Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
61426e3f02d8eb1003f99ed22148ca41_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61426e3f02d8eb1003f99ed22148ca41_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
61426e3f02d8eb1003f99ed22148ca41_JaffaCakes118.html
-
Size
31KB
-
MD5
61426e3f02d8eb1003f99ed22148ca41
-
SHA1
7f78a83bc5a745d0e149322f3c79b5133c556dca
-
SHA256
5a2e89299d981f66f439f7b721c38cb7cb3e126687a783d962f2cc9e48922662
-
SHA512
2832d468e711eacddf6cc0e39b87b45f14fca361abdbdc29b83fde20b2e23d1e6c3940f9feabc5ffdbfe61e472291f22c6c37b3a26db2e37f0f76da3700b8fed
-
SSDEEP
768:Zcd9QZBC7mOdMsZpC5I9nC4oF+0w3wkw3Nm6Pd:gQZBCCOdl0IxCHFbw3wkwdm6Pd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000b7196d9ffc1d28f323acf840426e70f497c275adf58799b4063261c631dcd7bb000000000e800000000200002000000033eb7cbb5d4733bdcd7b9291dbc4ca43ec73b464e042ee30b5c8c393dfe77623200000009237277ff4d76b8a2d7df213dfd40120659ffb76491287a1ca481f78890d94404000000051981b346ecd5b1f0ec81eec85e7d5a1c83d3c52b3d00f7bb39294fee7c09021612f042e0c41856f6447fe78d0cff36e9a068ba586215c90e57fe400d89d8f94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0793e99abdbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427755134" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C26B4EC1-479E-11EF-A504-6205450442D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1692 1732 iexplore.exe 30 PID 1732 wrote to memory of 1692 1732 iexplore.exe 30 PID 1732 wrote to memory of 1692 1732 iexplore.exe 30 PID 1732 wrote to memory of 1692 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61426e3f02d8eb1003f99ed22148ca41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69ac18fd1f82955d2dba3e17e964f59
SHA1eb04a476a1fcc531b822df6be116366239598ba2
SHA2568cf46f57d7d3b89f042353f965fdf7fdccdf860792029a222ba4d09c57eceb6b
SHA512ab5ea0daee4b6c775bbe6482daa4147d27770bec454b380d2b699a16fec1ca56aef48de7c2a84821e2459d6e11819609443e43cd81cf07939596e285abcdc755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258c07904521184c44e38f7f43ce7ade
SHA114dfc70c59863acb9b67df7cc0ea0515e4a3af9a
SHA256611b679b7bb28f5a9756c41cd6ff5f217e830d85d154322ee37d5caa8417b249
SHA5129f0ae74237aaae1f54dac15d4ee1bfd2674703f61b6db556b553b2fe184354a5bdbbdaff06c5b08395e8e84a4d25c26653261de7d403d58c5ad93efe6a8f159a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d530f7b0c33bdf7a67a3e501463892f0
SHA169f61bc0355a8d2e6310c1e156bd1cee7b11f45c
SHA25672a6a868cc9f723b0c090d1757da7be322248d7c3d67ddaf8d2b140983cf88fb
SHA51274d763a84397c10404cda948c7d1a6c044390cd8aa73443da2c3fd9093905c3b3a24b597e39e6929a969f473ceb84fb802184f3b06fb9959bcec0b3f27c72415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50becd4153d3bbe1adc1bee607985f4aa
SHA173853746228b6b6f7c21b6b1b98349aa7fde9fe8
SHA256837af51490f118f6abadb4fc4c208bfd25386ba35fc192bb2d7a17920dfc4790
SHA5124abb3a7972edc722f404c8c6172a524b029251344832815d0202fa2f90c4f8a6050f94581357020446ceaabf5e9743ba80718c7e0c95a872364f24dcb3fcb564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd933b965fe5bb0ebec3c7eaa0bc865
SHA1fe2b92fc27855d9f2dbf3e2d9fed6862d82a8e48
SHA2561841c287818c1315af55c8f886af7b4662928481f3eaa801cd0d597fffa48393
SHA512c4ff63f736e278a82290165317a864009c08211753ebe577a52c4515393be2307d543a72e129137b5fb1462af708c6d4de3fcc17b4a87a32ec3bf26d5e0c7369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e458f93924b901a231d25ed4927d8812
SHA15edcc646fd02e7147260ceb87276cefd11783033
SHA2568256a88b8815510054ac2ecdce0a46f08d594d91e4a2ebb6529a011b3e22d994
SHA5120ae4039eda65300dc69e12f32ca2ffc7406e8c9be67014d2dc121ce47d2589719299d950b2930e586e0897583dec7a0ca67038f3e6d4e26505f865d834f28c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584cc0e90b20ca84404b6cd3b05166a6
SHA1a5d05bd7afb7904bf67c74fd180102c9d0750102
SHA2567d0e93630647c513effc2e1c201ffeda37c685d05c7c4ed3fdc7d97a608371da
SHA512bab88766107fd1f1d20393e32ebe43627e4633b7340a5bd71d970a7e2daa9cb49bc6ec695ed8b1d518be74809132e17f9cf203e5cba6133b03b8d2e53b5b9804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb2d8befb3d3dd2aa9b0c8832dc72c0
SHA165b2b920addb24acff0baa2231ac30b95d6b5752
SHA256c2eeb530a761df07ac8fca1ccc260fa668ec3e2e2b3ce6cef3cafd50b3a45970
SHA51277a0b2f5bf5a989bfd9092d587ddf60978c311427760b5241eefc069355146d21776192c97bd8bbb95eede9c6801a99f67e2c869351d409b4e0894472e3b8bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4810c31afed40314c7d96aad1ea9227
SHA1a29b95f19c243f6341a698ff3008130b68eaf75d
SHA256ce3f426ab2e1c50b6aacdb2751e51b141df8fb910c322bcecfaa18d79477fffa
SHA5121ada5af337f616b11adbfe000c740250728025edb6b9726272a767d498973fff15cbbd458f64257ee30b07f68b35a87c5108830c59813559ca7e3f71e94d0c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa11bdcfb5fe6f6291acf3a31450fcf0
SHA1ba2c96d7e8ab6cf23991401895f84fd91610c96c
SHA25620f6f8b7df298b683a8b1302446244289ad8cbab207dd49b2420e6a9c9c81ef2
SHA5123dc0aa17210beb5780b286044f7e6ea2cf08bba1b341b8853f856433e71922cbe7a7db819c8f6055d2335d2f5c8614b07a4631b731e890980dd796f961e29866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534845b926884fe8edc7110c6ab3dc9bb
SHA16d737f077c2740131461bc7a294e73a5848a114b
SHA256c06e09feea5955fa7e42a25e6fe32166845a69aff5ab47530f555ab8affad7de
SHA51224159252219b653c1c9342be3577057b5e121c66e14c37582eb46fc5118c3520464423b3b3c04a2c418ec063748cf2ac6dc68860f84ea29759f6e56facfc96a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50fd47e7065f1670c0b830b3267e767
SHA1a6cdc4c7bc7da9e63a76d68cda856ad7c0159e49
SHA2566476927bfd5f126911d586a0edae17ddeac8d78737abeffa97bb54a6f48fa240
SHA512b58b77341675cad18c92dfd49c5048a9eb84f02d9c76c09fcd1c3f974546b7ef763a026cbed4c7743e79b1dbf4964f9ba7277ba44d30f77c4997be6f8c74f463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578332589ff17b28178651a481254e79c
SHA165cf52a048531176279bf0ce669b572b01b2b1cc
SHA25633d26148adf1860c02f07c16ff5d04b3d9b7f04847787c2a2a6d35e751debddc
SHA5129ac118a82bc5b29c01e0028b1c80cbb5edc9397a3977b404623249d7842d928ac584ded600595bea98f7d84228345209be46bdc49539ba3be5f7b5a1802bac0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17ee3e23e336692504cc9efec32ed5f
SHA1e3d33a0cabc2c2b70b42c229c630f6c98839bacf
SHA256c7d39f6729de24a422451a662abadf948043de413dc27457a1162ad54c5cf34e
SHA51268b122daca07d3e30baf4fc387a241fd8e4da2fca7e5d5232ccc1d3f3e3ff8993361e880cc3b37f29ebbb83d14144d7fb50583495b055a7a001dae990641d3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a58f95715f0bdd7379dedf2b1c8ce2
SHA1bd17d424db72ca89e2822cd51119c156b64bd7d1
SHA2566980f91b7138952fe5b09f8f2ac77059859519a57f3834953e1206b3c47ad6a4
SHA5127347ffb24288865e7eac7cf321cce71582617b2d5ba567db7ce2a4af906f6a8fec374a6fe1573411970a224dcaae39a20116cc3546c9e0ea2e97c751ba4c7695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ecc49378330cd3ddf74b2afbe66c28
SHA1777c74ea22a038115ae708f161c5eef1f212b19d
SHA25626ea39b920487be3e2c51b97d3514e8005487832c3229f335f0a03ffec9a8e99
SHA51234464ddd1b1ecea7c7488f2aed4117075a6df4caf4cd8157dbd6c0ff92f94226094e9dfc12954a80c73826e9e6556214ad8042dad8f19b135dba6e8da4d42627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a59acd2bb94c1014ae4476bef19c2cc
SHA1fed4119373557f05d2de98fd8ab9116a4b88da12
SHA256afeb6386f233688286f695e36dc8fc45e7fc7f1eabda66d753bfd633056ff974
SHA51249827eb30ef3bea52a27d57fa40e05e886adf9cf0bdeece4277e07f853978125e7eadc9a20e4af88b38604e745b1b9551b4ef670fc255bd95f9c9c96e19a077d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac677dd7cb5351e27184e56dba048392
SHA1fcf73cdcd45f38835b618a7d8f4e0e7a70a7bb5e
SHA256de12c37c8b3e3ad298f45a45799479992254d92f808aa993a8f80bfd5e321f27
SHA51213fbef4a2a887fe998e74beeaa3072df4704f5a6e64b01cd86be9a3efd6dfa7c112d080da7ed28effb0f65087a54a0197c25d36f16e30c49314c2a46d0c57291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd15e787b89af0ef6dd9b7e2021a32e5
SHA19f66c945bf92bf00b38d4ca05b8e970c67b4216b
SHA256c979c272863207f04aac4d155c68dada12d9899e56743460bac959bdf9f66052
SHA512cc797e2f07645d0f027ea2b53cb897397d95a121f4325efe9ea4802b9a135ea30c0f2ed888a51e7c2e1a3b48e9276d99290fce525dc8219241e219c1c9d24f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca663c2eaf8f169c38605dab698658a
SHA1a3945b4a38510ac35f1649530a92d72bdb8a4e7e
SHA256f3761e8a918db14efd6f4b6e5da3b393e9470e35c9756b78dc5a2659560f48f5
SHA5129f6ba2e74e560c2e0a8a9806790c92011423447fd39548bff43e4f6ad38d9d2fbd24ce9524107f1a7462ec78fc1e25f54a01ae8e84cecc13281fa6cf5251f54e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b