Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
b6c1e0a8d67e5593457dcba474e4d96d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6c1e0a8d67e5593457dcba474e4d96d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b6c1e0a8d67e5593457dcba474e4d96d_JaffaCakes118.html
-
Size
460KB
-
MD5
b6c1e0a8d67e5593457dcba474e4d96d
-
SHA1
db198fa940f8203f414466e6975efa51bfbe2bb9
-
SHA256
38684bccee40b7b7a19253d2f62902211b25720acd3418e4fbcf03342a0dace4
-
SHA512
b3b254dbe375b533fc3e719279a82465b5d2f3ca17943ae5fe0abefe9d7b5d1e5eee405f41cef8eee08185efe627c866fd493503db6d1dda78f8d0aff24527ff
-
SSDEEP
6144:SEsMYod+X3oI+YRsMYod+X3oI+YVtsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3D5d+X3755d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b7e00a82371254bad786edcd837d79a00000000020000000000106600000001000020000000159b558160d4ba211fb7463c49546b1df62fc1760339c921d950d5b99eb4f609000000000e800000000200002000000088f1c96d2dc734eb0ba2f61c5fc020fab83806940680542c074b7968828b949220000000be6fb8a888aed2c68e252e1183ab0683f25f52d1b8a755a0ccf926ab55838a6540000000827de254e70bf24d271ebca47ebe67de0af2ccb95c70a50f909585a65e20d792145aad8bcaf85d59b82c29e3cd26978e498f9084e95e69d7904e5b75c829f4dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aee41d6fc0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{455A1F31-2C62-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b7e00a82371254bad786edcd837d79a00000000020000000000106600000001000020000000694584dd88dc1b55e5c827d0b1d2c53a3bac7f815e0ccdea436027bd9864d285000000000e8000000002000020000000ff5c05fd3208f235f33e0d8df525bab7f8cbe941c1d4a322ff62a2af321862fd900000004930d00200c3166a30b45a3215529142e4a218ad859095db48b84d7a0764846ba2304159f111a0b70a48e4ae54b2bb4ac189e61a579e5038cd34677e8ba2350371648d2a2b25bed09256d04d668ea341939b1abf9b741b0443bdddf5aab1132970272286a7cb429191a4cd68e7895a14509c4ce977c654eb23b55903daf1a34957160171c11f9a4b313e83b10acd4b464000000009b88fb6f2e3c81425c0d38262e71c25a6ef6149251b22ad7f0f8e7903946d4f8aaa23eef96ed545a0c3317c27372791a3fb4009c87cb822970385edab1d0a0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424760473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3036 2760 iexplore.exe 28 PID 2760 wrote to memory of 3036 2760 iexplore.exe 28 PID 2760 wrote to memory of 3036 2760 iexplore.exe 28 PID 2760 wrote to memory of 3036 2760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6c1e0a8d67e5593457dcba474e4d96d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fda9f881716499470c4f9eb77ad82f
SHA1647326039b2fce59e92829d1810a1e8e27288853
SHA2569d3ae61af0d8c582242a0a1389fe3f0aeb0f56fe62a04fb81bbd0c43b3623e54
SHA5127a61cadcebc93c0072730be0a68b6ae582b0193cd816c142874039a7bcbc3f7ff2243abb6874ad9369e5c17181a2fbd0fed4f550acd5614e1606a80ae0e88445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892b9ad90a77c8f9fb0e90dda4461d95
SHA11eda6a16aa984c282f736a462511c004e077775f
SHA2565546f78e05779749645d2a8a04d4748c5289dab89d6ba2f87228f6692c2f2257
SHA512764994b4810534e34e29fe9924e0c5002c30940550da0b74b21f3f25a3b943b0916e16414b12508aa003cc3eb004b344b56dc68e7e19dca10b627e9cf3481114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736a925e705e206b2473f5f8394338d2
SHA1ffc6f40f46dd685b27076c829fc4620cba83296b
SHA2565287bf1bf324664be885997c63770f6e4ac81eeb5416c7b133b7b967c0a6a21a
SHA51268fea879d7f6f37347b67abc6e01ec0f82546ac145a6d9ec455474414b72a9e83f55df25a1c14a66568f4d305a61c5d2ab3a3632caeda6fa827cb56d33785053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922269f00de5a05b8a251b708d237d7b
SHA1b65f9740557122f2d81f530b8987f102a56efdf0
SHA25681eaa0352495e7c98d4d8a56aee150bc045fb5737c22deb20c62b7c84b1ffe6e
SHA512bfe387b6260a6ca081ea124641c087d1466473e63804f6256b9108e770f36ecdbec28a654d666ba14024092f28b7dbf92fd9c030204dfc14b4cdf97065e07636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c13a00c1ac5284fe9e0cf88bd9bcd8
SHA12b0416e3be8ea72b7e8f22aaa2c3de116a96082d
SHA256b9204bc323ab14f2d2b64127283bae2b1132c2ab04e44fcde5336ee0edbb7835
SHA512ad0a8a2119c14c9274c4c18ebe6236c7363609111bf77583e23a1ff570a8f1736061f4597428c844b7620b162ee3673c0b8d99c188f1383709eff4f22d23983b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203a27909a8c3eea8172a37fb456bb21
SHA11d46be473311052958e98bf9a0a731d2f019a5d5
SHA256131d42279f805bbd70e99dcb8579b3377062b59dfce64338495c30538dc4188a
SHA5120156624f870f50b87f3f327365732750838411246cb9c592968f86c0fb9ac8f1bdc6b7aa9d564a36d97f2087443addae22267f6dcfcec145500599c7c1d66b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1abee12e7a56d7680421111e56b9ba
SHA1c751822105ebf9e436f3d9fa7f84782dda58b7e3
SHA2560821351ccecaa1f843da1fcb1c4df9987a2681697f341348e254b63ace65bb23
SHA51200c63da5f0e3a16609402c3bcd56a3d139fc49f1163b15d14f16a81ac78c84acaaeaebc4f52a11cd15ac8ec7e92279bfe94499a5e6e4ac6aa2dfa0e76cfcc986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c21e4c8ffc39683400bbebf8a790f3
SHA17509796163eaf2311264774183098a69a34e7226
SHA256bf9e964884bf70bb569c3fc8e83f10c5675bfc6ce8dacbd90b741713a3375ff1
SHA5128510f9971c1d6c843eeb982650a8829f52acd76af5579178e0e727f2341421efc47cfef955d54fbe429079ea0f7bb6af43d017c62f0eee9d56c0b3beb61072ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557483d720fe57d1fa281429bc106af52
SHA1499c02b94cf125f70e40d0ee32e6a5f51c1ccfca
SHA25616c6eb2617098a52d89a0ea5d4ea8c0113e0884b3391589b6d8da47a05a1fa5e
SHA512e55d53873773b85190d772a1849ecbd5d53c9792679b503113ddb2246f9d1ef5a0e05b81b3e0a0c6d223d2ee2ecbf99b942edf51e83b3d68a4fe955358d5f627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba560ff3e5694ad694363fa66ac0970
SHA140774baa1ea7af9a2a09e7f3549c7fa7f43e77b5
SHA25659dca1eac157c59b2e2d2c77896ec0fc7b3e417de5f3b4b73e1f31ed213b436c
SHA512c9b3c1a01843792fd44684900fbd322e42b696e6d540d93faba81c2e739309cb8c29a3c4b168e83be4d9e7d8928b2ca3b25a1a868ff0ae3cc8b55b725914e05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51414761cba64f4ea9c3049c4c70385a9
SHA16d23f1f1781ca94f2253019930bdb8fb6c784729
SHA256d954f3643841f1fda99e86a003f1202a09caccaece424ddbe87ddd98273d3d0e
SHA5125c3089430263d2f2aae2fe1e2b63643f1a243fd4967e06dfc7fd1f8f0b9fa7d885b798750c014ad54fd35b6383d1a121995f95fe7fef63fec5778bf13d10b25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253cb9fbd0fae6f057001c08a4f3efee
SHA1338f35cd0c4665b8e43f5877ed0b75240d320815
SHA25688b044f59f717d8c7041dfcd9644b19b68a9ddb46b44163b3b007f63b02b36c2
SHA5121cc4f462e1f072eaa6aa0ffc18b00d1b00d3b1a45e85ebff49df1846d7dda5bffe30a5950b627103a530600db59f2d8fbc6b1a694676411887b100eda6489acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed0b2bc563ffdc38a480c7749ffbe84
SHA1f825f1d744517f2b6bc4162c900d8d845040290c
SHA256c8578c5b85181d0903c3aa5c36d32ac757c1eb7ce3ce88799ba3b1fcd7cef415
SHA51276774a6cb066953dc01ea3a3977c205d3be836edf1a6ff67d50d54b508c90189214578fc258174d92c5481bac2e6f65e30d02c469be8b30f5af8004de2bf330e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2b34950e6f6eae5eba5b38f89f46b1
SHA16ab8a182a2336bc35134a3179458c499aabf27a4
SHA2564e502b466c3c7b97b6262bb1ee76bfc73ed192e0b639df45650af6c196b91aa2
SHA5121c1e55f232eccdebd4f4b4168069208ea7c7cd67c456954fe9f582983f2d4fff2d3a5aebdcf17657de12518f389f925cff3e2e197712c83f33c394a2f114812b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3e1d635e2e5278247795caabd585cf
SHA1a6a16338ea9a6ecd6571140f5b9ab0e3ce772ea6
SHA2562140453e256d087f7fbbc662af51fbb5149359c37774d8a2bad9c47d5d2075e3
SHA512edaab9347a6b51ea46cf1a7cdcfd6b14e557807f5853fbe1a21deb83452a65359e87996e96671eedce3134d59daa1a009b6ddfa8e0c2e4b20c38195b552c1d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b24a194b7a31cf1998de25bb1eca73
SHA16081b07dcad17a0ef8c6babca2f22bca9e45f7ca
SHA2560606832fce271983f1439bd2a790cbae216449465828ba1cec9fa4b938805f52
SHA51272247b5f58be3cba6216a5d3e297b6595969e0472a6536adb7ecf69c47e79ac8826a6e1b671acb4024b34ac4bdd61c1d9b337e3cbcb90eba59d8ada7d3103797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a9c53cb0da1647a8264f3c1350f1de
SHA1d5897ed7cf3b235eaf495d4b3fd0486945f58479
SHA25610de4da7a5f4a194b2defd2039cf9d330c8f8177690b7f42347a4fe57af5d147
SHA512b0366f00162502f39671e7b57089f1036482bdaa99c4ec7f1dfbc8246d6d0440bd36ab9218999ef568afbf28af5315233677c3df65bde898a60b987bee223366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c0a4510e3251d51feaab0961120616
SHA155f6ad2c0fd70c7c4b0ca985f756103097e47ff3
SHA256cfe3e9046616f35b350ba04a3771498a40eb78593f9375bd63e4354cdfd53b6f
SHA512dbc48fa23206828c37ada5e5218bf78b5adcf19eaf36e8b50793fc887110d20c5c343edd9eac59f160d86158f0d845e095f4b3ac88ac42cad0e46bbd790ef361
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b