Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
60ca72db890a0e1ccaea5d66701b2df5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
60ca72db890a0e1ccaea5d66701b2df5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60ca72db890a0e1ccaea5d66701b2df5_JaffaCakes118.html
-
Size
6KB
-
MD5
60ca72db890a0e1ccaea5d66701b2df5
-
SHA1
a25e6378d9fccc1e3a0d5b44fed0ba788d0457f8
-
SHA256
b24bcb30ee942487fd8d4a43feb6a7a02cf9e4c514857022757d80733d8a6c14
-
SHA512
60a1ea55743e0c8d9f0ec6d6783818477f2c44971de5dfb922578bd4b54dc4120402e1733f102ebc4ab5fe7aaab4c80770f6f6a23d70daefbfafe4ffcbcb0f13
-
SSDEEP
96:RhM3sHfOp6yDVLHyU0ErwGubWhWJYR2RX:RhM32SDVeBWwGSWowS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f7e2e3ebaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422395144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F5E96B1-16DF-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c2f3731169291a4ba317198d3672958700000000020000000000106600000001000020000000c7a4f05bce81cc0cd31eb996e94a585d08c04b10d8cf39b49abdd382f781cb1a000000000e8000000002000020000000eb9a73d04e25890711ca571d581618fc91055cb666a59127e4118ed9e76abeed2000000056335e5225b2578e94c24a4dc40a6e30782c9461a65bf61746d96808953294c640000000473380b75ca0e5962b4dc645a1d2234e962e384bd29cf1851c7c4c73c45ec5fb841a6893f9137ddf317467698609664b73940e40ee86b8e4fa76c6fd35634095 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28 PID 2740 wrote to memory of 2636 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60ca72db890a0e1ccaea5d66701b2df5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50663d51b5e691cfce65b12ce8a76ac96
SHA11b26a26877225cfcc0ebf36eb3802d5f2699e7fe
SHA256da8a235464d03c09539212003d1b4c933c0306535a4301c25bde471cbfb29144
SHA5121bba4be981e516f788878d78e6e8050436bf1059558e4b36a938b9f616565228d27163510409f13c67f1867a72e8a94cbad43b1d387e738fb5208f4a99db5766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c87ad385e62d4ffeda97b073e6c2201
SHA1af7cf0153932ff7b17bc3f1d24efc7809b0339eb
SHA256c04044bfc5826de7020a4fbf49fe0c9859dffc15270afd98ba20d509600fee6f
SHA5126e150e53c063e523d1dee720250c58c3640075878d7fb39e2bafa559c82dc29a6a0148caa1b1728ffa9a56424b431be82529d22548444e45d0768186af468d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9b91c6c851b849c8104b9c6c0b31e1
SHA14f80dc4ad4ce546ac51097739a3b65936496ee7d
SHA25696686b3f1c0b07c03e03333d22f60d7104e8bfb9c432ca9951c24eda24c54e2b
SHA512e660db3036eaf0b3e3fbac398d4dc8123e6699ff7ef91a7220554311ba14ac5d5840611b33645b6719ae476b90de9f4a264338d08c3a2daa965b354871df896d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58774a5e53651d30e91370982cc130924
SHA1d74ff0a9550b1ebea40e831d5c9e9e49ad104702
SHA256380ad22e3536d53c31b4ca94b08852cb95014d848baa436c3122653f78fbef50
SHA512b98c3c71a0b2660f9304901f02217f681a114cd831bb6135e367baa597f3c084b34f0389971951d6b4fd3bcba7854135bed5a5cf414084e7e4f54e7ae2f5aab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79fbeedee44cc9743c643107bf486b7
SHA1044ff7cc3f302e62a29d64f07348d07342f0a9ae
SHA2561b256a10f92e6ad6f1336da314e465019710a12cfd231cba540ec53baf0fed15
SHA512987a35904edd2f23ba8c5e2b29e3aab81313c15aa54058b7e787f94ef4b2c289d6b96a4423ec242ef1d86d8fc450e445e6a95793d571c24e6bccc380a9b501bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0cfdd3f791256d47d7fa5cb1a4d99a0
SHA1c635a06c3d0f02af276d8dade2ca33c7ce945a27
SHA2564c9095f9b568b92bf1ff0e7047c7c52d68c4515e4ad523cf6531fc5c2083fa3c
SHA512e7d758afbb14b436c21b0877f7890f06e09f5e19c553507905ea7af1366954789a964629167fa5981e93326ba3a198efc02abd58c450bb278abc5ca567c71623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c3dee8af36acf24ebbded41ecea574
SHA1eeb3c3feb4652e555f5bd36dfb03ccaa8bff26b7
SHA2564be45bb370224e297359401d58b900e3bba264ca94e926ac452caeeadc5591db
SHA512115d382714ccadf3fcc5b009ecffae175dfc8b6d5fa50d928a1e27adca5da0191a4c6108f8a3c61b372032e2424b1c813f3607791904df85a03b3c1065ea408c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a19d2217541829c08d01d0599533a01
SHA1c9347a0d38ff36a02863c651afe9f84b77e2ed20
SHA256dfc7ee82bf7a3dd4f2adbc52c7a0f05ab166a41380f8420ccca5b40030390f0b
SHA512185146bae378796200aeca5040ded2af97fe1a389d829c16c17391e4cdec82bcf258c48dda15b4e4ed4e4aae7ba8193ca4c52bfe2f63d1dc98ac07be9630c5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555347c57938509c752f6970506c33230
SHA1f8541577f9faeaa5b849bd95f8358f1a676accf9
SHA256dfb389408d6c2a7ecfb2e7a1ff77e28d1c8e2412e932e8d53d9635817fdf2cc2
SHA5128bd3d7b87e4042d90060bb4c33f9ef75f0045ec86a1f8588f314b0ccb440a3912fac4c7f705f762b64a50ae70258c402ace33884736c547425a0fffaacfe1b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7e8671890e85188d16209f2261e8ad
SHA125b7d939f9cc11240a3d48838f0eac4c4060e211
SHA25651d6461b0f61c91c216dad373d9bd8ea18902dbf0417a88971b04839932a7da5
SHA512a40c16b6d8f43d14c3fea07ff74bf4daaf40d5c85e5de8e490ca3b7ceb62cf2a65b86207e3916d90be52bbbb37ac597cd55a78939340729fc773e86c7f8d7778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58111f2cdcee9d9035e8250b670d4695f
SHA127ec8f8fb9e8d9fa228c66efc520c53f364990cb
SHA25622ef5e2c7ee49ccd16aba3aa0415fbc1b77fe8f9a68b2cb8c305b4d868303a15
SHA5120587cf9bb7203708955f4b25389bcabdc98ca06b89820ef89f2765cae6b13bc74c0024a55ac88bbfbd0d488dda8dcc60955786f43c58165aaf78bfeaa2d5503f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507beb4262df54b7c544e307828456e09
SHA1527f2e1881e1a3b9f586c08315885b72a6822e33
SHA25610625a72c9186faa410a2fb01ae3b82bbc326ac296fda61750c73292f2ebf2ac
SHA512d3aeaa2eb2b0a6d17023b0b4a21c1e0ea2e31233caaa898e79604af20120b2aa49118de557095dccac945cc1f723ce9dee7cf0fd1e211eaee643ef182e56cdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3fc05d34fbb80e4a021434bb0865e89
SHA1d8c9d30f33c0053455b81dbd4da0b2462716cdac
SHA2564ded4780b1e647bca5b99391bfd755b098a7094dc8b80c4b14d8efd6e4ab2420
SHA512911b351fe21f75f7d8725823ebf4605ae587be23fe2b7e9cb52a17a6a0a04c9f975a2254caabbd7616d053381a873e2b46f1d0d5496fa029e2527bf7c92b0797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50505dfcec9836f7ffe55a5a428a9364a
SHA122f0b044bea5167a1ca912e54619fd5b313c48b1
SHA25673e2b426bdecd2c7630a5cf79507e33b972df0e9ecdb7e32c72a02279dd73a71
SHA51261f4e5c133a09ff7ba90338b64801f561a18d3019a0a23ffa4f9fa940c940caad5951456c2735fcd7becb7d534c4b5fdb4ca7841f6e239ec4574b8c3738ee032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b849ee31ee1e43add61ef43ecd1ed398
SHA1b8d08c18a86f0b035f60c97b42bd5b08bb2b1b0f
SHA256506653bc2dc41e255b12e5238989d967cc65b912ead7ba771c5cb7a44862862a
SHA5128137ecefa53d1bf159c751d3262ee19f8616116330a27219927b2854827748ece1a6cb7949e1ebeb5a30bdbf9be8b29928ac6eaaac7356a1fd5bee47285c30d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5458b5d4992678c4b18e8ffbf7359e77e
SHA1af83fce0bbf814c239b4867c951e799088d7ba10
SHA256d5c03d9163b562ab1d5c9d10edf81c312721ba52772db50b9fa615744113055b
SHA5126a13540b8b8bb36aca0d7c0f6c47e552ab626af1236f81d6d0291f138efd364157974d4bdf1b28344a476bd6b90c8bf5b329a2f25b9c48ee4e4dd0379136f4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab867a7103aaf275ddebaf0ef5bbdb15
SHA159161bd7730a8230ca61289939d5ef8393fa2bce
SHA256a01e8be487aab7ec5d0b0294376e554229e83c23b5bfea8279c1bf6342c2224f
SHA512698f2c78e9ba95a0cb9c9d5fcac1668825d81f4af5226ec3e86bf0d056de4c3f0b8c5c02e994ad283cbaa175ef693162cf0094597f5aa9b415bfbae9678c54c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d410a4baebc2e75d43b08e570a723254
SHA1a6d5a42be3f96171dc1c190116222c09758929eb
SHA256408d5068e86e28b36c575b1cfdc4f0986ac249ce20083a0e8feb578cdefbba4b
SHA512fc1148defdf4efd8e05c6e7ad394a57e203f9bd5ec75ca8892276ed7a946ed01a73a44eaeffd48b5321ee50c9d4b4d1c6c1c01eef6d29b13168e21de1feae041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613274c430a245c35437b7ba3d3c1ffe
SHA16a6b5f67c9bf84f011fbb52be96d32b4a42ed3d7
SHA256e3b8113961cb80c2af8dc53d6bdbf87dd0ee3832f5d51e261bc984d1ef8af8f5
SHA5125c94cdae1c239d6c960132b474561cbae7069daaf50d6057dff7706dd573d0a5b26da405e155beaa1ac019504721f57a9fd7bdb939652ff42a81ecfa1828dbb2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a