Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
600371c3468a23669cbd8709de3f1d04_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
600371c3468a23669cbd8709de3f1d04_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
600371c3468a23669cbd8709de3f1d04_JaffaCakes118.html
-
Size
57KB
-
MD5
600371c3468a23669cbd8709de3f1d04
-
SHA1
a0ceafb7328171e7555c4e283b188e4e5097bd19
-
SHA256
47b1772727fe408d53fab3acf537e1033ca09f18aa88a46fabdc414eead982d3
-
SHA512
d19ac3caad2032a6176f6f53133a9524d26d1fc211750714c7e32654f31559f3fda4e973af9f02f062a13e20d10c6e5511b38717db40b56378e044ffc383b24d
-
SSDEEP
1536:ijEQvK8OPHdsglo2vgyHJv0owbd6zKD6CDK2RVrovewpDK2RVy:ijnOPHdsB2vgyHJutDK2RVrovewpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40af40568bdada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427631322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D3F6911-467E-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000032d5a9ec8f438a128e61ab84bb1149fa2b0da6da984a32826bf80a6928927ee7000000000e80000000020000200000003dd645b1f31f9e77f7db9f4025f8ac2352d14c964be5e1dd879b8f01e5d1f461200000008729b87fa2f2f1a5a69ba0eb1a154f62d2b2d662bfaa6ed90e5d9de84e2b072d40000000bf0460212edef15b106ba443f16d5bb6ef01b7ef763fcdbdc239c5e172cd9b141e6c98405dc3792522dee8e01f859219b1917a3e575fbc31e39f07baa264d8b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2144 2524 iexplore.exe 30 PID 2524 wrote to memory of 2144 2524 iexplore.exe 30 PID 2524 wrote to memory of 2144 2524 iexplore.exe 30 PID 2524 wrote to memory of 2144 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\600371c3468a23669cbd8709de3f1d04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8652684fe72dc7ce34bdf32e47ee24c
SHA19e9f93bfb1a7dfc690da64160e55aa503b7a554b
SHA256333b6db2688e0fad5352734be82a28c51dd685042aaf2a519aa94b73010131ce
SHA51265536f9cb8a12f24518958041f6dc8792bce20a3828d00ffa27cdea67c91a58cbd8312b73bd9616bc67ff7338f6870cac5aaad9633143a04f3f905832ac1dff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f59f64eccd2127bf6d4d5099cb886a
SHA14c5a07726803490733ca0d1057fc291d447d0837
SHA256f1e8540cc6b1b56e34aba2ab0570d1089cbeca59516ba015189f0bf44e394812
SHA512fbdf9a099ec71a8e2996d641eb2c4411f38dee523dd49292221514281ab79e30b3cabb025b1b142a303c1d7ba10b738a27c7429d8212a4b87dd85ed219cd67fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58367e238fffd68c2b0a068c3c65cdd15
SHA1ea6527e3ee0d6da687b9d5a5f04d3746be1b7000
SHA256bde5e425ef129e62ef3d454079bbf8f9809cd38966d93b931e9cd98b1a1830ec
SHA51243461d312a4d33a415b5dcefb224c25e58a13d2de9ccedc3fdf62ec49840b7abdb59e97b2a5b7367e3e69388a12ec090e8ecbcad1a541b26274efada5fa9521e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a57bbd3fc4908cdc276c470145fd1b7
SHA13d636f2a709818ab1d57fc997646028be95341d5
SHA25684821432804eb41332f4dbb00fbcb1a19abcb457b54d176b2864ccabb0f92094
SHA512e89b59bd3e44914148932a388c937ef683223a1e270a817b96adadd07ad55f57f5662d85f10ed072c51b7167d865891e3d59f556bb21006f91a93ef2aa6abd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd36d990c67dd52a5ed88b73eee2c6ca
SHA10516f3b1b044ee05e3a13caf498564a7af736f9d
SHA25625f4844e9ddb773f6232a133fcaa3c38de3072a47c8a9ec7c95016191e3cec08
SHA512a4442f2ec7fe48a660e5da5e5538059fdf98553e8e30e53352cf973cdd77c5b588f6c1e871d83afb7b6ad9b5f57e708130128aa96fbcfb250639b6c082437ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863e95bc626b022dbe325e02685c70b2
SHA1ffccdd181ef199fe1abc55ea3c2f30a94c09f6f5
SHA256c6e173afad7e6923010c5897cd558314541e74e460a3443ecc839419ecb41b9a
SHA51218f96087213c798624e2eee1b7e062746f892bc9fbe494c8bee04c074c6626037b02e9e2d31e9a7dee501e75d7faca3fc9a6d1e5351a17ccb595c84477633667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d0fbe59c6140ba89b30ff629ac6b25
SHA1244a68e90702d84ab7e93457f02831a8d13b8ed4
SHA256ec3d3ed542224cb53ae570a709afb1e82116043392da6e553078b5dfaac243ba
SHA512268e155af3c15200eec862f25a6c936e74b548eb29c0d3031b8e7595597dd8b6f4c7270445ccf64bb3c159a65d8cb0ed9331d961d2beac53cd75fc0d28970ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea22631bd2d2fddeb5565a0938d594d
SHA16d42cc4ef937e220dd21d15062f17a1edd8f03b7
SHA256da99575da841ca5a41a93e198edb1a24a14f354eb22ad3ee4c65be1740a9b1c8
SHA51233ab166a85361c11ade8a12f3a073163fd5820140670662b20eed951f80a5f64273b225b55aec91360e6e93c8556510a86e41b6d3a12cb0462a75a3dfdf13b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58698d93529dc7eb8cf37eeb2e9ec0598
SHA1d2ac39b84534d89f22c83f605d4ad5b8ce05605e
SHA256e881e8fe78fc4262b69bbf6608b63fb294ae9fb79431ef1f9e5c29f8d669196a
SHA5122a7c858ca623d4071357a874746d5cbe825b2e6fcc64a182f730b8d0e20b97f1e6f44a1b5fb396aa2b4f9323cd496f80cccec29acc9226f4dd45d1f6c9101009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b244407ae209f8f57a0d2f4848baf691
SHA1ea39e9ca88237a0d47e09b40bff4699f9a7cf83f
SHA2563988da78fc579d8ee0fcefab4dc537df527268d97c18ed8bab2fd63e2ec05d7f
SHA5120ac378e28b99b771ef8b67abdf87ccc04fe3de72ee55069c34f617ef16b2a1b2ece194c0a10d8a7c4e27d43e149370e2854d736121babfff2bccd58acfe51fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271438b3d58a55c07552d6c27c0aa293
SHA1ca047e49cbc1940c1887bc874472cec484e9023a
SHA256669be062b7370e192e3fa59f15b17def84cab417e7824d57ffdcfbe432c421a7
SHA51229ba9210ec9e5523c2a7bdab3c724622c2689d34484b4bfece384d1f073692a520dc0694f372908d4813f7ac5ccbbdad0c8d63eaba5c06af1f99200bb2717245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e7b77a2e4fd22b854f3c727b2cbee9
SHA12291d6d320cf73fc80c216a4f9232422c32f548f
SHA2566b48e2d25dfc0e5698357591f831f75d6e46b80d59198d38c40323c11fabf449
SHA512cb5794c4cb579ad36cd95c965884e26264dfb3b09957d77de067defdebadfebd02eddf5d7b8399b43849214cb16666705fb4c72b1c05b23eb99f63cfd74a9d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c8fe10d9a2cf9ea7a9d18f4b40c515
SHA1bbd15754e0f8207b9eaf3f1535ebd8292c1f6d21
SHA256413e4d094de2e6b28a79e2bb33001ca970de405576f2fda613182aa76b4387b0
SHA512773a3820735432fd1c59ab74881eb2d146bb2b9f7bb86ffe1927684a5efef92d6d471e1298ace97ceebce18f74f357f01bcfb6ed59ce1b786452a081abd68dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa59e46e793e9e4281ad2e457dab9f51
SHA19b87064857752f709ca416db31a2347a4e73c006
SHA256a953f00de81b933e152b729efb5a1c281d62d378a2080165f2520d2c398e3381
SHA512d561769026c95129304d8fb07fd725592271412b398c6d803a98ef93bbf4a6608e7852521ced33b95221457d72d2675fb0850634c8b91d6a7f8a268f62c1f813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51654d859f36fa13d535653e58674ab9a
SHA1cd2ae4122fb1d8f3f9b256d55688254801ed3ae9
SHA2564d243ba5541827e061d72c352a7e32c8c78716f520c38ae63234559323ae21e0
SHA512f947be03c8aad70f788ec91f9c906bc6f972a77f84b7936d4899224f86fc4a1bdad5acbad4e361fe0282ad2ed452db20a69cbdfefcb4f3ae30fd9d3cf87958a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b77906bac23c12e4b987314761a951f
SHA1ce163d0683b12d68f916146dce2d79fc6a1ade14
SHA2568210318cdb812337d8b9e725a2cae7c420d25f2b8cb62a3b5ba42e2061f5fa0e
SHA5125f8d54b2cbf765ed3a8e6f7177b7d63fbad2c6efea8d1de5abc4fef6b81b40993e6a5ed4102fc2ad560525aaa2eceeed4c6c2eb38ba5682968f45934c2bef88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36bfaaefd486622385aba8e81324829
SHA1501a6e7b47741dbdd33b5258ad9033722992a7f7
SHA256791dbed50ce938736d1336bd700ef59ddbd82d936cbf4c67cb3489ee5e2522c6
SHA512c1e09de5e3579f88dee720041737ac0cd19887821d532cfa821932568c2ca463b88858f7ebe6c8372d71d01dc7178be2c0d13b315289fbf6ec63b106e6420b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0d17328430103861a2abf7687d8eb8
SHA1024661c62edd2c9beaf82ee76605b4f72c039943
SHA25696cdf4d5f9920ad0a50392e22a9187c30e8293cd0f3bc8e579233d63759f8924
SHA5122a02ec55bbc363d72a00ab8785c0c9ff07e849ea1196f7ca7126954b665d723c37a61afdaab535524bc3dde29e991325ec9276de92b3411b590b11261f1259c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\f[1].txt
Filesize40KB
MD58c8f3c88a1d7d0e8346c6cb12253e16c
SHA1d251f4624988fb90788501f55afa303edf82f366
SHA25634b6ad6e42b06cdc33bd9c667178323c2c413ebed9e08c85175d32dbaf76d79e
SHA512d536ea20e11a3d8f913322c52cf17984f918c15a908e54640e8e4cdd174ab2eb78185b4baf34b120de20d4eddd53aa554d6da62227cab05e37820b3720fd1db4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b