Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
61256b8c106cd00c844e1208f761d8d0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61256b8c106cd00c844e1208f761d8d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
61256b8c106cd00c844e1208f761d8d0_JaffaCakes118.html
-
Size
361KB
-
MD5
61256b8c106cd00c844e1208f761d8d0
-
SHA1
feea9391f77c40093111261c8be1be3f36cd4faf
-
SHA256
e1da6d6956b52dfcae6d4a4aa61d2400874b0eae9da98cacacf1d8974f0a38e1
-
SHA512
ad2e185f482063f2c76b0f0431fc3ec3d3d7f3b188dcbf0a4a8a5532f412d595a75f3626890cd411cf93259cc2f4fbbfa44b866823314518e96bc3a8b8354a65
-
SSDEEP
6144:ShIsMYod+X3oI+YqBosMYod+X3oI+YTsMYod+X3oI+YQ:KW5d+X3g25d+X3N5d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000fc23b4fd20dd033ed4da98ecffc71ccf1cb3175ecb356b3ef41ace785f41518000000000e80000000020000200000006ce0718289a1d65ab781a215cf1cce7f923a2c51414d748c86917b875307d283200000000dfae82d583d734b8a80d036633c5565dc51394aed026aee736358430e431d8e40000000c677a7275a87cdae258af4fb865ed96024e537448adbbd143c02affc257487c093983fb6bd5af7470ca1d65af8a68b2c39822fccdb34953c7e620fe23592d441 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{231A61B1-16F9-11EF-AB01-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5090a63606abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1532 iexplore.exe 1532 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1532 wrote to memory of 2704 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2704 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2704 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 2704 1532 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61256b8c106cd00c844e1208f761d8d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5083d82dc32d8aec1546546546e17fecb
SHA1a33194a211297bafca935d108c13cf9d9a669f4a
SHA2562ae64f47aafa94f246f06d227c5d6a111f356984d997d8e8ff57fa23e9b82ab5
SHA512de3c69204c51a4bdd0ce36c5223cac3185d90b711199337bf15f4d02f63dc12bc8836c2516075846cc623952b587d19744f03264bb0b4cc3565d3692429b54eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54823f58b1ec06619c51f2f1263e8687d
SHA1ca68d4a658b333cb412738c69beab12420cbb0d5
SHA2564e6695603d7747e829d96b2b7448f3c00541a69c0322f35f164748bed4114524
SHA5128d9de8a534b35ae7d2236a812adbcf90889f02d87e6827c85e81ef9a7afd08a9773140cd938940ec90fd30affc94445354dd7a024dc5771c6eb6bf0125463f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5150a02ac2f7e554faae4b38c5f279d36
SHA17420bc94ae6f1c58dc4bf86a01ccd6c3d2639cdc
SHA256720de96b6fa2a889e61ae14a12ffc9f0aac6a52aee01358ab9bac898561e4a9b
SHA512f68017dc4ca0d662caddc61f7bc55d3a82a07895f930bdce2c7a99fe39ad912daa57a215198ef525b85cb16d5d96403d9c1873f24a2e1351d3c40523d9735717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d14168e0401d808f5889a6d6b2bf8f
SHA1b7eec9b15c6f2e010d045fa495700872bf8b8ddb
SHA256be2d015474d65969fe9170e9c588826949e6425b9cadc88a7bdf69be5cbe2ee6
SHA512b1ce7c22a27ee877ca35d9ff594d96f575838e77d79f8728e3cb6b7a36f69ac72653fa06e5f8700e413a664bb8652682c545ee8a4b7be47607363b2388556362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a2235effa0544f770d0dcc52c6ece8
SHA1ceb190db8d92d94beee399017e8b40255861f3c6
SHA2561b741c5ea47d65edaefe2b8579be972bdb5fdd8ed9bc77cdc4bf9065ac57c30b
SHA51243c80d6b6c6a40f302c6d3c6852034b54de6e57eb0e996c1ecc1c14eae058bcbff27b2688cf565c7e58d31113793cf80f8af18ccf4c297f02a1c5103f44ecb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c873755e604380a56526d05380a0aef
SHA1ee379aadc70e3c7d7bbf52bd789721396d24005f
SHA2568c1ec041c6c0b4b6d89ace90fa81fccf6285f19a684cb3b56b22f2196f5f8936
SHA512d8d69a933ff3074eec1b26d26a54de6a18d55570928ad3368528b5e4e456453ac1ffc2df34e7d7c44e3b631224ecc0904f1542796e84ea4590205b38ef9e7dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88daaed299199a9e85c898391cb9abb
SHA154fd6c22469702a0ff5d0522fe9700b977a1eb54
SHA2568f939497ef35383b84e179304cb14272b68fc7db7350329dd22be2945bc44e96
SHA512505fe47f4f8ae06bfcc0fa71bf7768470c7dc33831979d4aec7fb12b778bd92b016f0bab24b2ace7648ded59a0448d5c459eaf7e5eb835bedbcd2ae0525ae6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5569e0e3721ef38e89c01336a3013dddf
SHA1fd1355c81a11529f940b835f9551be4bb9a37aa8
SHA2561be592997ac57e421b54fb8c28aa1559cab6832964281990bdc394f83f1b4791
SHA512e10160d503f43360c8007a6774257c64cc4de66c43fd8db2535e333c83133639440ab6a4481eb462a8af855f88d819cefe61660369f600f0f28cde9e0c8ac8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b765868f3fe2370fce27807b7b1d338f
SHA1a05096c9be3f394f4e70b6613a48d19d2b716e91
SHA256f3076f01cfd5005be1e1a19e42ab89aeb561237efa34c31a40cd5ed168bfcac6
SHA5122aeaec31228acb4a96f3bbe3378fa208b0af7d8a2566c633591bce328a7bc2b8bad74336ca382f80a7744dc09982b94cf6e56972958008dae7faaf656a19dff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae63b63adbf17f7a38ea5d80a5787af3
SHA15e16b5572e6bde33578fcacd66f81333672aae63
SHA2564748d3939236c18d7395c691aef8b08492a0f4b244a6c2ce31bcc567baff5600
SHA512116c96f5228b54486643c67ebb914c79b233c5965b05f0b785624a3581925c7320a137ed2c5f0172b40cb8c82321199f0e41b6971f5b60d20877f46fe8b0a99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556204ef76e1d41bf58ac59012f6300c6
SHA18d0c287df7c47b1113762ece81a6ed383a9ef27d
SHA256597870d0e26723e68acad7b1cfcbfd710cefa3273e1c3d0f2857bdf205cee9cc
SHA5123bf9041f2384a968ce0f18dbd117f467d864da9fd2257e4bcbf362e03a45d614886977af49cea1522509249142564f0c1573023cc722a7d88196f68117c104b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56746db9394cbaca005a4d758ff49ff9e
SHA1d3ecca4cff7f5008bbfb09a7d71a827eede06a6d
SHA256fcff6e21304f1ab8f56032965d3561447f7feacadd1ac7d7671a7ed1eb902133
SHA5129567e1c14fd723b4d531ed17bd3e6dc98349a72e9dad26746373e47c88dc67867d56508933d7264529b0b496b8db9c53502561d139fae54645aa2dcd317c81c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a6d774741551412b356fcaa8ea7479
SHA1ca71a38bfcbf44d15ba0f7d0216696dc5c0810f2
SHA25657f7654758a069fa2ab5ae88f990f286ada869eb326199835b56e08208d89bfb
SHA512b8f30e0c4ab77e87cdcc1b099bd5acd8e0e2a4c96ca9521cf0965c62c98ec3ffd2fc724df8bb65c8bf4ae9fedb7ebebd64a5b447e3c76aeee653b6059dd172f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c6daf8bff63392006c527f7c819a343
SHA13e3c39d41a0566c0a6c32cd9171ee68ffa90ba48
SHA256b10e43f2b3492d03b23748a9698f29002cedbc2d20667a6f6235e8beef989d8a
SHA51246c99cb7b3c52267683391b436d38cc865beb5c83e5a503d50d4bc8f7ffecb0c570a2c6b367add1308364473fc6a423e4408d489c611abd64ca3190d0edf5c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50793fd91cdeb9ae1b6aeeca7c58791a8
SHA1d01f6a894d04462e63ae5cc0e5246118436dd006
SHA25692df292665fd2f40d46998dadc1c3c07ccca6007815eab353d9c74625fad8673
SHA512f457dc8a904accd4659862400abc9e8e8d92e1bee8b58034ce8c99d168ee794a7075f345aaebf45994432ff8e2c7bd49bbe9e662fb211da90d9f9a101aca353a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c272ca77f63d21588167ce4a17bbd069
SHA18692b59dea1ac179adcc3bbef127fa2c92e10d91
SHA25696c9cae30211fe67daa85d9aaecd47188b17a9494a5c7c3b6f08cdb63c283d7b
SHA512d13a2a027a295e8e0ca803010bb429864a6a0c367dcd7ce9865f8b20484f31a2019e02ae9c0514e033b86a4c4b3c0f8be870e4820b451d3def521d91958dbf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d9594fa3c3806936518e3a68b73100f
SHA11592fb92143107b6ee4b4dacd9d646eb7761855b
SHA256f1ba7eb82a3675e691a58086a4b750a93d5908b18480ef9c31ae91216a690d1c
SHA512b0ce9f7843b5e3274eac7eb832b5d1da0a3a0a30a81e22b03ee3edd4a4c0d545312b039c9803c36e3973eea332042d117a59c1dcabda9d66dc916c7d3a79585e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0eca65e7c3351e88d2593a89d082fb
SHA124dc147b74253c3a1900af5b0a0467e7e0134677
SHA256841f6dab74b32495af020e1f20609a324cd48d7b69defa83355e99754aea2b2c
SHA512f92ac811768474e984f50e0d20d76c9a17f9f959dc8ea9f4a7e0472c30f75a8f0f60224852047b74b4e27f8403dd3767c41f7977d3d6ed88ab07c62f6adaaf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf263353c024cdb0bad620011b82701
SHA1e0cfe665a97bfaed93e1a691063715f23f29875c
SHA25630a6c880943035aaebd9b932c6aa7461f201d4a2ce1de898393a3d4898d10be4
SHA51228bf2e92cf9a349182c4d03124d61014b75b125eda80e779a3ac4fc7fc62e6f4206d84b17c73258419d2833f755feb4b6e462e9d75d585b290f29aecbea9c65c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a