Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
6f8ab1e8638ca2783d551107218be8f4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f8ab1e8638ca2783d551107218be8f4_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6f8ab1e8638ca2783d551107218be8f4_JaffaCakes118.html
-
Size
461KB
-
MD5
6f8ab1e8638ca2783d551107218be8f4
-
SHA1
53be7c2c6f6d5c70174212ae7e4d57bd640905a7
-
SHA256
9e561fb5d1aa1669a49d7d1fc737faadcf08d78bc1b672a9c010d7f49989d37d
-
SHA512
e12fcc030b2ccaf6b246ea17756fcfb95bd540083650137db75965fa24d147e4d7d14d9e965e55b1d64bf976adc8f8c5bdacefb163fed89686d18eaa37aec0a8
-
SSDEEP
6144:SYsMYod+X3oI+YcsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3s5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{439B4751-1A01-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005de12efd7c0434b182fffb374e0bef9b14f23511181d4699407509102613fa1c000000000e80000000020000200000000917ad0baae1b16e513476dddb299e2ec973508da05068ae87c95fabc791fb922000000084d11ae6b4b33c47eceb417d25824f29fd620d7afe0981cdd093c75a84aeba0c400000009b9b7c12a21e77b64df0c89880fe4c4806877499d0df98abce36f3703aca062fb9006ba126f3a88f9435d81fe4115f471dd120ec6362bd3b08e2488d033a6d4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c27d1c0eaeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422739688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2984 1632 iexplore.exe 28 PID 1632 wrote to memory of 2984 1632 iexplore.exe 28 PID 1632 wrote to memory of 2984 1632 iexplore.exe 28 PID 1632 wrote to memory of 2984 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f8ab1e8638ca2783d551107218be8f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb2ccd5b5135e47850fbcb4c61e77215
SHA10acd7e47c631ac43c1c6d9f90c7bad00de987b43
SHA2562885a5c7e76250eeda7dd0019af724b9e1b5838abde5c3994ff07056b413d130
SHA5122b189af27e27b8998d3f687d67beb78e13731b523c0d138dc3bd8f5db631b87bb51874bf7beeef8531e85000eb9d019a3cb56306d2ddfdf6cc82612bfe0e336b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56181783bcda5e1995cf62af0cdeb9446
SHA1f6ee3580962b7a8c839b3bb47dad4b30f8aa8ab3
SHA2569eee58ab1c8170d7dea49975a01a3fbc36cfd053c860d5c3690f0000e9bfcc81
SHA512ccfa4118cfa759a155c4d673fcede9685f72a02d4a7268d961e4f1256bed707e888ab15460eeeb5420a0701a49ad81211d34bb294c85bccae86146b7ed0b3406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f5359b66594a2e88aae4921882c2db
SHA133d826bbf30af68b26de9815cc5e91dbdc0c8062
SHA2565205326ac8b80254de846685f52fab7b3ba06f8cc2dc0e8445a3bfe109496fff
SHA512c220598d8cd8a9cefc4233aee763bb8aff47018b79260f09581a9799f5d5dbaf4e90c81cad98491f8ac56a2a8513815fd5a0a3666d6f9ff9b351d2c935f0e156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe49b7ae8fee7a564dd4ad6205630b7
SHA1cfa7491c10b57be3afd50e4da467a2d31157c518
SHA256de6e1f6f7e2df238e968035d6c65aab8d6b30b139a450de7b98536b1175a6733
SHA5120574282baae88896b6350e696b8c7791b61693e119c9f7a5f3e04e3d38dabc76d1e6601e4c02aa98ecfb666e35dd4735b2748b6b47b10834894222c40f08b315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a4acac974297a5dad5c5eb60e6bead
SHA1d25fc9c394cdd3934ff3f8319f53c24672ae9735
SHA256520f87a78f82c95443683649d31a8cf14c4c452fcbb7aa4332a83ce0a72fe1dd
SHA512754a0504abcc70058781714eae62f3c226e9c79720be44b1aed7db663d227f033fd55dbed21fbdb773d053e537bf09718c57c8c2a622c2918c514904f3012795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc653d469eb86a2574385521c1e542d
SHA10ae4b5ad2739bcddfac8df5c37469b02f62b3a84
SHA256f4dc93eb617f2480afaf297efe8ffb7d849ac0f108e08f554557602840600ccc
SHA512a8313128ade60b007d77c851a134aacad6e2e9608866108ca5c5b731cc6ccb986e959a5534d69a7e3c440f35c9e2291549cdfbdb5f4ae0704105ad336ad618b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592e76c87b2b11b40ba74ca9808ec1fde
SHA19613890d18cf2b60129f119c1779f9593bafc8cb
SHA25661c307047285d7070fb77f20c83664d19d82572e884fc36f12c72d18257de235
SHA5122534da57287b81bb7bd8b64cbbd9e26754b273cc648ebbc92d2b29d0def054a70afe989f6cfa709e498081240c388293a909208a4b3c2e9ddc1799f0d22f9866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52df2bf5c04c0820aa53dd8fab2f79829
SHA1f98faa130e128b8094c8a78d40507b53f538dadb
SHA256d348e0c04f80b9cd1e1901a25c7463bab313a4c18648dec55d474628e59c1d20
SHA51253d19c1b7af6692f17ee35ec64ac11b3f0bd7f1cae8e7039677b2840176eac9856d1f431dab3b1ade71e6fbbc134e39b736bd846fdccc65c584c9522b17841a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8bece569316381f9f892b96be6adaec
SHA1ca35bfd910f02015699c61c12cf6d67e35f3f463
SHA2565f8360a438a79a707a9e8a15420a2280e4b7f4b7f1b2392b29e3b9e0dc690b15
SHA5123a8ee9c6f2a34e19231bd19f5f8bc58f24ef46c2654ec01f26a86f948f52438fc3d523a4f6c67f058ff864a81599a84a5cc1fb37e9c465f0922a1d8e4f3ebbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51024eaf3054821f56fc35535e450c276
SHA13b17b971dc857034b754317a7cae69d52c0750eb
SHA256d70465cd428ce13f5b1c321f43c351e5ef6cef56b1c145da529ef8a2e33807ce
SHA512d7c7500b62264ee1e68a93ea2119b37933581a089ead54cdc8e36ec53f644c90fa4f3ce8f79068ba74237d8e11e65c66a52bc263f8ebece3b77336318801d91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5646c0632ce92fbcc49fbe499ce612179
SHA10f37d08703731e17a69e7ed7ade9895ceb03c598
SHA256e92a04bbdb680dc93df8fd102f4bcb04b39a8e38dc122803c662a079f1f54290
SHA512381b3fc9e1940b15c0c5cf7d585cf2be570aef2ef93651f47f017044809ad24cd59aeec9294575c14623f1b376685640b3c96a9229211fbd00bae5b7f82a8a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519deeba102c996134aa31a7b6e35b556
SHA1f3e8e246171865f424c3bb5418f00c9b9a364e98
SHA2566088d9ddfa6693019709ae404b950b61b29402dd51accc86c40cb741c71c62f6
SHA512168709c71d269013bd4295cf16ad07c0d1a3ad08b39bf466d6c2c9c1293e6b1d393383cf3ca54e3552399560a03550183c0f7d7f5fb6c3ef16552584d891c128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40c49a18060e48641d1eb2e3b4c6a0c
SHA19d9c58463119fbe0e86f2d3521400f63ba2e9c58
SHA256a5f9d3814e98c2caf1a30b444e081d4d665d91b7ee94db00d2c0529d3ef88ecc
SHA512d6ee1b942854624e9915e1b80171c338fd36aa85c8d8d5facc574858e3803cb078f1e9c62e0c8ac4dbeae669600d2b6d72e6ca334ed964dbe7c3ff151dff3bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa189f4c13812a3417765d788c25dcdc
SHA13779b63ddd050c7475da14c96ccb8fbe6bf70ef6
SHA256cb647097ba88078d02c9657304db6c82ca5501d550ba37ffc79196fc6f38ba03
SHA51220b8982c19f0574399ac8de9142194c1b6e901cfeb2041cb467418582a4dfe364a5cfc9a0af02ef2490c51b73207ffc557b05ed0022e3b5c724dfc9a8f356e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c09a29ee55785ad89f06fa80a4581a8
SHA1d18a12821ea2e72cf262a197cde4aa9cd9af6aa9
SHA2560d023f8adb37ca1630502bbe73337d193f07c6e878804d57c0d16e4a2f9be82b
SHA512606170cb9a79b4f4394fade34d7c9aee5a73f1ace068b38882e828b6ad8af1c432e634f724899ab79763c88ec219acf2c14b7445f7b81318c8f1b759145ec426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50327b17327e6c2960ba7e1aa548fd604
SHA1364cdbcf43840e9e5024f2e3be0fa3d19a494ea4
SHA256311f69bfde55c63e0a125bd210284030ec053f42db447e3786303b3fa4d1ed3a
SHA512eef3698628b1a42d7afbfaa273433510b8c2cd075a5b4aadf7a129052945cc5d79d26a39de6b981f0f0d8c03945af57a9cacbccc31a281be3c6c1eaaf7bf7c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56edae123b37664c17f5b76c3ccad66e2
SHA120b7de92ce918efb39ae8bbeac6c504969e96daa
SHA2565ed3cb9af3e223e90d2d558983622e813021fa28653a643ae323f01173e7e439
SHA51243cb1ab6eed86f32d30cfe16588554df6158b0602128191cdd1fc29b13dc84c4fcf8861e8b8e85e98ce7d22bede13ad69e1df6f258e4f661a65e6edd93311472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5762afa959829d5e3f4d656aa1b0b8271
SHA1e39671aea24163f1bca1a5d87f09b71274602766
SHA2568dc4567f546351821fc9470a026bf3014a4205554e8da361a615ad15217eeb0f
SHA51207856d85da31915b0d6107fbfb07be0dae76bcd3ce4f9a1fe1db74a0f55add413d28555cd8e0eecf57a4b0d7e320bf152b4c0349c3ceb5c0b1184a89dff4b61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e6d0cb77c5363b53c821909b5fe0b3
SHA1c4f5bb7e333b577e0cb3629d61e9e2d81bcb0c8e
SHA256a31740561b211aee4170fd01bfc0c8d08579fce94cc5105cac1b5f7f700cef25
SHA512fe8b47edb71e960016a4f830b46593ba1de877eb9bb4327d02aeb618efbe32513aa65bebbb30c9c9b993d0965490844ac3da469b4250166a6e2f60a9836d995b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a