Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
6eafa756bf74e7fd32649522dee6fa34_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6eafa756bf74e7fd32649522dee6fa34_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6eafa756bf74e7fd32649522dee6fa34_JaffaCakes118.html
-
Size
66KB
-
MD5
6eafa756bf74e7fd32649522dee6fa34
-
SHA1
2b6e4fc25b5214df139b41cbdb9891d8c9c05da3
-
SHA256
0c7b2dcda331fae5bb06290265f50ad8dc670ef8348388c38fae1103fc39ab87
-
SHA512
cbf8310f92f31a28f4991a7c9f1349c8a19946093584eac81d5d4bea9a58a54daec71a69e209b8c69bef17a6cec0025d303539b10f7e525960fc7c7a9e312315
-
SSDEEP
1536:L6FlvFih55I4DV+cU+ip90K1o49EMYoCcn3XYuMPy1U3Q3wRcTa5cdM1nHp5Q4sv:glvFih/I4DV+cM0QoxMbSz6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422719489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e036822adfadda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CA4C2C1-19D2-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002d742c3a3c1fd80fcd04ded55f7acd71b8479d9af81eb9fbc30bde4b2d1cc5c8000000000e8000000002000020000000eba98f0b1f446dd32ebd7312475250b31073ed2fad506ccd570c6921c3d7f31b2000000054e84499731fa8122772cfbd9f3b42c95bc182a91d33ce5fe6d1bbc5af64233540000000547238bec43b44dfe3f422f7a9417be3466ac0c751d482c6e16846004022da55d81357f9bdae2febd88450c0b69bbb802bb23367aaeb023050ed872ef73ce9b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2064 2364 iexplore.exe 28 PID 2364 wrote to memory of 2064 2364 iexplore.exe 28 PID 2364 wrote to memory of 2064 2364 iexplore.exe 28 PID 2364 wrote to memory of 2064 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6eafa756bf74e7fd32649522dee6fa34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e18c4b00eb62f8ac3782c84a3856d0b
SHA13e0fd9f678b6cf0d891f06b4329e44fbb609f38f
SHA256d43bbf30148e2c7a98c7496b3e45d3a6c050a986b8b852c81a734ac158829072
SHA5121aec2638b88e91273f6770981ba631f3485f92c34cf3eb8d3b13163da12b75305dca4811daf40a22fba1aab17c900cf021d93c49811de219183b0d5d9bf163ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514be3371fff3565fe7eb85e1e01b3ecc
SHA17fec11249dcef7fe81c19c194f3828037ac9cabf
SHA25683ff660b30c70dbca3b832b5c8abcf82f9f6061b5e116824b62673b09de0cd4c
SHA5128cb1d4d5dfb68fab3825520364efb31557a12b91278963dbeac7e9fa49214d940576397c2384676cd0c6bfd6dc225b0edb7597b5b3de7ca1a0519483f9c9564f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffbc23439c6c39d1a89534da4f2944a
SHA1ccdd271a49f054e3ba420cf7c387fb64b85af9f6
SHA256dddaa8697fbf29cd2ff4dedd0aed46d052cc8520d225028574f21d1a55a25ecc
SHA5120115681bbf7a592fc8b9300153b12543cafbea30427a5922b6b1cf6701ce2239dc606c109bde2a573e29100722a8f6c5bc34f3b222a7b7a3397a50af0bfee724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59396550e1d2b587b8c4a52547c8828a8
SHA130bf9bb29d8011810116658c0b1029e318298414
SHA256b7f3603ba117fee4f29795d8ee0924be2ffd7954ef6a407b58a7a4be3ca28433
SHA512bf9e545b2e95a9bbac9d34170bda416dd2b77a54d3357cc4995917217ccbe0eceed344eec20d23ff0f558749bbc776dcdb0bb143e2d655c733015c8672a4fc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba71787ed1b3e907b66ca99cb0f3e230
SHA16fd599940a5bbf91275e76eaa15f9b77f6a4b4e2
SHA256cc881dd7d9bf37123096cf935a6d85e38eb5e0465c601a0e3cb67bb8a16da205
SHA512e6c982795f06c04295f081a338ec9478aa802929519b208cab26fb3adbc3efc385198e93f2153601ef0be7919e0444f94da40a2c9ce04e8a3434e1cbedcf11e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559255dc013c922002d4047e0010585aa
SHA1fb6ee8d520a9d2547dcedf250eb3a400eece7b21
SHA2566c1759055c8cf0145ea6a1a2a5cafcbb9b43aaeb6449f7a55f8034e087d789ea
SHA5124ec00c09f79d2c95d34749683eab67f12a3ceaafb1dc5b0529f4dca3d15512665bad0f45f364db918b407d8bbb7047674ad55866ec7aa326f54e0816e5cf114e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d5a28485a4cd0e652d94d98da30d9e1
SHA1cc7654d6f652d62dfcac4aa5dd970835d8536f38
SHA2560740ab984b0ca72d140c8bb3752cf1abbb76770e81701d4754dc4cf88d0ab712
SHA5129381c1817fc7f516168e286699329c8d15570192a0d87b76fe9fc4a81443d33c151e9a8b70d1ce9d9f9e18894a0eab180ab0836df8f27281e1880331d8c6e16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900e9546154ad437814e51fd68acda75
SHA1f781848b179000675127c07a361d9e7a58aabd74
SHA256b94b805828d378812613a4028de181ebe3e2c17f6a4711274a113572ba2baf1a
SHA5125075c80788e0d73349bcf0108caf8f195ef4aed941d1ebbe01b3d62d248340b182c341d242fd19ff0bb0abb63f01ec2a22c837e66b78a1bc08cf5192f24959cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55812a538321768c195ced79dd6ee1f9f
SHA11d659879bb764d292845720addc574890696e61f
SHA256efc1cc17784f4caa13d09e0832cd23fa72e66d871a90cc5b3c9c070afff23089
SHA512b9d7a06360399d9a72e9959978872e360b62d1d8e3165ec61840d5cafb194f7941fe9a7517cfab4d3010a55db6365b727bbc10b646c7353db1b5f39598286ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e614fde4fba0bb6cf8a04018e058bf56
SHA1beb4d65ddd2e69d030dad5dd822ff6b1703c5d10
SHA25614c87f882174236f03d82787aa32264a6d52c3bf01078cde8eeb5041e88ca59a
SHA51214b29a0314fe9218f4a56c883d388df0859107b0dda23e3e8799bb62558535bcf62526ab7624fe2f177f9969b913a6ff0ca59feaf21847cb5ef34502de7455a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f250406892f8d2f5b6a4de7a718ff8fb
SHA1f09773e3d2fdb3341c74da528efa7b398793a047
SHA256f6eb490782d749053f473d91f6abc0c03c6d4a017b1b2196ef0b684577d93b02
SHA512aa730127dff2cdefeb0a7dcdf10914eb0b64caf1e61b5f58a586034577023bed8946ffa7db68da0471b3d26e3ecfc94d29c8f3132fb7231a41a91d8011c04560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582e5b529fbfc4d5fb9178d8376aa4fb9
SHA1e9ac14fd4ac3ac1c59a428150a0ee52ab46e0f17
SHA256281505e2e7e1660d5c0c5d7eadc5e7e7216a58b2205d6b75b38fa398e6c7bcd7
SHA512732821f707bdfdd6578df3b224abc2daca1923fdba252c8e38e05d485448ebaa692bcb90cd3c984d2a3f1751b00c33346c427fa3bb46360a80362c3b8ade6df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511d2d7c0c033af0581087065438912b5
SHA10da60779a8b19c0da78836f64d3c267126ee80c5
SHA256a4a810d4d21eec0dcfe6690c5c4c7ef3707d0948bb0d614500188b6565820cfe
SHA51249742349b6f8dec546efd80ca8616d45d9cdbb8387bc417e2aea6ca63ebb89dffa5e123acd95801f95f8617ad1ecd5fe13007126721d8722a7da97b170338e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c8afe11e049ea82c14f42868e16508
SHA1ad28c245f51284e2ef73a825b0c227bfefd33a11
SHA2563eac63b25da68df4810307447ff77498c2e95071b67340a8689c40abf46f0a48
SHA5127e50c8a447d9eb01a5f709667595b2c43d4926a9dacbcd0b01f3fc26639252a4cfc08632519a98ac715ce4721c5aa3b1cc6d2bc4c38c2e1a3ead68d6a68df32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf07527742d40bdc469f9b0971797cbd
SHA18c2e27c2aed6e8f37223a5d8770c0e82dca04e05
SHA256132088c9594d77e98f93bc0baeff6c6dbfca7bb333553963a3272a7ff376d804
SHA512846b6480a5ae00457e6a441f440043dfac508e453a74a63f675d4fd23999e04f444fe2911da923f423d5f0f78eef8705c0765ea19f450704c612eb0d9d1f7519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a0bc994ae5e7e02848a65cec539b848
SHA1ac81e26e58ef716aa429292d3d406f58c13a3bcb
SHA25687f050918258fcd413950c3eb5a8605a90ff0b3b021ce0ee533d05fffb3c8d08
SHA512297e08dfe60d572ba4f65ada6ea25df9e92b6b65947e8ca9ae11feff457a3377ae12cc57c506bc6eeee188176560a3fbc5b86dbd6316ed85684f1cf4c683346f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f18a86d1148e991ecbc43d47edb92f3
SHA17d2648bc66e7e30ddfe3bc3594ad61c3a00da939
SHA2565abd76744cb6b7adc1868c9d1a6b601c27e702f71cc929038238426816a59c01
SHA5128e314d44229d034b21ab1f8e5910e4ce4514d0abb7d3d1c64eb17f84dceec797b14c0e2b2b8310aa9f3bc068666d89edd7c532c348b2b9d5f6377cad559c2ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2408b020b149945464e91edaf3510f
SHA1af78477a1233be032e4079a713ae4d72fc5cb1e3
SHA2566cf566a08b122f77a3730f07f9313e789fb0c6aa1052d8d3ee10460304ad14f7
SHA512446994014fa31ec1da5e78d66b2d801575ff77d3ca9f1a5c3a528be9882af4f82dabc948f2b19ef5869ad0da5f20d88fc090541b527887a00f33e7c4cc08ca33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c5fe877442065fb4718d2df17383ec
SHA1607434362ee7e9c0ba7816c4db1af9b28f8d6b55
SHA25606b201adb12e4ccb1114da7d954fa1f46189e0791ea0902e0dc50e792bef84da
SHA5123d0fc91a9930f17e2d96b737be5721c7c0e8e31727f204a0c421e26874ce35a70b28658bcc70687649a5ec59af551ba3f3581b870680497264446a38a299647d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a