Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
60367802cfc8418310530e4da6a1fd4c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60367802cfc8418310530e4da6a1fd4c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60367802cfc8418310530e4da6a1fd4c_JaffaCakes118.html
-
Size
11KB
-
MD5
60367802cfc8418310530e4da6a1fd4c
-
SHA1
22c5be9de427d0c294b00356f499b71422ebc329
-
SHA256
b75b7cb575cc6d6e3a13471aed4cb187122860e1235e632f1447e08c203624f8
-
SHA512
78b86d799e52dde0e75cf67e5a55972c44035d49d9604cbcc2819cfcaef238bf906cb0d12bac14a52f2364dd35b590b98c76a3877d5a5b9c7ad56182afcf0213
-
SSDEEP
192:uiopjmh8tX/U+sxQkbcqEllbts0iUpkT0tVwJBm9w/b6QPyu:uiujmatX/U11be9NpOKKJTb6du
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA185B51-16CA-11EF-BA3C-D684AC6A5058} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422386410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000aef7caaf58920094d0fa0f8a4f44431e34b6ab7beb895e8713e1501990b9e1b8000000000e800000000200002000000070a5dc847da8f2ef3f975863a20ef782faae6bf0ee0db46007531b10c89b3336200000009dc49619cd5753c21701ade9e386cea58404342f877f693cea0dd0159bcfa2d4400000007196dbd4660120161065de09c94850a9b339fa744880230751ec3178751be36658f95374b9df752ac970b3049beaf4942561e20df1e2c9594e5994d02ad0b6e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cd8b91d7aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1756 3020 iexplore.exe 28 PID 3020 wrote to memory of 1756 3020 iexplore.exe 28 PID 3020 wrote to memory of 1756 3020 iexplore.exe 28 PID 3020 wrote to memory of 1756 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60367802cfc8418310530e4da6a1fd4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fd93a794cd68d5d9a0786fe695d3fd6
SHA1b42e738eccd0735c18c40bc029bc36931ee46186
SHA2564219c45ed42e4835afc8d70d61ecc531ac37646a47e46219f397bd6c6b9dcb42
SHA512c3621e575c845b75ba993872a5ae57799b7f8a4a83994e42440379ccbf8af54c52d0a04b38f270d71141a874895398d83e6b27dcdebf3d2bb407de99ebe56f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51be17e3f19abb6ec7a387f94a299262d
SHA1e5c61389f92d97f72ae19de7c6553535b6e13cd6
SHA2561c93dcf8b337ea5b5440f792ddfb85d7207c9f780c02a022686c95fa3e68d803
SHA512be10ca9cdcac390ce4d776ccc1e1023c337758b747afdadf7750ce697eac445dc367ff5311b4c999d6f25ccc6b4bfdcc1c6b923e57a763d21e5463348ce2d7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d039eea40134acd60b92e4e8fd78ab
SHA17450cef87253657cc79ed8b2850376c50513c63b
SHA2561eabd2062359d2238e73ec559b1af1b004af247a12c0e2b2f684e94c65168a7d
SHA5128ef23c8dff9010ca6e550b43fefa8a4d3aba538d1cd9d561421a801f5cec6f0bd6f623d927063a0590cff79161d3ca82711d7b1ae67eb0176f0bfb392049124c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535aa191b5e4ce594457491fa67cc7001
SHA1d1d4d6b1dbef0bf4148dd62b99e9d6e61e366cbb
SHA25678aa203ae63b8c7a587ff9bfa33386dda98d746f0266abb1177ffb2364a2550e
SHA512f10da1084d7d7d5172527c56980f449f753ccc91c4537ecafac0e205bf7e249a179f8d7fb04f115eaad01fb9eeb2f20548e8eb45eca2c17230aaedc15545b360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d276a5f43bbbbab84150c002ded13c25
SHA1113a9a55ee0973919956b2b7f39577f37294b8de
SHA2562dd654ebe34a59ab7fef3607c81621df08f799923a792be66fea2bc1d11bb015
SHA5124ac9665a09d06bb98216281f5d322360d2fae86636406ad5e56f997f66ca3a05bea3413bd7c2298369da0ba13f4d2d48124817a9a630f998a86b5d0985853dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588681ab7c04ca64a7a34df5e0342ab2c
SHA10a2c332a0b32a79aad956711a8063a46fdd04e47
SHA256cea720d5c839f5023b46a8ee69717ce08c2dffddc998f22c49d226df2609173c
SHA512f3dba1e5e1cce76d0b809d7ab0c28b5be84b8b6d5309f9f952559a37d20dcfff41a14d242e936e9f2f91946ebb0a939e726f563eef2885707a51b38dab494f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefd73de487e993d9acb8bf46277e13d
SHA1a5788cc34f0662c8e1e6d0dd765f34d8eed6e309
SHA256d7c1f48ac9f6c466dd0bf7cb2cff3594e5bdff1186ae8ae6cecf88c3a9a369b9
SHA512ca8adf4b488f2a608679a73dfa1055ba07b65587f44febb888a93f4172f85b5093fe6419c106ebec7368d6261960995fa51b47eebe08b8ba7ec451669c3a51fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d86b4388e430ae5b0947727b680a64e
SHA1dc6817c2dff54dc4aa0eccba7c7e152381882f1f
SHA2567cd20f65a94325250af0c39f0ed190c356239c9a6d46ecda8380c436b87a8635
SHA512c28d449f8a0129e3befd44c2d93e94b0c5d45dad0cb029cd0065b80b06f2036fdb4adb8a191b6d78686d7ada8fae20093eea7bd04c084f94bfc0a9e184a00e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5772a1d09ea2d81c46337b2dd1024d2e5
SHA178fb068361c9c4fcdba304babe0f327b64d61132
SHA25670de9da09c30c4652d2ef9d11e477d82dced843809be5a58ff76fd138b1ed644
SHA512c9afafe7dd20fb872279c2c4da6b7b2eaef97955386670edea39ac4e1a89eee3bc597fdf5a86157b5503bb18c804dd7b44cb7ada1f498657dcef141d69a20456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30ec58b212d210153a888c5cd98eafd
SHA1c348dfcaa9f2fc0b237331c4283c83cb7e649099
SHA2560f90ec8209e8575483d6f3c38d7a7d3a828c6b6a78df958b0fe1002d488f4a04
SHA5129dbe9dc3f9a8e896d817819eef3555716e193e740d0e040a29e9f465173c60107f6d36d31e1aaa09d0ef6ef0649063ac235ce6605a211b1dd13dccd63072bec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c615967ce239d73eaf4416668ce064
SHA152af25feeabec46e7d865b07725d54d4bbb445b9
SHA25649363e17208502d4e130cb029945000c2fff38bce7221a317a76ab09f302c3fb
SHA5129d8b7a945e4516ca271d5f888090ab9d29899e985bb112bf9ac6f9518620a11b8d66d38f7eb1de44390bbbd5757e8f6ecb1bf36c02316e51247c973429ede0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac984e02121ab3574648cd5e38177649
SHA138e68e763cb913c2e5d1efa632a2fcb71c79fa36
SHA2561993f2714cb0977b6c573df92c6b7815ba8a8208356ecc8f6c42c0c855840ea2
SHA51238eb5beb98b384d7f41fda02e4d381c6db57b8491f819af6a5a0fbc9fd1e4cfcb3cc42d08f9e7215d553f97e29f0f6792f5126ed2160af84e4b4a2abb7a6c17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8a1be95e4b4630d3d067199fb9f8b5e
SHA1a2a30a67507efbcfd19dc23775ef556716ebbffd
SHA256b8a603f1b694df329a415da40e2139341d7f8bf838d00460a91bdfc3e0edbd87
SHA51242f376406f824168934d388bf94a4d0e6d28dc67cbbc4d19a2bd690fd89c5e1ab0e5216feabc4c373fc17a8f04d7bef29fdf88aaccb0a4b3badb8a3b404074ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405603dec0b47540f9ca25c7c59717de
SHA1a92a306cdd370ff779d4eb1d23fa612fd50d0a56
SHA256ab7d59445133a0c04d18cbcc0530e08af9aa486b4c499652ff15a3ce179e4746
SHA51266c997dc51cf5447ff6ed611ccebf0b69dd71deaa71a431e0273c3c451bae4f4e55e98904c30e0e43ba9a82d6e3545dcb122bb300203a49e3cb77ebd8e50ab33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b00d11c701b78c4857bbd3bcf491423
SHA1c56b658ea550ba4fab2be29d7a075453e7bfb463
SHA2564e74b69948d227be4ad9353110b5578623cd0a1d7b23147422d50e72e0974131
SHA51299925242ebb68445a8a0c2f1469be8f6409603ef7158373ddb3660e957251ce97e34eec8abfa24f67f60b4a9236007093dce27ac451e37c39e01ad788b7d4f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a60a63c92bbeec79cb27f58a2c7a90
SHA1e5039dca8edb0e689a9fed47b77cfb5e7ce17544
SHA2569dbb4b007376f85235335987dcf488bade595f88b53d6d3f873d2e8e002d8f51
SHA512a44755fe8b1441f47543cae6b776cae65041afc1d2408c7a1b4e6dc7357fe55b4a17724aca8ae16afba57203869656927dd55bbf336592a925f0a9ca58150684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550f2e98e0068878bd7824a392ec0c9d
SHA1a6e1f3b597b4e39cce4298b835db97f47bdc47d7
SHA256468d18134438a4a8fe660ff7a0ac14f5877f3a4ef23de2233bacbf87d085dadc
SHA5121acc41ac07b8ad79a9cf0c65545da513e369920e16bf2958f5e998e9c2c43e0909ab58bdf3c9d724d1e18f9b04dc8db7aa5c9066b5df1eb25139191e85208856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a166f24bea49151ddc754eebce9bf45a
SHA1ff02fb861c5eb92af492478cb5b4ae48b0b22f73
SHA2569a9efe9fe4be976edf5442e7d7eae8fdeeb0cc1b9e648b80b404330f7cf5ef64
SHA51261f0b821493a688eb33482b650d2558064576198e86d90560d95de3113628cdd46ab803a1b66ae017bf4c5cc7b0fc693ae361e3d7cf99c482b06f9198d41efdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50130e75504badc54c9d099f3b9621218
SHA1bc675e9d420bf6272c5ddf95844b400e9e069577
SHA2568fd6e81c1990099cbe80437e18b51c2f3dc35909753eaa82ff2dd00ee3d3b8c0
SHA512e198f76bb70bac9070e543e9742fb4fb663039d28874379be113058b044e4e7e1111d4a718939c0d7d4602b1fbc6e404fdf51e1ee0c772caf13b6f193c6f6242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad9baf81d81fb521e6248b7dafb2b75
SHA1e509ee0217800e0487d5ace36888f853885af7bf
SHA256e8e3efc79c643754c64bdf2e52e39673be48f67af77c86b609aa70d8ea1a87da
SHA512fd0aa3d4b73bc406113c49464bc4662775308c3dbf378222e4cb77b1c316fbb96f0bcd963638aa0632539a14f02712d29454ec895759192ef7a09ea064b4019f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a