d0a9baa7e604cbcb8f25_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6e18a76b42e0d0a9baa7e604cbcb8f25_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6e18a76b42e0d0a9baa7e604cbcb8f25_JaffaCakes118.html
-
Size
6KB
-
MD5
6e18a76b42e0d0a9baa7e604cbcb8f25
-
SHA1
c95d3fe134ad1bd15d715d5893f07a2db29ac8e2
-
SHA256
40a5657377363db80050da395b1db6607985068ff1d26a97da95b8de5e2057b2
-
SHA512
9a25e2253a2130ff778b7c166b08d3c703c54337b64e4b2f588e4c71103197519715f3ce70a9f3cb04a88ad87fbde4fe312073c67fb95e5c0db5303ae8f047ec
-
SSDEEP
96:qhM3sHfLTn+sqLO9fbUsmH51VlETYv5GPWhWJsXVBx:qhM32e5+UsmZ1MIGPWo0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f03f9a23a119fb8cfc3af0e45c75d4d0c76d02f09f728031fd9677352ad496fe000000000e80000000020000200000001aa67132214eaa4f2a9f67636fae038d5e82baca9224ea605f90f5db1226864420000000284f779158d892c7206b35516e104b9983edcfd57f6110c78de938f854641fe4400000003b731ba0e7840555733ee4a18a414ec209e5579d4c333cd884d29b55931f4b704fffb0520c066bd9fb780e6fa55a8b6eee65d19454b09051e7241a1d4b5b6545 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D064F0E1-19B2-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c027e3a4bfadda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422705993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1344 2236 iexplore.exe 28 PID 2236 wrote to memory of 1344 2236 iexplore.exe 28 PID 2236 wrote to memory of 1344 2236 iexplore.exe 28 PID 2236 wrote to memory of 1344 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6e18a76b42e0d0a9baa7e604cbcb8f25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b58fb0f542b629f271e1a06d70fa5ac1
SHA13e4cffbb191e92ef0e09462fe63f601520d1dd19
SHA2561d9ff4b596f01e08c5615a18caa856e1d9114ef23cf046e3feef15d2e6fcc023
SHA5128e9bf626f1beaed08a066f23b180bf63c69667a83d8e5c5e054d6001d05847b415b420ecbca6153615a2105870011c760367ab76bdeadc3a50bb76ebf8c6a8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514294e4e9e4bcacb6be328d944c4904d
SHA1f9d6d781606848273232282aaeb199df5f1c6da3
SHA25680875829672118d5d60af42881866b3851255029457008d07acb31e4fb089589
SHA5124099db1bc23045fcf0662fe20bc528c01323a584d435df4a97b4399dbf7b0aa9c197be9e621e87c79f9c72b87e097315280ac8925d7151ea5d0eef0e12a31073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e2a405d1e01f57a6eb343ce6e41215e
SHA191d04adaa83f22d273b94719ac0c98521c17caeb
SHA25635406a2abe7192990f737c3225bbb3562d265e002a4d21e25a1a433643d885ca
SHA5124aa922149e6dbe2447fa54518c688be3fa9582a6feb3c0054be37bead057bb2e1c60a121f3ad860c389a47a83064a2e5b670aa5bafdaa6a2ad7566a890443d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ce308f8f5eb6b74cd4794e238ceba9
SHA15e26a47eeaf4b78caee635dce5e160f3f9e07ec8
SHA256375d055778427c522bccd7a4850eab79d544f309a3d1ed97b36a92285e421741
SHA512d70836f32074ba1f83034ba0e35f40ac804f52a1bf83a4c9aab6be89c7c5a2989610b9cba1246cf4433c8e4d1db7d507ced72351f00cf9c5d63482d560f17512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520588b55defa8a6544bd9f20207d9807
SHA1bdc26e0f71f3df95c356ceecab22257852b67fb7
SHA25678043376dd2e96259b7aed9e0b99f33e91ce52e387a21a18e16865da38fa6ff1
SHA5121de6f62dee33e014386699d5bd321d4db88321aa45fd40b4979f448e78aabc451444963dcffc53362dc550854924217a8e672f06d146fa3cba4d8926460c1f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a817e76368e4b1b0fa90003211e66dcb
SHA1034ae5d8120d1f95d27c9d69d1449b5743b8f6b4
SHA256944db847d6d9afe0330fb8cff865f5dd79ff72b104024cedded4dac3013354fe
SHA512f9f10ab289f1f8cf4163f4b964d068613c2eafcaa655120443e4785bd78c05239332b0cd8ccdc2c11e15f3b69a2dfe67c6a6e447cc664b2df827d405918494ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe8862c6ec20ccb70a897f769045fb5
SHA144c181aaf4e0d6ef239173a763e7eb5cb30e8116
SHA256f5ab2eb77d7564c32e67cf56dfd8a8d927220d49ae6c9ca5dcd09e777c3909b2
SHA5129da9fa2095df2973b9a55b7e26be0ee1ed024308bcbb76dcd0a246c2473a4941887ce9019aa9d4c42c81eaa2bfa99077fcdc7f154f487b6113eb8f446736388c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493da7b57a39830651e86a2ff10ba846
SHA1068fcd777974e68c6e662e0046a4633b761a8be5
SHA256752db2b1fbb0b581a51284895220cbf814e37161cff2021c244da4dba59adc2e
SHA5126bd100e623a8481acd4f78102327ce27df4ac4b42b3e923d826ea8dd6124bcf4d93bf21b734f0027b1c5e1b20366ca0e9be50037ba9450ff6bfbfb687b2a4390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560f0e702d30d8b78696576a8ee86dd12
SHA1ad562b0029f21ca26285fae5e45e6f551b05a9f3
SHA256d58a58150e52e2aa4d86ed5becace0850fa93dee1e10f911977e187df3dd8a6f
SHA512a36560054ec0e9e666d62a77ea67f6775bb78218d381c672eee781d4e2000e9b6c7731007805c28df68becf3d146d31634fc34cf935eb6b5f241866822c308d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10653a9d870154d436352fb15369ab1
SHA14e82b06fe67ee750a42a02c7df9387e2d623d02c
SHA2568f5882de74f9c884a926a2cc30101fd096ead71588d4e4f34f391101ab9ff37f
SHA51282ca3162036822970704db1387805dd44c6d04d8b4cbd36bf9155648b75f1f8d0d99e168c9fd7e5827d34693940a16a146b71d522d7408374bbfc52d9235e3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59661e2a829b935450e095599647cc32b
SHA183615183f303925c4252f7ca00327571e29dfb1a
SHA2564781c708b7c477f2c767e0c16ead2892ed6d751d3f3d81ea8f317e61c136af39
SHA512918ef5f6e2b8f754266e504de07d0e9acfce55fb156c8b491191ecbe11f38314804f2e84e4b38e30d4a1400dd990c92629c177518978cdcfc5063bbfc0c92d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c3df7dbc7f3bee401d8c7ca7a11378
SHA1d32c1492dd3c7e01880c167e52815615fc1da37f
SHA25674043a8c0b40a49abf6b9e7271f90e77eab67ff5148b68e4ce9f248e044f31f3
SHA5126e929d76c3c8de1ed24dbc31aebb8e6e0a9a15d515b4ceefa5b4a7e560c245f687211544296d008dd4e80cd7d3d870b210c08c42eb0cb482702f99cce407a6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd4b2e1d297e23e80ee2dbf6fcb0f77
SHA1bcb83b3df14d000b24ae9ab6edb76136033b38bc
SHA256fe32f9b9344706e4f0b339dd2f01746e41bcabc5936ac3d38954eb3c6b865b22
SHA51235dc5c4624f34b964edb90455c6df6e5d3b4f0235dad7063e1e22be2ddfa1d8497c3e32338e1321771572843bcdef89aff826415caddaf4b4f603016c3d6c210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551e884174e46b7bdfeaa43077e2d0ae0
SHA18334bd8cf75faa5a3aa2976d36d5380b6db0fa02
SHA256f5b2274056351c7e134e67518c87886806ebcda6e5573dd865c75a1e0ca3208a
SHA512ea6ca852462c3db6c53262b8f9dbee29e625eef0276108dc3cde04deb1ed87b9b75843a56731195a6c3bfec2674e911099f13f5131a2a029b03966468fac91ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f72f0a8368ec42f4cf094c8dcf46dcb
SHA12b7f274b6c75ac9dccff17080c4a5266962977d6
SHA25662656d38fdd6a064e13b7901ebec4aa4178f4cc7d1ee882b3a9db3319a543c16
SHA51244d1a09aecf135ccac18217ee94499d09b23ba1132fa287be3699730b7d820522233cc5b74a1e5c279b74c14b27240730895297968910c11aaa415e63564ab8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59398e739f838a6d188f52d936cb637
SHA13835660762cd50ac72ecffdc8a7a66a656b8016d
SHA256f01aa9b6a11e27a0432bd1ebdd0cfee5c8378d4d68637103c6d1ba8037fc671d
SHA512850bfc842f985b899390da3dcdafa9eb14656e71f08a32c3b61089f2d3582ab33b0ddb68f74c63d7ca591331f0868b536fafb2c5d1127d37986a3a1205a2e873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ade0311cc2b8ad805e1a2e8ad74f8c4
SHA13a8d5b0d88ecad85f2d8acfb9d102cd41ee870e5
SHA256a11ac8bad440e302f96d93a04a4f3ae4b0dccdd45e75d62e02f7db529092dd68
SHA5124fec3bdffc457275e373f712a8a51a73b77747bcf2403868c5974655705b94c9eb91c6a1b0009337896e786cedbf25faa9f26ee502149ea1cfb0cd5177cc6d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512df326d5130fce5bb535d16ff031759
SHA1ff8276ad5d2edce12eac664f3664a72810ef5a26
SHA2569e8294caea7ca873a96afa6f95a1f3d3b639d23887abc227880a66d32670dddb
SHA5129a00762b0c4f293f1433b96ecdd9e2e525acbd9b12c6ad79fa7c3371184ce5955cb03743312a6c088a1b3f03e6725bafc85d66426d2c37ae82c7f21428c160af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407afe364750294fe1766bbe27d1b005
SHA18bb594f4f29de9dd63d3ad768f203e5ecda7df48
SHA25601ab5739e99cb94671f8527eacfd5951231c62cf84264b697040ee9a95c1e046
SHA5121c5e9db10cde95f6f7471dcc6e882e51d7e1f5376c494614fcd24aa324ab9914d4f0b21da02cc25f1fd6846bd34013fb3f02eee14dfc59e23bf077bb0793b23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59703f3020706f2190c67981982c822c9
SHA12313ece5590c9b51c412d30fe47cbd6e13892f91
SHA2569c0c9b1c5c89e850054780e5d808693985f45f6170ee1494acefd03e917271d6
SHA512c0aa8b69b0c9aa53b31df7e830d86412923cdfe4d27cd964f058777702deac37e6fb632071a09fde80605d29a74b31ad76fe59a40aca915517c85eabb2f9efa2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a