Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
60dc6daf90d94a944ed30bd1cef90103_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
60dc6daf90d94a944ed30bd1cef90103_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
60dc6daf90d94a944ed30bd1cef90103_JaffaCakes118.html
-
Size
9KB
-
MD5
60dc6daf90d94a944ed30bd1cef90103
-
SHA1
c97147a57b0dcfdb21b114493e05e66a95f18a82
-
SHA256
1a5a58e12f2a770ee3eb8aabb5049d7e897270680660e8ec12863332b2ab44a4
-
SHA512
96a0eba62d6778d3c1b6af868d8d021c08e35bb1fe18451aea583a688326d69e32ef659dd888769a8aa67f16b54639838a113afb47553ac09ade1aed5735f1a9
-
SSDEEP
192:j4Du4UrjFQD5ap5q9B/BJFkRN2e77hdc4zLXyzME:EKw5ayXB0L1hdcGpE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427746805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DEB03E1-478B-11EF-A39A-6AF53BBB81F8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c2a74e98dbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000b416dd5abdec9f5be2fb8f5b3e72b9767ef4626eab5b4ccd947b58411c1a7f33000000000e800000000200002000000055115850bdfb5f9c672714e255540c21021ced136ebdd75afbb8fc42ed62a9a420000000c4325fe7127cc377247df94d2b50865a57cd0f49f8d7b980b4f6e055bd464b65400000001d06cb5dc18e74a8a7e530c88bcd8859ae7d3e83a50542ef93a7889415d3b7480d011d1adb68ef54197305f0a2d5a8d8dd6812f575d81cdaec2f6df977fa5d3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1796 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1796 3020 iexplore.exe 30 PID 3020 wrote to memory of 1796 3020 iexplore.exe 30 PID 3020 wrote to memory of 1796 3020 iexplore.exe 30 PID 3020 wrote to memory of 1796 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60dc6daf90d94a944ed30bd1cef90103_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343815d6f95347a5bc955f0e1bbc82ae
SHA19c57f5e12769d97c3bf886683dbcc72497d1bed4
SHA2569ddba2b92bdb0782d4cd979c7ff072bfb1237c8c5467145feb9ab7d49d73bee7
SHA512d9ce1a1cf9c04ed2248370934f35fb5fb64e10462737a670028b17f8f7b125297ff7a6705e106fb44d3481ed4edb2559d4014b486bf4d0bd7abce0c09e620146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf7a05f3d9239c8ddd9f589ce697c80
SHA11887be8c7f7f2fa5e750f6754ae779f6c5a72730
SHA256de865bf15b671d99fa4f36ddb6e2751248bcb48b9557c2c82ee1dc547527113d
SHA5126fca836d44da16e9deee8dbb43ce96e2d02e2277be6e50f419bbfafb1a01abaec48bf1aaa8021eff7a77113b1917f536d87d5143daebcfdd92dc2e0e9de986c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56468586636eeae8c0524a556030e18a9
SHA1b0fed6c6a69e81b2e874f3f4ed20512381ddf495
SHA25607ecc1d79d575a8960147654e6dfea9d099d9541e64cf47ec6ca8f32c07ec471
SHA5121cbedc0c53ea3269f815f38aa367f3aea70d1d89f4d15d312d7f894be808d778166346d5e8acddeac355c61d022c6b0531b1d4b82ba4f1a41761f5741f9c9129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f162ed8eff0a70095d48757a3fb5ccc9
SHA1f5e31e2e0199b7167dc7e8ecf818af3512cf0f76
SHA256ae0ed9f7dcb83c5e39e6f86899b021e86c2aab8b7180059cc756e37f1b301897
SHA51232ba5077314b94692559d3635b17ba0efd63479853fb3207c1b14b93a5024c86e3bb71647cc359f0cfe9e99b06b96748a828bbb0feed4a09153d6600b480c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d55f55960af856939bd0831528e6001
SHA1531c0f42be777bcda6e91a23dd1e423c6410b4fd
SHA25683435489837d8596822d20a9ed967558ebcca093194d394437d47b8c45da23b9
SHA512e0e7b416661ae0385c1114847988dc8345a3686d46810981a642a49f8c70786201fc2d23048135e933d59f0fa23ff8d49aa617cc2b9d5554f1d7001915a1c0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521dc1d4c8c045bb74ad6075c6f8bd9b4
SHA12fec964c02b4357c4031abcf318c1767008020e5
SHA256a23da2ac524851ed95e3f3cc4b1b208a92bd49cf28109a3a4f249c6683c9c6a2
SHA512f07d9d51f79928a7949d0932ee55edab395f1d6b775a5e4d6e3709a8c413876c34791f50584701a11e95303fafe20d42d4fb97a7c83725ef194c2783eb980f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794b7fe7c2a191d84cc44146f9c65b06
SHA11ac0ce6ca9f33c6b8c2390dd9a8f31739b07fcd8
SHA256fe250e66c5146b2717b5a17577856e90a16798d86f42fe564b0f83bbb47f73d5
SHA5127560632acb73006ae80a90d0b395af461f8d85b64ad017c43b06b724403f579549f938993efe025a30cb2a48447c905683f2708f7910bc81a8454028f0283cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8acc7a749fb94557e3c694cbd04ec6d
SHA1b6619d1a982c71fd5b341e8d5863f92782a1c316
SHA25681d771a374802762dcb947e641e99ef81dc8daba54744a1112f9e926fd18deb4
SHA512d0ce3e53136dfafa50f698eaefbc9d02199bf720f35ec6040e47954af176e15c30e1fa050d54e414e27c3286cab370fc9f8bfd8306bf644ce979e8279710140e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e89238c5acc0472ff608d997afbf4b7
SHA1212073b9edcd282c6ae03b843e34cdd0f1fe9769
SHA256f89cc5fdd4e61a285ffe7ac819e4aa05ff9af350131436ba064e21686ab08c87
SHA512cadbb4269f03e88f7b95fc11c31792fb81eda14028c84287c63c7a8bc6960c30cc8bacb2af95d03daca4dc2067f0e79e21c2ef024e8118d26d61026522be5375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ef436ca2f8805e02aa3c4dcf161e10
SHA1111edd40daeb5debcc2dfdf1a027457e504898d5
SHA2565d2d7972dce738c4902a9b16fde9f98daa72a09d959cb648dc9b997faa418973
SHA5120a7a08c419d33f6614058bc52416ca1166da35d15d1a32ab77405e93c4338fadbbc52fbc78b28248576bdfe212cd2a83f0c30ce1990948f85fe60147911cf581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75e2afd6a769baa613b7ad9b1444eb3
SHA16b0ca5187fbe8c8c63dc4869fac26cba0fa55a56
SHA256c7a69f757af30477399914ebbc0eb0638e656f6784bd9c0ca90bc6ee687e7dbc
SHA512f5a7a78e31d8fc4bca095d112dd44289d8f2f6c5032f9753dcb5253f8a352fc1bb3501fd7c6c71bff936570a3ad16771dde0a05d13db9c9a941dc78c866989f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589680882d7ef34b85ff5b913d2e64b9d
SHA100f5036c7f72177f4f34e77a71e717cf7fb5bff7
SHA256184edc42cbd229046ded973ebeda779aa1e8806582ab65dbb4429b4131d00aa5
SHA512a95bc1bba7b0230326742d8dc560be8f87ee0ecb911e3bd434c05d258c2386a72cdfad9faa7a311f4c6b84a6ca0382f522de9d2e2803e869c097d345ef729477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daebf2664fe119db032a21c530214b5
SHA1861374597a7b8f63ba8159754a4f43221988f4c3
SHA256aef5f77506b07936adc55c0b2e564b00105f389ba9cfce9f51b69887fef1e911
SHA5122e59a47788c2a1c907037451eb6da81f32963146351798c8985c52d3b5837945c3bbdd6bc8873a66c212f884a2f0aa69829e1f5666ff6957eea1eff1f6c387e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764e452ee52c304ceb7d4c967f9859bb
SHA139d38455f665fe57761816eec31752255c9d0543
SHA256b6e063de01944d219056b32813ccf5de8a3b62f54778e1ec7e7836bc09dacdd8
SHA512a87db8b701ef6dcee825aeae68473a0ba7b2fff110eb78bb37b6ee041aeffdc7af02097c28873e943928bafeb8a1d0018960fe420b621ae75d2f89a2e8a035c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fa043e9c89204634f125cad137a894
SHA1531bca6b3c76e65cf0cc249a7f0007b020897bc9
SHA256c5111b27ee3e328bc08d87e024a6f3b0a6886e40392e8d7e0c765f90453e120c
SHA512e5b5c302f661278aee773644f2e7ed49ee5820998e3bfb1143bdbb6dcc8cc624f001d0f8cfb21e11a080a381092fd80bf86efd9c97e870242f293fae24de6377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238dd8a751143859ef237642970ac9c0
SHA1318c2eeb624fc2620e0ff9b12fd916df433dbfce
SHA25640892263246b4421f11f1bc7a98b9973ac285972e276cd09036fe6a8309ae208
SHA512ac11f1523e19a693384de41a50f23ebc76b29ab1d3be1e2221f3e14c81b26c398588be279dba3b48a34c145a2abac5d4a3370aa73a3f59dcc0fa30803a903bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e229991806536e523d2a9d5a52080de
SHA1d2bed4a6e07fd26f4a6a3ee7746eaacde656dd8f
SHA256e1a358283dbb38146afa7ea04aeea34aee64aec6c1b0aa085651d97d012aa0de
SHA51249cd6618e5e2ab723d9a5fa73da678eec1e1042f2555eea247d8cf1e4d197c19c8a518fa430d30db412e0b511c91a329a51fa34e88ee276946b9063441437e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d62ce8a38233e2f8e9b7def1d822a0
SHA1fdd2d1d1c725a5e50fe32a458e4f7e221e95f54c
SHA25634aeca3009edf7408136e46aa6b3fe572f2a782cbbbc141db17f3ecc5ff9fd85
SHA5126af2c04f4144cd563b56aad791da8f40b82ae6c3a9010e1ece930f643243a30a3d3996861c8f75f23832e722de14fd95504326a343aa06211d303becd22f0e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430ca04cb1901a6ab303e0c1fbfdd8f6
SHA100eee00db62f3fa21c95f33fbe1bbc2b795a2509
SHA256710118a2a0bded0caf3690267927f00caaed19fd6e278754f2419d3a18a2ed97
SHA512adabb96e4a2be185175d2f0f7fadade7691b8340df6bdfd5f945720c5762c83ef6bd4ed44c74640eae1cb8d317d311d5cf9fd3407f345326d4be7829228d2334
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HNGGU6NJ\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b