Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
60db3424f024f6ee2259fdb887d62462_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60db3424f024f6ee2259fdb887d62462_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
60db3424f024f6ee2259fdb887d62462_JaffaCakes118.html
-
Size
70KB
-
MD5
60db3424f024f6ee2259fdb887d62462
-
SHA1
dded965e39af353c5aa672d3aab97a9d19dd42ba
-
SHA256
52e37f58a83bb34fffab8b1c640d601770a8498e784f450a6cfa493f7c7fd534
-
SHA512
10eff4eb919a98dede38b7acfd6511f5fef430a4d4178c180069c934f3ba529c8ac9a0d40b5d2a811c5a12882109b11d7f772a4b112e445e3cd505ab8f983346
-
SSDEEP
768:JiHgcMWR3sI2PDDnd0g6/Ownd0Z0lC0l2RoT2e1wCZkoTyMdtbBnfBgN8/lboiG1:JBMah0nTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507b5922f5aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DB0C971-16E8-11EF-BA3C-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000764facc8459d348cca662e6762d64490270f6541c0829d252a5ecf8e6abda8d8000000000e8000000002000020000000739dd21b158aebccc76ea3ea64d6904a5ba4dc3dedbf2e93b8d5e32fd16ded0b200000000e6b265c568c66c040948bc818cb175b658f9e3fd50db174ccd96466b24bdb7b400000002a6baf41d3d8fdf9af70186d3198ffbbde54eb54ab386e01e330e1e2f62333dee7834517c4e324bacf89f80a7532dd360e7cd8cb92c79370f9d6960af58be77d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422399113" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1276 iexplore.exe 1276 iexplore.exe 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1380 1276 iexplore.exe 28 PID 1276 wrote to memory of 1380 1276 iexplore.exe 28 PID 1276 wrote to memory of 1380 1276 iexplore.exe 28 PID 1276 wrote to memory of 1380 1276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60db3424f024f6ee2259fdb887d62462_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55024c7f3d91162b926f8a4c253fb24bb
SHA1301b52cb828baa6311545c29474df6b36e1ad06a
SHA2569cfabd6187ebf26a948de184621fbf37bf9ff31e08b2b54f6fa4b0a04cf2dd4c
SHA5126dd4fc32208837be46d7451f47045c0adc8bb96e3bf3076c679f23521d58411525826622a2d717ba800a4651315fc75062c090226691bcb20128e71cd31fd524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581aaf18dd2b32e10329e0a5167bcc3ff
SHA1eddddefe897b8193c44d0c1b9f8ddd2b45727cd0
SHA2567b92bca350a431b3b7100707bab5a84728782830d5fd1e4efdc6e9ba6da26630
SHA51215bf3063f15d4928b460b70af51a5ed3c9689362ece3309728b1806567a6aca09df67563f9697293d29b0a9dd7ebeabf20fad2825b7f6209b5138a9c481e71c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56afa16d1b929dc1948c504cdc1d181fc
SHA1aa2a57b9ec76b3cc19cd8422f8789dfd966d9732
SHA2566142ab7b167dff467471e7bee44f7581f4d62ed9a2b434981addb01630b78f43
SHA51228e2a5a40a69eabbe00c75d0eb0ca68739817466c3b6ba724dd7f568aba7abab9420e461399f9b42ae5265dfdf264dc91632d027b205a51ec19b43a1fd65d0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aebf4d0922c490b58ae9663ede987d4
SHA1ada6002b006f6d3759d2698c72a8333c6c29f4a6
SHA2560f995e87c08f9f58e474c0a2cb7427d6787490f85d2f842ee33bfbcfc1246bc7
SHA5124fb8d2cb257874b4be39252b2e43015d43566fd9656013e4ee1ff6ee9fa4e2bfe103db06f7ab92fc9aad122a30a68374468657403fc745a97ff58cb28c93e1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac009de205536d20f889ddaa06e209bf
SHA1f2da7a965e2b61e8fa9d8f2f247118f88f2bd0d5
SHA2563b26bf7d76cca96ef99f068a6ed3d55d35cc828ef631c56fb7dcec957dd0ab8a
SHA512a1095a4735d3cc2b82f1ffb21226da597433aea0536a1dd9063b179440c827f519a87441f6083fd2947d1686c1e0980c56fb1ea210c8f935871eda7c044a4c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5495525d2166d1deca7dbcc190de02206
SHA119aa2d357ece2599df0529ab5502f9af9756e0ce
SHA25624a48e0793e69ec1dee2ce07c2559266604ba54bdaa7a11061058a33b53dabff
SHA51276fa94011ac795fb039d161dddb0e65a6aaadc7ec1f34a48dfef2a8374dcfe42017646c1653d0f4a3422dcb09dba5727e57d402ba658844c0ac98504fb361720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574de12830ab09412a64a837477debd0b
SHA18389dd90e8b2db54456ffdc16526b728afeb39f8
SHA25620df707f7f2346428ce7694e44da45b54445ccfb119465a28ef7eeef07fa487b
SHA5125a3b878d0ca8af4997114ddc8bd26b79b336912c83a149e8f82aea145f611563fbf1308aa542de411b136c2292203e589dab55ff3a771ef866a204393bae1cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51215f637230f64fb24d8c013b8b07bd8
SHA155720826a33d9908ab30d0f39a0794014850e302
SHA256e19071b0c279a0ad44bbe49d444320b1e597dc6f61047ac5340780710c2e22fb
SHA512db3494a1bad86088aacf228001fdc7cc40370a8d9ef149f9314b6db638d3d821a1826c59ab63eb9a8207c53d5cbc33cc4148bbbdedbf9f63f22ec4ce31595cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6c9939c209a6f13b5a1152f75f00db0
SHA16c995abc6f8efc41922b30e83e9ce92bf60f7b4a
SHA256d072459e581d33e4b80b0dc5bad182d2015da8dfb82c432de22cd1f0eacf307c
SHA512b7fd6ddda4073a1f6e478a45c784802d6b0610d44ac70f5cfe90d93cdf6a296aff2bdea937c1bb5b6c6362667cfa42c57489a9ed880252474c183b9b8f7479ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea585fcd982257fa02bad97b400afd4f
SHA1ccf5758108aff442e9984d44ecf02b3d155769fd
SHA2564fdae1d9cb1875a742c0883763048fb0916410e283ed4aa208c4aba5f8a1a710
SHA51226df5f3a5d57bf3bd4131fd2268a4307cbae855874702b0db34c33074352f95a2525cbc83db9fc7234c66c1575ef06a70bb918c9c95d7d3aa9bb89d29b642598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5586489700d1ea1cd07bf679601a00fef
SHA1db96cf83a647c66edb64524abeefeb52d435e5dd
SHA256ab6be8a91fe62a8c4e3243334efb7ae17ef6d7d984e0a109f7bb557e7b2a8534
SHA512919f533e8c5a4fb8ebd15ea09ae5ec02c49e023bf66e427c4811f0a9b4bf7f29f3aefb3703734c8f560d87ab3d0c25c7267b04fa25ca3c8b1929891bedab8c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d13c910fab7faf3316e6d99c91044b
SHA169372b7e1d290c559af8752ebed6eab0b013e015
SHA2569db1e7943992954ec9decdd7c4952a909ac68eccebca7fbc0aa6cc3d86964d6e
SHA51278d53c8b9805ca5a75a0e0bf942986385cc7b85b02bc8159fb5f80b4f5e1341d509451e843bd3ddb592d28565750966ee9781bb62af1c8767d8a9e66187ca16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5123257a328d4c07a92d99be613cb0fd3
SHA17043e1c96b41235bde9d32fdcae1b9d990545d8d
SHA256f3d7d1b0b743f2a844aed897635a75bf1fc0a7bf5c4e851a35a47619b106a6bf
SHA5121e51fcdd78fcf846a9d6253dec850bc925d5b9916aeb4d78d13a2412450e4502f530704b18a34aaf3ebd2cc8da4d387be42b5f26544c99bac529acadb99ef21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d710e8a619f97a2ad75bf57b4555c94f
SHA1cfe00bdbe9e9c4eda24107fc449b835035e7bd31
SHA25600b97735133ddf50bb9310ddbb844254cf30c9bdb46207cf1ec825648567e6e5
SHA512570eb4dc9fabc7b1325567fdc3b690c294a7d2d14a270ba80d774fc126dd6286da712ea853ad2c0c261c119a67e5ec159e316e041ad513ee4cf00204612764a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf24f1611790478cf4bfbca193cbcf6
SHA1ab7349de89b184230d44eaffedb46cc1411a8c40
SHA2569e60166f0f66f6b91fc8cce7bf2b397cdaa5f4bbec6db6c7d99643690e9f679c
SHA51207650fbf92a025766288549df116445b60b48382ef1e8cf5cb4df582b2176b4b1777ad473c2a23e15938625f55571a1cc81fe61575feebe4242bfbfcabe48f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571aab3e72aee682fb81c1fa4c92dbec5
SHA1bedbe1d59204d947baf58dc2d80d6641c0cb8032
SHA2563efdd1206a068ea6b9cd6e892cae4e85ffc4aa8a4d6f7d1023add68ba5b66464
SHA5129cff79dec9374124e5cc4d254b96781d0f0977e944f439110ecad9d8fe73865ee168056c34181ecf39588b7d793c8a43e5576982121e847e729431345040e7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff9b9a4c4726b766bf328272d065a08
SHA1136f09c345881a42f43ac664bb5424e9b6ffd118
SHA256b826e01f8713797a42ebf047670ffea503feb1eb429a2cdd8a20c91404df2382
SHA512fde6146fb038365f0cab6fe88ba3d8f8dc1c167cb941a397a32f26652cee94a5e72e75ed13891347a5a37eb86fda9ab61125305a147f387335ae64d683c71bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516a2b2840ec5c8013cc3225f21b59c2c
SHA13b5c65fff929163521455fb69a1f7ec7d9d484de
SHA256d17077a9c84d8741dd444dc660bf1e7b6289f2e30a616b5808930b6243d85430
SHA51244520fdb5cb46588b4c8f74f749d928d688b9e435aba01fd02834f25ff6566a1953d84e9b63a6331a6eaa6ee10f7f107baf5c5af82b84ead243fc0760eee40e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acdd0f9fc87117215a2b6105f5b11ac5
SHA18b74e962814aa610678b0ff8bd3782ec2268f09d
SHA256e1eb5d6a4cdd7bcf882aedd5400c682177bef3b2ba2f8a6fb0277bc3d5632c94
SHA5120e65f6f1cdf8a0bc5d0982d50973aa3fd9cf407325187420995c42d18f9a5e5dc90abc2b095bde7b18a9b333dcb1e24337b1eee07c461ea2fef0edee49b86e6e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a