Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
61e86e8d0883a2fb214874846fee47c7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61e86e8d0883a2fb214874846fee47c7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61e86e8d0883a2fb214874846fee47c7_JaffaCakes118.html
-
Size
333KB
-
MD5
61e86e8d0883a2fb214874846fee47c7
-
SHA1
300dbfdad155f4c5f4455f4765407208ee610878
-
SHA256
39a74c39a9683785d3b4e1e660e8ac9bc2460ca67a8b641ae6634550af90dfa0
-
SHA512
65c99c1bdecd7afe7d8f79bb81ff658d2055ad940268c70372f660a3509757ee0cddaab6ca5ef27f97f3f0e239c8f01f3c664d4958a914a395025cfc775ff81b
-
SSDEEP
3072:iXSNT1SizISH6FLjQ4iJPOTlz/3FT/xzn/3FQJegM4lwI3HsIEkb+2l0xOw8krfO:iCNT1RIE4iJPOTlmJeQEkbc81ZRgza
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10725a5230abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422424531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000004556a6b5f1f2ebc300a7c4e1219035d98a597a2634b2710b2e3b7c6b62c4a6f3000000000e80000000020000200000008c51c56571203eefb3f3cdc918355c75e7a0cdd6397761fe8838cea5c50effe720000000a32d3dc9b2587f21b45e2b6ba66a8bd0dc42e6de1ec0013f625113d7c51a5a0740000000a7604dd8a256f4baa3751b89c78967aa543e5fa06787e19b420df11b6579198c4e65cdc61f6668fcbd3ab92caffd44406581e4c90c7fe7edd5e4ab9c689aa013 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C000121-1723-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1836 2216 iexplore.exe 28 PID 2216 wrote to memory of 1836 2216 iexplore.exe 28 PID 2216 wrote to memory of 1836 2216 iexplore.exe 28 PID 2216 wrote to memory of 1836 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61e86e8d0883a2fb214874846fee47c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee6b35535af9bdfbf27f29e42ee1ce4
SHA1ee2bd71494f4d9b26df6d409ec54277b254609d6
SHA25655af547b64d4ff05441521f18bcc10be37835314528deb67e5fd1b22de4e7730
SHA51271dc55151df2bf91b84c083071d556f1cb186fce5c47f64ad1dc7ddd92d88b840150944baa559eac42cb3ef00fb8f698945e36439ca3a3864c5cf93ec2b5464c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17b344aad63277336ace124db22bb9f
SHA14e60b62ab7f733cde12f0bc946ef9320c3e391aa
SHA256be2e127c5a05432faaea3321416bf940e16b73d1bc6412fac38dfef0e59283dd
SHA512c78b0473e27c8f8855489381546b0683102241f9b9fb0bb2b92b25f99886f0ddbf4aa3d674aab43f96f3c99a827be4b232547428111cb2e2f149c6f944f01571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52566492928b61c98e99db6fe4cd4d110
SHA11a3ee0d861abf58abd3075398d5bcccdaeea86de
SHA256535be60a0bd0f91a820015c0ce93cae60293272ce40e1f248a0289387870f201
SHA512087dc5405b4da75f744326d4071e33ee99b58148556013c40d8554240399f58209c6997951be2c4bb744dd0177f77c09384a3720cb2ce3c4bd6ebfb3df614cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736080f0365da1b8a3a7fa24bb5cba34
SHA15e33fe42846a56651f82738c83a4a201c953fae9
SHA256ebcb834cf3fea30c3f2e3cb6bda44718b6009a86513b18d79afd985f4b6d0be9
SHA51237b93046188f28657e5fdc46b08ee29bbdbb51f06590a708172d29059db7186853e4a23d74d5068722ed504b1e99791214183e3940fa1579a82297496de549b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50694e14f94823c70e28a2620a72fa3f2
SHA1d28e7356933be30e4aa9a7e1f062e4ae190c49b0
SHA256d58ea48eddff414eca794bb0f431265b1cbfc6ad0831b6e0cc9613b968203d84
SHA512b5afd4f583ea0e8f5f5089fec7402031419182cdd68f436f412da407dc754382f2da6e9972b7c7832cbaa52948ff358d3579a9e52a275074232df4c99ab91eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369a4c1cd78edcb708387a398cf1c48d
SHA10165dbd4c2f3bf47c975def654731eedfa8afaf5
SHA256cb6df36a1055a636edd3d2587a8d48f3f4ff8fd186788f8e32040f8b56c059d9
SHA512ae312fe87a836bd4badd7d040083f7be06e070829559e7311c1d3bbedd04a3c7022d7b06ca89b3d6714473a4da570a2b815de402d2a011b3cd95e0e9561cf667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535544f6f17f606230646a2b98566ec62
SHA1116e087431bfe25fd43df5041a2495dddfe964ad
SHA256cbf1e8714d15af0ccdd01bea07e3ccf09cf8e0126f617abec1392027560ae9b9
SHA5122d7decf4dd7b17936b6aca7e328954bf59b1811572a79d59c7cf52461897385d7c11a747a45b92ae9120dd8fceef31268c2f8db6620ae8e428d869cdb300cdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229b436e3780624c4631bbae4b4cdf67
SHA180693d3c242a249331c60ace70797ec8ca228fd6
SHA2565f77cb6de9a10656ecedef7bf8033f7d42144adbd04e2711f2a46d3734bd57f9
SHA51267da506a19b25f61968b4776b3f9ef3b90965fab878b72d84f2df9c46ee9b5ce98d01561e43db44c4f2c7fad787f2d8bdf3b620d56da3222af9e43c6f14a5193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433abb427731139eaaec1d8366083463
SHA10fca51e326ccee1eaf5de3b94d529b833a0cf9d0
SHA2564248aa580ad1e8d8a1b6517e36e31491d6b42b15307070262299bb2a11932f19
SHA51207149df29232f6ac78aeead83ad01688f42dd918707fb595c961ec6f87840d5bb13f3895ec7bea8159b1addbdf7023300fb54f25f28abb119dec06e4c97945e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dfd30da1fa9b97f420eac5c67c4661c
SHA1943629f35f41d5705a0eb0e4e0919feb6c0317fd
SHA2569776005871906c17ebe5140ffe167d666a7dae3b7109cd9d1c3d93febc9af2af
SHA51204464c17fd19c688fba22782c1c7a0bf374dc8318bfa44a3f11fefb0eeff9e18bcb1a524c42229455b7e8cbd6f0323e3fcbdf669677ed081b31c7ecc4dac40c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e7d1313517fa282468dca0cf02118e
SHA15b0847865f7fd624210871cf30bc131e436f6712
SHA256f3f5168596e4e5f7f5ba5135cdd5f0b5b790cb5cc5df102755ca2d14725839fb
SHA51209da362a42a74f99b173147ca69a13cca974a294a8adc7aab51ee0635c5f205e60f3a6d9d3dee7d38e4bea025dd10a6c5c8636a24a36fac11dc5edae60daea20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e43bd480576668a0d9a29b86fbeed4
SHA1d6e9f25a55b976178f278d668ec5f1804e54015d
SHA256261f9540b175233510e186a4007ad68791af0f359df8bc120da3282a5c9fde4a
SHA5121e2285e0e63ed490bdf675fada2828fa99d9e8e67f2c5b0c07c5b9e234bbc33c90a44e8b3752fe9abf2a6b2c3febd02270fa13ae1ef11ab43b573ecf7c7968ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5568620a168ed0d16ffee8943ea48137b
SHA1f858ec069f7c587546a894c85b29fdf467a994cd
SHA2562f6d75e419c99e3730709e50fcddecfcaadda0389b3a536ab6d461d27c26ec2c
SHA5128e271fc8b5ba86308d35421ce800fa957e54df09963c9799e6198ee9659a8a8fae47017f325e06838cf48a1271cd7f2c4a5e5fa43d9755e8a9347b2f36be1836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584562e76ffa4868550d11a5207e9198c
SHA1715a43e46989739d0f93c6bd178348c41be38ad3
SHA2569e225f18fab4aa16bd7724262830ffb784e74a5f253e9baf4d13701f570b9be9
SHA512af601d258f3af06f96533be8f6130bb705d23dafcecac95b4c10205928ccf10ac79e6696fbbcb07fc6ca54e9a06720904f6209c6ed73bbf26dc3d1f23d269c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2716cd0746a0eb407f18f3c16d8e4f
SHA154612bc8074274eb88ec0675a41ee36c5f1ce964
SHA256e16119da486827369a1e9711b8e268fa080e910f1d5c163d12cb8d4e44479818
SHA5122d5c6bf7f4f8cf1aa7466b2519b7f1d3f6ee802e0896e634beb09062a6da3122209b6b73820eabb1e245e00450a7d30c2dd1bf70bc8cc82563d6113775e82519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f44a1ddc096226fa132f5640a40a2bac
SHA10eaf9c8adfe414a34a2bcf0ebbf1215e51e0a7d3
SHA256f896d1bf13529a4dbd6666604638d62837d63dc536525d00bd667690895c0a08
SHA512c800751bc27481496e652e8a020f2d5949c760f8524f446a0a1862696777c48f868b9004880b422f58901ec55e72a016237ea4a542eb09a75f9a989b7f12bd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d478ad04b2b182d0b9959273d77729
SHA1428f67fa2ee72f80101fd028f6cbf847be80c1f4
SHA2561ccf927e0113a3cc81b2e610d69bf62e6eac12a327a7776e03fe47e70db56ed7
SHA5125c5819c96d4167f2a3d68e669f0807475d78781f5a2e24756e40bf0a16e5b1495bb693102618d79a7c2b8ba779847bbe8bc6b8e8c4fb794334077ae5d058a279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59246795afed8a40cf133be4310649a31
SHA1c29323d6cb9b178aafedd3881c16368229dde80d
SHA256ec3e2bf83c552c5fe1fbf302926768ef1c7c0cd1384b401e634731775fd09604
SHA5124ff716459e88fbcdd891726a74a9ebbde43cbab1fcf84a86889c71a9086de4e6d0cf81599cab40ca6923efb07bfe9b0ea002cde7ba8642e1638527c07703df62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b6cfa196e4215e81adb8dfa6b903a7f
SHA17955cc64104bad4418590fe5248085e21b895c64
SHA256e74d7b9a6fd4e871871c050506f70a87990df4dfe5fbaf04e7c05e4220b0cc7a
SHA5122523bfcce9cd691f5a26627062ae3bb30ffdabf3a0d71bd983bd68b912c2cadbe4120dfb689d1cca4afd010e5f8bba543ba279814b1cd2e8e58f81a236ef5900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53351a3539a5b00ce94a8b8a9d01ebf70
SHA16bd758f81a58f9574685403d15be7e8d59577851
SHA256bfdd60b84add7051288dca645e2a86c9a5e6feb07933a271fc95602e4773ad1e
SHA512122ea731837a786ba82d66fdc94c6ac174b0bc1201b6cd67ddbdabc40d3a45c76ae66c35b5907b1e4636395c256d2e341afbffe50364ed8ab5d2fe40720bdeec
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a