Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
6f41767eb5aec67d37c8fbe6a8404825_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f41767eb5aec67d37c8fbe6a8404825_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f41767eb5aec67d37c8fbe6a8404825_JaffaCakes118.html
-
Size
3KB
-
MD5
6f41767eb5aec67d37c8fbe6a8404825
-
SHA1
4d2b5b82436e3a6ab265e25d3cacd8f7135d3129
-
SHA256
8c2b7ecfe5d6217420810325c0c6c2036da19735fe49a2f07462dec5e5142951
-
SHA512
bfc239039849082c1e32482122cf3ce26748edf4939e878bc148fd309b429bc0854d430eb5cbe16a271d672fe746d5e8e0f9d409b46ab85e0b1d9837ef6f3bf6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422733014" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000469d501a76ee52c68d98814c1d3f765fc0b30b8bcaac8d006d5b23d361d293b0000000000e80000000020000200000009223fadd62676102831c1ba1e9806dd8e26b7acce004fdc9a86a605e6043701d20000000852c1e8914ff4f18141aab254a5d216cf8b596e4731902593957c71023df7655400000008d6040872dd3c8e7edf87bc531c730a028d5544fca0633423f0214d69e3d5f036f1b934775532b649cebee0ebc0cd85a94e1cd2ad3be991f38080c12f67cff24 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907dcb8efeadda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009b72c500bafa91f1bbf0e639140891cf5206c7fb51ae85d9629662b13cf5e687000000000e80000000020000200000005bdf3b50ebddbf990725f772e3284f2ed5669a1595f1bd0d19f992285e93a657900000001315459240c01e1b5e44b3bc738e325335bec13f7c1cf913bea7b149e775f4248719b766399327b17a22446269313a6136cd0802f53b52cbede344cf4927a9d0862bb998157e2a4f70bd3baa5df5130be80fc1327b06f65a926fba1bd03b7c5f255abb462cbd39ce164fca5306a2459954b714974455253c89bdc8fb946e9a62bd4a0e6654d5e0c3acaa07bb8b3ae0014000000090f704871be7a51599cf08041c678b40b771be7f919630757afb1a4c2515278648212d36d7c52045f69c59aed20aa8d63335e2fb0c200b0510a0de6d31f57b06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA281341-19F1-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1744 2128 iexplore.exe 28 PID 2128 wrote to memory of 1744 2128 iexplore.exe 28 PID 2128 wrote to memory of 1744 2128 iexplore.exe 28 PID 2128 wrote to memory of 1744 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f41767eb5aec67d37c8fbe6a8404825_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b980f5f3c78b6d3599186411afcdab0
SHA1fb846deae60c797ceafec53d83753c64b0adc0cc
SHA256993d07db37481bd93ea8687a04f187dd22144804024f611be8b81b7f836ab308
SHA5128cebb8dc18c25e7f7423faf71e530a85aae552643f00c01c295221f0cf69e2b04d2131f795daa0cfc1ef56342887400ad2bc926b6c80339cc91280a84db7e9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dcbd43bd1300f92bb9ef63c405dcee4
SHA14aea762c8abe102c5144315a29f9ec8ad8547c36
SHA256181989b784b3a813b7ac64943ba3852c6f12c10347362d3cac968b0f9b3a683b
SHA5121a686eee51ae38d010ba2802f342a0ea9cd60d3800d4ec7b46ff81310148897fc400529745c0259f3f17aaff138aad2798813d7bfa2fc3a5e5bccf67a02a314f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7735473cade9716c1cc4278dd46d90
SHA16e2703ab451177a256e30675467c6a7fa0a68306
SHA2561498d5d7ffba4eb0f5caa834f1d0bd16863172be82601d321f896dc4e84d916d
SHA5128c5983f6fa3175e00ab92d93b8731e9733044e06990310edeef5dfccc74bed883dfd3d7338950e69f4331faadd008774578482db8741a3cb5a3a90e761983293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c483f359ff5dbfa42197815e49ad66d5
SHA13d7cef65b2ccfe1f2e99937775bd647250281e39
SHA256678aeb40d43cc7715c954606c60659b879eef7ffa7db3cbcf78822daeb8dfdb6
SHA51219a0223d27de0481c53bee933db08affdb185285dddedac5b72fcd10e8f31d75516a3702a556377fa496c75634e49977f2eadeec27ef02e00367c3af243bc9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5be156c7e0a1e1a042330a47a3cd26
SHA115848eb06a50bfbd90fe96cd11e2dd41fc3612dc
SHA256d4a2bfc398e9a22d1f36aec817716f91e4b2df9c5626ca789829eef380ab1415
SHA5121178eb5a33aa18a63dea09ceaf60d22547d95c8978efb43209b9f413eae6bce5a89281d431706b71e075764ae81eebbc64ba54c25a668018ec18a549decbd5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4fc79c9a962be3dfcf749bc105086ad
SHA15dc685674c84a1954a8c9e10b268df858c806aea
SHA2566351dc8452be2ff3624d06d113499aa18eb35f14e412a83d09e3cf21858dc308
SHA5121f91363f6659ceb68ef3cbc1abd4ed4114c35b0f954a11ca53be2791a0e3ea02e00745aed620596c930254770e16b03638f56eddb698e6bacc6eff1743287cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e94ebcc271a2041e71c7e07fcee5eca
SHA19f038601f62311d86353997658d563da972694ca
SHA256986deab662c5b3b93bb8606cd691598b2572c462ab94daab459c15b1b0cee7de
SHA512f6b3afb0fd250b4be7aafcb1d7d1b4b721a3a48f4d2697a12e81bff2bd96dd68e3081851ec5afa95a4892108d7b41f46b46f1b45b1ea27ea4a248ea40df9c174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851cc6d36312449966b3c629f9b04f5c
SHA18d79f4d6da9ecf6466a05651f1603f66810934e0
SHA256b405df7b19c0e06c953fb16cf5268e1040be33623675b50b75f9c7c34ab00ffa
SHA512d35b210a3fdcc17ccdac29984d2cd1bd89645c20dcb2d2160ecedb3b6c216987f7bffcd4f7d30992d4f2c6abaf954a255c9be7ccdca019ee904ea2a992e26406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f202055b592dc9105e2f82020aab2f
SHA1b4ca18682b82722b4b845154379c3245a5371810
SHA25614cdc800921964c47e5778faee991d18de9b5195fb05e2642bf969507adbdd4a
SHA512b05cf14349ea3262d74e04230843efca1c002f7b6929630f48b4d56884fd72a4a9dd8bfbd10a747d93f5089c720b13c94e3648e568a87d1626307a66bf9b7ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d754d09fec60bbdf521c63a5fea3d6
SHA1e4f3a3f70b9d6a573fc2d0673c9b278bb1905f71
SHA256be75668605826e641e848e17ba0ec0d89a78b101241aef639a55c46018e525df
SHA5120d68a732b47513f37fb201f6f2e49e187b10dfa81df9496c384f4a3a6d50f7f0c3adca550953f6f44651aec15a5599ad901067d820d7ce469e264868c610bc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baabbb4c501e073171632943a7a1fd69
SHA1532b6829e272cd711c1bebeab71d468db182df45
SHA256d867cb9ddd730c4d2bd9312a83f0d10e8e75196e95cf52e95617c8c84dedd295
SHA5126f8245926c9bb9987e8f0d30132b4427b3f1dfe1a1781ec86f6ce803eee7ed2b083e06f3811fe1ee440ad25396991c4960dfb8ed5d297589841cd6051935b718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d91f2f3ad18deaf0dda4c37c16d58a
SHA1e3cf7b2809fd61d4a168543d20f62ae2fdfa5bfc
SHA256bf5f05c00d20675213e4135142d51349e906f0b7c8f32f0747ccaf252898f333
SHA512d7c6a746e74dcc5095766cba081eb22b5a5caf4c6ad53bb45a2ffff87829863981a0655f63cec0891999f6cd477aee3bd314a3db4490413834ecec979198b9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c9c244db0412b3745446dbe7d55309
SHA1020f01415a8e09d3757ff2ae514b1d61cbd2ead6
SHA2561d99fa4c823e3f0a84eda7ad8d997d56c02d740ab2771bed96f4c5bdbab04c9f
SHA5128185f38f49a4ee41f1de4375f1ee3d2cfbd22861e7aadd6acf2e686b60c9021ce78737bb17f0b7161b661cd449920b1882c851b1edc6635be0a29a8d980d27f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471647bd517cce361efae81710633277
SHA19ba2f0e7d6a9595655bc4f88ba0ac81c493b9fa7
SHA2569b35299a48c5cf16052e2c3158d8a04c0f4f6f68151175ed53977ecffb371044
SHA5122838c0e30f9c092a8caf2da845841fa7fc85645a921ab49b6ecc3132891be5aaf52068b73438e83f55064ae0d19ac54c9fc7bcee552cca60f58d8bc0d8281d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be15375cbd7be342df70f9f8e37bbb7
SHA12fed87b20e00ead1aa9f72db6d4a5ffdecbc8bad
SHA256883e75274d26d8c4cd0cd61fee64a15f64bedb6926fe1b1dcffe7d61dba71b80
SHA5123301bb544aa9481a45d8b0f3a60e1560cd2a6e5169cf306b1e11e5800432b19d42108f8f00db4e79c36c809a3ebf0b615242770dc80b832fe3290a770e907258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7da47c8d7d5f5e88abd23636f1a481
SHA1e1bf9693156a6abb8d678b3ae1c4e98301e3b8b1
SHA256473661420c2bd4220d63f40574c45e5a728649c93bd3d0f253dccd9776c26b64
SHA512807fe1aac825aa58c258289619808c115af8e28e64fa50efd633769ecaa90961c478de290a0b0ed2f39a1c29dc6010a619e408703fa386886bd6e3d93e7e9b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c7d7efc261db916e9deb4d8195f5300
SHA17adff3d9db4b1c536b521f43249f5fd65b8937c0
SHA256c7bb933649c406ef31c63adf4f04332e770e48841587f9ad9fa7bc88db055259
SHA5122b88930d9ebe6177f86a4ded0370d4f74fe05e13708d2da346d29023163d36898575201f0c7dea3e3d33cc2ba1cbce0fc18afe1526d2c349a3a82613c78414b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505641017d478c1f2ed9e6ccb5f4bf1b0
SHA1300826af12d514e9804fa8134dfd71e51dce8726
SHA2569d0a78d2afb767aaa53ef115928a878d8bf95ca3bf63fe633386759ccf9b07fc
SHA51226fc0283dc9cde66c62303b1df2fd22068d4c546dc476651c9a00725e0c521d8008e1dcd14cd9bfece0988dd528ce31ef3a8c276e47c4b9a87b3c566e670c1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5590e9252390654fb4f970231501135b7
SHA1ce44ca6d5c5a9d5def290b2efdd6f39caa4d59eb
SHA25614ef0f73e0e74e9bbfa59993d3e8df74fc7a37f2c225d2afec70646c22081304
SHA5127e1338f7c3b571f591aaabf6313185e8a987d6e014f4d6d10de8003dba82a95ee3fa0e91a7a1be7b4dd64645bec6929d6447afd26d1b154a80cf59e33b93e453
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a