Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a6c6d74d076ec6949f4bf0717c98371c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6c6d74d076ec6949f4bf0717c98371c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a6c6d74d076ec6949f4bf0717c98371c_JaffaCakes118.html
-
Size
20KB
-
MD5
a6c6d74d076ec6949f4bf0717c98371c
-
SHA1
4ee31c2b1a8d6e94d6a15b51a12a23b073b84163
-
SHA256
ca294b952a2795720d251abb4861763a229090c660721948a17b0f712de7ad4a
-
SHA512
dc7e765b2f2866ea8dadf5cdad0883be16caf70409678c3e0a9d4de2917da96ff37bae4b52fb7e753cd31417260fdfaada18563ab0e87bc2ccf6699268b12e8f
-
SSDEEP
384:G6QFwS3JuTLVSfdx+E1YfqjpSacjxFZLGQL9Mv:G61S5uTLkCE1YfqjpS5xFZLGQL94
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{555C7DE1-29D0-11EF-820E-FE0070C7CB2B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424477891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000001613e0eb1a470074e18155dc32440210408ef09336792de3c8be5df3000839d7000000000e800000000200002000000025a75d11aa3006bedecdbb2e67c3c12fc673efd956824729564b2e7ca064a1fe2000000095a1b94211b2db66dc2f5e1ef896791f2de5ac3938e4866c2cdeee16237e12af4000000067f258899f28f0c68fa84a2f735c27e25768aad73ea68e3cb3e931c021b0cef96b93a0c489ae84b3cb6a33d26abb67720810b1f289be69837bdf22455ee9074c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602c9a2addbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6c6d74d076ec6949f4bf0717c98371c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bb9b3ec508ea414b785fa4e63b7e12
SHA12ef29a7ae728a6cfe6440224743adeaa8f90ca34
SHA2562a70faf1a69e9f19246136e64c5c099197286b4c977ada14014603e7e5a3bdbf
SHA512387157e4d924f1491ca02e25f3f7c09a9e525a47a8937a43653bdc6ff3f0f3362b33cae6237c142dd1689c0893f4658b4c052409388b03edd13818b1fb683762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a4dff9b69aecf3b1e6c71f51b3e18a
SHA1bff67c1732eb031c1ac4a4abf4a1d4862a5b445b
SHA2568d5c8174e2cf5bd55cef0434e7b4703845b1a22b725599e7e276d401e7d33a09
SHA512bc1a8c533f9c4cbd0d40fbc4c8790727d051851ca6741378849903962b6ba5ce6e9500508713ebabc0111e0d669ee41d396639522b1249b591c9f12d4de89743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e87a919338e3982f7e5232d6a8079f3
SHA116a8e2be6165e90c1c050de96a5e7264ad45a9c3
SHA256c6a595f91178bad2fdb9a16e72d3f9d828c47b015af5dabd88c09f2bd9f56d31
SHA512b853f95a874468f46da2f48d3b9667c128b6a1b984040d9bdaaa7f8e640deab628c230459b67d47ec828799b2cff9557a31838e9db03542c07ddcb6aa1471e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f021ccb75773113c47b6b4d93b49e8
SHA19040ff9622a6429dabf8f7538b83f4371700ef8c
SHA256fff1ca7e475e605964ad54d9592b2e924fcf901da3d55121d443bd60b6a82247
SHA512b54c6ffc2fcf623cc13d8204aff7f21e6978d92625d0f5b9dfdbd6d4646ebc8dcc1e1188ca13c871ab7339e18a9a25450f1043ffa198bbb61f37180aee184469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55872b3dfa692cb59cb76750f0859c79a
SHA14794731dc2889cb583ddeef43e5800cde0f0ca4d
SHA2569120433e24a725d0426f1da2ed325af98008d33d49f2a2ee332f51b56fba5f0f
SHA5125e7f4985af0a0740088554fd3775697339a028e794aa5b0ad18e1372c632dfdb1688ca8384829cc76b3d0f78164e657a03b19462c599083d2721f15a46c3fbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31a5f63e4c092399ca68e88cb526aa4
SHA1b9c104695ea372d01e95953c15e90472a58c3adf
SHA2565d0af463c807c9940fee898c0f20841604766bcb3ab5f15d7bee5e75ae548b0d
SHA5126fcee117df07278d8d4ffa2c3aaa6466e1a2192dc14c53e58dc18658c00470788c274b8d6210dc5762a678c0f0d96f14d2aaded4eb715204d9f4c7fd8dfecbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3ab8fc907e6abe0d158053efeb401a
SHA1ff18ebda06b26a7177032de2615a0261aad39ab1
SHA256b6548c6b15c420a6a04002c7e912f0e335de123e7e4a6d0c9b13a8da46d04693
SHA512c6689bfaf2a8caf9d022ab35ee9e09fb89e237972c75e86d54555cc9e58ab28fab54964092f5c56b56ed9cbe8f74b2c6891aaffc802af769a6ee5ddf6181e943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508464d54bf2dbb34d4bc9b3f8e0a92c2
SHA173586f5238994cc650f360d2903209c0c19d3842
SHA256a9a667b2041b1517f1716b239819cc54c39a219127297c0f9efcbbbe52f8259c
SHA512e3814915b06941c564c7ade24c762fae5211dcdf41866c20d30de7c4cc41658c8edc69c2d412e2727e69981a7de13d256729ae4bd3d9f80f2d77925d791cb23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167e1476a47f0b02111571d1cf3083fe
SHA1fb8dde14adac2f3121eacf4b09bf6c941cf6e152
SHA25619216b571810742473725559493d26d2590785e7d67e8e6fea4e90aff501d8d2
SHA5123622eeab04afe73d1b778d2cd93cc3720ee5e1326d2da64c8f5612b5805f240c9162223a3e1a6a4f64e7bd9e74f51c114537ae783889da196a80c27f8306a097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a4f0a50bbbf7f979e6185b4380a0c9
SHA1471ce56d972e5d7e04aa6e8b6a623e5b6fd78120
SHA2563641965028c4d224012233ac66f1def92701bd3931c39ff192d295361eebd8f5
SHA5122308678bafd161dbfc66c749a06a1ea73bf50545397cdac58a5a516db3a28c0cb1f57d48bee1b2905f3594650fe79fe5524d326a09715296377195f23b386563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ba38139cd86b5e4fb12a437e75033a
SHA1eea5185d48194e928954bb4a0b944331aa07962d
SHA256fff0d870845968f045284daacb34a8e12a996dad53c7b2480a2b7388e7ac9253
SHA512495209c479f0439d065227811cd569b1a9faa4418e771f9b38db4ba6fc8ab709c439ad0aa9eb242fed38acfcd395f1f3e51a662761cc11ebccc522a4e3439198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee69feec1d78b6f36a12a0d84a255f6f
SHA1e7f2c138c008115d86e48daceb5bfde5c501302e
SHA2564140bd6de5c6b0beec458dd7782652ba2358d91fb21a5fb2beddbc42ff101e42
SHA5129f490e94053decd2750abc54cc2642774cd86c91e4e6782e0f98da3a3e76b4256271e08afab562050c53e3689953a112e85bbfaea9816ed20ea175c043ab00f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee4eedd2e1823b088e5da283baaa27d
SHA1a6d0ec2e74c0b27c24862b546a153299c96f4f6b
SHA256638b49516cd356419c2b8fbd08dd526cd0b88b3c27a517529012f3697da962a3
SHA512f3c2333bd09ab62658db7418137de8399a63fab128c9737967cfeb765360ab87bcdbcd7991b788f84ba2625a36a524a8de231828a260b90a1473f65ae817d39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c11496f798c013a917de57434270ef
SHA126c1d132c1104ed05e4fbbb53baa637328e87fce
SHA256495e18c76a2d8998e518f664c59f4197960bc1ed087a30d27b87f20201cf9f0a
SHA512edf9b0a76e6c787ba74023724bb5eeb0f491fde60ec5ddca65f99c74556afa8dbacaafcf5c2aff7c0d9ebc1f9e1dd5f6fc70049e9037fbd5b7349a54b1e47ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fb14943c8c2509a799035af107f8eb
SHA15ff31ef4bcb1c7d0336232919ea7f9e6343cd3cd
SHA25695b77995f355aceddfc58484be92d8d87f3c6e0a35f24fd4676125549cc99ce2
SHA5123785881e454a449f4cff01d5e3aceffce6abdbff532e279d44e79d7704645dea9006cc97447e1bb0bfccd716d010475055c76d53721d72e8c71563a1e13d8673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9782dc1f8d000997f51ad2744e6de48
SHA1cc16d54b546225070d66a5b4573e0af4eb2ee5f4
SHA256ca335b6ac1fbd29bce64a8efb36288b34b2b24442f68fe61c7a9ddaa86550e7c
SHA512c91fb0059eae79919532d3cd3141758a083973c5f5e1964fd2c09c197b41f14a4f7a3df148c17d82ae34ede3abd37a0175414d12e0a2ca48841128c93320b52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eb3cfb6c4b216369079c60f9cc059b
SHA1b849c2e26962ccd01d5ec62ea31953681c640f3e
SHA256be7c535eab4f8d7851e3c2ea39da78f15f9df899b69475417ccee66ae83d2c10
SHA512f7a1c3f17e70943e0b52b093413e6557673a28cc7d02212fc28e2772302ecda9e684e27075a5d026b79d015379b8905bf54743202d7deb31c464042427a3b4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08048539945eff9789621ca46f316eb
SHA18877edf56507fa225202db07519e0bb880793b4e
SHA2569661dc813946c01dedf4623d2f4fd23fcdf2b127cc40720964062938ef83d65d
SHA512c5e16cb6999c9cee5f510bfbfcb3e02576a5ed5e8e166567bf28e3600d24d3a0ba241e26217f37fbfee0620f34c33a62d4c81916e527759692331033743eb821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304217ceb47a256c93c1262886d22432
SHA10a1351fb62579ef8f764cd8bca435ffa39a0aa21
SHA2566d34bc01ecfc4d463201c07a1c1b1fd7d5fd64941e5ddd389fac780331c161ec
SHA51253b7ed87af8b55f01bf06d1ec6594bf49c028af5b7f181ed40f209642c4e7ec8b42ffbb51a4dff044ce1640267c498866141bb3b00a9381ee45040c01b4e1b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac00d5058f23ae5230682f4d3246b47
SHA1e4e3d8a08e93965637b699026ea07894071574c9
SHA256b8b9ae38fe822c9cd82470b0c1830ed6dcb5e1c57cf874930965e980a2c59d97
SHA5123509a04c2fbc2dab4e58cef0c8302b3bf375eb302f079793d959e9a04de9f569f9d8737863a6c1fe6002730fc1dc4fb532584f342211e2cb72e451046f466b79
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b