Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
60452f24680199adaea6b9749849fe64_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60452f24680199adaea6b9749849fe64_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
60452f24680199adaea6b9749849fe64_JaffaCakes118.html
-
Size
53KB
-
MD5
60452f24680199adaea6b9749849fe64
-
SHA1
3b74a2b0a485d2fa5165eaafb1ffd27ddb136532
-
SHA256
c980af9bee1e6818031469c46d48449c78d8ff9bd5cea61661442cfae26338a8
-
SHA512
015015bb8dacd1d5b521c8b534ca58a9f4e9c06a9b7d3e7949dec466048013c9cb52e29943fd25eb6054875168727ec627c1586d3280a6697990e2b8c47e933e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUOrunlY863Nj+q5VyvR0w2AzTICbbGo5/t9M/dNwIUEDmDm:CkgUiIakTqGivi+PyUOrunlY863Nj+ql
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003ad228fc3914391143a29b3f60b6572e590750247761f1339b174c01001ec1b0000000000e8000000002000020000000934d5323bb7085b75fcb77577f747d632f15c40f245d4594accc50b5a1097c2920000000c097b41c0e48a375cbf9c273cf3f5e260a389ab2099616f587327b857ae74d0940000000995016d8548037e12c0c40751048dbb76b5095e2599c1ac74fc78e75cf432fa6a15ecbce9f2a65a68b686fc9164ad57d1799b790035d8b93caac59d28503f036 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427677146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c04304f6dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E7EB1D1-46E9-11EF-9C22-7A3ECDA2562B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60452f24680199adaea6b9749849fe64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0ec7303700d0394c641a2a85df4f7f
SHA12225a8dfdcff5ef9a857529f0d7e60f71eff36e6
SHA256a3e1c332bdd13b60f1a1be6303c7bfc591546deb9d7e021afebbfe7ac4b4656d
SHA512cea9d05663d4b21c9113d8a1caf20eacb20a8da9dc71ee48d4bd1bbff50425e49cd7aab8f64001ac6cfd40dfee7e5c4af270f489adc1cf29139cf609706b24d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e0e8b3e015ab1117079f469d3cd2e4
SHA1f27428f05724ff767c4b2462277c5568297935cd
SHA256f934e4a807e7fcf083631e0363742635278f60aa7957005427a8a8ba80072c7a
SHA51253c3d984fab14f46713d8277040f1d65a9d3cb70fb7a730d2c8af80c1758e0c2ad21005d241e03fd1fd5f04050ecff17a237d3b3e6408cb8bc1ee99e88c5f744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ab1d17b0daaae235171c78042a5cbd
SHA1e17a3b31dbd10a2431c5e4ddad5e44a203818c50
SHA256b5075183420f506f2b048fc670d66c1d7a414392f1fd9e231be159b4d5e3407e
SHA512f0184e655693caf086e275846bee6cbfc3f3d89af6266fff758b1e1be825f3a904103b17ae7985588fa81334a6f9ae3de16d5c7bf1a4461af816a6c2733eaf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f0526aab32bb19fb240c5b5522813d
SHA1fb35a0e84a21bb1b146f450622a7ccb1fdcfef3d
SHA256cd36c0071c34db39acecdac2fca406f7a907465ee0b1e836c03ea8f62ded038c
SHA51273f6ad9c4de66bdff278d1fbcd3160fde63d746768c96b1fd22798eb9dcc8830e12fd558b3af26fdccd63c0c616708ff79af0243a6e9d0bcd10ed887c60380bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505385c3ad6621dd8e15e2b7f65c1d506
SHA1f3d3bc7ac6c77f5b8b8fc3f0e3b22b0a04d63474
SHA256b70ff4ab8d3d38baf9848e91bdf83c809bf24007c4ba382320ca4559d14e9305
SHA512eb83d2438390509bfcd24b981dfc9dbc5adb01e90929bc9c5fb3897ebc00a7c03f602b9a3a52b405d25b7d268b49393a6e3956bf79426c356d246e8613619671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e267d119bff311f93abc5b8f0706a14
SHA110294105654568a767acd8a49bdd86a8db9b5d73
SHA256fbe3a7a4cae2e3f29e6f16fe1a87c8bbc994dc881e5e0f1a35b16d6f60816818
SHA51235e8f64472f5e4999850483fdd1f373e5f563410552bf29251f1d1d019d097eef0f17e2cac27f819753f618d6cafe47e7348f16c01cd8fd845e0a693f38ffa09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57956912d4bcf5dca0952bb81cf002ce1
SHA16d69d311a1ffafc51376e10d5d3aa712bc0cfbb7
SHA2560e286dd71f8823d20de6ade9e9c08ff0eea0ebf0c631693b43f43b580dae4e2c
SHA51271f6f5ecdc593a35fecf91ef2a95e687aff85971d5e3be8610d46c5a5864876078c0dd424e88bff4e1ff6118fe182228fd8ef23974f30c17a56fb07343ca7283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51070088137d1402147eeea964e43a981
SHA119b59378b851f2460b9714fdf643b1fa31dffe65
SHA256fd8b22a93adaae6b99f846966e2f77272c94bf27d3dc9c6f3795a9cfa8224bb1
SHA5120e2da15d9279b7fff06a4b718a77bde9cbc376148248d466c80f29fc3404a728136de4ec91b0474556d3cb4bee021e822462268503d7ea08da5f9adc7182bf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d80d19a0445e2c44d9f1ad04c3606c
SHA14daa45a3203a3d176dbfb4177c5b63577896a733
SHA256817b64e1f7d678b0d76f40dd10cda0bbad1637e634cc58bb3a4540ccf7803040
SHA512422aedb5a5c47b9b73db029094f5d53b8dd1088550b095a6776aa19d4a07165055f522f0e86eb94de480ada268ebc41fecacd2740a540d1bbf7ed668fe50aea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a414031274b0e2ecfdc3c145ac440dca
SHA115f8f76b2291f74c6a5a0034d1c290ca66381381
SHA256562b10bc677dec7f373d579e00172a947d5ea36c2d1100047fe31f9b0f13441f
SHA5123f50f0dcefa40d871a906d78ad6be9b7c0a3602469d50b7510a7a36a4efd4acf4656de018c63e78cd6d53bfc82de53a1fd5950338f09254b9b48cca2a56d71b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2f28c988cfb4aa1346ce72767e0825
SHA1e50eb4b983348c2e99d384be10ac1b3d01583603
SHA256ecfde270852827bf64471e77042699c424b3f932d09e411584c8f2fa6d305e4e
SHA5124b394fae1b612dc14009f0e5884b4320a21b861b6d52d733ad524cb1db55cb9fa2db6b8113451051d046959ecb847c24edc77c39d045f603081d8c0fd4df5205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cde4aca7b3ae632f363944e7e1abbb
SHA1cad612bfb656dfa6dcc8a2d23f6fecc7c6658b19
SHA256e016c88c96d8b8b45f64c55d5528b8402b04a01e2e901f0284e0472b3be2d799
SHA5120f3bae44e48cd3d8f7e1eab438d417fb6d638ee846a5b7c6f46dd0ddff7ed869954b429a45e572590a5b6a1e7b2273ee643a161a7da72ab1379dad8f8eb612c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58235aaa5dbe8aaf027efaaf2fbc3a0aa
SHA19a6baa2415044d1b14cb8ae7aac4dda50274bb80
SHA256a6b126217daedabee4ab9631fd5c849542485fe9a75a79072560ec95573dbbc4
SHA51263e444f90854af05d5406832b215eee944e8ddf773d2defe40dc833b9bd736498d2781293dc5a5c57e6ae58d2fd251462b10e6f995616934f6fdbe521b60d64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2f2728ea4ee1cfe323956261c8c9a2
SHA1cc22747bbb5fe957faefa6db14afd996ca8f4829
SHA256ddf833d6558d4b2c8de9f27742ff37ec1b6e0805e9bf148a452db516c905be50
SHA5127bf3fb9b6a33ccbe0874998ed332efea5d9eb76c0310ab0ea37af38eae3a28d623cfc3334046d25a2412a3f86358cded03a64cacfc1d233bb92e03b011c5bf9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b1182d8817354ac6fe6baf79b92770
SHA1f4fdaaac0441995c8b9ee8523317f65839d0d958
SHA2566c8819fbf0ec3f77e019884ee77c5fd97e1bd282d09f709633d1d76879a16b8d
SHA5127c4676ef95dd19acca48482188feeacf98aecb4d841b1bd7ebf3e8b7121f00b0844525d7cda1bb5449ad571481e51fc4495d6a9ebcee5a059683072a11beb010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced8dc9cea8fe4123a5541246357b374
SHA18965091bff6d8dff2a08b37f57ad37bc24f56214
SHA256cf57140694ead510769129d5da384f2d5190c11413bdf78b9710a496302e7e52
SHA512b9471d532d2ceb8d48455ad02258b62134c710fca4cf0d357fea3c79553d3596db0e0fa229b41431af185d7085a11eb09a7c9a01bb9d383f16de2ef88380a180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efa38723aa60cc571fc1e4c4e2959c3
SHA1889653af80cd3080d7165123483908e6ddeec110
SHA2568ec7abf4157d9b16317b8b2ed520be0477129e015708b0a2190343bf0715fd2d
SHA51202d95528cf325f12ebdd20e68ff1ebdf0a93af2e33abd9adc44a650d14abe25d9743bd3b2a9b8d6dabe1c5c9fb45e4ad4aa8bbebe9a72e2885665ab625cea0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550dbc1241ae31d523e40c43c992c9158
SHA1d51fb1b07c7ce692b9e7c46148a75566bef0f51b
SHA256d96dc8a05fb43dd77c2d3870b6fc796effcd4a8ed9968ad73a7a510b607911b8
SHA512709f8b351823d1059fd791a401c80d4ccf559b67c92d527ed99617d1be8999dde568a994ade62821c1384630294d1ed878fc3bd9bcda4dc00241d5bbbe580cd0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b