Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
6f562087b30f99517330e7f21e77e8e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f562087b30f99517330e7f21e77e8e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6f562087b30f99517330e7f21e77e8e1_JaffaCakes118.html
-
Size
69KB
-
MD5
6f562087b30f99517330e7f21e77e8e1
-
SHA1
8f590b96cb684eb99041952202caacca11f09647
-
SHA256
5756aa8d2050548940be100cd13eb177447140849047e1bde5210dcd03421852
-
SHA512
e1938b14d907660d70fa4a99668ecd7ca0a9260a0c0b9c639f4a260f273ff69d16eece73ecc9af0ec72227feda9c69f81a77f4c76e202e302d091cd7d9bd4fbf
-
SSDEEP
768:JidgcMWR3sI2PDDnd0g6V1OoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8s/p:JP6TvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422734771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000fb54aa9d1fbaf14ecfabcdeaf79c16d373590f6d635e5d250ab2496b2d35d8ab000000000e80000000020000200000001bdcdf9ecc528ca7e3300fcf5139047b76ff32ecd13e16b29f3c84b37c6cfeea20000000a39c60dd47c478076a061f4542a086e2e999c7eccb035a4641f647e29a5f021f400000001b1c6f77b4fe8ba4f766c9208844411646e08637cad03795584ab2c9f0f9a78c9952d934200f05cd35293058fa73876d21e773eb82b180ff26abdc5c27b5716d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304020a602aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D172AC51-19F5-11EF-81DB-4E87F544447C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2700 2188 iexplore.exe 28 PID 2188 wrote to memory of 2700 2188 iexplore.exe 28 PID 2188 wrote to memory of 2700 2188 iexplore.exe 28 PID 2188 wrote to memory of 2700 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f562087b30f99517330e7f21e77e8e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ebc4e387efb32b459b85a71f42f81f
SHA18b244d117351f5d0df1a970ac4eaff208d0bfdc1
SHA2561b7e0e8a391ccc33c49643e597f6b609f3c7fa65c1f31ddcf2d32ff0cee84eef
SHA512b8d5675dcab62dc23cd4a6f31dc5093e8d9c366f84d9b537987ebc18e496d9ae5c6220977046a76dbaa583a11aa600a95a4c674d83d0d237ca66e235de2e26a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c892c37625eb24af3d30612d57733db
SHA1af166a55279416efa66e01d41cd98ada48a99d13
SHA256be538039c72b070090afb207f8a4438c60ad12c9b44c98317cda408d8ed8e3ee
SHA512afdeb7441fe9d9986be52939a4f39edad98d8dc0a1c56bdfd2b828877594d60cfd1b4c824503e8028ccf3ea2511864bb4f95405f4de247807f456c3f17b8a7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588c25cd09b9b2f5f71126a57c0a06eed
SHA145e96259389e845727d8f99296a0480c5ddc136d
SHA2563bbabd6a8b5aae7109f72c001eb505271146c4c7a155120b85c052ff33f39ac9
SHA512d2e63d80f14c377b4e47945596c720ec8aa564bdd8d570cfcdef1ffdd06e5561c9e4e2e4bcc7de2d1357cbc10f01907a8b1c6c1ed8488700657e1da30ec47139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f29b9ae9561590899c251a65bd23e9
SHA18f05140167a05740b371398676493139c7afe129
SHA25661b0499664e6b23171c4fe567c2dce8cfb1d0916b8f053eb64dd50a8ab105c4b
SHA512087e5d8b49acec2e49e51269ea180090ae7f5afe1110a1a6b41c201727e70300e1c06e68f208158b587ff1933a88e6ede065e9bc23b801ccd1d1588a6c6dd8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e9e71e97bb2ee001305be6219ce5f6
SHA1abc9da2cca45849c919827e6479d58eebaf84385
SHA25629550805b34eb2499a1d18b569a3133780c432f8cf141ec56cbf0bc510651f5c
SHA512ae486c979fa86e805c59375db3e459d64a9271f50cfc2b0d80f23b22087cc42356cbb9d68d8f910c05f4d7b050b908e106e173b1b7208cb70a483d5a125107a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074691f605896c3726e21be606ff3bf7
SHA1d70d0c0fa35f2a63eaabf4577022b3071922cf2b
SHA256a176ecfdd8e82566261019e9af416c09fc2f88b6056b1a9c82f0677990bac32f
SHA5126fd7537649acedef16a69a19f1809eaf9a1ba7fc0a392af979c931ee800a9a98f80acb5a3aa0264f73a2c29de1afab7575e224bd3a0bce882c087e58936be6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d4a605c302e550aedbe3ebdba3b7efc
SHA14485bfaad68a75e77fcb034d71fd0cccaffcff33
SHA2561d3cbf506efe80ce3bf5782c0f424d7854fe2bc2afeeac6fd4bab4284424444c
SHA512142c9f297a82066324e99b1b2fa1b3a2c73cc7fe9cd70f12b3b4ae18b49a7b527bace89e33234f77c458f3b1fbe9b7952206c3b6362c474e183fe734ddf457c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d96970292fbfd2b141e861e57f69597
SHA1f8673a068edafc88b389b6b86b7699d5aaf9d851
SHA256b02f81775e7d7e706a9a669b6ec31f978596682dc99b9482cee359a4ca43bc3f
SHA51224f014c0047e23cf4c9778f85cabccc38c455d59490d0715b4fca213df1c1f1278d6b800aaa5769bb8c9b798175d163ffdb77b556638c68ab07e921af474affb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a2d604330bee9f649bcca7a934c3093
SHA1abb73f024caf865f0b0a6ed682b29d9766f2c254
SHA256bf03599ff53945a535266c99a3ca1b87a8c1d2a9265a9a8b89e9f7fa1e8511a4
SHA51241181a40ab933715911889023ce92e45662ae5ce7a6d49fb81fed7b8acac36a09fecd351c0a224cd771480ca5dce8d15e50659a72669ba33170314c8e9741581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b03f5a3768f7863bd0fc98cb898ba8
SHA1dd269de4d39e54368a359be2df73e351650a98d9
SHA256a139a6d41f25cda46da6c053855a44b417475cd5068f43821cdf456232ae3621
SHA512eb2674b1f59852a9a47eac661116bf01b473ad77cebdcb5c43f653aad4654c591832cb510d215c948adbaf83958a32d892480bf5ea9c054fc5672617cd948e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e970bdc7661ef63bd1147071b757f6b
SHA1effd6ddf813d57f182aee13d876812b9a6f75a07
SHA25672f7eff4ba5a4c6ac14b75b6b444180073496e98ff71e3b7f47cafe9591f15f6
SHA512a9934491161210c566ff483ce049d033d872440adcc9e4b5a1cb4b8e94505f2272c895d502f6339461cf4b22021623d8338636e1cb68180945e77bacbf422521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7687d74ac93f970aec7e34475d3ed12
SHA156b9183158d859507ee5fff74c85fbed6a640e0c
SHA25655b11b00378c9b9764b1551ce7bdcc16053b4805022fb57e27bca88201e5b8bd
SHA51217871b575353d48c1964556e427bfe30511866b35cea0d94d9ccac91124b260a99c239b9abdc62750c0cf8b2973135294646f7f7cda9b437fe03f320cb756366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a2fab7722072627536352804451470
SHA1e2327d2313fcbb502dce1ec5307e1420241e05a1
SHA256b81d79e78956c85c40157b6098982016af3c512b3b62ac01f6439ee72c6c90e4
SHA512b8f27e4b53d2c42068436cd388c5c1686318d8554ae6c1264fef7c683f2efd81e05e964d2dc2bfaab0cecb2c672a6ef755cebf8b3d36ec6534c6d96c7911e05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a530d8342eaa3e8122b20ab05e0eb7a
SHA1dc3df49537c3b5f9578f80a2050cc4303c8a1630
SHA25693802df8182b556b123a7b321c3c5787d3f6d2370522897097f0e7eeaab99624
SHA51272b871fe743a137fa661de33e335050ec61324c6a8d7172c0dbe9142edc52fc72f06a872f64d0962d8336da2a07c2834d4db7a387ea593d65d9af62f52eeb526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6335d16db2b87b841908312ab608646
SHA172617d39b7ac3d9c5eba12dab412598637cb164c
SHA256255843fb52c2210918f781e419789668030b611ba7635a29510e2d078a7d248c
SHA512d3defb85653c32c75279b7660ea38e4cf5524d6d9e11c8df95007ebf7ee46a0f68e6abddec15608cf5545bad0488c00825b77ff2a3a6e14abd6d77a35ddddc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb399cc6bb9439ca824f6b3ffb0bd34c
SHA14e4d0103b6647c78999c07f754cf2163a2fa3e80
SHA256fe446d4f01a8f67e4df6b0430a9d1eb258a4b6ab967b792749e58bbdcfff2bbd
SHA5126cf7eae8efe62da631e072c771decac906b1a9e3ca7790ed2c94811904adfd0077449232a9e8dcfaf646c9eb77fd2a0101216007d2991c9fb04003f845a802ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559eea6d8e75f9b4bdd20d18122987b90
SHA19aa472664ebb16d8550fba8d8494952392a8ae6c
SHA256334fbbc81090352b1cd3fb234b36255c87162789255b5b6c5e2145af7dd57b3d
SHA512f6cc7d59277d0438d8aeb693ce9f259f46014474652c13fbab9fe9662e9030425f07dfaa93a77983221bad4bc17e659d323b9bbfe0f0f43f56d2c2c97f086584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a385387e233c21fb8eced1bb0a9b8035
SHA1fffc75534c0a4a80b3c765d80985fc607ddc45d9
SHA25681f9bad9534d2d2ab78f4f561f0b074a8da3cc44e6bdf3fd14882adf192235ae
SHA51247b6aa8d615c9cc904f7cfead1ee62c2498f023d3f87223d0d69b517d129f110cb0f133f6939af57e98adcacf7c8c0165ee5169924d3fa3b8d9a9d58162ba42a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a