Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
60513f7b34cb7bce666856f91c599888_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
60513f7b34cb7bce666856f91c599888_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60513f7b34cb7bce666856f91c599888_JaffaCakes118.html
-
Size
3KB
-
MD5
60513f7b34cb7bce666856f91c599888
-
SHA1
aee5b19af10647ff1698310f236244c6c057b317
-
SHA256
2d526a581a16377455c1ffd9c483c6141fdf7d73bf7360da74a6c46898d095cc
-
SHA512
0f9f7872668a26b98a25358ccf0fb2b294d418d496a292d8083b330b4d5a79226674d405c39fa0effa6c049e9a5175643434325953bdf2b694fbc8ba6c5c4b1b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422388056" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F378831-16CE-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001f58e03cee1f224aa688ef76583f0dbfd11e2033ad999cf085badd8e64da5520000000000e800000000200002000000005db9e70922002b2a0124a04dfd35900a837cbdbd75822b13e5a567e52572c4f2000000024539b2f52c89d05aa27e67a5b42923fc0e3dae8c062da7334ed3331d4bbbc6b40000000c2401a439fc047d8f512c3953c2eee86e0d8905143b0cbb1e85b55986f8c819f39687a9778df4ff83b07d6be300d997980b7c3fb8d3f0a12c9f7ecd07238b283 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c094da63dbaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3044 2164 iexplore.exe 28 PID 2164 wrote to memory of 3044 2164 iexplore.exe 28 PID 2164 wrote to memory of 3044 2164 iexplore.exe 28 PID 2164 wrote to memory of 3044 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60513f7b34cb7bce666856f91c599888_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45d3f0cb02ccd159931576190a654d7
SHA1dca4727bea6b32e08e4f63e738eb477ae7775074
SHA25689f69449b02049d797c4b35761a265cb60fd38c78f012fe84132a84db949fb8d
SHA512e714ca6e3fe73a7914857856fb4d313d8e5377cd90646c919b699c58b47a5b067b8a37e43e81e985ab878365e6d2b5cf84b875cd5a32f267a497b68eb7b8bd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0ac48415b811cc8a26dd7b5038ed068
SHA1e4274d1e508bdb8c39381dacf1c00ae9cdc7004d
SHA256f37df30408eb77026e2f8cb7de33cf070610c338de58dee3bb420828b6042822
SHA512ff358d9d7433c1e7de6a3587beed09e776ffe941c49282a6f37a2ae5cac1671d36d3d50788aee63a474f76f5fb3b799288cbb0083d384d2395d3160d8467e7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b92d9a936e508f2716cd358fccc855
SHA18d45579c2c6a1c673f1af4da1fa5b48e318a1a53
SHA256f7c563346994c94ea9e55b08286ca2aac3aab60814e96a05271c6260b6267a03
SHA512232f861cacc3a2f13ab9e9325a42538f6b51b412afe68c7e61127cc6e14c43cae9e05da63d451baf426605148ac360cb2852f4bb7ba16fbdf602f6f0c8a64756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed588df1ed20164b8b79e9b0ebb60d7
SHA1b32feab38f9ff3e6e38ca430a818e45db9f13ec5
SHA256e7eda0fd82dd8de6318b2b0a433a8363bae8a02da8c3689d0e095cd710527167
SHA512c9d9c165b3d6dc5104421c475bffd733c40aacb9021175d9a5090aa808f00c9918e27dd1cee402dfa8aafbd2243122230db73f3748a87a1bcd5f4996b537004e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5338f0a77c199494c24c3d6c7de34c9
SHA1648ce6c89f572b705ddbda8931bc52dcdf881dbe
SHA256578e60ad5ec1a6469d0dee889bbce9d928851338431e0b67c8b1d5f2c1df0110
SHA5128e779e05e165a22ba3e115f98e2748c1ca9316f8694bdd8bebd683f390c6d3a5d3a4311cc17cae739c946aacbcec7f288582a3972c9f3d0b556d2862c0b83392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e67dfa17d512dea7a6d6ed37bf8ecfd
SHA1acc1dc97c0e99aff84cd1727aa2119cd9dfd66fe
SHA256d34d2ed0b8075ee0f3c3e87ec510a266b89341fc9848a1efdcceb66ee316e219
SHA512e672faa1d628b7308ad3fdde4af4d28db2f6244321eca0ac0b820557e1251f1d48ee1234e2330debd9650aa29d542518e33eb8ead7511c62652eeb22f8ff1ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c89bd48abd26d659efdc648c4348aec8
SHA1419886b4fa86124250af51b1def153f952e868ea
SHA2568101805c348479e184fcc0562d449f683b817b01c23735547eac98106871b882
SHA512652deb26c5478162fc9d7364b12759fb2151b902b900194533a11df607f8c4219432c60223900abcbfc2b65872577e75e62b28ab122e4943d0e5a90c135722b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c2c65240323817d4a6997c7ba04901
SHA1753c776336072ee71e9b510a2fb708202ba58a49
SHA256ccb67d7423a1fd80f07b098a9167e4810cb7cee260c95da2c60abb1b24e81807
SHA512307ae8166cf4e2cd9229b667dc99d0ef7020d2647c4d6c04bcd6385a1c7ba435e1887ee4c6796780e1ad27b164e9c3da5f5913fe40762fecbfca40a7cb9b9ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58256818ca1ef5915e7aa3bc2d447d106
SHA18bf9f93402d4a43c7087a0de433ed6488a0f07df
SHA2567c1b0fb1e3f287b777a9623ae898b40a4a666a3c85d3a80c8f91f0cb703d485d
SHA512843d3070e5cdad6a634b96565fc2787d51a4d4a9fa2da729446fcd0182e638ef15ea9c1702041fa4061c5a6a5f7d5e1d72a67dfbd58332c59bf5c4d490e0f80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52142e5f58b4c3c9972b9bf6d66917d03
SHA194b5d768ce6d67d4c96be0bf937b1715d8853a99
SHA256809d1e22a8256303472df655a43dfc6eb85d1a08a1084e6311fd21d31a6efaa8
SHA512b2be4393239618205ce17714809403ad0896bd2616c570fd7f0e98e2193a8e9db538842869bcc9811a06cbebc4ce230da3012325a5da36b03335fddf803d4007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174e653fe9558f524885682a48577cd0
SHA1430b8a769d3afb6a69f53c2735cd49f1912f4a88
SHA2569155e061a07f875df5c406e0df63e24102a2172db8031d091dc0474675a26ec5
SHA5129a2dad4d3ac379f029a5a50d8541a74eae18acddd358bb74feb216b154d5ac294c3436bd225443127e633019c03aa5584d5a687e8b6ee43ecbff112e4d4fefd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585004441072265631dc7c43aea57666c
SHA130187268d79ba60f036574355d4cae94e06450fd
SHA2561ab5d10e94bc93cc4d18ec5d09be1b14f644e1789523c8da9228656be2764d67
SHA5123763fd6862e46d57d96869c68d7d43d53c174d8091248bfb79d9dcc6d74b2668bc25dfb4da70a00f62f1f888db180307fa6454d83b85685921ed8afb72862717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b703f96f614427e542099150db5f8820
SHA139e43cad8c220a0387a180f982ab03a7dcb64e2c
SHA256ecbca6a693904618a27ec29f60b1abe89a5216e4dd066e820c75ccbfc0a0dd8f
SHA51287b8a3fe4d859bf5a9a9ba75bf36417acf8332924ebef3bf8876c15af31748fea111734091b0e5e278951f34ccbb7d2a53747d42adeb1b166f692ff62a86fcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07dd666380e03c57bc4fcd775a15d81
SHA1f6ce92dc1a2c01e46a8985584da60131b65172c8
SHA256c47863a0d6457df6bc1c62837907a9270dd341e2993078d7fbb1fe4c339eec01
SHA5120f0e16b0e31e9ac6fc9d856f970701255f15a096865f28c81ee8920c3b3f7aa06766c4850197b47391e9e04001e6d75142b498ddc35b8dc641f7022d29646411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d8da332404ae2e91aea9be7c8f1d7f
SHA1634e23adc0faf43c02f5a7f2d404c69d8606674c
SHA256acf7f0fd0758cbb4961d52e1c4559615a7bf0412dfced9b3465ecc6685609592
SHA51297632153d272d4005703932aa6e22b35468133c87b5989fd5d57321c93a3e48270cfcd48aa274dd22588b9cab80aad22f3265103537a968ed5926c930aa7d877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf0dbf49dc59cd62c371902bac38f10
SHA1f22e83429c4e9c201116c4719dc83feef18b8d1b
SHA256fe99789e7501f7fc3fee81f01d5736b29409589365b57dba5798176f98168eb7
SHA512541eec44a9ff0f9cb550638bd2a3b326d776e5df9aafeecc077e6d35fe5811d0caf4d9f713b9951c637b1713b9470f063247fc05521fb46d46dda7773c465442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a1863f8a751a6a7b07229650a65506
SHA1d55b3addee15f2d591a588a68c96272ad968e08a
SHA256a29fcced84089a566f2e42a1a6c5c3a2b70b4a7aa29da3bab7b9b91d0d639bd3
SHA512dd74ddea4f059fb5268cd20b4f1fcc54a62f650046e9bf05b64a11519a2053402d949ce0b40752db6c6c0bdd03ed66ee61652e09e3cb2e7f9a96ceef066ea56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1a76f4a364242c50ba424c6ce4ad4a
SHA157fba49fd05728c0ab95fa285ddb2cf9357df799
SHA2567e720fe0d4a7c8c4163ab7fddd6fe8169502820ed4e8705dd9e31be30e13e15e
SHA5123b8aa2486e66a6ca912cfa4367adef6a12fdcd810d442f1af03136fd14e44b78a02c8a9be593eccf882a00180007770dc68ce992e6f9ef52742b114376a21fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08b3da880c666191e052c4282eaf051
SHA16b6fee2b01452ccb2fe6077c791f1311d10af0c5
SHA256a7e188da852e727253fc1f1287ab06da9d3e1cdced8a446e05cac2bc69eaddbd
SHA5122b83a089ec43bc1e8e11aad789cc8131ff79efd105f9c10f646beb50aed7f6305f20cc36bcea0b64687b24e5a29d8a4a6a26ce0fc2fe995db9e386cb8ad1cf2e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a