Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
620f73efedb536ce0683e26ab68d1664_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
620f73efedb536ce0683e26ab68d1664_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
620f73efedb536ce0683e26ab68d1664_JaffaCakes118.html
-
Size
21KB
-
MD5
620f73efedb536ce0683e26ab68d1664
-
SHA1
99ceeb5047152efa823c07a837e290c587a16d93
-
SHA256
78c3556b480b12d1654d26041e934f9ff6397b06fdd27e5b590fc17803901edd
-
SHA512
eb5cfc401f2c503428868643a14d184bbff1adaf301685d2564adea1aa3a032e3c9970976076bab739a1c9db08c4f0ecd5ed80c25205652de8691b9ba21c48d9
-
SSDEEP
384:SU+E2ubq/sLRs/MRJt3uu0/efOr/FAYpUNhucX1ISbPQISfZ5QboFmn5S:QEFG/MRYMRJt3z022r+XCZ5QboFmn5S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422428349" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4044576339abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F14B841-172C-11EF-A3B3-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004676de1d8b0036257a2600c7c654e3a84a5f300aeeec6e1f80b9536d0e9273f0000000000e8000000002000020000000ce207e2664766a5dabd0abf47375374e2c092d6e68b0db9d6ab421a8fb44971120000000f0066bc89ccfd08ed82f0eccff8fe5ac9ccfec22cc6cb50528de6bd879d1bd4a40000000c57d82b72437faff74943462ec3cfce5213cdda8065f9a70971d1c47834a5c402bcdc9d20bcb3210577b7e24d9e639a2c6feff78900ba1482ff8eb24499371fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2120 808 iexplore.exe 28 PID 808 wrote to memory of 2120 808 iexplore.exe 28 PID 808 wrote to memory of 2120 808 iexplore.exe 28 PID 808 wrote to memory of 2120 808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\620f73efedb536ce0683e26ab68d1664_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d6baaf51dccdf61e7c79bf618de2ba4
SHA1f845c51c50b9b8572a1eb4366405ff52202bd930
SHA25613c800484e0dcc6cce47d1af72a23fd5ebe52c77a99ec41bbaed1585827bf42c
SHA512ab49d8588c904590468c4a7f4b761ce8d8ccd18414e830efaf926dc0b4f2673e800b51a12ea3d0e43ee5eeea203a25ff2f28c9e3bcd7e713e38f872b46efcbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5addc5fb4ccb2fcc3da1230d09765556c
SHA1606f58618214aee0947574ad99699c4f05045760
SHA2568620777a00a5a3678945a9301edd9f0e7d7aaaafe20f4539373a0cc6bf7dda59
SHA512a97034fd45c14f8de7963e6b5fe87848183f44fc67c17c93d7dcdb46d548243c0ffa30e93a72d1878da220e25262a477bb66cf195cd536bf0cc3bdb86f2c71e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3449233e03f72516b2c8ebd4df91cce
SHA119a8a8ffb2c91278c66573a4b2de7b4a6af070d7
SHA25680dd69b5ebc66992dcf840b29caf6d99783487d7a4fa521a56252b88df5d217c
SHA51265ecfb98d9ac487d2b324a5927196278905d18131e986a56bfcf8683cc63c1476cbec1063dc57f4156516e81ef6100a72379fa92feb00d33bdc688627db5742f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d54fc95166f290eaaf658683dab2223
SHA1eaaec7a02a0a5f5f2903bff5d69e7a05ca88775f
SHA256e103ea7f5507782e209a1dc3a8a2d6b8606593a46a90d63f9efa33f2ee43cf11
SHA5127ae4a29dd3ecf61f6640e6ff68cfd3fc06b1fc86078bcf429b014bc16a8d7bf55678bb39c1d5f2f2fcab5e8f9e13aabb1b6e517aa7dee99b2d4c4acbf9e8ef5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f88f3032e8108d572d0864cba4f437
SHA14a17be595042330af64577d2d6a31eb1fc11a43d
SHA256073c9d4ebcdb4084e2861c58b1076101b88366f376d14e1ce85d333860f10b31
SHA512f853e4a68ce4814679af1e7d936d7a3861050d8789bb2ca209021e2923d6877f30f63c0e7fbe3556d99787d7486358d8ce0b5f647c0cc5ca6b0de9146f1c13dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df5652769e10de9d28de832ed4c6ab6
SHA1ebbc9d6f70b6780da9654d5b4c3f735ca09172ff
SHA256dda01adbc29c1d50e04bb9212fccc70a8dc79e79f3b9b6dc4c142d3c5601d1e1
SHA5121f1d68b607eb1ce91acbd5a00831204ca6edc477e84de8810aca888183637fd92f549dfdda64594cb64a7c26eafcb6907003c96dfe51e22f18ce1c58faed05d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50220a7a78938337dcfd3135cab6fc43b
SHA1ec476e65df09185759b7161cb419077746f83bb2
SHA2562ae36751df09fce4fbe3f8449f6df840150bb4862d514984b0d3fdf00b78f1de
SHA5120dfc8312f9b2e8489f9dfa11488722b06a54ec59c42b1b0f5f45d37c59cf08a0b3bdebed96a2db08755d83be83b7ef7cca65d1b64a169123b3844996b4506214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce46ae6163f25433e4400b143b769bdd
SHA1bdee3ec578f7e5eef0e7b065f9a62a751d7fbc46
SHA25699a19fd11a57d365c4495c3cd80ddb0eba1aafbaf0ecf8f6c232777c3f2aa71b
SHA512bbb98d05f1cffaa8aa1c92e8d912ccf92d2f8553bd0268c4e8ec45b7218ae9fc2ffd834adeb117e536cdd88187d0d0ec1bbedf2ef24f462e375a0e7fa2386c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbc518cb267a601c3c60001b1bfbda5
SHA160abb3f0412fe026f813c72509d2586df40bf815
SHA25682b1f12745397d4145d8d8947d973e17cde3683e46992516dc5dc451920bfe67
SHA51291333f41e476253696bfc2f3e0f17ceb767a1b220c98ce9a911a3c186a2c97dd587a20aedccf8e0e7da51e06af08a4fa02b231b1d987bee9caeaae48b4ec24b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a0028bccb43719e5818eba5e8d37482
SHA1a94649bc26ba5ef4afe6a6bda5cf1d732991331a
SHA256ddae57e8670e0a6250aa4ab32eefd8b3b88be26267fccdec029a97780f9fe4af
SHA512a86166cb78487f07282211fd4b6cdd52647dc7f5e2be9d75528c897f973784efac5e57304bcbb5ec83637e6d8f51c27dff7c127b6cbbcb338e96fa895751ae97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222b4ade40a9f13eb18805801dd4944f
SHA134ed182d7d73cc59225e8068043111e3cf5045e0
SHA25658de0286ec9387d33ef1ef5fb08667682512cfd9e0b3de5bbaf209f3f92f15e7
SHA512ef47fde2c46060ff58b1f9f4b908e76d177268e86b99089ed3840501ddeec032f5403a3b09649a38ff2ea9f49e86c3cac27c0b7c65039839e11cc7021c736a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b517aff291940b29c5458d939df90f
SHA103bb591a08e2ec2316d376f3890cfbda9c41fb73
SHA256420e840845774d4693c9fe9ec3cfbd61f9a3f0563605165bc82d94063e754027
SHA512661afce40c99ca105e0790ce4ebf54ff74198b585a06cdea612d6800cf3b693fd658653f93557556206d11c0d854590a58e4ce061f16754fe64f4637a64d4bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc581d82ebaef854dbbb1e1ae3997ce4
SHA1618521f068ca9f9635f71a3dd4ec5d5b45e6eb47
SHA256084e1c386af2f7f6fbcfa8220e13dec203fc6aaa23730365e52a4ce2347a86a4
SHA51218186973271cc0c85e5805ca6f927502c12a64b19d01d1d2307bfb9dc52d3967c304390c28bd3e28f05629fc4596787f962a1e0b15809d795c59cb97dcfef37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe40d0cd5986dc8b25d341371e722ff
SHA14bf1148f98e1cfe93ec771280fadbbc09bd88572
SHA256b5152fc92e839ecd390a434829fd604b1fbefe1170725f56e5ce2cb94d9553c8
SHA5126ab6ccf5e6dcce624d0bf67e3ce36c989343a962e0d9ec77c852d8211838e45a755de38d9ad1823328feaa945dc034bde16e383980c3df3dc83fd1811800dfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7efd51cb03d6eeadbb106c0fbf69de
SHA163af7be937707a8ffe969f47eb62c20e8cc4c96d
SHA2567b2a0f5b374a909fe9bb5e2191a98a7063695e7a05b7d9a943296890e2dd6682
SHA512cd81dc71aa90ae70031c275158eb8515b02a13f3c5afaac2aef6a91c5d38863a978485d3cf8a8ac93e57cdb205debb0955335edb7eebcf8452ca55eb64084df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693f69f9ebf487f9d742fcf0ac69d0cf
SHA19667a38bda31361911f11089eeff661efb8474a0
SHA256f2f047a03f3a624bfb22997f256005d4c512510997bab65032be70d26852058e
SHA512b27783b7d407b966e8890e96100a0f9ee353f824ab88ef579e800a173d0ad86e015f51eb96fb32c4a0796240625ce69e69b620fc06fd9fc54981e4580b7608be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf383f22828df11e63586f026c285d4
SHA13a65ac61fba6c6689d5b0ec15fec82359460fdf5
SHA2564c6714d7290704c144031cd66b655471ef6c6602c63a0d2eb35a2ba75b2f1134
SHA512c0fca4340d681b928508a4b91d831bbcd93895fc343c95b78661ef809337c64ddad72d233e3b510dd79d58deea1868f11591199d360087f3bd8eef587cb94225
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a