Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
6f74e1c99f4ab55d215c6a6ebab40a8a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f74e1c99f4ab55d215c6a6ebab40a8a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6f74e1c99f4ab55d215c6a6ebab40a8a_JaffaCakes118.html
-
Size
64KB
-
MD5
6f74e1c99f4ab55d215c6a6ebab40a8a
-
SHA1
e801355b516bd6c0b0d23949e73fa804bbefd2c9
-
SHA256
5f05e0f10358e75ff795ec93884e73d7b75931eb04a82910badc4134a121a945
-
SHA512
4c9583bc8e95b5fab83c2789eb12d1e7b1ec57ca05ed803f993134618f54423c6b1d29c4e6f8350f6bcad63135868d29163097a23c19a40b859ce3f158ecfaa9
-
SSDEEP
384:CYinJORnRm6pQUTeZTkCHM2eVZp5hnNHrlinxT7IE1tPTvSCHITkCiAZSV9E1P:CYinJwWUTerLCH1P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac43c02eb776f540b8882163ae740a1b000000000200000000001066000000010000200000008bc24ce3431d5d8dac1ee8776f9c3f6c4626015872c8a8238cd622a3cfbaada1000000000e8000000002000020000000dcc43c19749e3c7f8c9a1d9b60003b427d65f7d13b15b058fef07e483e24b82f20000000685f708723c94d553816a56071e73a72d0f23f7aeab6fd8290523d695a9f757c40000000c2234cc39a505519bbc9d628aa3fc4d2c7d794e47437e7c8a53985d1dfb8264844d370ceb05afdf09a7acf6029a880078764dc84c84bcc1952d93eb3909cff9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422737603" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68CE1CF1-19FC-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a4444009aeda01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2484 2476 iexplore.exe 28 PID 2476 wrote to memory of 2484 2476 iexplore.exe 28 PID 2476 wrote to memory of 2484 2476 iexplore.exe 28 PID 2476 wrote to memory of 2484 2476 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f74e1c99f4ab55d215c6a6ebab40a8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c0bfe899364b81c5597edd9dcde199
SHA11582087eb1c85925d980b6f3df2f3b712ccb2100
SHA25659ccf7fb8096406b99461ee2b8ec4e9fe55fd0250bd99af39941cbbcb1d7092e
SHA5126fa6ae11e388bd24364f3004375dbc552a0fa803fd49fca03dcddf59475e209a8163133b8a22eac593de371f00c3e66d6d9349ad87ed4feaf638735ce9feeff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259bf358c8b4a17160ee03332b2c82ee
SHA1da3a711c8c95ded5e8b86d2a621a90d75b06bd0d
SHA25605773e18497505cf03f0cfe64fac29d22884762b95d5296571a053b018af44f7
SHA512c01dafc90c066ed68756ddf34a15a531b6d89867a74c7421cfbc82a9d1651f328c05dddc716d08f357f2bb3009590cbe8106e9d59f56cc150302f7d40c9d573b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a541c56207fb61a8eb3fb731ba6b64
SHA1f9265cdcaea3464c0d42cdf09bbc25c1f76d3b72
SHA2567f77fcc3e9c1e2d5df16a2c168102df85c0a7efdb4792ca66c35f339565037be
SHA5120dd2ecd6cfa1ad9b139944c13aa9cae150df7fc8025a9fa1511b961ba8a6000ff5989f670ff08d08db08bbdd0e54ce8adcffc2f3e9a6487efa727ce11fef1baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ecc7663964ff2883c91ff7200ccf5e
SHA17fd91cee8eb44b3fd04b51e1698219b78bfb6315
SHA256fabd04f38045f826e482f1d8f871c680526b49375f566b3db903a8b14243ff0d
SHA512f3538f5cf98fc1c9c78aa3802cfefc9f3147be75c2a5407dcf648437c73d040d6b7c671e3ecd5a172eeaaab131c9460e0df8de4a82a3417cfcb761392adabd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e0ffb07f18f1dc584f98f71b80d0d6
SHA1a03c1c0ba3254591350a0a338765ad0445880543
SHA2566d3baf7bdf7a85afd94a3c064028a05d83529784f811f6d66862339ca5b89ecb
SHA512229a6902dbad1889c8af68ad750747d42cee65c4424e90c7b4289aa6850933dd6bfddd5d3986de649e59378213d7fe84156ee8f194f241fa0742568d372827b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5333b0eb109aae7a4a599c847eb22aae6
SHA1d04c68f26117ecbd4cb3ebd2ec4d533273c802f9
SHA256475a962b6010c39f11d96144c0706426a3c0f0ac6fab756432216b56af7d98d8
SHA512f066f474bc34afb618139d16fd7bdba538ac223b1001c13df8ccd6903a0e16356e32c46bacbdd3c3bffb4509fbe57f62301781f310017d818c2d198f7e3feafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595598b7dbdf3c9ed9a71441d1825e5d9
SHA11bb5096367de6e8c3c68e98c241d345e995d158d
SHA2568c4f6f7a35eca7b5137943e647ba6d78be95c0f1ce9663df5441a036774b330f
SHA512b21619fb8e0f30b3e67911997c9a72b7d257a725aebf6a182f61a08f419c62ec1bc72cc5c9aada6ac9140ed568cbfae75926e5281af62744e2c5d62cda2f5c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd5c5d4ba11d9e5a808a04d7d2b92d1
SHA12778b76ff607e09fffd0c6d19052bf1983e707d2
SHA256a57e64240d5c38848313665a69602574ca30b5275a18829c19ce0ae409b1db87
SHA51249a6def62746cd8421a302e26c946003f1f95af6c7cc24ddd83c5c9d16635261d75f62f9aad626cdf86c5f0206094a6b795608bff27ee742b3f06febc7fdd8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513836247461e7f0c91b866fce229408d
SHA1f15d992293d2889836eff813e486cfcde8135cbf
SHA256b7275b89c147f2a8b158b7774099978e8298fc675b1093c0ff9a2f548c91f49d
SHA5121811fe474e9d2919d7b7080fa52672d1056dec1f5884f902d58ddcfcefc900a9d668b7adc8be0678420b236ddf6b11cd6b02c173551613dff375abfc9bf315e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e9917a1e3064aceb0a6060b03a11cf9
SHA1e3390fabeb6a2f395883ce9c369053cac8007d2b
SHA2565ea6d3d702ff3eb2d3baa7ea8448eaaee0ec474e073f53566b087dd790366a98
SHA512943770fa9d2060fb4452c601c907485c128cb482e2b76ff198e73e250b5ce920788debbf4ec8305187e57207189bc73551ffe660dd423b00e27c666cadc5bf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f18c87345245d070df7bbe33fcf53590
SHA170a4a0f3b1e51ea52636f36641110e6d876c0770
SHA2565ce1d775fd102e8e98e8d2d11f27259438e66bea84a7786692b792f7c24fa8bd
SHA5123a57e449ba77933fcd26b8ff8eb131d4c13c51ff78bbae52a7f3f4912d8ddb55e0dd586ae8009b28eaf0ac4eadff83e4b5551d465c21c007f8b9268a2a83f16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d110f8d53eb9b35a402ca25b036ca70
SHA139a19dc13f6d94b03d7cffdb70852d22bae7e7db
SHA256cda93667a4b4ff0a33c3c24bc7fcadf785f82eb42541cdee2c99495e17ed67dd
SHA512b7e80395bd6bad9416a4119df1ca357a3f606f129716af96ab4e55c08d6174cceaea4c42a75f224e1765b632f01d03efedf215df0de0d28d5aae92fe70cb469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fa8b9cd66699ca69653dd80e4e38f6
SHA167c6ed6c996d56acc88cde1fba7b62cde1e07b1a
SHA256cb52cc5ebafb9758cb312ddd757b83a7b81ccfde25a70fa13fbabbe4aa70a77d
SHA5122ceb387a8840ab4ffaa36ecb6ccd1af76560f24a66a2f81a673dc23bde3de0b6e527ff47cd7134ddb98086e89f12e03ee35a181433d68721b4030a55e71a1476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56211b389ac6a31bb64bb954897a63a4c
SHA1a578a7f090a56ab5df8b62c355d16a9c8c91eb7a
SHA256cbe09269a35bd669697763ed67222033185996790d27ce5fcb8b55cd61ea2e5c
SHA512659cdd8de8e5abbb6dbb5c079b6e4261819489038fe9fb66fa413bce371f5b1de2fad1c9fa338eee7ba0bc896c5ec5d81e394deac73176afe9317d35302d74b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2b5b5935caf9f428a504c8482a33caa
SHA162a9d98f305a8c82d6048a55326f24a890dd1833
SHA25676d9a2b149e89444e6d12068ba974decc23856d2846d8da1a2d0c23a7ac4afd2
SHA512bde20ec0010773fad87660f15aeb14fd17270e0daddc862cfec4e9200d51b53517c95411148273886cbdb83beb935eccaf29422497ab3887ccfcf9a423b98ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b09c9c96e4fd582407dca4eda2b77bdc
SHA18ad79393f1019928d9c1eefa1894e2036b0b4d00
SHA25603cc159562c14bf59659a0c715cfffc975053594f88ef3c007aa37c754834af4
SHA5129ba306b5c8fa5b95ce55198df83278c78752060f50de7b181104d44079c7d349af66c0db293896e54295fb4d953f1067bf1490873cf330f7c4d68c4548057364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d31baacf92602aac92a340008e766b84
SHA1ed71c746bbadf4c0483d82e18e6c9c8ebcfb3cc5
SHA2562a6150ee0abeab2377b6d1d5982609c642fe45ef670a605c998d23b355bedd33
SHA51266ea6a2f85db0810236bb963ce7aa73debe916edb7c326177c1c7b7531b5c4e8e5c8ad722e96d2dc1ec4279474f0030e63e212de46baa75537f842e8fd521571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56854301041ecc0c88a9ab05714d67f93
SHA1be63b96301ec23dd86bfc03dfba8b62672a5bad2
SHA2560e3adcc0fac797efeba6a052c67ac3ec14b08058d5f989fc089175956478abec
SHA512906d62d48ab208c471117ad35591a632d00195bf2b8d049789e5cc34e60793a3d709e3fb4bf2769bf0505122beeea15f7f1ca3a6b801614444ebf9f3ed74041c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f613087cf969e62038b9064653d4c11d
SHA15896891ad1c8f328d2a96d235f71b40a8a10835f
SHA25645c8b6077294132dd76ed09bbcf68ca5e2622e40f4fd30a411fac7f6bdfd8540
SHA512430d1e47b93e30872731736b2dcef416e05388d46a640536c8148bfb9d8790843c6c208f665a6a0e3c831befb914b6a2ce4fbba5fa3b08d7e07093482d7acf1a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a