Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html
-
Size
157KB
-
MD5
62dfd7040be6668b3a57eff7be9f0991
-
SHA1
c7c15a6a5fcdc43cea85a2620bd9ab2edbcdf6c2
-
SHA256
5011df1f0a60571947079e3c34499d45aa4898aba329024c9ffa0bd9ae9caa51
-
SHA512
5e9b5f910d927f8ffcba5b23a36ef6fd15a751cd409694802d92e1831bbb6f9ce9afb8f705bdb717070457becf23a09c2c4e7b47d2f7e9128ff2784167f679dd
-
SSDEEP
1536:SIrcFqSLIOvldBMA2yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SIqqYvCdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422447158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A23D131-1758-11EF-8CD1-FA3492730900} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c6e3d795e42314994ab32fb8b0204b900000000020000000000106600000001000020000000f2825bad1ffaa3e813a5b7ccce4ba71c6415e17df50d646b2af8c5bb6f304ee4000000000e8000000002000020000000b3554e482beda7a08288c5c35a7c2f901e39e201bc75c4e7e3fda337493ddca220000000fde07c9a648bdf91a1900649275b420da2c1990cf6d2dd2a2d65538047ae87b94000000042e61468a0a9906a8053904399a4fc8d4437b350d9dc1263319d46de28b53268951ca83ab208635596af53466d95ca378e9ffee9285cd107a8ea50878617c5ef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bcc23d65abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2288 2192 iexplore.exe 28 PID 2192 wrote to memory of 2288 2192 iexplore.exe 28 PID 2192 wrote to memory of 2288 2192 iexplore.exe 28 PID 2192 wrote to memory of 2288 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62dfd7040be6668b3a57eff7be9f0991_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fd8da8aebf64150d4042d31d080e1ed
SHA1cc5dc35cd272643d0329de5c3f13c6c83d5960ad
SHA256bbfeabc8db23a058617ebf5acfe22c0560f5040f5c760d0fb865885a036679a8
SHA512bb2cec70badb08aab75c4a77e255ea0f53ccdc33eba74eba5181ca5dd777ced67bbd7c31fce7ab9e23af3a692396e2347eef972bdd614fe7cb47ef0f84ab6841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db79d35e2a167a9e6a329d28a9f18579
SHA1483e1ffd040cdf0800aa6340285246c2111b225a
SHA2567f2c67ea6b2d2683ae491977d7b5401efd97ffc6c1ff7c5cfae552da1ba71ead
SHA5124f67e618778b035333faa0d60c9689becddc208bd243a9c721a5fff4bc3a7135091c2d09e1d22b212bb49c6ce932dae81acaacedb82a687b0d6cb64e1697645d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90c56c5f27b07178435debb3d0f1a67
SHA1e7995c7ddd0a1d0839ddb6055e65d65eff2667d4
SHA256d1ab063685df5cdecaf5de272de043ba1c6bee305a860f1de89ac7ac2d2931e4
SHA5121eb76f37814d5c84bf64f1bc936d243cab90fd307a027ad8e67537624452f77c9ecbe25bfcdee0a0d32e58cdf9db0994a6f0ccddab6d343732c415535f17de7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c63ff4c331daf620b501929677beff07
SHA1884243878b44b4381c6fbb89d120daa8cd8a4701
SHA2566e24e2f6dfa08306be00607ba84d6b9be6e254fce6eb712df162fb64e3945cd4
SHA51271bfd46f00e4ff729cdf8627c4513d83c83e6ba3df61dc78bbf6c1cc2576aa7eacf6e4b0cc24e2c2db1d60a2e91542700ea621ba7ca7b30397617f20a62953b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842da6f0536ca45644b6f1efd4e98c9e
SHA1438b448eb7fd6d73a32a435dfd7760d9c3321ae6
SHA256b03287088bb7ab4cd3cf26bb15bcc482dd423c1a96bce6143e0f612e2c8e9ad3
SHA512e428c68ea351fa9b552151733df69254ed19e31dff63412ff589abfacf5f722fb26c800ebd74e5b88f849b8325f81263d9e94c47ec0800ef556fe33cee2d8e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568cd03a661d3fa2a59613fc7f41916cf
SHA15033b256f6e3f246ed317593ad00f3708b3eaf7e
SHA256e343c4146ba80177fb9f826470ee485668c4d0ff9d8177fb259e5f0cbabdc223
SHA512fe3df1744c6f61c806fec6293067ec2da45192103a7b6dafe37f1991470ce045e48dc4349c56bf2c299781aa2cacdbdcecefe1e26a3fcfd9914c888bae3fdc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc25330319080b665604787c50edcdb
SHA19a492492337194e7a7aaef63d0e33f421795e54f
SHA256076fa5ca4b2558a158706f680b0a06f8a65aea4ad4ef98316b72cf1f921e5342
SHA512a3977db95ac930b2b7e13a8e3d5b6b18581d18092acba0819380f327b6bfb9b129c1db4cee072a486ed0f6d12bf451a019e5475bf78dbafc12cfedf48b677884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589cc9d0eb153ca58ea55700cf83656cf
SHA13c7841d867e83dd1f348565cca764834575d51ea
SHA2564a4bb0d201d6586ea324502e518d3067245a32ec587812a03c52e1b27b1a51e1
SHA512f3b2118ae671affe98fb04000c4e2457d1c40356cd5ab2d455e6e46d05742ed1511201883bc47e06306a23d67970fcb9213ed53b967c7233c15e243c7674e5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5939b380e0d978aaea46c921d8a788c19
SHA124f9905000f366ee63c211c9507dcf5c48bc92df
SHA2561929d1fc5e524de5b99ca5417e4fdf17550607a816a33507baf92f1d671c72b6
SHA512ef699cb30f2a85f0c0569ddb13dd6df11cbfc5a1be65d5f2550e24a0c3b05ac5be73c0bfbc9819f61c148352d020279a8484ec92340fc9026152aec872121a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a27ff40f8223fcf279b882e66c00fa7
SHA15552805334d5a3cb6656770337687651e4fd74f3
SHA2565c0bb3fe0db028c4141b8ac36a75dc9c6edf6b1faef0f802eaaf4714f89f0905
SHA5121d643fad207f4032988b9795872d24b659597f9f8ab38567a0cd3b066639a90e975dce2c3b3177945a8081543648ad093bded7ea86f71e358d2e5e07a0c0ca90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599adb07ac07afb27715de8e3a84b5298
SHA1fba3872a5b733da39990ff1c9d9edc93acfc0aff
SHA256bbb5aa3f9d0ef97fa0fe03c1718940033eca0b7f5fc100ef70aef1c13fe7fc7e
SHA512eaac81248ebe487872571230fa067f5518478dbd583d238a6baa35753e686f04b05e0819c29c1594127804873e1c3344c178f9e27988b3a988648fe99a09278b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b369ab1696e2ad1545ddd0c023581854
SHA121b32639639c5a02df527450cd34bdacc38a017d
SHA256bdef00dcb74a6a3baa7665a373efd8092b40576f9822250c8f46c1fe85669363
SHA512890d7ca3f9671fa5e70163f242f2a3c574337d7fcbcb331113def6132a9291a346c900745c9295a3ab1a423aca0a3422b12c9b3d3ef6b59104c21ce161ce3633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7988dd9471d57202fb015342ce34b8a
SHA1c3f1ead825b7dcb4baf9e2f84afde58491a6d2ee
SHA2563547b2c8ddd532ff2877483419583716165cf42d632e55ec5a0fe433db23bf71
SHA51261aa55a16396721475a107bb4d2fb9dbd911d866dab8e05fcb5f51856231023f8b474a5f08c881e1597b94e700026b97f70bd2fbd3c02d67e68faa8432493678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a7ca21b3a4061c7e6907f1e63764fd
SHA1dbc87080a10a62e848e7e8b62735be9629090aff
SHA2563c1004f19855e0eded7eed01e77c902f3abff21f1f064fd95254a762761575c4
SHA512f6721844da4ee9c4da70ff86cd0cdafce35a22f438057fe26213db42e639a0c62c0e3c40869f95d6d4c67720d0d60962450405c7ff848ef496b48ead4ed3394c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56def940b77b951eec8e97c0e11a3837c
SHA11298007505b1efba57449ac5929ac51e0d347c47
SHA2560793425b178812252adedea5187b41dd7825e516243894d2d8d3d0ca612a319c
SHA512bc4aa67284cd647efa1c0bffa4dd476bcc1fb26b9ba09d14917acaf1e2104cc99fc16d77f99216758f15b2a22fc3b468566cd84dbeb40320ddfcea7a28271b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433101a8c756f14a27cbe3b99b09dfb6
SHA149d39154edceebefc45b4eca744f21a986c7bf8d
SHA256adb02cd8db83420abbbb2f4e414e850771c90024b04e21f83403e17e0c969903
SHA512d502edb5f60b3f4490a81bbe8031f9d49e2431bb1fe6cdff13a607f806102b8ee69a912ad1e4463d593ad7102d67a7dd96ba47db4b0c5dcf5390c9778a26653e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604ca86a75b3d35746707627f5defade
SHA15b6dbb874ddf0cc83d588cde7cdbd1beed07cc0f
SHA2565e1e84688e6a792f08971074630437863a402e871fd38880b36116c0803c0275
SHA512b6f454b56cfbfb3ac659e44b509fe952123663ebc826fd6a5eac81c47d48f1045d596227c1254190e3004629625bc4a507112373b7c0aa4c1b87b5b2fad5dd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ffb892c666dbba1a610a6b966cae63
SHA1e100ffdb59d39fd9e4dcdaa513182509a7714410
SHA2565c2bec9117571b98430d85950545d9e6829eb36b5f3c4384e0dc11b043d6fb8d
SHA51209030fdac2b2dbbacb3dd8493c0ee2ee6d99d72477297cf3d06b1ed2162cee3f1069f252c389a719d54f222e8d514aa1aff2e1d51bc30d81209583487689cf75
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a