Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html
-
Size
17KB
-
MD5
a6c3994a72927f5a1ce33ae415fa3f65
-
SHA1
fd6107978c0ea145d7b7f477ac87f1689eba8870
-
SHA256
4f2b8d8b671221294d724c9172bc216b8e0d6f44c0aa2b3c63b1f19dc23bab60
-
SHA512
91f2b4d065ae8913b9478e0854634df659a1532091cee1fe712465666274ae57d6c5647ddf3a43c082caa5f69f70477ed17668c69f7dfcd386c4b32583b340f1
-
SSDEEP
192:SE0EnnQcnoaQBM+qSnVwYSnmSnLg5PpN54FWWevuq5qoivyP/MNryl34vyTRVcKv:SDvaQBM+q8wYjwi34FpevuqV9rgXqzV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083d4f74db6a7064c917d107b5826538300000000020000000000106600000001000020000000ef455ada3ca7b6d6dffcafd878642d9799f05fb508cf4c883c8ea1318d931b2b000000000e8000000002000020000000282dbd5026817ebdba553204eb42f426bb7aee25aea0c9b21cfc611a50f19d972000000027447e8edff82f4c5ca17066ecf49709fd7d2cc3873ffa27a40ff583a5098827400000000277589d6d0d85411856f7f2db0de3a98af4c490014a0ed7a1553147910c1f7b04df37260d88d69963503f4af09553bd7df0242161e7d5fc2f6f4fbb8aac8442 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8402E01-29CF-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8083fabcdcbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424477708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6c3994a72927f5a1ce33ae415fa3f65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d168fd769659fc2f7c51a4b2913f3602
SHA18e7a0e31e7e30037ab68b6deef85ffa943b37b3e
SHA2561f09545bc30d46726d59bcb9f0314615ba7c2666a3e7dbde71d48d2c44b19daf
SHA512e54611eb71012c7fa9cb0171ec693ace86be0ad0723bdb39aad4cbfd88b57727538a78bd4e0e99f25628ab586517d2369b30bd642f9faf7e5c5151d23c530542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53487469e9c7850f221f79d8040069126
SHA19f42ffcb128ca7c53a96aed2ae7dad60bb82c940
SHA2567d22ccded18a4e04d26f28082afa1b3a2ba723ca11438fb679a2c0da37f206df
SHA512ecaea1d3e46bfb720ab0fa8ce7fa1f96624693fb61e420ea9eb08a49b1b36918dfd2d2144700660b9f12d8688b3f5cb98958a2dfe961e0f6c3e857ba0a354aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d20cb4dbacb4a3861a8a8bfbb28e2ec
SHA1564791b632879d6e928e74d92d51f0ae6fd96bb7
SHA256b75ee8be7de79c024303373495ad8ad2d702c6d49939f4bd04aafc763f9c7288
SHA5120dd96102605a2dc53ca5c8542e6ecd4b77fd331edbcc7ead395c6d48835683521e93b101d18cbe8ba976c78d18c5b18ba2accfe0f83d1208bc3f329e93744913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6341d1e4c41e0e343f092618280fb76
SHA1dd87af4cdbd75cc54fcf17f1de496bfa3f4f96bd
SHA2568179bdd252d6384db5b86ecd3e12a27afda009db2c0f7ea0992ce2167bbb650f
SHA512cea385ce63a78c2fc9268ea92aa59f1c222f0fd9e1dbfd7f8c26b065fd9aa190c5dac53672a754001c86b03822597a3b4a87455a55f4df3aadb7cb054fbf7bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b097f2356710af378aee3e0b903c194f
SHA1c42d1c27339d2d010adf0be8af3e2975be1e833f
SHA256715663e06ce824453fa1aaf473c0e6c6745796c0aa5cf6802742b93180783557
SHA512db30e97238af797708d1ee278f8a7f454f957a98a9b560f754534ba2701ae68349c62ac372c17d395735eb15b12453564f76aa392caa6a8c3b3ecfcfdcd3f16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986629b02540e9e6397ea57fca32eb89
SHA1a1d39d655a5d850e191e04db025a2e7c209e6d4d
SHA256f95152c966f0d4ce60ff548a4fe30eafe65c870a58f74d75a745b0bf4096ad2e
SHA51223228b22f7952358783929fdb007f63121411ed7f0e65dcfb1c669bfc4eb4a41c60bbaf78d4655817dd16e674132b82578ba14426050399d7a01d67d5104607c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558f1f3811ef42efa415227e6d5c3e23
SHA127bcdc284ba78c3081b4e1dc4b10fa40b27963c6
SHA25656e1db85a154e466045c07ac1e02b27e8de33c8ce073ae5917a01bd3a3c54dd3
SHA512a28c6c0073a40b9f872254914c9c7b10a66cbc062de14a46bd5887c0ded49f70c6a89f42591bddb752f4803a717822826b87ced55ece570b659a0c983a0a1c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8ba86668fdd7d8d626c5f2b6428546
SHA10d2ca75870da049a4c5f7558a4e52315c7079aaf
SHA25673bcf8371672611a6cbd24453646439d5f97fe4d275fdbe64692a16ac02fc883
SHA5122f506af2d170e6324c3950b2eba224b31341da8e8e1ee140e212e4ad0ff19ba356e419eecd2cc0d6f4374ad493bd5313624aba17084bdec5f839b2acee35ce61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fe08d47f528317d2d0d32d3a86d2d0
SHA171ea53f3c3d177d711878c57289309cff685a20a
SHA256760f70014e85f5405acdefb9fc609b0d31e1c02f9b5f64c1671af3b13374bab6
SHA5127bacbc93859f8fb70b66f2839de8926f9f963798d8df809b951f65a31bf893f73eda40d559f0310c28824a483175e824f2a5260b7bb7851b2fd955a062575159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4a95b3641c3e0b3786ae4f255f4b18
SHA19577f28c4fb632a43ba1965e9817d979a55dac42
SHA2562e1074a7bf667ab2cf88190f0718038e03d16df2e2d67c0a8c095cc9e9446788
SHA512f6add96d3f37625e935f506b7723f3ceba0e84c356f0bb30ea0d968f51e5f452b6225803bcb43d68c3b7a69904d40c7c6ee5c307212bc53268968b1723313ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52515f20205c23e6fb5769d440e74203c
SHA124a9dddf52eca3174644a2abe4e58a1b7eb5199f
SHA256a34e20b2c544bbf30b691aabced52c95676eacad2874acc3d2d0388c647b1608
SHA512582689ffe1b299347ca207f0cf7e6a3f77c285ba069184521d5eb4ad6809316c3b3663ca31c467d34cf752e97b97f34acae21c54b128aa34d4b79ef691cc197c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57616f844375e3c38b703f9677abfb19f
SHA14add1c3b4f8c0a86ef8c4734ca6ea2487ce4812b
SHA256fa3496a7b8f323932759d7dac3542ee4585d5d54ad71dfbf3fecbafa5fadf9e0
SHA5129ea6eea45882c495f32769910cd7f8a737a536c48160bf71d023b66a165d581aa01338c39ed654b49508b6e577aec9f61d07f62e856904397aced2151d70e9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c58715d74aad830e957699e2aac6b79
SHA11baa0920f6e38b2f7a8a1d1d8df2688f4c311b37
SHA2568a2ae070f05259c2c0f11f0063b6c383ac79fdccc7187815cc9c274336bfbbfd
SHA512983e3cf6f227b4e7d6d5d5e365808678bf2ed78230c161f3217b1fde387f5604ddb15684ae6100ee53fb419f215b91ef6bdce26349ae4eb87f15f7787462ad42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593eab10d1a24eda9fe1333ff37c1fcc
SHA189ec29c73ff8f428556cf18dd105d40571eb0c7c
SHA256d3763b86ea13ef2940d746f049488b516c973b194c983d1d2515063e52d0a4f9
SHA5125d20085832402ddb445a0b9c132c569868fa5f9531606de078615f69e9b234a8886a62e4d5df689e8a11d4446525f351a00e20e805a2c4dab4e3f77df67c06db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ddae1b8e84a5bdd697f486044c715e
SHA1fc154fe36564933462d23d9e9cdfcee8de432064
SHA25698bbeb7a4b93b71edc21fa4fe24eb2001a8d706b46b9d3eb267ccdbd486b4873
SHA51276791a7abfe62090fdb48d5eb10a3ccbdb1ee2237d017c3a200c4848f520d5d27b7ac63c470eb3eacc114e58b3dfd75ee2e3badb032b2600474b5e11ee70d3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c335e478cf41f47677b2d323ce2ad6da
SHA1695b417c5e706b7eba750f330a7a457e7202f7e8
SHA2567321915dc793617f269bf0c45c4bb6eac6fd7e8c1cd13d059a354aac61d7a881
SHA512d2ef3df6f5306896e42ea923007656efcea6108323e51db0590f1e6705588d315bb2451e22f856dc73c02c27df837b6b20772542fa001a0f523b02cf683ef54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510be1142f990575e2c618832f455428e
SHA1870ac041ac548454f5bf8b71547066cca6c13f0b
SHA256e9105e6436151b4247a4007f8ade048b15527e9604ee17fe02fd5b226cac9775
SHA5124ea862f7f58df605d6f2a65543e63a79b122d4eeca835b8a16d4ddc58fe667f2573274695809738c8fd4748f540e063a93b16b3d05520ade4a7c3d0fa98bf87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c14a2e4a2726281c7b6a41b72cc06cd
SHA1bea22ee6fbe082455a87674d3de57cd8d50f0f2c
SHA2567678ac1929643386a3e596ceb54fa43b730e3cac644fa24ecbf86e56e714551a
SHA5128e59c63a8e27afd180f040985574bca6ef8067c9e492997d80fd081579d4fc34799d0638676ed9ff38a39615ded69cac6de14cefccda075e4c2c67e0d8483563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3f924d405a7c42127735918892def3
SHA1075b005403920c4fe9ad69e09b3a6b82b960c160
SHA2566334da0be4a3b1ef507c51ab95cf75e43c2dfcd7e60901958f521a442de1e556
SHA51214fd48e421e44a20bb6e502067541696348ead3947bd11d743d630ce3f4f278b2f963bb2f498394af1a69009857cb25774f3a918a4f5f3bb1873a5ed73059ba9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b