Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
60afd73f1e5ee548451bffd9b6ffa637_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
60afd73f1e5ee548451bffd9b6ffa637_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60afd73f1e5ee548451bffd9b6ffa637_JaffaCakes118.html
-
Size
66KB
-
MD5
60afd73f1e5ee548451bffd9b6ffa637
-
SHA1
f76dd6982ae61dde8d1bada596f77a893007da90
-
SHA256
1d7ef9f16f2fe580eccb3a367ebf62fd2782ea7455256ffe1d81cb90e54b4212
-
SHA512
905f9cba04db998fe176609eaf04029327ff8a0c669afe81124fa5f527b1ad52817ae395f4861630bfaea2abd4a8a58c4f133c30dc9d9f69f39600aedccc28f0
-
SSDEEP
768:JiDgcM0St8tN99OIs3ws1xoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/IjkKN:JD+41GTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422393547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083465d980e2ca642a675b17577010032000000000200000000001066000000010000200000002e2742f0230566b95116bae3db53c5195ed7e1f4159ed903834a8b0f9f9cda21000000000e8000000002000020000000b5a486d692f37dd935fb1f1e3946240e23e9e5a213e9104d90b946f959f315d9200000005a4ec47656889af43abcfb1b5d3f202c92b0ff07c40f5c9f0ca1b50f0f0e1b494000000040a56bbed5da9998c52f915dd0bd7617b078b7b72fb3ec80be0da597e7d606882e02808b25b4d84ba69c656ac0c55f3c0376050dcf036b8cc5fcc4599a089338 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{577AB861-16DB-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40770c2ce8aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3048 2864 iexplore.exe 28 PID 2864 wrote to memory of 3048 2864 iexplore.exe 28 PID 2864 wrote to memory of 3048 2864 iexplore.exe 28 PID 2864 wrote to memory of 3048 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60afd73f1e5ee548451bffd9b6ffa637_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c90056220e33112e728a87eaafd8a5a
SHA1c954a3a534e8ce0fcfa1ff3f6916f64bfcf1599d
SHA25608f3b045530271e39d4d16ab295f2bc30262d1b2918e71e06cc81772b17d54b3
SHA5126655ed20db9b5591f7c7cd4d016de1116a57a8077906a86d8fa17e11ef07835cd0ddc2328085bbc199e3396d2386fd6d6db2ed7eda518c578caed8595f93d537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1966b9f78791b0fe3f72ca76a1d304
SHA1fe74953f77cc6d950a05afbab47fe13cdfaadd91
SHA256a0fdaf245ea189791b25b33fbdf9127df5488e8bae18ce7d27eb28f7a39d6f3b
SHA512fb3022509605d893df774674e5955ef12838aaf1461e5f8cb6e899941abb7e56afc6653a9af78f922912d85b2d0bc469f248afd4eced61d23fa93fa48f864353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51166f0cb892f4db9baa83d148a13bcd9
SHA1bd5ee48b77360636435957ebf0aa48bb673ee8fa
SHA256f3741e7e14814d3f347afbd6139e00db2223493d9b32f326abf2864b658164d5
SHA5120e17f9ffde153778f7ed6e2e77603a0474bdc2d88f379cefa8cd5fb17508658c7b30c29512a7d11838b86db640ba81bcef062ab5a05f0be441ca5da857a1ba26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1ce051acec86e31d6f16e05cc042f0
SHA1daa309a42faf4b9562ab2260bd1b972e319a13ac
SHA256435e492f2dcc5b8b503b51bd6e5ef1b4c7c87dc5f2c068019c2df140a8bce434
SHA5122621ee84d7b3e28f743e93306e5713e3fbfa41c1659057a0bd063db79603966ba3574f33a2cffc857effeee76feec41f3f82929a3fffcc67baaad0a28f71808d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492e8de286bbd3ddf7548911fa40be9b
SHA1a9d355d299a6bce66b430e668a204e3df2b8969a
SHA2563d084e38ff24ce6ef18e8d0d9e4a3e3fe488c6628c3eeef767a071c840beb681
SHA512c5250c280dc13366e4c07297deee016c8195f8c4b293915c0f8edb2bfdc6cda2fe6aed9a1009d660487e1d4df12d8a363d496c95065d7bbeb98fc2dfa6dcc4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac47b308ace76da11168a666666b397e
SHA132da17235991c51777dedaf88036d731a2ab19db
SHA25655c123e4391ba509ea44243c7b3ea37369937c1d46051498b31b96bb351e094e
SHA512f0f68058bbb21ac2fa633858d1485fdf573d3307dabed08d89c8dcb64449fbeb2c16e37945b3b15c31fa893184717fc1eec63108b5ac96c18eee430069ac7658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9b6e3da159fae5641c0f037461bd09
SHA1aaceaf96050425d12b6c2bc1939b595a90c5fd8f
SHA256f2a7a7e7144d89d867c318bc212ebc1c349a1b5aebd8ea90b02ef31c084f452b
SHA51232fef48b950518c0c3d980235694eac259966a1e7a897e466db7a3a50e8598c072098ecc4541e27b68097b39799e3509d67947f738fa2a1f9d59fe9665e6f0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e752f5752bf5e07053ee3c81a28de7c
SHA1204afbe1afcb9f5300fabd7ab9ff600224660d04
SHA256c2e31a4ed54260db728d65fdf6555145e8cdc378b3f24d32dcde4e1572799c47
SHA5122fccd30e1e291a832f4cb5f4a098b0f83b33439e9e55c902a9cddba3b77897bf84fea56338fc22f22d8c4e326922c7d8fb2004a45fa8661e7c27b01f24814f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca71ff0d285f2fd47f006e53d0495db2
SHA1c60cab24a1ca57299c39fcd2060e509c05b360fe
SHA2565c62d63ed85cd0770b1ca4f0c3fb808b29615a385c48238c0bd3f5fe45b44b29
SHA512aa41c55fc7877916b65ab8bea8dadd0059ee4923c1ea77c09d035474d6ec14e96cbe08a7a423464ef1135e2407fd4a9238e7409cb7723d67e85a6a7a4469cfe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a5a2afc683f253c1e74baefd472b3b
SHA1979e7c00e6fc62e51e49592393d4e0b4d73b399e
SHA256e8101b6cf0ea3d677b67c984673ba20a65f0ea995ce4f43640a92af814ed9f6d
SHA512f0c404197941c4b203569e26680f1fb5ffe620d9693bac72887ce0b27d2f221c58074827d0fd0cb0724a80b0ede6ad20dc95170a38c32a542e69385bc139d627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8baafb120c27c4f136015a10c2b9b6c
SHA16759ac026dad2956039d72bec4450e666c93978b
SHA256a0988398c55d923528816b621d7f6879b79cf0c5fc7208be00feb396cae61450
SHA512cc28535e16972d3b9b10d95ed1fe03ce49d9c45f3ef997f09a920a791b77154b64bac4ffee21ae28f23fe363c5b49497bfcb25cea1a35526b4c10522151cdb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc1ffc227c3fd6678952e2f61685f75
SHA19ddccef0db28af99399242dad2cf06fc72660c2a
SHA2560da72e25d4583f5137b7effcdf682f38ec7055ee908a721cf4c060742a9fba2f
SHA512f5bb95369221503dfa52925d80665997087163af250af34f44be1e2ec8a48c785e9b39568b4701539c04451f10e59729bb2fe370cb6c7bab3f7c7eafeae6df62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8eff1498b1ffb24566f3202d1815b1e
SHA10260f5454b37c0a3575df08f626513671c78aeb2
SHA2565e1a865549c6e938d90eb98bcdbb66ef9113714cdd994476d52d76dc8128a196
SHA51233fc43b9fe7f113fda54d112cb4f9f3218fc016ef78ee677f08f7fe678e9b8bf5c7dbd9dbc4752d90b047af713aed005810b63fbe5a05c36b454e81346d8791a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5661a21eb9a6fdee7b6c49ff084b9e37f
SHA133142dcc0871d36a47f05b223d7c34c2d4f56fe2
SHA2563df6aeacfdabfd205d8c804a61a5af5ec52968c891e837741656e440de24fdb1
SHA51238f4f188fae0a4578142ea00a0d4b7037e17b9d6d6e458d5417c285a6ea1435e99511717be1ee1ce537332df58d03e344fe1898d3f3a0312b0c0c47568d80075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ccd4b7d68bd86c3192d8387ebd7dd26
SHA1ce0de65ffe1789597cfbe84ff3ffe8c4d53d19e9
SHA2562b64c16376f2ded9ecfbf1618e0d17b3da97a31904c6e2a7ae423aced97dbd2e
SHA5123d048f903d29fd146986e4fc599817c7a49740ed4861a4430518f853f604d0c2b03434962d171ddd3bd574044b84ae124a55e2c4a0e16dd332c1e5fea008df93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd128a2412cbcc8b0ad9c45646729cb5
SHA1614897abe4a485f8efff03cb88fe828ff37e6bd9
SHA256b3626ec8d87362256529ae5de74b3e42209355fb0fe0c8cc906bdc47dfdc3ee6
SHA51206bcf64199cac1049a41acefd0c586e1e856df4f22eae715daf5254b402632c9203af38127f64048757da49301dbfc709835473188e6d1fa83f257b0917236f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd039fbd376751c8886c2c793a2a940
SHA15dd2d683fb856672f27227b3a9764def5c25d58d
SHA256176d91621451db495f05c006c09e2f3ce648ec91512297e0c3497de4ca3f8e94
SHA51253423f568b1945cf1f044829673625df6a015c6331b3d35ccaf063f813f6df996bb6e8c758353aec2770b0b135674636af62eec55d6f0225d5ab9a9ab245a98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0294bbf01d7409ed01c67c2d403c793
SHA14b63e26acea33cd1790f07430d539578658d08ac
SHA256913a794c7bc9f2041f77e9f5115daaa342edb6ae2559ead7beaf6c6104e2c7ae
SHA5124d7ecf0bb890c313248b43329c9439a9e8a71d38a4ba3753ec15a1407345fb6863f4e18c8a3653616ba420cdfb953de5530abe982fd5f6e1b68b855f0b763eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0f00c4c373a97966620a50581a0fce
SHA1e5f18389b310452a5228c618df4671e3e6ebbe4a
SHA25665b5f3dcf3fab05143779e3b861ec633c9d1a201be0159dd1270f4c159a96a66
SHA512d022f8216bf1a474d845b78eedeee1bf136954020aa1e7e443ee5ac438f6c45d94a149b47d58ac8a421ce3e98e28b1a46063f56deb8d34c907f8027e734b002e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a