Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
b6dc174a3a5a290c4074b083b90a173e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b6dc174a3a5a290c4074b083b90a173e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b6dc174a3a5a290c4074b083b90a173e_JaffaCakes118.html
-
Size
753B
-
MD5
b6dc174a3a5a290c4074b083b90a173e
-
SHA1
d8bd39ac7dc0eec4db300ed87cbb434cdd939dba
-
SHA256
dc6bdc9cc59ad4af634e1e40ddeb39b5c946d0baa262cd88bb93fa0772a2415d
-
SHA512
0ad508628d52d4505ddc2cddc4e7d089516b534863cfb3242bf55a55be6fdc597a8bead714a91113807b41b9907bb26b9a9bb296cf6cfdefca3f489bd4846b0c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000045e8b1d45ab60f9b4ca710a808dcf518253f8e727fa76a6b074358abef6f313000000000e80000000020000200000009302667a051242f5f6b66f43ced498cd8b6e2d510a2b16a1d495a0cc75e90935200000005ddca28163374ee5cc577d9da68817cc96236778e5fffed610eaaa8ce25ada4640000000254eca8fd5937154a594af1b1c80fd1f21fdda8d16bb9bb29f53316e677b54b7e086b892c044165d43faf147c1d42ccb359db675d2e6dfe9ecfa599644e6d6bc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000e6cb7d733a6544e02e607596a79aa1d846b03615eaf141c48b24abddd7784928000000000e8000000002000020000000b6449c6577985076b7333922dc93fb9319ee0c4fe57fceeef776aee4b5cf9aee90000000195eeb14b801104341edc220022d2e8f577c4e51551af3f6f799b6427cd033f5634ef4b250937cc96c7fd7f753ad762bee32d22949912e11c5296cb24c6a947bc476b036f08287c88f5ff58d96f73c4cc220fab4108e253936e02c4b56304a95c6c1f85f8b76c451cdf27478127d5679f8bf94b18e7db20c39d56d6a3aa9c20b6a6c641cc079053f0774c4ae0fc4ad1840000000f08b418eeda950e589a4fefc4301c30bec3432f0ae7538b18cf4b85d3955d2af278de6cee72b01f0f6e207ad5b5ce22c8261c6e4a0d9be8006399879fc511349 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6CAAC51-2C65-11EF-BE23-DE271FC37611} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424761926" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ece76a72c0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2300 2540 iexplore.exe 28 PID 2540 wrote to memory of 2300 2540 iexplore.exe 28 PID 2540 wrote to memory of 2300 2540 iexplore.exe 28 PID 2540 wrote to memory of 2300 2540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6dc174a3a5a290c4074b083b90a173e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf263759a604f4f00e1bc900d76198b6
SHA1d3612f912c8fc869d6d4136625e34a31b7e8607e
SHA256210d4af1df470c30b9679212f634c38e021791913ee546af2b964704d2b996f6
SHA512552d70e3da7675b2a0383df18403577b115dadf8c443a6c80ccae4d5b900194b4a28bd38dd3c6cf55c941d14155eecb21e877db7e4bc50fe8c0f70270ce9b520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a510097d7f9e18c97004e775694ae6
SHA1e1f25724b85a865b3f33caf6f151074d33d271bc
SHA256305bfedb45d4fc1ac11a394a51f94f949edb41d1986fb79fcf8e0ca6bbb29bc3
SHA512634f90b5c08ac231a55f0f8d08104c687f16c834c2344aef82d5187bbe802132bbb27c7b8f2f3cc90bde5fa428d680948ddd246ff606c4bbba8b2661337b2c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16c4d1d7db33f0fd2a61943e883bbcc
SHA105a4c2864c466035e5b6f0cc42b9ba9de3d4164b
SHA256bd48b74dee346e7f127f06c89d257a13ce57d641d65828bbee8ca67e96f2371b
SHA5128d17a4d94861a1f4eb0cc6f265ef56ded3c276a3321d93d1792339d5fadb4a061128cf9bbf2f27a1a3ac97cc48ac273c7b29c3350d733be010855b7371d2b2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0d9eafc4186474c308c365fab34851
SHA1fc6727fa0402d28bd6836729ff0682d3e0db1bd8
SHA256ef427f39e6d4550a190cba50096eb7bf1a4da8c339a802637969e2399506a12c
SHA5121a67e5dbefa0f8f0455c9fee3d85acc5a7bb5730edf5dc3a738f907ff230ad83b4800ded3c932b294fda636b661ed4b9a5c74bfb610319c05f149e91d0ac5980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e6b834ce119bedba7b2ef16331c37f
SHA1ec80154c82529a4f36ea8f166250d34565944d66
SHA256959c5d78f68751401a2fac6e722888bd6359d18ed5ec8addeac161483a8ad986
SHA512147b857dda5ce389fa78c5ad44d72aa606274fa72c4065c1a90cde9ed41ca7f82e98361fd36e316cffa8514895dd29bc47ddf3c833b9d16b46f150430031c538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542acede214a74f9a682a4328c5fe3967
SHA1e380684d6b39b3670cde88405c3542f9e7f3b6a9
SHA256d8556ab583f515c91c761d37993284f4d0b24c55177bd1eb7fbdd213f520a1e6
SHA512b840a05b7b5d0c9e648026997f950603aadfc1d35d6848c436fbc0756deccaede4bb779b80f1a939c3bc2f5349f150e5d39c6fbd8911ddf6591b81ddca1c0dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c74d7faddd46455eda905400bb63e83
SHA147ade90b4c8aca056315a62560a0788a96f8b0d5
SHA2566d94b6d24573533371520deb9eb3e441c5ffc484ce4e23bee91570323238be9d
SHA5125a9adaa04d588a22d5565138c05d3f2a5d5c91104798ddbe628be02fec2b4d9e6044fe28b25e75a84524d3d12b41d9cee492f44d9066608c7e4c102701119cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec75bf32c2def022a7ffb3b6ad7c28a
SHA14dda3cad36f71d5e62baaa38260b7ca56f64692a
SHA256028cd6b2bcfe5bbf3e8b696767e0fcc43aad9f21f582e41c1a4f6091522ff651
SHA5128f91842ecf2474e0260148ac0630112cb7f7ee5b79c06d8f30259ae3cec666ac07ecc31ffbe9b5baa61593aa3c823fcd1d12c448ee1aac72adeb4a98aec79f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568404f9f7b471875e7658c4913f3a788
SHA10756950cf2d30457a89b01642bc698523678fea8
SHA256490ed6dd0058dc5963ce8e379ee247eb9f15eb2a445a19e6b80e77af0c9b25a9
SHA5126dd43f5b1e401e5d91532551a4a30e71eaac3b6a34effc3ea91fd3299c0c3267e73cb1806aa7069248fa2f2c7fe1eb97cffc234c9aaa3a91d8c7bd010be4f1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ec62c55f7f382c80897bb21d78c966
SHA1282c6fddba7c26c13677354632d0c31901adbbd8
SHA2560acaa7d604644b07f8c0e59da98753c1a6106f380598379b4f4d30591bbd0d73
SHA51269b07ee9f3f2eb4961cf05d5aade8adcf4afab5e90c089f702146877ed9fd5d1a3e8648bd4077d2726ccc619e2125411450c06dfc3a3e4e8bee84bdf2fd08d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57622a523a179771b220a57d7fc229a2a
SHA1b38e79f8b77f86a17203f0d58a27d76ca0a86481
SHA2563b0498a9d1a66e1cfa122b06f918ed2f0ccacfddcda0b8ac9407885e02a2425d
SHA5125eb76dcc19bb5c9affb001995fa97dee2dfa86d46548d1804a18899f069b3f2430fd54c568bc822c08ef5d6c68962d5c9716c92bac095afb730104d74a906379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52453ef592783264690f49c2a12fb2caf
SHA1e8abc0d6995de81cc5c7fc8cc180caec56dc662b
SHA2569421e68fee718f70cb5badf3c4754bb51a4873f6f194d283d0d6c865161b43b2
SHA51283b139682b5ae68644c78d7f37105eedb8b4976c76404bb2026440731ee0ed2d5c5b59ea9318e0d58fe56ed7f619413c7aa0bd3fece8e933cdd73525670f4491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ec8ca156a0d837e4818f8fcef36d83
SHA148e48feb29b476da803de36aa3078e6a238f66f8
SHA256e2d48bd0bc4522c34b65d3501d26209730b1a3cca982c375d99a814de236cddc
SHA51286c6716085826272120de21031e2e949002e38aac87842db85e5cfdd8debb501cb51c73a92e299a2460c552b434f649855bb8400c588aa65c627a0a93b760e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f999f5b9c7ffb8218ec9742880c814
SHA193423926725598b368b6a3c5514795fe85d7040e
SHA25644ad3d48df787cff7f0de87ed61b9611ce17dd307cc35855135e5e7aefc7095c
SHA51296fdaf1c33e174ca85feedb104967155d31cc9fff0cd9c8e4b4dbc67fb52d905748802c0365e75a64ab02a2ebc991a9ddf9f235f105932e1a4a920cd7bef80b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58114d32bcc4fac505f2ca5404948ee94
SHA1b89ebe2526142b96be31d3f6e5a3dd94e1400ab7
SHA2563ed6a130e9556133bc4e27d7458e37cf2e52bf8de094a1dc7a4e943f68b747c6
SHA512362dc30e64d7282874096c30764ae24bf5d40a1a6762409fef870c5d589a4db4a4be955c44dd9d011cd5f9bd8dacdae3920a5c424b0911afbbea3f65fb35db2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211d4c567c9b4ae517e69317c869e8ab
SHA10aeb4230ca5a3b0f4824a9767011dbf242dca480
SHA2562d42746fd2af7476ec3b91c712dfd1e35d472ad8c3dc3527a14ed33d32119a96
SHA512f637b1e7a3ca2b05073255f14bafe2c22f5dfb052ab817dd13cab209a6152586e5a81110143600acf806cb53bb6f62cab1250a2a977359a6201235d157fc9c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53bea0c18e6555c628c039a0708a566
SHA117b7de6386579b609c17bd5d6fcea9b0eb430a34
SHA25639a108c21a5057516adbb29014b059bd92ec92ba9545bd0e8493d038577a74f5
SHA5128914b0c781e04bd6eadc3f7f3d0c54de2d6738190dd6947e8e6d0bd3a51df6bb3fa9969d35674674f18a010766939bb6555799e4c28bda38e664b7043e0914d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560dbe3a5e4588d8fdeb37fb673eef6f6
SHA1a454c0f85edad367a4b08f351821c5a6c16e1b3b
SHA25668e51175a309e8eb23dc48260a84c222210907e676ab70d874c1e4322c311639
SHA5121be2ea5771218772a7bc7884b994d57c1d78d786459712fe88d8b380e5b6d42129bdfe3df5f55b61c33e5f74acbfc67d1ed134ee5264d873f98c430aed2a291c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bf4bf996357e3953f313d7575d3848
SHA1337bde17cf6219ea2f95e19966daf637f706aef1
SHA2566b739c833d677ec411d65741d984eaa72de9b6d1b1808b43da9b746d1d7635ae
SHA512ca42a333f25e6e11f1381c4f2e8b4275fb44bc2ea7e7201edb7d397c066b58287e467967beb728e6734597f1f3b27c95d642899a1a43db557a1dec6bf87cc461
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b