Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
6fad863861d731636d0b773b23b0002c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fad863861d731636d0b773b23b0002c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6fad863861d731636d0b773b23b0002c_JaffaCakes118.html
-
Size
4KB
-
MD5
6fad863861d731636d0b773b23b0002c
-
SHA1
80949e7c98c150d21474fb2651ec08bccdeabb2b
-
SHA256
5dc6c0f7ee28f86e8c78bfb0e2ca1bcc7646f7a543ed122d7f1b43fde7ed5fed
-
SHA512
aed8dcd52a2dc65deb1cb64eba7501f2a60c7c4198b616a482df8fde9ad230b20287557a77318f9733da63c5b76af823124ca50ec749bd6ed548ff8f8496f9e0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ozH46d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4051B5A1-1A08-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000232a37e6f542e247b5693e62fb94a1b700000000020000000000106600000001000020000000efc9a4fe110413f0f2dd74de56f3951215e25746122e525f71e79cbdb050e466000000000e8000000002000020000000d11762145b8abb14487ea9be9bb65a408b7564c2891445f939909ad83edd7833200000008321a17692955f6c167318a13394efc48148bbf06522f45cc13e6a4a5eda873a400000006d940fa68828bee03a368ebd315391ebf90036017d1f72fb1e12b1e5a59be2caead5ff38712f853b7894a92a6fca88b4c4c7c53b6254ccf380d517719c49d41b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dec71415aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422742689" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2972 1728 iexplore.exe 28 PID 1728 wrote to memory of 2972 1728 iexplore.exe 28 PID 1728 wrote to memory of 2972 1728 iexplore.exe 28 PID 1728 wrote to memory of 2972 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fad863861d731636d0b773b23b0002c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506841de6b4c3218d7aeceaa05ed4c31c
SHA1b5922956f951fa6522482ea1dbe8f1062e018be3
SHA25686b256440427bf24ed9d4c59c03b26144a9cff7b51fedf5361d84bebf2ce66be
SHA512f583f89bb6a42239a9c4bfe3356b51ec24a605249f9462bf43f078b3d20b90b1272834bd9ae3d3fa17c9e3c2012b74974ae6801e976993486649b1220ccdc032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c416c25c9bb89e3c2a5491328a51d5bf
SHA19e06878f876840824ece5eda0c765bfc909eac75
SHA256bb9b62283c7236db8bbc95e43db108373bf203f7525d3e6304cebf59ee54dac7
SHA51276519ddc232dfdd5df234d7d8bf6fef23dd80bb081f706feae4d9f2abcf77c1b3c6280e96d8918e53f5e6422a5295e277119cd155d46420b65502add6d2d288c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b4007fde100199cd45f6a42ac72b1f8c
SHA1ff959e2a78280489ffaff3f99de872b2b10001e4
SHA2560421a4aaec339c259b7da4dd50f6a8484c4e97ece2c9efaf86df1b871322bbca
SHA512c9e1ce6dc1b6896fdc43490c44fdd08bb5bfdb3814c5831b6763503161c6beecdcdf26c5d7784c04cf80c026bd2acaea1e8e3617a0cddb289e1f3a59116f414d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c38c94aff9886eeaf05adbdb17d857e
SHA1f1fb0ae29f5eb779dfb6635425cf708b33c52e68
SHA256de3ca5bc1cc9140429a23503b695b1e01d69bd195af4a02b21f8d3edd653686b
SHA512048d5b8bcfb70b6ce683826b2744a9622933248ad1f8afd59d1caf6f65f3aa7a60bb9cfa121f1f3662700b3daf24708493c398c4912cc55ed43150330a003647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54472ef7e46572bf317a16e2ec450dfa9
SHA1a932ae6067c00c22eafee7bf697a0558f44c192c
SHA256cdcc568d3ab7d1968fefb4e2771401ab6b6f148c2ac758d8bc586bd4f8dfae43
SHA512f0e7c34907bf37b3d20cac62e5d473fc3696c92a3284d694de9fff891852da04030651ad364ab2b50079030f056d3aeb3698ed109596848c343752d75317039e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56fc54571e8ccdbc14a20a776d10fb2cc
SHA1c388e53749c30fdf5fffb86ef59261d4059570f8
SHA2568a15496b2bd7cc56da7a5d1d34d323ed0f14cadab7878f8fa0c0afbc93719ee0
SHA5129b4723787ea464ef0062e4455168783b9c5e68574959f0135c78fff30b4c81e136ba5581a7572a2a4b2a540fda83db2340ef61a70a73a075ebd07af41108441c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de5b07fce4f7ba40ecc01dab1b3fb0ba
SHA1115ac5e76646e55fb62a18028f4b670637430c18
SHA256a53b31edad9fc561ed02bb9feaedbc817e6a88ab4c7874ed9975be778d8278e0
SHA51251f6ec43d080e74e381800e84b8e90a5757d80de596a72b47eac86462e1df1f858de01ba65a164efc63fda37bd54013754a052cf43ec7c0c3f729903aec18b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6c550fbf7b1b6e4b10e5e76b9d07aa3
SHA14e33d6f9d9e9a859f51bc082d8bc7b1cd7fa95d3
SHA25681b703b702c5827e6575ca909a5f5695bd519bee05a0cbe997892897996a07d6
SHA5124f17b7b255c29176ae13a42f8f4a2effce0b9bcde448574664c1632c274424d414b9abf18b0df06b750fe50876a97cf9a81c4a4e2ec22fd7acc90c1f315c723e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1c713123f6616767c2039e119a52e9b
SHA1070226a8c1a251db7ba4cd62019caa32bc65bfdc
SHA256e7e9b87692ea53421b83fc4267034df75ee436ea52c7df817695b22f728f7a05
SHA51276e742e9286cae74080161f139f8f2d6a261a1cb549d659a052dba037a3b687c2a710ef43003f7f43dc8a3a196c1075b05bfddaa05a39e078f3473a5708ea063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51166e1ab0bee06d720d10990bffc26b5
SHA14aa91a8dc3dd92b41c31fedb4d1f31de3abc7e45
SHA2567d162d127bffa227619556060de3f190576a03789edd56f21a4d3c91adf2ed17
SHA512d8c88f6e948a070fa9212c955bfed7e794be71f78b49e245be6664b9b6f7e16d79d90f47f9e1a64d858224020fb16b503e57b849619ae53a566818d41bb991e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3c4b2bc6ad40996d3087df82457356f
SHA115aa30f9a057fab36de005f2dfc1dc8b3a2304da
SHA256210ec90582ed1eb688d3a4fd56a069f7e9051c52a5fc13044e6f469fe196d774
SHA512d95ca3b0f2457fef08f952cda85b36576c4b2683fe2f725a62f7c71cd15fdfb30e4517616d0fe783eb39f2220ba671f06e23c5654545239b79f902a066ef989f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54aee0e19e2a85150cffcd8aa032dd165
SHA172b92db319a42d06e7df239a20c6339875e654b6
SHA256464b482b3891c8c6a89e6b11e19a420d7d49752afd60f7693fe6ad6da6118bc5
SHA512662259d7d3440d93e0dfb5882e0719b31abb3b05dcf8b651ffeab393b78c85f0633552cfddeb53bf4a3687b9b7b9ee4d0463740584ca786c276f27a14cf0b9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5169a37efa89c84f9c9b8c4d38cbba851
SHA1a45decdbe950713695d7b9ce92efc55b372024e0
SHA256a4a0f529e3192d96100196bf91ccd568f3cb7e8e8acc9fcc342ef924406c4205
SHA5120fbf48393a87f223e0c453a10771add38956163868140d865a48848b4055aad3745e68b8455421b215c9239030493f48afd570e9e74561d923bf855fd051b5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf7a77305433d4336bf7459911a34c7e
SHA1780691d5ed10bb57acb8ffebf287dffda90ab3e0
SHA256bf116e77a06294ab77ffcfd7f487034efea7fcea734a5626470b4c91a359bbea
SHA512f4a5ef6573264fa99397bcd11cd6eb8df2db34097d924e2c6063d6d6ae6d849419ccf9e622c584aa3c71227cf692f66d196a870482049c04124f8c3569b33802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e01dc6cfe486c7d64b578187c821650d
SHA1b245d04efe4d37b119af9ff6b32abab301d17868
SHA256455717a3ddbbc6b4f3afce24be88b7ce98878c659795066e6563aee48b74872a
SHA51299c95ed9f0f0cc33bf5d97703a619cda26b5501b9ad89282d28ec0c91350839fb9a1cd762796872e51686e4eda0fbc8da76e8115ad2432a5a6c6578c8a8325e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf8d60fb2daa941fc5bb826c5b532837
SHA15eeb98dfbbf655881b1e2f73867dd660cf46ca42
SHA2565cc65bdf3b8388dacd5009b5d5fb78f24c17dd46493eda4b6eecead6da9721e4
SHA512a44b8e3d216a25c0053cac9c6a2d25a922c3d2942a132c94942cac500c0cf933707ae6a108ad3cc80e958eedfae90f03e7730d9e659d9596a792ef68ca209c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57842fcaee8a229e7ec3795fca98cd7ef
SHA1cb8717d4b2da8f0578c537493ea70316b9ec62df
SHA256806ce4e3cf856dc2e68d2f2ec84a5ab01098fb7e915480ec85f2557e6df7bbc3
SHA5126cbebd5391cc913473501715dbc0e243d993f9daaec947f51f571df28229ef2c412f107306028b9dda2897bfdb599ade13b0c8022fd7cfdd595c7a43f62d5ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566c90133da476a81e0443ecdacfdce17
SHA1397a768c6716594adce59fb7f0d8c31d25ee433e
SHA2567a03a8a8132c8bc4785a83d7f6cc9d895f505245e76ee734ae49814c63548357
SHA5126fd3791e59eb0d4ca2c9f5ee80aedddae6565b60b94c189fcdf92f0385bb512ba67bea27cbeed0bac52083799af303811d09c7b7f287cf633b53a06c02535775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57fbb5d795abb417224ffc0b351e2390c
SHA1e6280c18fb28fd7aec0996ea7ddbbdc6898572f4
SHA256c116525cce356ad2cf4dbf0b4af8f4b1faa3ae638a4b5f86a91cd5563f737d84
SHA5123a42950df3ed2a1bf3ce6ee31aab8b04f68d83f6b8f64612a717c8f869ea0703503ce560466abee1848b55a50b2c21d1768dbbd3cc8696d35b4d1a5d46b878c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a