Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
61351a22e0807a73a480c399c1581516_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61351a22e0807a73a480c399c1581516_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61351a22e0807a73a480c399c1581516_JaffaCakes118.html
-
Size
4KB
-
MD5
61351a22e0807a73a480c399c1581516
-
SHA1
51c4b423f78ccf6f2ddcc880204999eeae6ddd01
-
SHA256
0818f33022626594521e0ee7235a684100efa7d83fb4cc091d3b16be4055486a
-
SHA512
cd63dc53ce860e50e90752851ce4e5c31f8b583872e210f37f1ee2348d19616880ecbaad45a69e8c144b1ea47adf714d4def4d62199547978f47270eabfc6cce
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o4nVQ8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9007B61-16FB-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60be89bd08abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000008fbd7049635116d81d9034ea8ac7f233cb375b2689fc5ebfdb1ed25c5a95a5f000000000e8000000002000020000000d2ac49685957a73ae4219559a21c808049df02bbb96f4868e06d5267e27e7b7b2000000022b35605b53cc8d64ee9632666bff30bdacfacc5334175ac6a55ea63cef7b1ed400000002ef5e58f70d986075d0c64ea52adc13dcf868d2cc2ebe587873615aaf42525107209d5d92b0eb51d467493f9a55d2f27cf5de4011d5682ca5143bdb7c020a240 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422407535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1808 iexplore.exe 1808 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2620 1808 iexplore.exe 28 PID 1808 wrote to memory of 2620 1808 iexplore.exe 28 PID 1808 wrote to memory of 2620 1808 iexplore.exe 28 PID 1808 wrote to memory of 2620 1808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61351a22e0807a73a480c399c1581516_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c8b097029458ac835fc7a598e9f280
SHA1a4d5175f4b50187d5112deee4264658e3f1d5bd7
SHA256eb3291cc792adb842b353bd8697594b0c8a0eac0786ccfa6fb443b2a89b5c6b2
SHA51247b406d071c95ed14c17bd4d3eb26ce2072e61544a5df9d73cfb2ce0431e0c073d4e10d68a37c73f760b8da70f9df36d58d3e2c849e08f6ed4569f4366598db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c0fa29a0d4b5e1c7bc2ba71a52721e
SHA1ecc50daee0e71e211eeca9a551b075a4fee2c23c
SHA2561a135e9b163a8292b8dc043d178f74d040af8c6c60cbae148c1936e82b4eb5f8
SHA512085e6ed5c31830d1ce2a9e98857d286c90ef45b52b82446361824193893940649591fb2df28bbac684f1263becfb087a04aedc4a2d494f929e9b1795face41f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ed3dac43bcc75972ed01adc73c21ea
SHA197ffd2ddd7de7a7620d5e7819f9330b8929c458d
SHA256a9f47c6d6ae95675c609e6666e1caa70d346f7290594939ac78e494c7944520b
SHA512a08cd1ade9e76833500675ed04b944c715a585fc54dd407933872a6a70901674a67aa44658fb55f3b8b80f7802b072ee0bb6be50953f23a86cefd741bac3e2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7af0346bed92263f6219e65fe9bf459
SHA162900bcb514f212bb2008550bf5064eca3e5077d
SHA256686576c1726d079ae77b44cba6d538937735446e8c4f90b03b8edd18e9fa4e7a
SHA51249247fa03890164d706ad59f549711018c3e123b2d6e9dc85106e48fb0e4ce7e9338dceb27a94c3e8320d9dae5df192ca0b84d9516909bfafaac77c08308a298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a779c5d40041c928c66819302081e22
SHA1efea5a6dd441a6646cb04af786958db3145d83c5
SHA2563cdf6ea5567d2c018d3345effd7a0128dadfea0a8b3297585ae3c63f5e979b71
SHA5124400b40164bd6fb647d3072008a40616ae5f0b552d0548562e461f2911f45214c715f044e846044142c0982b27cb124b6dc44d40b38734828c97c52f8ccc1134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d8e90395772806f67f58101c6f304f
SHA1abbe471118856abd278077ea57ca450ec22470b8
SHA256322b8cf29e420db066a01318dca5b4ceffaf4140c7cd3606dd5b022bf0be2e3e
SHA512a56c2e4e6c8e5a590ea5918601945d0af6a813da8a0a18f0ad54f24b99cf5d93b9e71f6c0d7ffb0226f92e11dfc62cbcdff235b9e435a9bb65efd199bdf84a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28a1f8c62bf04ed987b7e6d387f5a49
SHA1abd72b82d5ead098007bbbc65d9c74cdb04b1b28
SHA256b831b454b3db4ac60ad005412c14f4849d2f960731407e4013637c0a07bdcb38
SHA5120c2f4eed96064641a5d862fdd84f170f3eea0937e27d11548ae1bcf66a3312e9e5034af54481473c948a7c1b57f975593e7ead8cb805d71cba2928c115f25af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb6b36acd2ff8043798be3cb6ab49ac
SHA1fe9981a37169485b2a88cefe213a623bd003acea
SHA256a6d101a71dd62d1597c76d729ed7ba2b3404e1182d06fc16b405aba1526b1d5a
SHA51260c2b1583ca0bfe9d3002e0f19bf0a11a9983dbd627b646ef35dd5a0ddbdeb9172cdb0b1db4adeff3eabfcf589df7ff92355b316aa484c26b59af40b46747144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52753ebeed9abf9dba753a893348c0381
SHA13f292c167f697b14243034054678498fcf74a74a
SHA256009ec0b60c3c9dcb285279febcabf8b9bb49dc7338db6691cda8456d65d92c95
SHA512f059b3128af30fc2864aad2ca8c689bbd4fa1893aee04f7e554903b69d97e08bc89005254062513768f9ea351644bed8d99a282f9061fa99d130909be91c4e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8ba9410734a994f748661aad49e6a61
SHA19e64e394eb814ac53149c687b90c5c0e1ecc4a1e
SHA256c4373ecbbe64d9ee6658ce87cce53f286f9c48879fe5558a94cbc3db6e0be7c4
SHA51243d78c0369d3260fc744a9631aa994ead86a8cc46452b15b5742c28d3fd03482a67034bfab11da8e9d642a6266d5e5fca7fd2be25ca06ba2ca0814e6a4335101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10062e0a20f47beefcf652008f8f7f1
SHA1c2fb4a9568c51edaa3bdb9b0fbb69944f4170851
SHA25690925d40d9f99621293580dd3902a73a88b0f15dfa87de2ecb786951653709ff
SHA512f58bf837e3926a31bc92040d000c657594855c13596b78307f1c95a7d3d2aa0a77e5e8ffa46e5a0d81cbf71c25ae9b91146644708d363aae0200f6adceda9c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c958dcdb4b04108ff5e9bc60515caa7
SHA19c2ed0ad15ed9c64d4956df59f8d61b08c389bc2
SHA256d924f0e6448e9a08db1df0887059a95cd68edef4cbe885ec94b237e2482561e1
SHA51204b7fbcdb4f27e169971f721523401608a46f64901e71feb7c66efb2b37f66b1a68934f142869cbe70a1ff10d8fea75f5da74aee8c86cfd8077e6636b7850b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667e9cbf517938b7bd9196ca56bf40e0
SHA1fa52a58289219fde3a4974b21d985ac7eb138124
SHA2562da6b29eca07d67c10f1dcd449e272806abce3525bc5ffbbba66f5d79fd37109
SHA512c34cfe68be878b271b8f78fdfda9d57175a2d0f478aca1f6caa14a03b65c08c53caa1e571d494b80fce2c914b287d88a3dcd77a02d34acf9bc13a3267f0a2a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc5ed5bf1a1bfd744ce5d37ef97cfc5
SHA1863f5b700f5e05aa6c6eba628a7f3e626c9a0b14
SHA256198891d4902b1511eb3de045fdcb670905e907809a441c92d14904b0058cf599
SHA51254dc083460649a19743758ce6c193b113e48dabba09e415902928b8fdb9a6f01cc9ac4c9ed6d929154535059c90c58304dc38424b013296b07cd614fe0c3c8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bee191d213dc80b2385e3cf862d71d9
SHA19e311a3f50a4bbf62102b669774dd1d307f90ed6
SHA256017d4742c509bda681a3a2cfa13a59105d9a7cd69b9c53e6d6b62c65e4751d40
SHA51245a9bd5b831e8684caa67348278af291cf53404b7fe84b649875f80d63cadd5e674eea5328016530bb8eaea8956719407b12c7e1c98b8bd6dadf355530febe8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d24f433ac14f38f3cbe9250979734d1
SHA11d6c03b22fc85e6e8ac78c3ee3c97ba76efed7b0
SHA25609e5dcad37e38490a2adc0eb08bcf63a7a8f6ca17c8fc66990acbd167ee51512
SHA5128f0a874388587c76fb4dcdfb93203fe4571a39aec2ca7ffc609f7d86eb7824877435d7b82f9f2ca18bc151c0b918f9fd22994f2b3fd40bfb0230766df5163b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56adbfe25541187aca3b39d56bcbad7ee
SHA1bf43fd6fa927999ddf38b16e69f9afc218823466
SHA256818881fab6c833077fd3673eedd6bae79517ddf83fbf396cad4e2581f94c40a2
SHA5122e1ab1d39163db98ec23d91af4728ed72bb1680c5b92c1b3093f18fe38f3d7144689a1afb9a9607a5747057fd3ede7cfed10eba638e0886c5646ab92659033fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b0f85563d98ed6b7641ae7468999e3
SHA1e7b41b129b2cc73f0e2eb0dd89eff3373c3ef9ab
SHA25662c33cdee3d890d369cad92eaef286988dbc077588614df211b7d3de319d338d
SHA5126b122e7a12beed10e1dd1cb0bfcedf93fae96c3680d18a62301a6c54f895b9edf1c469b1bef1340f77de53c9d66a61a9c33ebbc5a8c03dad8a66dbfc2ff2f976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35ce17770ab2683a4a2ed2c4400e37b
SHA1e9ed57be5c79a878735b25eaa393ef6dc3605fb1
SHA2569ee42dc79d8873f464984a49f1e582099e7381db51b103664567c8e925c464d3
SHA512ad4611f0fb9dc83a3b824391c3648180f01315f32972c578600fc357a9fb3805ee4be700d82af494dbefdc4798517153fcb5db29f0318faeeca23ab38ed6db62
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a