Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
61f7548957ccd40960f26d6855809837_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
61f7548957ccd40960f26d6855809837_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
61f7548957ccd40960f26d6855809837_JaffaCakes118.html
-
Size
70KB
-
MD5
61f7548957ccd40960f26d6855809837
-
SHA1
b8d1cee21e223f3b3f7bd0470df2e43d0c087926
-
SHA256
922f3fdc54fff785d7f75b0a36f5956db0a30df4d789e33903a0a3d1cf040d06
-
SHA512
505bb1c341c8089f5965583f7e298a6ff9c34c5ae08c8b070a48e9ea3a255fde5ecc5799cbc0582d01b16d25cac9170a8fc6ff70ae0a4f8af1155834d49e823a
-
SSDEEP
768:JiNgcMiR3sI2PDDnX0g6sO6DhDB7hVoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JbPgTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8a6a48bfe16674ca9ea9cc8f2ec7436000000000200000000001066000000010000200000000c43f7f0bd4fbfbbe14009f73965f35c6654d0073ca1ee3f436f811ca8c30ad2000000000e800000000200002000000046b8d1db6b6d005ffa975dc50af53b4f1b32e75894e0d4bc8aef30178c05f97c200000005be40ce88e87bb01fe13735e3d656c76f6763283319f6ce4f5673ad67a9aed1b40000000e6574aca9111fdd2b7e08afc150d6aedbd0df8ce6a818affa635b464fbde650dc57967decccdf71eaaa2ca732dc0916c5e211a7c1f541699b18d23d14e90fadd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002ce5bf33abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422426007" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB296751-1726-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1540 1200 iexplore.exe 28 PID 1200 wrote to memory of 1540 1200 iexplore.exe 28 PID 1200 wrote to memory of 1540 1200 iexplore.exe 28 PID 1200 wrote to memory of 1540 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61f7548957ccd40960f26d6855809837_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68f550986d318a69f95db89dbe6c179
SHA11c9e67ecdbb436033d3958ed3f79a8ccb136e7e2
SHA256317302d7305ece45192bde90e8ac60215670e52a8035d1ebfee0aeb20e877ea7
SHA5128e6fde41bf1d2da9eb1b27684acc819c112f83ddb3938ca6aed75c11a7664b3c8aadf9648639f4a5954d75a1da2c8d2f36d21004550cda27377a2110f61415f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7de69d41376336b429eb7d14284857
SHA13f373090b889bd23b2ed9127ba12977c82321199
SHA256f6d09758a443bf19c6dc6a30ebbced442427c4df1a7d878bbaf100a9a4b3fff2
SHA51275df715a4279f64f3fbd17ed75f7dbc8be92c4195fff4ae68552fd0961a01b71b93b4b1122fcd34967285838b9343736d9c974d90cf63031ff1407610124f1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594eea7e7a3f9ec1321d35ae159506ff6
SHA1d10f052dc7593d708d0da91b9e44e3ce3b03f10a
SHA2561b4616e65a6c1112d1d315211f9d8a6c21dbdd92f777f3bc5165d9aad453d3b2
SHA5124737f31da8d6c0cb245e1192cd205ea033c48b1045bb2d6ca145058d588c4110b93aba665121b9ff4c0c507ceb190bb5fd30962bbfe45e1477db1a1c03ffb4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b554bbf199449b25a40cb0b55fcd798
SHA17af31d5abcbeb0ad4719ef56eb0ad09fb5d5fe82
SHA256c9176e5ab9d35791ee2783afaad348f88e234a1271f5280a5503adca6325cb3a
SHA512820c5f7ca6c2a89c681f5a036bf8d2973e782222065b110cbedde73393367bf7fbb45fce27d42bcb78bad98c33b39e5fc0484a8385f344cdd4cff748e036c654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ff8442fe3686af2550d3721ca88eca8
SHA18c9b5b00b0f3eb515c9fd1b1d31470ab4e132458
SHA2566493fe2545c07cc6e2ba6e86a6d127bf5a418aab7b510ea99fb6542acbf09b63
SHA512afbf995bbad24d53597fa54f3b09e17dc32a1413cb5893c09ef4c05b23b20d3482f9f02fe7ec26d827902a204ec89b49e44d7afb882ac3f558e24cfd10c34132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b46af38a01d23d00e4705c204259e1c
SHA1f589d80721ff0b0516ff5309ad94a23987e0a67f
SHA256f444438dc4b9936c9be9c9dcc3c4ef910fb0913e1ec1146e34b81aaca639bf31
SHA5121b74781100b7ccf609ebb4ca6a404ea1100d9cb8887d39059f3dd63a4648babe1f3b1b1213518454786ae55ba6e549fa9e787a40aef3aa32da0d9226ab205295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559b619c76253f586f4323a34363f5023
SHA15e1b2eaa19182c662e01c80090c790bf46f4152f
SHA2569c5ae066ef8e9014a1b91cbb8a27114bfe2e3580e92c3e32a26df9dd4de7f587
SHA512e5eee687a2b76f7d46b63bbc45f77e95eae7fc99848e6e0ae196d16ff8384360147ab805f364eee1eef58be29649afa96d1850594a5e4aa1a0bd0e5129e58ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c468a18a613c006265cb7bb4055588d2
SHA1f7bcfa59212575f94f3544eccac69f47e6b7d1cc
SHA256ecb78d99bf9415e46d44aec6c62e3397031d4fddaeb3a3f6b34db96850f68ca4
SHA51210852a1300dc127b7b606a6f1fafc2933d152370506ffe1c1ba4f50503c6b9ed4d61d4aec95d07728b25a5817e98dd55921cfeb760fa78aa382957d239db859b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5570345f03358c20d9e0b3776351b487c
SHA1dd78e542c77681679549eb864dceb96f247822fb
SHA256aa11117f9830ecdad8793b5db29cd6071a01afcd2a6c20c55aa3bab4d4b2d7c8
SHA512897a4bd3990cabc594ee90e1712ccf2b5624c2c04b9378054d59f7e51d67af442478ea5ba27329c4c372b8aebc46be6af1b14def1474829c70b5f54f15909c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b4acd3eb5edf929f9610d072d395ac
SHA16414c94bb450acbf5317b79b1a183b7d2aaab8aa
SHA256f8c584b80fc388eee9ee51ac0e672c0ebff6f57b787399861ccbb0a744abfcaf
SHA512cf3c30e44871805054813de2625ba6b9799e537c5475d14c2bfb13759b7e8a0bb02e2482162ac3d9fcc7eaa50539c48470d7a8daef137037da736c26f56a050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531703cb28b45dd307970547ca7f63e60
SHA1c92f1b23eabe988d36d24a49729eaf8148cea7c6
SHA2566a0d27a6dab76a23f00e575f7068e8771af551d35b5c5ebbeeed110b513fd548
SHA512cd4656273d05a8da6be33576b39fd7dd3647f260ede7adcb3b56b301e8b96684d2ece87fb506027c260f008fd374d05b038c9958f6b8b89567a240a34428f64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d83e2d4230eb7981e1301089a446edb
SHA1c647dfd07271252fd7d49a347ec036a5f223fc7f
SHA25686dd925189e04dc0c4cbd827b66b991739ccce7acafa35bd382d36b1f1c2d023
SHA512c11ca38b45d37bddd0cbe5f209b6a3c7444903c8fe36426982a5317c85fb4fb00d24869e99a48099d7ed6c523c3d2ebf22a7bb6f0b21eeea26d5d6d6d02a7920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6d674e97b23a8edf4ae494ddaf14eb
SHA15143b2d17f411a17a76f691f6234aa880c81ba6e
SHA256daff50d5f11d0a42703a54ec1c86e2a750adbb5f6deff117a357f701a0c965b5
SHA51284f401eefa1925c4adbce2f4af21c2024b1abe0585c2650f6f90c6c8dfcaca1fdb6ff1699f51bd30360ffaf050f5d193712b97ed3844be97510f08b571ca0497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185bfefefa6a8125ecde57fed01356e3
SHA1720e86d09df21eeb1ec78d2fb72f18aa1e2b7abe
SHA2566f8ae979964abd996b74beee0402c63af864396028a06b7a902594d07ebb62bc
SHA51212c9f76ec9d137712584bf6a7cfcae08754f62324e9765f35d8edd406167d0301ad8b549a4b447fac9562102aad16741a3b6fa6ac837a9f6a511e26f66cdccaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521e746f07912fb4903ea9da6f3663b7a
SHA1682bb861974907bef2bacbcf5082303420e8b389
SHA2569aa9ac9021a5afc9c35f9c3ca864e0653b8e551a74191bcc12dcdc0e25d2541e
SHA512135d97b434529718b2807f4f8c56e2aea8fdb30c8ec9c245a15907e4a017b3b03e65a4f1d40f3d39ccd259cded61c6c6a6cb0ddcc4db97b04ff4619d6cc2a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27b6d34054d6fe13a1844fb4953b64e
SHA108dec38c94e3a16ba39cb43743b5da1693431f87
SHA2563ad29e8cc2d849020ce24932708678c45e300d2f8a9d61ae8ebfd40b16d8ad1c
SHA512b288cea88f64b0869c8e80187210ab8e19f08e6ee87ba6283f50a91824a9a380739fc9dbe49d7051982bf6cb09ba61b0a4c10a46e744a0dc629ee7145eed0e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23afb07a9ef990053b696974eb61130
SHA1db24afe321c63976a7cbdcce7e94bb0bcb3e8183
SHA256f336691748c80ad9071be9fb2157bb73cae02ab8065656178415c6217aa5878e
SHA512deeda3e8b91f00f6081a23fcf06b62645223a129d619293741523db8f97357d64c60da6ea7bbe2cd15971612b6c3b6c64db39844fae65965f610aab4cf52b3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51413791f3fbf0ddb70026ad7f554594b
SHA1d07a0837c6d3edcd6191fbaa93ee60eeee741e12
SHA2566ef202ff9ffcd7430e77f671fad01efd29fba703adfcf6b3b72612a851cc82dd
SHA512ce9850437611897a01f0e6708d9daf4fa4ccb890ec49600b577a8f47beabf03a7e4d484fadf1b9e3fe05db14a72c55dd2e7a982e7fac8a70552f521602e9d12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58194a1b2203e3b51d85f65619950a807
SHA1f06d79da4d6a9c8031a0baf30980212c2281328d
SHA256417c268706e930ccc13483b1caba06a5c81f8ebf68b4604af1d803cbf964141f
SHA51262214625e05f2f08ecbd05ddae9e89c45f29598bd0b9a0d1dc3611b9158306d39a43c86879067bd9008e6748ca9a4419b28f00519d58f4000b5eeb139a63987d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a