Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
06525869ec597a7e760de602dfdfc0f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06525869ec597a7e760de602dfdfc0f6_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
06525869ec597a7e760de602dfdfc0f6_JaffaCakes118.html
-
Size
163KB
-
MD5
06525869ec597a7e760de602dfdfc0f6
-
SHA1
b80e28c8990f3c89f42af024913f642feb952593
-
SHA256
ce8d42b8475083f4e28bd567fe6cfb46c7bf843eb399d4a06d2feec68d0b9f87
-
SHA512
2b9064d6bbd029fcc2300a820cbb97f5447d0a1d04b1e265520c10eb50c41836eab11f800577b43da22fa0dc77b430ec69152645bf481ba01136094dc0121674
-
SSDEEP
3072:hWpBIgHUTQFCmdex5RgYwdNiQkIw8nxCltlie5g/JOod4hI3lEfGPMU33S:4pBxUTQFCmdex5RgYwTiQkIw8nxCltlz
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05b4a8fd2c5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068f89177d69e734c9a1b3f3a98bb1c91000000000200000000001066000000010000200000001a8d615bf9d337874e1771c7a79a893f4faa33d6792414a494b09acaf94bd0fa000000000e8000000002000020000000311aed5ae7595a41b0efe20c9b11f1b5f657403e8547d15852d2e97a060ec88f20000000220400066841d053e5c9b90d2f96b4e070d8adf827d46ec10889170a818e7a5940000000c0d1c2995a0baec541b1a6410fcad83eb9c917bbd09f346bcbb570d6590ed923e17c227dfebdbcd9ed9e44737178daa6d2e5868031460f1e2cd9e07109a1b1eb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425352851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{821909A1-31C5-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06525869ec597a7e760de602dfdfc0f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fe831b40d7b68bc2982388351390a15f
SHA1e3de80c5a3116cd694e48a1c9f855c7a17e5e2cc
SHA256edd83821a07910fb209d07270817b1f3247632964b63498b439559704c9b49df
SHA512cb539542513c8bbd158c15818b44daa813887b74e3a25b6751364d26e3668aeec40e4c5c76b777bb2f534c831115cbc1f1e589fdeb49b6ec6f400dc185b6453d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab9922fe62388849c2cb182a9cc0420
SHA1b1b20f72c773ca4481a267f10d4ac0d8139fd8ab
SHA25662f5673cb6fdf1952dfde48b60bce1ebfd564314bf5df41025cd99e10283e97e
SHA512aa0c3d8763d5cc528052fe42aab62cd41cf62596bdcf82f443d92ae7cad90be4eb1c0212ae86d51d0ff1c46ae341e4eaf355e3d1c06a2a79c5a87337c6e10b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e343cbaf3a47ac4d21dbdb8eb00ddc7
SHA1f11824736d5b51bb837f92e389c955dd7ff40112
SHA2561122c02cd55632bdbaf6433cc5f32aefe710891faf470aa2aae02b217dfe40ef
SHA512f8214a2304a6de8adaaafe73efed4b2ed8ad15ec6732c4e0b32f0139bb4ede31203ed1678cc82e1dee29b20208c54f01b53267235f252a2febb3cfe7103fbc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b351a834940b72b2f56d14eb3ac0efcd
SHA10329dfb53af9d7096850a1ffe98c9d77fa5fee49
SHA256e0ff1f9b47dc17fb376a36dd280e99c2dc4f296a923153674d2f85bd0d34edf1
SHA51234426462d37b81840a38924cd80f81d7905f2166fac25aee1dec9dbbb1b27fbae7f57619e7fb69f3024bff131668f3564ea70ca5e012420cd7ef76a1a35edbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bd83bf95f4c08adbdce29550796d1f
SHA11825fdd00c51213444fb408e5b2c255b10c80eb0
SHA256433641267a44cce1798b8f480bcd52d47a5907b5f5d8216365a3eab10a40cae2
SHA512507d50958d9d70694b97122a94bb67b382239393690c8a841eb040d3a5db3a2a9d2f3ebcdd2e67ad460fd2677597a18158515c3c240b5aaf325210a71838f837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59335a5bca57d3c6bf24a873e76574f01
SHA1a4d81488dceba52f863076af85e134ced462df95
SHA256a7aa3e65c974e4cb624ffcf719bf105a10b2464950928dc0db0a87e084f345cd
SHA51257cd53f9c7577409fbf20f210ff00273b60574763a40e7985346b36e5df7b2eb899dc1c71abb96ca34484b0180297b9c857c9ed53bf5f367a733208e27bd0834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1cbf89afb771f2cce4209e03a98c1d
SHA12772917e9a692480f1933e756c03e2a1e2f2a61d
SHA2568ba9a6fc5ecda063efccc9699a16aacaa82fdebd6083d26db6c79ca8de1b302e
SHA512bffb9f5dfc987c39346751b78627dc404b8e5343958baba375b4eb257a79358aad3478b50dea0e726cb00bbb8ffd2d81ea2b70e90c3bac854d8216c489401743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062c88ab2cf1d66acddccca0ab944ec9
SHA12fd0879adb02cc5760fe02b27becce99a7b9b6ba
SHA256068920dff475a870c6aefd06e69d694aba780c7f4aad78314481c8de987a2cbc
SHA51209132b4a751a513ab50e5b6d4b2c6645f0208ccf7fda3c5991525f86a7e378329d0f67cce60e6e096c243065ce215306ecb36806034c5bda41741370a360ce56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfa09e773692bb4b004bcf3f72d4df6
SHA173b7e527220bc414119a43d9f931e219c12df85d
SHA256d216100b10774bff46ed777af967b77ac3d5b94d74676a0f062b735c5ca3992d
SHA51240fa6b890d28708cbafd5650630df44301f491da8a75d21eba7c00c8a40117bcf5edc8dabc7b51dbfcc65e8dbf59ce2e3a9291051343a5f17e5d3ba97f5c3306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf3f287002ed126457003b76e8f07b2
SHA19a04ce8e52590977e5187e923f9e8031d04f112c
SHA2562fe42d4a0e3254786422d2fa124a9138d11849b93ace7fc39c3bc141b4e5ff98
SHA512efe4bb0977a90f801fe3dec529494a2421541ab9b2d15027dcdfeafb08cc22c3ff3b9252bac236c3c746dcf1e65e2fc8281e26667b90d6ca9a52ce26f6ba8b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7dffe25d4114d0518c58a3801ac90e1
SHA1d4f265c15418d0c1ad4ba05390ca220374bf32d0
SHA2567ed2761c0a1c5db83a39f213648c0e421022bee219e72e57735a79d074f9a990
SHA512a97e77bc6c9d7ea885111a2c33f19dac446ab74e4446d73fab81ba57c1dd64a90354fc006f48904e10a836a04ec263af84fd69acbae7b9554d2778f31d6ff2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578963c3d86f89695ce59111ee4bea5d9
SHA1c1f31a9052b42b3fa5dbe34cb3d305da45db4ca0
SHA256e74882fd50149817967fa966f782ea434fbd6ea3e1eae3e3879c5871d1acc078
SHA512f24199de8476a03e265fe36cc094121c81c87cb3ebaf9ca8cd114558024cc8583e757a79de4d57569645e59d00a40c7e693b816d184bfea76661e333a3699a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50946b47572f38d7bf76c143a3c11e38d
SHA19e44c73911371adc3f031d7318c218e8d5107b19
SHA25662d999370166dee6ab1916eb5c9a5782c57454f5909130b83b8852100115f3e1
SHA51272351ebd5cd7067ce33a0c388d9c85c1af45d6849fc227e20a99a4e914a66a5764174f7e95839afd3125c7cc93736b4fb02a338e0a22726ee672cad95677bb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d1238caf939807f399597165e1a359
SHA1a7d73ea4f2ea8ccd010c9be22c0cec492a4b8603
SHA256593b18cfdd15dc3938b7d3f97d33bd3dde88dcc02fc11c8025a760c17b543915
SHA512447afd4fbaa083fb0d6ce5d74e95e092347763c03b028adb46672b6c37647ca81da2ac383f092638e5af8d3ba58f1a4bc0d15e8508952f77dc9b988e79a7fd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c77da83b39653074d397e9e57c0608
SHA19203aa293137dcc76dd1857ab969e64a5548fa74
SHA25682d0d47bcf71a3fb22d0912b15cc733fdf5a22d2384f410e0ee29b96db3e3de0
SHA5120ec986fa26595fb3277d943d2eccea5c15425abd5f2130eccc8dc6ced3609ac881711d4e42ed5549978e944e677e00e24a5f1dbd3ec19278252fef215aa3a08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5770af5b0007c84a21b1a093c5a159b3f
SHA162d12b41023b9e6cfd5cd0a73fa1aae39c9d5f74
SHA2567de0554926290f1177fe82d165ad192855f497714d57935229062a7c84b409eb
SHA512dfc260b3b66995e0966a98161fc7d40238c381b6d202805474637591afe7e975a0ac79e29e2e3fdbf30b0291e2fa44998ca20e9db35218db7613c72f835d4236
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b