Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
6376aa0c9b93907896b243ee95f68de0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6376aa0c9b93907896b243ee95f68de0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6376aa0c9b93907896b243ee95f68de0_JaffaCakes118.html
-
Size
101B
-
MD5
6376aa0c9b93907896b243ee95f68de0
-
SHA1
51715514de14682e3f1711532be6d4345f407609
-
SHA256
9601682571598b2600fbbdaf8cea5adc7af667def6b63abd1c0d3945e0fc5380
-
SHA512
631b6146a739dac4de52752d2fe8dcb6bd539e21e8032d92f6d9c39c667ca5ed005b64d11a8ca8a268a3eefc7821e1713a1fad90aa7481b451308263fdc0491d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fb02ea41dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000008cb6f786d359cd2179f3a3392576ce10b281a3d852cb0eb5dc575a5c84bdc6d1000000000e80000000020000200000005d405fd9f8c9ed33cfec8a71f8f0e2d84e2b721ff773e5a85d0bc11dcce4fdcd200000003a8208ca6b834c79c766bce8bd43d8c5671893f4ecd9f920569d585c76c9173f400000002e6c9d911bfd7cdafb9385744b497c138e804a549b207829bfbb82bbe7a936e39d9fe92bfdb139ea04d0566cec759662ab080ec203dce3eb8edff5224383ddd8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427819698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13B3A6B1-4835-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28 PID 1916 wrote to memory of 1620 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6376aa0c9b93907896b243ee95f68de0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582b9c4f41a49c49223307db3383f36d6
SHA129b14c4729acebfdedc28924191d3605be092afa
SHA256cea52d97e4caecefeac429d5e0f4574db60e2b9246e2dc2ea479bda64083ce16
SHA51239984b342633ad17a2aaacbbde852bed20dd9ebe6d30876327d93daab9bf1a8d7949078d516c54744404aaf62809a5b8f33e88da46d9566fa19d2f0288b2722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512724c15e0ff737b0354fd7ac22402da
SHA18f0ad7c0ab54de38dbbe2f8187816d1fb17ff53c
SHA256340b4f7ef297c862f01722090516bf0e38a594b4d491a889cc2e2ff73cb9acd0
SHA5125dd039bd8c6bfb30e4a134ff00beed7ac55d491f6a79788266aef6321d0a5f85294cdeb55c0fd1362b257071b4f8433521cbb31f606bfea6dbc9f5f0dbd84525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580564a8cab84a4d048b3804bc78795ac
SHA1b1ccb5b78ae80669e9478502cc0665632321b66b
SHA2569301c20886a6d11ae0376157a66e2291f73cf82ee9f36bf64ebca44eed5bf557
SHA512a60377f0bef79b10cb0e2fad7dd894b60ceb1bf764fb397f340a206934392a1aeef6a6d6ef57a1c384bebe89bb61f2e75b7909a6404bd9c991c9eaa21e7ea1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ab9297e19d4f933b1af3cd3ec6a4263
SHA1c3a92531f2bc6c9adaafe3490da8412c705730d4
SHA25681eb9de94e6548ad205c82dc123768f7db6eb7d4dd15b565f7561c7afa6b04ab
SHA512225f1e6f1e95dd86f276eda37c033755bfb70f9de9c941898804f46ba59fb84b287fb63c1fdd3649fc3c80fc22bea219d092d1606fe81ecbc23938a4da37c729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fba648b0ab68e44efd9bdbf72b2afb66
SHA10bca4587bea138bc86f3aa92fb704b1c883298fc
SHA256ef27365876a35c70d9099d4287c2324b1081c91fd4cc175deddbd3dc21e94d04
SHA5128edb9fcc557ec708ed6d49fda5dd45987401d30e2d446b347172831c0ec8f8fe3d9e84cc17138ee48ed80f11e29dac17a75f5e00615039511ba095b3883af01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cde4d4b664d857b5d46c8764d7d3c182
SHA1819db21861c2d97ef51f88294b67f05209b9b4a1
SHA2565df7a4095d9daa0449d4976231c47a3810d4e834621f7685fdb932e3f8e31c59
SHA5128b58edd445b566936c858fe023e78611f386492355938eeab5620d221dbdc21386f18b24b29ca0b064221c2dfe98cee9f3b6d18ecaafcefa5d6631efec989bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d1b563755c23d36091f53b3044b4080
SHA13ce60fdc09cf2dfe2d0d396548b1cac915a7a504
SHA256cc44998459fe7c45f2d5134de6bf08889669dff2abe8fe495787bb581dfee607
SHA5127292ece07ff39d3e9af22143f3c816eaddac671a7bfc7f76b0e8bcfd53227cc4a2af28c27aa5a758526ce12444ceee525c2de0ec765b967720db18e6e69a3ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7e212cd577d855879741bc0185d36ac
SHA16f48328817d576bc443d37990bbb4196163c2c24
SHA25650015cddd5060fd8ed8d55e49a86275eb3149734bb2c68279e86d2a856f7456c
SHA512666f4cdc5ea144ca1ae6dfa13b91f6afe1cf5f120540e2d2bea65c7ba6a7676dfefcfe49b749461dec2903bedbaa397ab6fb21cc039aa3b4159aacb9fd0bf9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5ca632f117c627a2e953ccbd52b3fa3
SHA1305c17a92e06e9f0e8a9fc6159ebbf2fa48a02d7
SHA256747bc081d4cfb033f776294682f5f81a2ad29e2d94946ba929428d28e780a6d5
SHA512bcbd8108e99f0e65c829298490f92358b462b85a4507454640344388da1d274650d0678e223900d848ff3ada6dcdf63ac9ef526e26b525674fe85fc75f921fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5441d606e77c122a97c2f44b93ff84278
SHA15abd55d319f500086f6e96e608c6d7dcfb11be36
SHA256fff0d3f724ca6e1c3936b7b772d33f7c0c7cfcdad2cd87710bfb9dfa31b6c2ce
SHA512ef3ab0e1d8bdd159832faf88535231ff99f38286ef1562749d5fe105b8964bb08931999b3a206435b21b29551ea863eaf16b949c3be602f53a12806b2e80dc48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac218ac71ea542041d9ac04d163c2a05
SHA11c7b66676b3be5588234b551968d34e791a8cb2e
SHA25631855a07c3950bb00b79f1708fdccdc237023227b8e5059964c7807424830295
SHA512ef85e1474c817079b59db9d4d11609ee02c8302b680d05b47d10b53d5b727ebc59759a0608743b9af7b8fc558e37efb250c87de5276b9963d48f9e2ade54e5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c0ed60b209601d6a30c15485e874d6b
SHA1aac7e849f4878ebc9124b42a628bb1af2f97ac4c
SHA256d56450969aa62555fbcb68b0b7bfb740a21579b3623b74536e65b4aee0c355c4
SHA512f853f1663d4d808fc97de440ffc3f2ea9c3f89a3536654626340a5915942a763e3627c584fcfd3cb595da8b316a80b44fd867931adf99eb9b36ea4770b6e4fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5771e4c1781746794ccf40229af488414
SHA133a09f9b31cbaf546f3c602bd0039a5c11afe761
SHA256261a385b19d6cb1a4733c8ac7d426124dc03a81eda5a154300af3448e71e5d06
SHA51211a5e0f728372538041bdde253bde25428b882adaa35953b487fd816804b78879e87abc6238b4009836928abbee387e8a93fbdec16ba52322d63f51ad1100b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a66b183ba5c16948f9728e5bd76e7b0b
SHA12e25f6534f7cc302b4d80c60d961d35613008db4
SHA256f789516eed54b35d97e17c703b42d4914260f34c342a69645cd469491989e58c
SHA512374d0cc43ff93fb8580967bda33ac9b156e54074826edc0a69c25115da2e606beb97d523c8335298051237bbb756de027765323d96f85f6d169f53aeaa668f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5097ef38d257ca1abebddd6d15c1871d5
SHA1815b415ef0efc4e62d881f50525ca77c811cbb1e
SHA2562e1b33e9072e06ea8402c0326de9596c2b89403699e8f6ba8f7a434ef8f099be
SHA512ddeab899e4aead6e6dca1f28b73c638e8d82f010196a79be990ffd5ae22c9f6ee8b7643d55b7ae25e48b4c3bc870bfae7677c54490d75ed19226a225e129baff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c124c9ea6e6c3866fb81bfb9f8af8002
SHA1865f8d9903ee735b7284950ef0128a9d5dc51cb4
SHA256f8920f6f93c1e6f40b71b9f027006a39768557959bbd61075c1b1cb36127d3ce
SHA512134e0c910d41dbbe7c1cf4723c51718850f235efb46e508b9a5be46a3243c45772af10e658ed0430bacd7f11b5c0209a1c672eb7cf1a5dc9a5c1f54624feadf5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b