Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
73b6560bab06fc8b79ea400674569c20_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
73b6560bab06fc8b79ea400674569c20_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73b6560bab06fc8b79ea400674569c20_JaffaCakes118.html
-
Size
461KB
-
MD5
73b6560bab06fc8b79ea400674569c20
-
SHA1
edd1c81974f037a1588f04df88fafe48fb738fd1
-
SHA256
878fa8a75880df76a8756be22ae010bd3efc70d7615ef69ea499bba2b7dff0ce
-
SHA512
e7c02f3c06d7401137e36984fc838152ead68d9799b18571b285520db6f8e15dcd4d46b442feab256059b30e59931ba07d41d8acc302646b86706c84de077f11
-
SSDEEP
6144:SxsMYod+X3oI+YcsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3U5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422844083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a6c2db602fd3c73f2775a1fa80b91b5a94dc314dc5cd78f29490f2225088fa39000000000e8000000002000020000000be2b7de4c1118afdb691e1fdc409962aebb7108109af732180e6ff998324247c2000000021f1698e09a1f7b96730c83dc43b7c5a8b4e690ab7f78992bbfb7a73a8df7cc5400000007119a0768a1e42f5dec847d9f5ca99d6fc9d1ae8ddda5fa9884acad1e604d941dc387941271775faef6f33d0a5489cb4736d542dfc9e7c8a0f66611808643c91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53E85461-1AF4-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ec882c01afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73b6560bab06fc8b79ea400674569c20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56408bc10410ae3226585235440e9f3bc
SHA1d5611036a72d2ee1f8ca7a7bf5ad7c025841d63e
SHA256e5351722a7a3d63bf40e64a6edd5139f4c3fec37fe5d8165246b09c90f3fc8bf
SHA512539d70e303e8bc47c32aa1d141883e13cdbd8c23bf18d7b8404e841b2f060b8379882e528d4cb981055c2336315d6bfac44f94bbc2bade6baac831a65cb597d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea8f0af3aa307f8b1264f1a8dd4bc5f7
SHA1b1348196db81a9283545dddb9a61f9a05513d274
SHA256d755a82839d66ad4e33e6db78cd3c50ae30dbcc2f1c79528eed9e1ae60e992e9
SHA5122bed76778f796154938d49878f13cd66db20cc7049a5968eddeb25fafcb2c004f0c086ee1a6dacc598f5de940911e4d20356bec8e95d6c954384ebd968c71975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e24542c186bfebbc4629d2498fe9ad5
SHA1efa122759c51e6b73c26a1cfd54a8ef5c4c9d745
SHA256626b545aaaea6fb9e93c0cf4cd251530625a0bdfa84a6358725a4b4e770d1edd
SHA512b65203ede7578c90ca64c8e385fd9f0fd009a482f355b56f8838c31664c98c756e43e24dc5a18b378a540ccf1abfd8edd84ea15bf9872fd8762717f6c0caef7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b99a44a9d604f404aceb1958adee87
SHA13aa0a280a71f560fcde6d096fe116f836e0d3a88
SHA2569925fe2a2a63b0baa374367e5dfb820f4c6a92f84e663252165775bd27a9a4e9
SHA5128416b24cc0636440111ce62795e1d27adb4b75dad7bf1e315ebe4624fea392a526dd03e3c4272d82bd2bbc6f1ee85b10b3e010f0ebaa12552c011e18584dda15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f29cf67c5c2cd2af6f2b1b64e5bab96
SHA13bd313988bc84b1e3f8e4a55aedd6662b9577b17
SHA25626b37770810aed05d266ce776712401a570cb5662e5fe6982d70e30b8783e83c
SHA512d4133feb69d9f836a2d193675c58ee8ea6b188a6c25016de77cdd961d0b265cbf9cf8127677fd874c166ab00282c4e210c422af940a91a7a65dda6d07cb60b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a5eda3038831bb3e8f4acbca9508fd7
SHA1d003e1b61f8b205031850fc5cab1791d5f7e3787
SHA256bad3296c99f1f128b6428a6a9824188f31301c69942f0e117ed511770ee691d1
SHA51297a154e319729e42785830c2edb47dcbe8f34d8aeb97e18125e6f8dc4ff6ada67e27e7120ba36ed7b55346df591ee7ab72b01904b98a2e26ca72556b0fa0cb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0898ca1fff9b38276ddb90cec4736e
SHA12e5ddab4446618a62157b252a9b941c868056ace
SHA2569abb0754dc8005436485c2c2d378c6eac69e016e52c3d0bffa95d6c0fa671bec
SHA51263e662147fe139b38b60234795a1440aebdcfaed9d77c91d22db2f32c8a427cf48aa26d8400b423e6bc48862ade956b5ffca1d189138eaef3c6e20dd223d4729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9715e9d1c85082e9d3d8dfc4ecafc68
SHA115ce182ea00fcdf496f8f2833504d3760fbbdf47
SHA256f35bddfee172c22e1f95e26d78442e044b579e97ef83829eca47a9c85c6b1c78
SHA512ced99902b4f31560ed2efcda17896d821865a5c7a3dd2d8473ada021779831d6d524be1beee8d713afdde1178ea080abcb0287f7571d997280706307043059a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f270b666d8b5fa7dbf137b9acffb09c
SHA1ad4097b4b1e1a42a81c7b5c3250871519adfb8ce
SHA25651d3849f1a820c1ae5884782017439ae328d5b59adac3f4d23af51a0fac040d6
SHA5127549c07299abb95504e09ce34dee2129fd95e856dc42934e6eca82bfc6750d9043e9a380e3d98e585d4fdb8a530828b2e4116b7c1bf7b5db626028ac66bf4e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584790555a2d8b78ee7bdab80cc3d3fff
SHA1b6a6fd7bcf005611990406ac4909c71e327ffd6a
SHA256511c7cb49f7c5c3ee36d729ef64d867dc43c465b8449098c0b7fdc5142817e02
SHA5127f17af9a95f3248f4fec48ca315f2c9381c5417312ba103363dfb5160c927dcff43d10045c052ed58771fb3d1228ab6d05d5a46af345776f9fbb107ea92b77c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace70b8a8586c5096b7166f7ec839c94
SHA1130ebee0e7c4b5021a9c80db31be21cb1fddec86
SHA256e2438a4b9a8dba6a8c1a2da83f738cae6e631b71e13b03431a6812918f2ea30c
SHA5125787317362a86cf8fd3e3e8db2104394040bd8ea5b9015ad0782ddf21c69a3589c76f8a5fe5a1e67acde878823ad127fa6f03cd20c76c217490d605cf2de3300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d7a1a32c3500d7cfd98ccf76435195
SHA1f78de524005b721353d9ba008f62891518f7c80b
SHA2569eb5d558266a772417c0afd7c7c9f7978f4af53d060bce812fd3ffee5653bc13
SHA512b1383e331072de14600188c1ec3cdc1f9651c936adc3fac143e57e896acf4f6a9ded6d517446e128cde4d7efafded48bfdfab0e4c8f4e45c6a01ae3cd15c0650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3f572a9432d1b0075b13aa5260c87c
SHA123a6c059a9b1ba2d14a998feb447d3ef1ee64d92
SHA256f84fe12dc7d5179869b2f4eb2083987268c0556abaad2e5c0d34e2fb83f67271
SHA5120d4f84fe2c9f5c9fee767687a9d151cd1621664016c29c0cc623a962c6213738edf16fc104749419f9a59d15e8a7405a4884a9447bf33d4cd4bbef2a11e3b9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cde1fd6949c36a17a06b5b985008847
SHA17a8bed304709f1ddfa5d61e2e04834d780ce09c6
SHA2569c6db78b8448df5d121e1d419084483c7d3f1bdc388b3c3c82674ee1b9ed5594
SHA512af1ed05dfd89f783e3c57f8fc35b5acde396279575b79debbc067f9a0c088ebba0bf02ae2e42b96752e084c2232dc7bfdce1bab69a9c6b46ba2b6b9784a18312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d1e1ea58abe86277464ef65d157794
SHA160be1d08af02ea9806354ef2baa7fe0216f65381
SHA25648706dfab7b803ec43f86bc7d93df7603f4271389350747b76d44004180eb4b6
SHA5122dcc81bac2bdaffd74f0a12e588efda8a3b1a216e5c19594e3079f21c180fd7892ee413495c8af911cabcb1b6070f8d8976e6b3b00f9e1a833c7bfc339f111ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b05005710d408dce7741e48bfead1ec
SHA1f2b95a403e6f9a091da50e420e1156a978cf59fb
SHA2568cb73ab8b04bdd866d91c162423ef2e287296cde3f5a18c43e0e16e4ac58a24a
SHA5127f423bdb4d870cd200cef6377bf66eb8aa4c3e200d8b992b90f461989465922dc895d69a21cf05028194f26eb32e889d39e9246f664d9d1c11bc50f7db3fbb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567833b80119b6462890f5ebba112f9c9
SHA1472cff0e474dc593945aec30bb0167bed977d236
SHA2563c3f1842b87c810a35093ad98c9a963244dcd00db39d6048df4f66be0627d9dc
SHA5121a1cb98ea0e5e046864d21dac8d9a9fd2918d6bacff78c9aa2037fcbda07ec6fcbc9ea5abca058961bfdb87bbdd34278790c2a200a4ee2ad809557c1c1211a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0353f605d45fcd71243056f4304cc16
SHA155f7ed2086252f870e4b40ca04544d64116e6b0c
SHA2567e82282d180f5c4fe39ebb2e87798e4b3535e415d1ec4cff16bc09e7fda4423c
SHA512e33a2b5c0a6eb58d5a32b293d141344c152b0d41061c8ec63741694a6ff70555ddd7aa34722c0bfb8e32a9e585ed1d8ff1dff84e39e83e17230f2fb0c1090359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182b81efce1fc7f1b2b071b7e2040ce8
SHA1dd5777056c208ee88fca7f59471b042bc2563396
SHA25627120d09ae6ccbe2c9e345ccba8cc5e076ce9248a0f53010b7defd030104c2da
SHA512c2e7367a8c125342205caaa183e6d90c410d586467f9c8cab5f70e2a35aef86d8572eeff9c5037d90b750ef60367cd9113cf595e5f27f388b4459ac29aa1aee2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a