Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
6430f0396fd795247fbf8e93f7a3b105_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6430f0396fd795247fbf8e93f7a3b105_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6430f0396fd795247fbf8e93f7a3b105_JaffaCakes118.html
-
Size
153KB
-
MD5
6430f0396fd795247fbf8e93f7a3b105
-
SHA1
e5a10876cab3bed0be3de6ef239a80a0f1406970
-
SHA256
6d11daf6749b7b8a9d0542a8e5bd529361f464a347220a75f38d79efebe0979c
-
SHA512
a5285eecd8187e7756f32d632413effefd9bf34f7d37a0db9bef60848a5f25d49866e5da566e18c6096ed73d9016af44864383c6734bed804860fcb1045cccc2
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcn/fJHANTELO+wsMcZJoQWQp:sk8ALeg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427832788" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90441a7f60dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000072588a02dc1ef2394f8b9c59720967dbb016a998944f932933c3764b7207ef70000000000e8000000002000020000000e50f0055c11cb3937e282153c80c30a080eabc78640b81d85cedad6e9f7806c820000000ea231176ace9f6f237994d8bcc1e9c575a25c01cba5c23e95402de1834a9059e40000000f9d2bfba02dfba3c488f519a6d78455f8a8be8c674bf6cb4da818d231b4144892cc188fba9bf6752a3cc011b6d8700b3b577b781599c6632dbb6f455d579a394 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000008b725b858c4f4fb3ac8168013bc90acf0cef3d302ab84b2e8b53df057feab46c000000000e8000000002000020000000bedb53e6fcf57bd6af813cff341ee8d6f89e9532e90ea82db11aada113224a9890000000e419b0713c17802e91fdb727eedc46a1f7c24e82a17ca242e321dea9103311c2a5c095ebb77bdb119d2da2476914a0b3064d65d9b00c73b0b7cf042ed9dcfeb50af372e82767c9f93930893b62f4bc726a5da580cbcfb6a218f36a6fb264771ce1e49f58df7f680ad51f8812324d639d4f0bed3ce321135686c932207eec0a53f6082d29115544c5f7371fb7edaaccf14000000045d13163bea02105097d684b5a6320968e54389f4699f4d32292eea1480a57d1fbdd968214b0153f6ccdf62b202572224d37254a5fa846413b07cc43bbe92351 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FCA54B1-4853-11EF-B836-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2500 1644 iexplore.exe 30 PID 1644 wrote to memory of 2500 1644 iexplore.exe 30 PID 1644 wrote to memory of 2500 1644 iexplore.exe 30 PID 1644 wrote to memory of 2500 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6430f0396fd795247fbf8e93f7a3b105_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531983f852c928fb19136ba39a94a8a92
SHA1beac3dddb6dfe13c8f093602679110fd5d336709
SHA2562cf62e37e9cc565a2d20a415f7acf4667fd74a73321d12c036d8484c9efcc568
SHA512daf2796c54541ed24b843b117cca3939b6a671b1b0a7d95c376c9e4feace0f59888336bdca9b4bd01fbae5aa808c55188adcd3f651f860790147994bfce2ff4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ab3dba45b2852a19ca268651812ab0
SHA1d4a6d56eb996259d1125411c416d3bba17187e69
SHA256e81d73d39ab84b97904e6fca38c77be9c4aa5756860fe7aac36bded1ce336ab2
SHA5120f99fd042b2c8263b8f668c8d7295f13bd68ffdd760d616927990a59d2dbee730fca485f8fef5d9e9986616584de42869527e5c017e1c7b75d2b7fbdf064bdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbf1b4f3b72641d3c87def5fa2ef8d8
SHA19f5e6be1743ea9fe2fdc41c8b07bd25e30111df8
SHA2565a988cd01d4bae4fc334372183fc907777beb63e3bb9526f08099ed9411fd8b0
SHA512f6104dc7162af12db21af0f0a09fe87616159f9f850fe15e253940d7540029524bbab52f64f3b96837e1ada55b4c05344ed77bb2f0fdcf18c05e0ac5f0dcd29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52361bc21eed6e889a994cce5e8a656bd
SHA19f8db0847fb3efe0fd3b5edb65af49d39de5ea41
SHA256c29082336826be632e3fad5f7e171bead9d9696cb13ec1212c9ca3e8f136ead0
SHA51232ef7ed7cd52ca32a1ce1bec7ef797c546a50dd565294d6124dffd3888257d5018c176d3a64832bfe4bdd71d162625f43ee7788cead3cdebba66f83a6cf44f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb8a03ff2bb48d51b3896bff962d0a6
SHA143f32e6e044f06b32ec74cf93519e6ef371f8372
SHA256caa67bfcdedf099d80e1d4c0905c0752743363c51452cc17361195bd7f1c5841
SHA512184c0eaa968bea32659682311903a541d2b016b1328e0092eb0598b3f1ceaf82135b134141994ee3dab4df95b9b76c05134225fd98a4ca87fa557f01e216e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff40d19100b2365824dab9c1ff2c3e62
SHA12697a8f80dcbfc0808dda7e6a1ce644a35a43e61
SHA2560d842957632edfb6021d2ed7589a742c4421c1f6104a372010873af238b252b5
SHA512cb7ce2b9f839dc54575a9af729d5fde5b2bc8ebfb309bf33fd419506a04ee20ad46b5ce790ad93e44c7ea60476d089c90448959062004fc8c3d726bde67e7bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544151f5aa8383cf8b35b748f8375e18d
SHA1f395e9a0c36ebf5dcc6209a791fab2ad202dcca2
SHA256fd893ea935b54af1d3751f565461b84153714f0df8ded801b0d7bf352d2c3f53
SHA512edf328dff48d57bb058f5184067b77ab1fef3706f340a38c9e927d479b33a071e3a4953a7c2e1c09f4c02c907d0b14b9176bc10bf9c31a0cecf6577d1ae132aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d46332bbecc155e21a15d8d8fc84ee
SHA199932a6be3b6ba2232defc210a10f25069db5e14
SHA25633e0fa5b565ec7f9b83ba65e725063027dcdaecdf121738c9d79683e2b4b9cf2
SHA51287cbcac204b22a554d921201af426b830f0a48ea45f3f2cdc90a76a92a04592ce3251a7415a86994331eb604ef081f0ba29015f35b2f0fabeafcefb065f94dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56721d46ff16dffed7d97932b296adfb5
SHA1b45982376db78198defcd29118143441653cc1ef
SHA256e15df8bc0523e05d3457b829e68773cce78cbcd96cfd4560699dc4a4dfcde359
SHA512afce2e97c68a532ad9e7f1ea83160731ddae8c111bc67f2636e9d3d112640b0862704d09a56b57d966c18b08154f79e463db01dc923cbf75139d2df56e7b9808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d476da30ca71df605dab7d3e332180d6
SHA1a2379cfb2a0709b0c474e491e61350eeb194b2e1
SHA256fbc50c0e4a6ed2c1f6bdd82ebd0d2ba9b7eed8cccff19d2edceec84a74dd2a32
SHA512d71e6bda37f84d6065eae89a420c1ca9f0e245db3f209f81cffefe0904df18c868f3d6030575d73f932f67a8a85af13123d0b4efa62089fc09cbf45ee2400604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5af11dbb474aa2a53bcdb7931bde87a
SHA147bd37a93ef23f634e6a58f602f4149f7c41de8c
SHA256ebc8432d1982b8883075367847d70e9081e0944227d323b52d3a5901f4fa0ffe
SHA51218d4a89215e4d2a91dd9f4c6e0ef386c9cbe37bc1d67436eb763204a55b43d14f3d74b36a23aab9708b75efd0a59d2657d7db50d0e239e58ef2884c24b0398d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bbada7c9956eac3ee989ee60b5a201
SHA1f254a4aa0fd94ccb773d176939cba74f5784d66d
SHA256527b75bdcb4013308a00395760b31d29e12c39e545f16a869f60f83660661a8b
SHA5126945e029ebd8e27fbe33054819104ed046073e2621f1f6c17c0329b68f6f0d457b3c564dd4ded6b86f650c2d83425de4950556ceedb37fdf9246ce99dd316f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0e19bc0a6609511ccc847d926552bf
SHA1f607785f177ba9fbfb2f0ae77e8c601654db836c
SHA2566c2e3c505c56b996c9b3d2607cde745ddc324d8583482a1bac20fa948619ca6b
SHA5129ab24593ab93049b0541379884abf1a6aedc3070a48826b8b13488f53ff80727fb35ad3134cb1bf3caa4a0d90a5a04c11464157ea3b17cc9df1a67c0404c4e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa786b65cd6b8392c5698895b1725ff5
SHA11320de5a92c4cb5935ec55a7f4d2907cb2a329aa
SHA256190a732e71b90544d9c45e723b1da07e3e27d756a3d89bbdcb2a794124cdba41
SHA512710c5d2baca2ade1f26102383fe65871a7e5907046878011ba8dce5e9dfc95d3268dea1feed161105383aa01c3c3dbcd764d3c7fd5744970049cbb331ee80264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75385500e4241aa6ecd767749638a8e
SHA10c0efe794f0d5382cdd024a3b99d1ce315831bb1
SHA256f8f16c21b7270d6dbede023052b866aef9d509360f96b6aadf263df2ca6f0466
SHA51243fc716295e1b10fafd2bcaeb2fc06ddb3ba4adecc119378835558ad0d912ab881e23259aad6d2aa02223b3c1425dd8dd306a60b6bf63e431d46d9b0a5c9d262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50feb07857782a5164f4654bb21a96566
SHA1ee733f1b6dc813aefb8ff8f355a8372f618b47d6
SHA256d2987e8b85270e0e4b197d1ae23ccc0b406cb387f5c951ac0560bfc0b5cb9096
SHA512dee13f4f79051db573d88e4865bac60030aac782a3d838c23c0d08522f5362300f2b13c7aff84ef37f4bb41f764087ac09330ceaf3f01c8a4fce537ca388bf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8fd79cab4daba5af56641983288536
SHA107143fb6af41b02cee51e4091df5dadb92005962
SHA256ed9b6995a3545bc633f0df35fdd8f41f9e9590f36a1f49694aaa81a8767f9481
SHA5125c62b0ce48ac84ace3a04e1d1f6f2f9bf63cdfea004a04b0e94ca86cae710573132e649d28f2bd08564e3b07340f057748f3831e268eaab5a889e39c2de804db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbba2ce93875ba22f7bf5e6be1682406
SHA1236ed4483f18c1ef21340ae8978f1e8e60d1bec3
SHA256dcc503a2fef9fa0160adc3c7a5826546f2b02d0885b218b320598f8295f06247
SHA5122dd6e1d46058ce8b4a20dca47df59f7ddc9c638bb56c46b859ff4015ae296bbcc38c2169114a88d3b0ff0081c05d105882b5bfdc739a16a5f36ec17e4d49cd1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8c722c833af6ee172087b0e0f30258
SHA1a65a63c9663f0aa82dd70ac99774bb3327479bd6
SHA25690a26e8c011a838c8f319acd658743b48a212ead3b36783450b69def9ee4fa36
SHA5128e4fe5675d2ef203c3b9266341c0f989ce4d4d60c48339bf2af9be36a839383fc47258e34a9cde4c350b440e4cb033a0c0fb47ee352b1412646b21c779ee865e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b