Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
62e6aa132e74b5ef7ea1ce73ba3c940a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62e6aa132e74b5ef7ea1ce73ba3c940a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
62e6aa132e74b5ef7ea1ce73ba3c940a_JaffaCakes118.html
-
Size
460KB
-
MD5
62e6aa132e74b5ef7ea1ce73ba3c940a
-
SHA1
16c6a7103643898e55dd2382563d3e057aaf349f
-
SHA256
6864a4f040a4271b7bf4130ea2ea5f4f835cb9db251ef505e46161f5650997ca
-
SHA512
3689b758c32b47f6e932eacba02674668a6aa9c8a46d93c0b7f7ca11f10669dbbc7524dac69ac1d40fa85e73a2d901ea17e238822ee536171b9e7d9e58807d3a
-
SSDEEP
6144:SSsMYod+X3oI+YGsMYod+X3oI+YLsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3q5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000dfc4966abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{715F8BB1-1759-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422447707" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a391e941ce98313c0bd190abe535a33c9b3b9887074618fa80091e85e7c6f476000000000e8000000002000020000000ad8bffce5d900b96bc25b45d4c52c8f5f74bf0cc7238ab47d496783f4c47779220000000c9f206d811cb9d0cbfe35c4bd4df8b85764780a93c25f5bd55e5db40839a576040000000f5b3040299cbbd73c7bcb00e99ccde7c4efa5277ac32c2e1258fa58237ce96dd0ceb96093790058cc25b112b36491712d4dd65ace518f9ec4fd9f18412456b33 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 832 iexplore.exe 832 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62e6aa132e74b5ef7ea1ce73ba3c940a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b394935769d8b371cef164bc482b0107
SHA116c7b6666ef5885850aaa22189f2d6c1adb4792f
SHA256dabdfbecba67745ceca2192a10ad65a85387f4c031045850ee606ed0195571e7
SHA512276a33a65358eaf8858dcd734d1082292d3c0712ce2d5618810e50ebf81a0c67755b551bee256f3a63b2e0edfdd26f8ec0caf239a3276c2bdfb93c27c041caae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5105ac5e243018e4a40489b6b79dfac9c
SHA11c7dd5631057232c87a34a2ea75dddf3ebba525c
SHA2564902441a17edd4fd92cf407f26665da49e473a6b9a2018a05ed183c95f9d85a8
SHA51250c75899b2e833801e466f7b66a4a33735fd1496ce1451ddd7583a75958a557f12bb4de42c887eb29c998a42190dd7d5ad9ad49d6ac50b1ebf3f78b908a08e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b408d61412a02caf159bfe235409e0d9
SHA1a36325a2d6a20e2419bd85cb9267cfa7edcd58b7
SHA25673766e8f78772e87bb68bc6e3cc47cc2959cfbedeb0962e2a60961aaee507afb
SHA5125d7b031277e873681c39ebfc762fc4674cf2599865c4c4d41e8c98c975eb89c54bf29ecf2e232ecce901508dfb7ca0071d07887b580307de8ebc2a90cb5a6b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0218fdc56b18125ff9ec9af9a42145
SHA1e47579821229bb71ea241f76641d827d10822e11
SHA25664ffa058630320e8a47b7c091733cf58a9c6fc15db65b90c644f95c07c4c8451
SHA5122416d2a8c9d7c318d072d423952e6180fdf8879acc108ba50215b60a200691cdb6153fab3551fb19e3dd85f3616e68cdcbd2795092dfe5b0153b47167a38da20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55256e4de4de32f87ea2f41e3d0035f33
SHA15bd9e12a1cbe88e568d1e63918b4ef3fd3b1f828
SHA25688d3a61b6e35b8e108d149578a3d407e11ed91036c7146e268226c8d5ffcd941
SHA512dcdc21535033a09ebd4bbc2d5235fe148e455028cc7793a3cd6671721921ffb1c002feefae2f1a43fe1661bd1e504862ef6bc4754ee411635a6f8c5b76f8899f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56300a5596b785a557090023aa1dfeb7a
SHA198e907860d902e2d2e1c2f68ce28d9353aa12366
SHA2564296f56d40d019d7956840935dbfdccd7e9025e02bcdcde5f805f87e33280c4f
SHA51247dc22894e433d64a39535db564a9388d982a4533d14f65bdeed2328ee905bc8d28d98a9f82cbd4d1b977c61e787aff7e4e60e4d198ca217a5644ba34ac7a40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50548f90d7fb3a344153ef6a8bda3cef3
SHA11a6d613cabee96f70f919ab317c34328996d8cec
SHA25643e5bb90fd01ca415263747b36487c1a10b2cdc00dd2f21b1d5ef2e7c7c53226
SHA5121884eb3ffdc23bb38a244b98a5964718b109e114b666a1ebbba1603bb78ff7e8bd40df7c82ccddbfe020795b450a724f668ce0604d60cd49d09d9e7ec581fcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571174dd3e666049884199393b11c2ea5
SHA14e32b08f5ea24404f107503d9bf8077631b0e473
SHA25629c876e04b08f3885d85fd93d111c89ad22ae158b7337a358f2e32e451248ba0
SHA5123edc44ece3aa3e859fe863b174629eaa80419906cebbbf214284212bb48615ef535c8ee157402a48159a48de00d7da00a37d2efaac53afeac4b2b6d11db1c456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569938701f0e22d4b043a197e0be3a06f
SHA1f72bb3b8ff14d736216117bd9c56690f33502a05
SHA256ea2ec50ba26c1f788bbc962719b7a27ab9dca07dec006b0901b918a677c47e37
SHA512d2432113809d5ae6fe46353fddf4cec335d65688de7241ceb5a88ebbc404b2b72005a19e23aff87e796907d4094e5d5ebe70f4ae30e1fd87bfe06dc9aab9e432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d4ba4ee1b2989b993d5035e393624f
SHA197cbca6e2c61def1650a25cc8567de0b61d705b3
SHA25639ab6808a4ce06e7bc2f29a4c7599fb62898385f788bfe059229b0f0b7cba00e
SHA512b5dff91779b1d61b80568ef9fb6d9f3ad226450cc256ea4868255bdc0b25272b2091eea0b657dbe8486c8d9a20cdc89bff5566cf6c67ad42d2e36731ea088204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527116ef8c76999b341357744af6d38b3
SHA136e0c7557b265136313a2c49025c87d5f6812986
SHA2566a9c370f52ec0cac1e6b13bed3ecc3e2d2e6aee526ac810fa4bdd002b30d725e
SHA5124e1c1c80191a0f68bf6518e30c47a6e8cf57beb180c778d824dbc4ee12fc1dd35a9e3b5606167f497b8786c025abe0b722ef0e39db5044b37de05aa24d7410ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e0bee78f2477b6f1fa81b00d14ed582
SHA16173d5a717618fd120412d9aa24c34b925f05187
SHA256181960b8b449f5ea57d20cc02fd9d824af08f6da0de6e337a9122bfc799a5b15
SHA51285d06ce0f92823d22cdfebf46ff0ae1befc2ab02c32404d7504a54f75f54b754235317b1f2f5df4201cc9affacde0e75cc17d9ce92ccfaf506b89a93ff0e7414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b37eeddb046c5e0b224c3b08daa46e
SHA14f1901f1ebd7ab2ae75fb5637e2fe4c1ce665352
SHA2563343735b2fc7f4ce478e306e6d07e284862e4ffd345a3b4fc2a1609be5ad34c3
SHA512946027ee444b454d9cfb91959e063c3790210aea1df9b1f40e465086ccdb10cac33aba91c658b359a832658fa8c148354db60a0c8c984a2d5c9868e4d46ec42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa395fc433561404609c51349785833
SHA16019b971558776b4519c809de549078e955e203c
SHA256f37509fd27d939e2c3c218a5fa47388d68813545f2ed2168b6de3e2ea9e92ee8
SHA5127068df5f7201e716dc0fe76021ad5ec1df9d213bfd1f80c8d70c856b200e4dad899e4c812488aed408959941dd9b980f29cde5d28bdeb63c4fd6e2557f2f2b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9fb044527a851ccb421df57f60e541
SHA1bcaa8180cf8373921372ba286a9e03f5c5ba7dce
SHA2567f05bf03e86530f743e5a670960b8b460e17b96328cffb50ad66bf436155974c
SHA5129cf39a0892dc3522e1b709cdfd88f0c96fb28eaaa913bfd85e8a4f8f8d2cf171af3ab9a3d8b11bb3fe8ddae630adcefbd4054dad5d01885847767e2506cc5b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5743007f217a182310032744bf56694d3
SHA1da8a5688f003ecc5f9c7655e3e59b86a3731aaae
SHA2564a6fd7ecc500aafa04f1b86570d104a919338f69494a314762ec0d1d1040eaf8
SHA5127340cb989f8db6366f81667b2973ccf52c139de17fd2a3cf4820c981304060cb5b3c1984aadc7ff3afa07fb96da918ad50249bf74ede3c800a86a883642d0579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504322abf911b2a404f9a28fb43408bea
SHA10517d3b5ff78bea94411da9105195c4e8cac1969
SHA256f8f201a69e92ffc62bfe0195b12f2425fd6e173801390c15a1a0c4dc2072c9ef
SHA512362ca1c948118b97b30fabff53860aac685705c408a2e9766f1ec451b866e9d79ead64acfbfc6c8e65867e110757a74844d666b1869df8931589c36e18118843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f34e9c0e857c98a891931442d41847b
SHA1b0d827702aef17e5fe68723eb1cfeba7f6e1a530
SHA25649f91bbb2c45d4fe8c3ae62fc5f330d38cdd35f5dddd60e1cf2cde32338cf80a
SHA5123a17bfe31ab65e269ac7613b71445b7e4ef229bd4a51ae00c4e8500d79e114352238e33994749091334af84800993e5d4217bc1b734a9727c75f406836c50469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ca1b08df3c9cc71ec67c4eae943e86
SHA1dbb1cf6640715d749be84c1ab79316bb0de4a6d6
SHA2569b4a20049215bbe0d60acb43d63419523326d9c439766e51d73100208f8e5171
SHA512c6a634bb90596bd56607a3822c4c526ef158cae3a8a5b3bfd9ff4296a6461a98b59ca46127ae1c1959057768608dc82a017f0dd4b32495b8fc02950f83ba0053
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a