Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
6f12e15861020392fb453f41ab365ad1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6f12e15861020392fb453f41ab365ad1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6f12e15861020392fb453f41ab365ad1_JaffaCakes118.html
-
Size
855B
-
MD5
6f12e15861020392fb453f41ab365ad1
-
SHA1
4004f0c955e23b0cad0e67ec641e2a79025e8929
-
SHA256
60528dce3d3a04f9395f89159675acb6b96a84b029c42035f5ee172ccfb382e8
-
SHA512
dc5976af964e338463c927706f101474f36407969173051ee9b55312d1831a352c8b5239f1ad9edb6e625b1b41077b09eb7a0c5b46da5877c83f2319eddaa72a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000342109b5f62de74a94be7a5b7d2b574f000000000200000000001066000000010000200000005053d9cedc3f40876495bebff5439ac60f6c6dc20234b74f93b9dc38efd32c7f000000000e8000000002000020000000098d43de29d4f97a65c9732c58f416849c444b546438f30b86f2c990fc0448d02000000095df97bd4bce5d1becc626160713ee46deedfe12f39c2c062393df7e02c241634000000069fdbcce07edf29b3aa7a3263f3c7848188c5404efc103c523e74c32b7237567882231b87fcb85a1610742d31cfb56ace0fbd6e241263e60ce8bc7dc8e33d470 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700fae30f4adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422728592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D4411A1-19E7-11EF-8554-DE288D05BF47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2260 2036 iexplore.exe 28 PID 2036 wrote to memory of 2260 2036 iexplore.exe 28 PID 2036 wrote to memory of 2260 2036 iexplore.exe 28 PID 2036 wrote to memory of 2260 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f12e15861020392fb453f41ab365ad1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252d0428a6f7d92ffde46f1eb5f18973
SHA1ca1e881ba7160ddfbe98f3eda32a697860dd84cf
SHA25653e272c9bd10144bed40f933d7d5437d5cdca226d17adc0bdb21ab006e614db1
SHA5129491dd5c7b92a6e5e00940156b4ed840b93c94ab40774b8f5048f5500248368879678091ea58da5729ef6e739c11aaf56a7cd95320aca895e52f2c2d273c0de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59817d4a7bf68752da2fdebf949895729
SHA1f5996073c7a95cab54e17ee550f2b87ed96d4a05
SHA2566002fbf7155f78758259674e1c50a27ee32a5462eb5344a14a5bf925a627eb98
SHA5125fc831aea81457ca9faac40ae799fe511dbc33678395d9633cbd65fe0d65636e8ba91352c93cf7f570b4b89768a10bf660e70f15636dab379a764f8aeb0925ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8c4271d2285dacac91e61041224167
SHA130f079ed500c9263aaf23e743f0e8a9cf99d954b
SHA25605f45ace96aac01e236c6c22003f75f417a700aae83246ad07ab99bcea1c9f9d
SHA51235f3c535265bf19162a6d640738cb4512c5b640ffe300936230b28ea5113de6ae8099dbda08e4a738eecba42c6a074304a4f28e25306762d766315e4c74369d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ef4e09d1efb8fc159a1357b77eefc1
SHA185cc08b48a063628696f7e5e6fd5c57846ce9816
SHA256393725a50ee1c872bcd7720867b938c735b9caa03ae0ae42fac7eada599cd25e
SHA512b9e0aa811eda3ede5c8f2417acb39556babfdb05470809fab4a8353f4379cea43e4233e6c1469efe8002ca7ce5764a3fc8aaabaa8f0045d40fb129f7539fbd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05e2104d1c95935b000f39c8f5175bd
SHA1bf39f70e5612cde7ab8bb68ba60c6a3c472d1960
SHA256dc533db70853977413ed55b56ad094b01407fd4c4f312b7ccf306f1aa8b03c9a
SHA512a3df17d07842e2efed09f6458efcb852ad0e8c5fe72c401654b86e82a55164d7fb34bbe32dba26bb805464e829196bf087324f0cf249cdef000c48f5313465af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a14591cf5c0054d4b0849c0e24e0b55
SHA1d8b880e613ba060dafb888de19d9bdb1296d41ae
SHA2566a2cbdf8dfc83e34fbe1d824d16312ed4a89c182391d4c63f396fdd031266b06
SHA51220f555acb907a3bcfc45f3a3a8c54eb1ebd2eac1b35a9471b67693388b8281814252de9916d803f4dd5d2df5938a3890e33a5d90afa0a7e06dd95e3c3bb4b472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754bda52eaf1724a575d0f543f4e3883
SHA122db3857b6ba761d8a3121d7b1e450ed0e600aec
SHA256e09ac01900946765201d1c6800e63c405081ca6f3561b00f70bda81902aa876d
SHA5120a60cec4f29b0bef6f35ec2815f203c1ab34fc38190047e5dcb5d1d2c54d5aac93284b8dc64b65779c2568fda9701315570976e788d68e7d087841d82b5d3765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a01a01215a6a9073f87f8840c61787fb
SHA1f518e545d7e9d3fbe82b4c46268a122f71ab551d
SHA2565450ce26008f70a989822f809d3237931581d07763a2a1fa4df8e51a2c950168
SHA51217aa4be2b0cc58dcc7e92fa6ab65b421ef22b77425ae6156d28553d3b05b2cdd2ba9f7373128f84538b4be8fb7dd635e73953e9e4500d84919d67fcc2a6f3283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523f5dabde0e0cb94a0d7d0d0a65bc13c
SHA132074dca21d56b828d761cdc804b2a46daf01771
SHA256d204e12821c778a0f938ad21248055d9f6fcbca9a579a26ac29111d1dd2e7b1a
SHA512aa1c798560e1c1c196535a6cbf827635b1158c03dd9d42a209f36d5ddef3411a7481eafed1dce7c449210866286f7c649fff3f2bc702c2fd0dd6804d5022fb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d12f70954b1bf2f9f5fc7f213959a9
SHA1bda995916b4d25a27d9261c4efb342a4e0dccc83
SHA256a1001c35335064112b49b98dd1ebf8b6dd2b0d7722039e445f19fda6209a8cd8
SHA5129a9946a1a57de696295005d55d4129f2c35d75b8076706645da316736c1ffaa867d861038f3d60e3a0f7491daab8fbfbdb2bded218edee41486e1e6f4181d412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afc6c375413d512a026a6640bc224e35
SHA1e58078fa758914e4d8da1f1e2c3b67eb1676d0d7
SHA2566cfa192a7bd33bf5cf3345cf8d31b4a749ad678e95565452a59823ada725a596
SHA5126ab9e461d3bd0d5b6689cf268b5ed84439aa2d7f54ef95612e6b61af957319e872440c93a5d769a78b16275c415916ae595b4443380386fcfd01141c4ded95b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59720d8d48bec6b21fc67e88f09bb3318
SHA11ce60ca8177e01aacadb3351d0e353977263f00c
SHA2564f171ffa88579e751fdc659b4cc32b62512fba223d014e4891b508698149d141
SHA51281668e651ffee473288f5d96a4abcdaf86480cdda6ed538cb50a87db454b7bd29fa1c4bd10e886f0d986a941ee985677338ddc12bac9113feeb07d789f95605b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d1e4c8c20f63dc09adb34955fdd5d9
SHA17d5e2deffc26904292932bc8ad7786a2b1f1559c
SHA2564dee75a8a8a9c88dbc9bfa5eda37a5014db5fdbbe36ede99b6c3c0fc7ed3133c
SHA512f1fc164b6182eecff0395c02bd9c3cc8945bbe71c29c48b3ac01e50cbe11b5e7cc674319ca23148143747b9ca83cd77c325b541320629dc193db4ed52c893774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec655d5a610aa83b6ea2b97c015673d
SHA1eef8c0f08730be404de98156bb6dbbe50dc1c6da
SHA256d4460ad6de89debf9a979f1f69f922188064aa3ac79a43aedd4d2cec832723c4
SHA512abafc4297dd6b3f78f33115193f5e757e6b78aab90947b783c6ea99c0c1530a0386d61645673048dc25ddaf7d59b304964a062715efd83f87d43c06185d80e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb334c7f3034e2549f81e2100ce9c656
SHA1b81648e9ea57fa1905a1b700f274cbf98ad006c2
SHA2561366d5777bb581c9e42607f75ed6c4fb21ae34ae270cc084f32980f45c8c2e5e
SHA512ee20a606cd5ccb223eea780a2acf943f02bb0ddfe946562e7f2ea685461a0485b15a0eb33c031a6cfdde73229a731a01c89ce0c50dd9b47f5e9d3c8920da43af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51959b057920aa65fb3d515386bd74140
SHA1311eee6747df5be71ef15e9667fd147618abd5dd
SHA2566613e2e7bc1f171dec49fe83fe120b1f61680817897842cab2e894a5b2475e61
SHA512f4ee7d681fe5fab6d0fc177950d999da3f788a88df58d4026e83954f5d4dfcf0686c2eb04583da41b9d2c23399090585a930322f0356cd2f17e595e64ee8c780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9fde9cd58e1bb717948b9e821135c2
SHA160319e6a9419536070f2593a09072def91783bbe
SHA2565f70fe65c2d51a71a124811642e0060a85d22f9680a9b7b1e0dc1b649bb81737
SHA512b88c20e18804ec5f45e21afabef9045834f2d8bf4147f55ad0c3796a5891a5f72622cd96b64e7d6ed8ee01919c146e0fdf2ecab8c9cb7fc3abb02c12aab78e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e04e66c45b341ca6eb4f8d3046ce3ea
SHA1d5aaf3e821f55a25bec8721cb7df3ea7e3afe573
SHA2568f5eb2fcc7a7606a189eb72181bda55691d7cbb9d897104a064988e5d39a9210
SHA512461c46f604baba0fbb12c154b65f640e3826f6111fc5109c0fda0d55f12ee2ab22a972588c77f226dd43fc140878ed86ec65a96f664efa6271ca4442d5c7b8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec358e83705837f48f21862d2f6fbd59
SHA14929c2a71110b6d33623da72a6a96305968bed4d
SHA256b6adac7da70bd0af71de165808395e10f1a0542b0b3ae6bc1db45da187f486ab
SHA512db0dc33ab588f2e60cffef907e7e99b7bc60bdce1a38ffdc001f3da436cb6b2d55a9f24d8e220dfbaa2ebb16beb861cbbacea7d7de4bffb84dedbd1fd95bc199
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a