Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
62f76e66241ac23854648652516712a4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62f76e66241ac23854648652516712a4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
62f76e66241ac23854648652516712a4_JaffaCakes118.html
-
Size
142KB
-
MD5
62f76e66241ac23854648652516712a4
-
SHA1
1ae1581d883f3635ce1ed5e2d3c1c138eaa2d0fc
-
SHA256
3264979612df124a0b95f356d106e478fd1010d2c6a25a8806216faf6ebd3467
-
SHA512
3827f49fd1bf5b956143a5261a7fb22aea724103219d7ce0686819ce5fce74f5b864fd2680517ec3434d63f9880410c90da0070f44b225368017f9281b003de4
-
SSDEEP
3072:ySpt5hlOvbGsr2stCHI4OgVhWcMMjalBmvOc3R+r/6rZTZAN26/qNDkZey:Ec3R+r/69ViSIey
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422449166" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ffb0c24d40ff9d29571b21265a74500f6653a3186b8aa602e4f9638e49211298000000000e8000000002000020000000f0ac0bd06ab92a465c02fd63981ccc940ff09325eb30c2ea0ac9dff955c48e6120000000562918c6a1077ab662ce95ee8b0d43af27497102800632468550a73ab63d0cbc4000000078e2f8257c5b00268d2bfc1c43a4d041e13dcbfe4fb68bd513574614f95814ffeb6103e233813252690c5f587e32cac708f1f5cb12cea861e8c48e6b0544c0d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705deaab69abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D700BA91-175C-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62f76e66241ac23854648652516712a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46fc56cbaf693600f78d7b2455f8ded
SHA101ca74df2709d5203769d202b9f6cd837aa9ffce
SHA2563f1fe8a71884500f14cc67a442dd1d1e592010293bf7457a9420bfc22ee8c24e
SHA512d6cdafc2a77c67bc0339f249f972ea6f5742342d18436ae14265d0df822f79b2aa5bd55591a0dd7f69df4d6f2269f23c87749f1949ee1d3ae16b7904784c930b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549386ca9de129bf9a241b60527e62c2
SHA18a747c1f1dbaf20eabf7afe289b63fa2577651c5
SHA25659c050aa732e741222c8cddc338f35bdabf918b6318fe3aefb5e20cb4087df91
SHA5128e6f1a00ef0694cb71ad9aedc569525bb37028fef0c7e0b62da3669bcf6821cf98bbe4238a1e3878d28ad1252600aededfb7cc4efa78b4b6040f270c0673429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a18798b568f5ed925ec139ce578f8d
SHA1f826432fc508385d0634eee5699ee248744da0dd
SHA2568ab09f4475de2a239aa5f05b62f65f9afe2eadeef29e2093356d77bd1bb0673e
SHA5120abedafadd5b6ee5d4ca1576a91420fe9fb90887a81f7b92c3d1cba914ddde36ad03ca0e2ac1285c6a68b1c0bef552f013fdc08bf431f6f0ceb52e7014c16b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a0cf23a7c03c8f41714a8237a99091
SHA1d1496b86fec59cffd0b8d2b829bbf5b84c4549f3
SHA2560b132f9cb49c5d2e99e4123b149ea5639cd18e4c3985878d2149da50fcf1a048
SHA512ff551e563391ccdb00b53a0462205d9ec41f9e738a659218e0191a95cc5aa80f5cba34b5b344a290fd30e5881c1e294e8c10f4d12fb271e238e8e1eae745d266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dca3dccaddc39960cb157072fa88d48
SHA14b9605ae62a12d7168dbfb36ecdf4843ffaf298f
SHA25684d5d4f20c92cdc2d7d47c41003c65aa88ae32b44a9585d0939119da9afd8d2c
SHA512e65a2cf6fa3e53c4034a17903ce702693c0d14d10afae5791152d5fecbf50570e7920c15780d42f995d207d39536128f40892e2e8d51c8634baacf637bb74b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fcd660334695e17e674b1878305549b
SHA1e108784e3da7ce3c4ed0342eca592b2b535d6852
SHA256ed68546976fe70f55ce892749337f86db45f3c440c39b8463303cfad45b3a3b7
SHA51241a5b68029051c24dd7d999a46fcf0b02a768f3a4aa137bbd2c247a0a79851fdc5a85145370d8dd75c014ab7cb2c9340a0741b70f41356cb1bcb8e77ffb7125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ee9ee276b3fca1675a6bf384ed7b82
SHA14ba1123f30bc97d14bb98e904c6196384aa4f5e4
SHA2568a0b375afddecc8c924432873f471eb325165c6aa9e78e3cd9f056fd1c31790f
SHA51229c6761ad604f7f59e5dba25ca63eaa7fd5db883a4c72b61ea955a590eae5923bf971cc8384282941bc3811954c30d1726fe8e81b10e6e83db6c1cfd4cf6fd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc521bb7675cec9a92fd773f1fef320
SHA103b2bc53eea4bec7ee36b0979196b91cdd9ae978
SHA25661e65bc7059ab07669789be22070b8cb004ddad7152e48374c6ae01c7b8c7161
SHA5126ddae2d949cacbb643c8a37bee82b6704c8caf11dac1c2a08e077b9c9e8e8850597d721b18b89b20c6627c0a309f6cc30f1293a5d8658078481c0f0f020750d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1b6c62f57062a57d7a6bda843935420
SHA1a7217940fc7321b11c0e4a622110e5b922b56f54
SHA2563e8563a3634cfea2783c193d417baad4c2fca29567fb42400fbc43f199fa00ba
SHA51255dc323818dac0c28f6292f8bdef71b60557230edad3046885df3d372d61e282b900aca48a74a0e474b659137a470f9489856cbbecdee65753640296f309b591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d66d823ae9bc788f24246132aa23f5
SHA1afa87f1257416ef38a8de52f72f22c4e1f39c1d1
SHA25600367efd91f026b71a981472d46740da67d821a307beadf1ea774935d0b0815d
SHA5121d4a8c4809978861b779ff5d984cc351ead2a879dde640faf59ba7fe8c859f06a18b4475365796321fc111b06965343f19739aef466ba6513f628740cc65fdb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d0e090bfe8c0cdcb651f32367eb131
SHA19ca20347c8820bb2933a9f8b82ad4ea81b5a0a6f
SHA256e9961dc6c48410b0671c58cbe9f5e6301962f3b6386fc894834a932a5c7e1214
SHA5123b8baf290e01d29c4615038cd23744b61ce5296569655fa3048d678caaacb56c83a000312fcb0e2305a132c89f839c71ef18b79546c5b6160f415801e6daf4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae95cd983d5fade4f2699f50e9e67a7
SHA13e57941d74e24c59f1e3d538f47b33713f490290
SHA2561431e3f53615036823e64176cc6853bcdb9896dae1f785a791bfb9af767481f3
SHA512b1963f1d86e8f6a6b7d78431b8f9f3653640fb720c4efefdc5534c606dcb8ab2fe27fba8967c0c494825f61efd7f87fd6bc9ac6532c5f1f1ffa5096d929c7d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb87e1cff1af513f5945f3f65de708d
SHA1397677af41c658fa8af7151e8676afe50e31db18
SHA256d79fe65217acfe8bf278a8976112a9c1229ad8b42161fdda1255ca236fe229fa
SHA5128c5b1a53da99befb64f77344e19f9d5cdfbe6595dfcb3a599da6c3d029e7bfe79ff70bda2c4c4b285948de863d81942496631cb7c35398d2b6b5052e562361fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e3d0e388539b1bd1b548d1cfdf4804
SHA1518fce216820731bbd21d5e3e5a29143127cd3cb
SHA2569546cb04e111016d7b750a4d1c43780e750112cc357af2870b59a0726d08dbbf
SHA512e5513438bc0de69fc88589f1a15f7ba4739609b0805d130760d87421e1ea59cd5b6379d20dc1d75ede10ef44e20df966a0ccd18e035315dce7fff11c2f5728b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad379ce06a02853aced451e4aeb81a68
SHA1a30da464d23eb15b786a5efb65f2a1bf2f20efdf
SHA256c5becccae73fb26de40a78f7684eb93dcc606b4df48d3677fedc6529f228a818
SHA5127a253c214634351948b05b37c7e0c7de597fd2ec9c20d07e46cf3f1bbd71571dac44467c372caf5808efd27f33e92229ca07eb77b82a9fe1dc79853d59361a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5581e0828ad59016130657d42f2afb8df
SHA159430138d29cc1f356d26b0bca694afe627f925c
SHA256fcd019e3f58f7437b8cf5c1a108cee21e59c71d9eac7fa2a40f38f48fe103e86
SHA5129189554a9f214c8a3a29ef6093e7ebfa930b6fa1de73b63ebc284a630da71085d8296749e2d346eb87452746f9242ef17ff1e30b668ed20fb8e2b531ed4d0b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d4bf4cb035c6329a97cc6419269899a
SHA16f20743a301e90316cf91a6d6e8c409d8bcfbeea
SHA256085749113cb05e1563066065f44af9c7cf5c0a858e8a3c6314d614a564ed49a6
SHA512cfe458fe99bd94aee957c0d9dc53287aa5a4c667af4931bdaf2214da962d0e7c1a19e8fbc8c6a03af81eec0b0b6fa4c79f65e81f30f25eaa03c9eb6dbbd999cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98528b6604bfcf2986bac5c5c70f38c
SHA1e73a926569c97f3b040146786e2225758e610669
SHA256f0ed108eb2125cf8109514e1da0d11b7a6fdf52b30b8ca6a0b1f4bd06a675c18
SHA5126c147154a8396141ac112b2abf2b84ebfde7b583f3d9c40ccaa2273f3400b790cf0f0915d2458ccc485397ca41bdfe4f9e946452d225d94c37bc7050e3888c2b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\simply_loader[1].js
Filesize5KB
MD52a9321333323a50c5a6fc0a319927c9b
SHA1c400d69a6485a55556ca127e6c6ffb788522dc11
SHA2565b97469b06cbe2ba3531489fbf2e661856f268db72464819d55f3d64792b1dd0
SHA512c5865ff766b343d7d47c7c8cee633f2591c2f1d12d93521f5fcf2e8779e2b899f96225e13264a3ad735e1c5cf4af0bdcc31e90ef653d7a5082038a15e78a568d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a