Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
60796e1011067fea845a69d5224a23dd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60796e1011067fea845a69d5224a23dd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
60796e1011067fea845a69d5224a23dd_JaffaCakes118.html
-
Size
68KB
-
MD5
60796e1011067fea845a69d5224a23dd
-
SHA1
f5bbffeb88baa3d110909f5490610533959a6d76
-
SHA256
fe4f61e7be151b8769b4e122a1d17f9392ed6cbb88e59f465152094acd143679
-
SHA512
d74c2f2f12c4f252f72dab02576b6dd995b6c988384258505670aca7b2d51eb0068599730aa5a1395646b334fb38b2c01c832877082cfe0f5faedf1c6d3b8ba0
-
SSDEEP
768:JibgcMiR3sI2PDDnX0g6jWfb2b8oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J9/axTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4A56B81-16D3-11EF-906B-FA9381F5F0AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d5542f2ebda48b5144ec1f3c196d0e36e6770041e0b5ea0c91192bd58ec51811000000000e8000000002000020000000054a5dabea261df313e8eced99097598276f13fee09ca966ba9edd7b236c4d232000000044b473119a72e45a14c1dd8c5eba5ed29b7dffed95fafd5df583c106f40b32c0400000002e0de7392070fceb5aa49e21eff02f0ac867b4d1767fc446ef5581e5f3144edec2ecce99a24d0a8aa317847d7cdc96a6e4e733b8792f3880c9ae756a114047d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422390320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204642a9e0aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2456 2480 iexplore.exe 28 PID 2480 wrote to memory of 2456 2480 iexplore.exe 28 PID 2480 wrote to memory of 2456 2480 iexplore.exe 28 PID 2480 wrote to memory of 2456 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60796e1011067fea845a69d5224a23dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd75981b4b4c3dd1fa925b78744a1b5
SHA1ed1877f6230056dfa668390d483ce1a7dea35269
SHA256c2db18b482fbc91a52105c7fb104b9ee020cc41ff8b450583961779d27bfbdd1
SHA51244e2aa094b3296544a0fe3d5272fd80a079abc3e0078194475988ee3d9ab8016772d0ed729c44eeb83a26f36b81a03eae4c32f79b4a2514153035352eb766500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acd7fc1bd596159d1a043039db2b2f24
SHA1f806da1426518ba93add15f4272da70318b0b8f9
SHA2568f2adcc83505ee434b06ba7d8ee99fb203339d66d6e3999e653f31b5b8126814
SHA512d351cdce28baf0a3f58a55765de70654939177cf6349128bc84d3af00d450589304fba8ee879d126ae60aadbe418f49d09f201d90b38bbc36009e935d48fbf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5072d22311360b72fc94f594c8f4c7ff8
SHA1a700ef1bd6ab473d9c1334eca99f2abe3bd4185a
SHA256e00545caed3a4bc587ec298e0ce842cad0fa999c0f0e6fe66436a9971fee6516
SHA5127d659dd6ceb00c116979bf4c7d17a7c646bef28f594c9753fe2bda5760b603604c695f02f833c0afb07a2d636c3b1d704e7ecc6153f12787c9b0da1e85b2aa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1582976ad47dbc344e482669f9a8b9
SHA125da102746e42e47a889e27689549c661d9d29d3
SHA25639a622920a60b418e93fdff443e04e9b783cd20c55505dea8a6b27305a486580
SHA512a3515dd85cdefad071e422e67d05e46b1c420e29734b071256984176d4e558003862f495be92501d91d36f167f990c8d29e5c89a75f181599c50ec51881ceb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd3f462286e06d4db0b534542a90101
SHA16eae9b9c4e74f025c1466c4a8dcd671bbfeef917
SHA2562de515176c7b81f3f4af512cae7994e34ec7eee8d40afb18998b176cc52da1e8
SHA5126e8ecd218e4732cce4827500ceaf6ff02bb2e594cfc81ded15984d5a2a8524f8e9e97e08ff4604470ab77c34da39689c39646a0bb43be85d637f7b9af2ba9f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8482314453d9dd938a51ba3969b08f
SHA1feab601fa12130bc27d2505f54d0a70b6f4fec61
SHA2568e25caabb34619abf44653bbbbc991f0e38c2001545dc7fd56b91710d678ef64
SHA512d76f8fe687cf916ab6e3c53292055a07df0a6ed3f6cb204f90fbbb112bdfdb46c4a97b7f6a4985747355632928cdd03d8f9279f2066dc223f9218935ae46f2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac6275ca4de00b22a0b957514c9c53b4
SHA1bfc0bebc33270184678ed91bdf18cfe892cba060
SHA25668a7f4b92ee9da7185f1e32da0618cb8bd5f9d7c302e47e859ebc748ffe4b009
SHA5125cb9082fe8106575fa4ae837312eae3a580bf19fe4023d4fc8cfcce941f0e384dbe6dba1d3e67844641699748626885650d914ef739caceb374b6bf518de89f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ecdfa090df5e6324112dde822f0b8c
SHA1574fc65e77ad79516c6a61ff76ad6db2fd671b30
SHA256a177b717749112411b3230a4e74c3e87c64ad0d462ca29e3df7ba4eacba16dd8
SHA51257ec16efbde26e0b9365e95f485a9521fb253b0143b6575b183fb6b0358cd5b40c4690325e914266cfd666e6dfc5949689a3824837699a4a06e262d6f5c7dc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4352f43220713cc8d9ab48b1a5716df
SHA1a0b4eb102f0c6afc9ab80b055469e963fb10972a
SHA2560628cbf76cdc54fef7c83276cfc5c60333616f10a9b4ab7a3f4c885f22a78529
SHA5120a4ef940b443e055bce07f22f28e46b471910bf3e40771c90feb754702f3ac59c8af2b214fb76142cc651c59be628eab264a5fef85807e361b23ee37a7665e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f317d74485a637fbedfc8e557cf25630
SHA1cff9fcddfee0f23d2becc9b7af87a006673c5d90
SHA256a947b3e6ea46b0d6aeace1c0a318eee735acaa2ea189169ea12590fdf0661e81
SHA512703724949b713e16b4cb25d90f53bea5b8f82e3818c8872d669734b73dbca4cce71363a7ca4f2a9e5315f987a2dc64240c81f5d3e15428a79fa00e4a317fcf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d97422c91c3fbe69ac1348ba90208c
SHA12a60a68fce12555246a554a771203d6c472b0bff
SHA256e7678474a09ca243f11a9f9f0191ddce8d0f9a751679c39b0ff79567484f624b
SHA5128cc37c56d7340ddba708ef755f1defe55f35c3ba696603e7c76cfd0fa70b16fa1fecca3789ee58946f3bc3588e6d0f3109e05b94720f1eaa6cdee1cdd42091c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e1d61d02a0a657995f7c5ec82b6aaab
SHA1ccab53a3f3e2881e07ad98ffebe9c8a6ceb18cd2
SHA25626cfcbe2b42ec9c40b2fadd7d5baf6c5ce33f890f0069f770ddb458c2caf5c17
SHA5125239a8f3007aef5e0e8949624f8b1dbcc08d0c6ca83012f9863c0e9df3eab6057904d1170b2924f0cf0db1a9ded4bed414ecc7ad707734d172d277c8fb2e6f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b06d274628f829d9cd8d855617df95
SHA10f13716a0e95a5af7c6f89c79906264a69058411
SHA2561c7100d275d88247e01e9e16a7868752375f5f9514d8cedea6aa64ddcb75a91a
SHA512205ddf773418dcdbdd582e5dc77816deb88df08f3c27fe95a5e1ce08534de699f7894e88d690e554e7eb3c2ad77223098feb3de3c4cd69c9e7c0dc5b73f300cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c55d1ef6d207baf0f141770d8c723517
SHA1674710c9cacae2531f86c22b2a0a98a1f03ff2f9
SHA25601725dd2b0df04903ed6ff67e7daf80af2c7d7cdb7cb52c0e020ced349574c02
SHA512b996704be21661884c35031e7bcc814805c5269e7086fa11ee18a3e75b94d9e9e3eac3d07a3f1d77cc8764e7349c9a52bdeffd91969b2e9e67199fc7b8e9e93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56161859f204c3567750a1f723a68306d
SHA17e302c166bf88628b313884ab8f66607ccf99e03
SHA2567b1907d85620562d83a4431d729d0be073493bf7a1ccf89f61f3bb34bac4fa4f
SHA5127c4d14d21147461cffacf8e3cceb9c2754b5eacd3c83defc7dcee1c25d76dc1278220c6bff70c175d2a1b63103f60ee68a70244361d7d40a17c1404d8161339d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe775014dc78b10a9a4bcddea0549e54
SHA117193ec0cc2cd085e935197ea91fd5465ad33dc3
SHA2566985d31abad70d978615baf695d883bae8c41897bc027050d08bd8ec96064a20
SHA5129c40cbb2b581141ca864c50fbf9bee519dac5da55b205a584494624ecda6ebdb6a9f6fd19afec79efbbd326d43430c0e5d647a53d3adfc20bcbfef28e06462e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b307880d3e4d3fb955d2ea064691a24
SHA18f0727280f19172265f01dea87620820c56ce95f
SHA256871860544de3024842d8f9c0602e225ddc095bec3e9f6e22e4f4c7c3623f7397
SHA512db39e550fa98a8dcee85c290c10d8c5dfe685bba1436cf6b485aa0dfd09a01c0da13efeb5fa1c0efe9ae29b8ba536f088a384456bab951174dbc5db514c20bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b930031a03b7bf3a7e6b3571ecb5abb3
SHA1bdd273d59f545ad148c500da175cf6eee83245fa
SHA2568d33c8206296497df8435fc02ab4c0aaec08b293c124e59b094a0769e07b8284
SHA512b57eff34791c85e6013c61537158cebc9d5437b8a967e46b3a1a624d4214a8178f43cd56d6e486ba7b6d03225d09e152714d1671d805078e614b5d173c432656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568dd55797a1d97ecb94c031cdc152537
SHA16f9c9f941034af53dc65d7445fce1b6dfa8069ce
SHA256e406726c5b98c800b0463bccfbb7d8839f1ce09c138f08d4c9bb6e21be6491db
SHA51226d1058ec8b24d364839a3a3df22b82e6d96ea62150be8599ff57bc6e58465055f70573f13ce62d77c3c7af578e1544452ad92588cd15b7fd6e522c40604aef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d6a9e4d124b4661d39488ebea72537
SHA16a1dd74dee92bb9fc97cc6db2d9f14961cde9d14
SHA2564f5b89bdb8dc1e60f270eac9595777484fc639ad7a6516d4ca4444c19cb0ce0c
SHA512d5d02a73bbef0c8936b6094d0c7d82aab3d11f28bf415e7e47fcc7dc4b9148fa39415a1fdd5f5d80dc81efe05b5cb62eead68767db98df76f34c4f7f691c88d9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a