Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
61f8d84b19e59d3dc7bca02e0032229e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61f8d84b19e59d3dc7bca02e0032229e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
61f8d84b19e59d3dc7bca02e0032229e_JaffaCakes118.html
-
Size
32KB
-
MD5
61f8d84b19e59d3dc7bca02e0032229e
-
SHA1
872fa5196109575375a5c803793c6dd68cf67c2c
-
SHA256
477ab357f3ed50befbdb4cd83d67d608714f09285e03c9060ca140ba191ef09c
-
SHA512
393ac1bc62f817d4f3055f94e95ab704b8ec5f62c129b8b512cc6ae2362485f4c042142c738d630618c3a591ec931fc85b1f8c9814eda782d455d8ef7149481c
-
SSDEEP
768:Zcd9QZBC7mOdMwOpC5I9nC4EHuzw3wkwsfd7Pd:gQZBCCOdu0IxCzHEw3wkwcd7Pd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001e70f0f5a71e8c1bc389c1e88969d7fbcf7ebdf572aa7068a47ac011d78e946e000000000e800000000200002000000014009c21e7ff3f5ca212fe87ce19cc3ba19d79191c68052e4df8a2cdf8f57e9f20000000c7bc137b8851ce0a87795c2b61a2f82222d9147ec9f1ed3e1fd4efd22d4c97d340000000d0836fd64abb8535ec8e2d470c240ae0bdaf97d01c73af51e9aec410df9c5140de6df7005083eac90c43235312f0d7d8902b7fa54bb8a1486528c45a454034af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c1d592cadbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427768439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD61D0B1-47BD-11EF-845E-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2860 2924 iexplore.exe 31 PID 2924 wrote to memory of 2860 2924 iexplore.exe 31 PID 2924 wrote to memory of 2860 2924 iexplore.exe 31 PID 2924 wrote to memory of 2860 2924 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61f8d84b19e59d3dc7bca02e0032229e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a3da0ea698cc1ab23184f634848b3f
SHA190adde1568775fcfbc14bfb834dafabf7754205c
SHA256f7c109a25492aac3e42352f5f8899b6045d2a762c0c8d1a185c2b04504e5f310
SHA5123e25ed6fffeb4bb1262b6e8a614d3fd7ca3c30ef76015d4430dfd345e0ec83de39616342428830f37e16548effc1f814106cd84dad941bb7272074071d4361e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8dd5aeda3d60e43656b9e882ea609f
SHA19c5b3e0a97cced32fa5550f323abead7c2a6c694
SHA256346cd12325312f17891cb6047acb62a2eca4870435c881036d5839d0f776c7c7
SHA5129fd2eaa5a7706f371918ffb7b0fbd036f8044ab6159d303371e9efd4c823aefa29dbb979a7d7b6c6bd9f3fd26271404226b1ebe69eef060c05a2fe77856906ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6110661564a3ed3d23365095799dad0
SHA1e166265fd053525ea2e073391043eed7857fb578
SHA25678b202ed3b651e8ff2f56abc199779dc51fcc89713bfb6599218fe6b2927c246
SHA5125a4f597eefc3905e71f2555b5b6b75ec6cbcbaac4a4ed82fc5ea1c0cdd0c956ec5a01ea32676c0d638b998ef91bffc3f689b81d4d0d4df80ad1506239887ce54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74f5eee11941b4debb44d2e72ec972e
SHA1f0b4d392a24ee6fe004c938317217429c144a402
SHA256d270e8da2bcff06fd0b576d821c6f1126d972cde07a7005bd5a7f05690eb91bd
SHA512e6f412e376a41b4c7cb19c6a1e3cfb3641bf58975aaf7ef8dd81b61b5b516f27a17abf6c196d80479723566a7329dabab035d74c796ddc41b434c3584db04771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e63a1df00cb18327e84c6cfef7e908f
SHA11b3bb251dfbd43637a5c35817609536dc6f67772
SHA2565b29a1b5d40eb877a0b1ae8c82f32e7cb7418857be5f6337dda8bc292d754c71
SHA5125bdb4565a1563e47a02d0efd6af6896e9c33a06b644343375678c4657528ae54acbe6ef9463426b3363599be1700480007b6aca4340adf5005cf133ec4856132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa4392e6cd44717f1766b1283f48def
SHA174285d7c435dddd2a79f55e022c27b89a5b9dc98
SHA256e3129f44e013ba8070424eed6102dcadbddb0e5cba4261b495063a4fb7cee52f
SHA5126d12fb6358b7d3e0668de60cfafa83a86d79d7bb072aa6e69062f9dec1def30e0c4499e8685170e5a870e4be283b36e5aae6bfa70f7fc1eb2cd0402645d8d918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2339f3bcedc8cc0fb82b795ced4267a
SHA16779f55b590210f4a3617ad3611e1fe1fff83647
SHA256a6e74d98d487f34df837a2a73bb367b1d48893d4fcee8e6b49b8406685ca2b74
SHA5124cb62604779367dbf4dca0a930f5b08ac0af572a6d32d9ea50d072d3072f4253a0ea989916d69284b9749e24c81f46f9483c06b4ed600e43f631d2baa2754cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b32d60f85b264540cdbf74041992d1
SHA12de870f4a306b3fc93f04b8f29d22d31e4a9110a
SHA256ef3a3c684c34db02a289ab212533574ffdea434f5cdde258e382943f4d3d993c
SHA512cfd7defa0d7aa4365163e201733807fc2ca598546b845763d4bfb8ad229e9b79976b14986d1fa0bfb7c2b92e362fe46db427328dcae13080e483dd178eaee021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c585807a7dfdb834f545075008dd6d
SHA12c3bcd98b3a4c8b768881908018d63fc513a4a16
SHA2567059cfdd627d192e491edd9532de9323d536b76ee60d3ff9a2f129ec48110ef3
SHA5120506d13da143b64f9c17006abcbd2b9c2ef76ac315378a616c5445faa7d16577daa4327ebacab2804ddd912f19d7778c7ed09e609319001cfcea7843429a79b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363eacc10796542f242e4a9f37f480a2
SHA1a71212940a480639d148a7efe464e50590b57bd2
SHA256571f467a072cd7ea28dfb1f2c227d1c5c157496ddd84f843d46d182159e5f321
SHA512ee36d4d14e3ad302d52e31ed2d3d6c8561c5b2743cdfef78af36efbbc8561c2b5a3099248deb9c060005557e5c83aad10f2f9626e6777f224832c883f4b983dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1ee649503f8da3db687ccdaacb7bac
SHA1dfc15a25e74ddc99707847eb74c8ff49db58f113
SHA256b1c9169ccbb33d1bbea32d94ec5bf47666383b93cd240b169443843de4e00e5b
SHA51211519f47e74346d3f85d945397fd16310079be2484914e728fbca59bd12c3ec36d75c5046af3e885087f8dfcc94ec72a9ebc1caad4c365f6964757a62adf4648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe8b49f1022c5122bafaaea68ec0b06
SHA1b90f3066664cb66aeeedb371f32d6465010eee69
SHA25654958deeac76fcbcdd0391fe0febb6fe32e65d01289b75c289aa8162d0dd5640
SHA51246ff35d45567481dd5b81bb0ba32e0997d77bf1de4208579e7f83ceb0c0135ed6dcf4f17ad3e3fe38dc8789913f50958a07b778993d30c09edffa043e43dc457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5a2b052f4d7ea5d4123e4fd9eea293
SHA190db52c0bb5ba8715c08fa4a903ccc7617e69363
SHA25625416e70d4dfbdf37a5f68d124a1c73dece55ed307cd0831db9ab518241fdd07
SHA5122009d3bd26580894cd4dc12f0c50d4e38b7dd273233f5023c4c761fb7497e8f1bfd050f6ca0af0df841b2820df224f1f89957c746ba2d76422c5e072b9a622bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b185c234c512d72efe1dfc6790a712
SHA10ad58a8dba11c68425f1a87bc1edb5707eed5830
SHA256e4153bc762524fd079218a6fc87ca2a728e39413af254160ab796ed2fd0907fa
SHA512356690cdbac712484cefa52fbf98d62c3c410ea170c576f3093a431f490aebb490d2b227c8df26b9c198408b6e60af7635b04c2ac7d1c8c94ceef10ead06ef47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80cdd743ae443a0da6f5d04d0c00a80
SHA113cf4f37132acea5b2515c2fc3af8f6733b4f4d8
SHA256cb1f07c413f62a7b5328f7b3da5f43b9ae7ae05f35ebe88b942fca08e48b3133
SHA5129f3fff925ca0c948db8a7ef8550d94dedb6bc2832e204cf5c0801dfbdce91d16f3664db9201be31fb8cb3fbc3825244409d2c6549cb30a8b9e6da0616afa7af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d543af779b9e404d75d232730397812
SHA1fd344915d0b752d41f6f41cdae1c43c5c3b59b86
SHA256cf995b32d963e2fc95e72c14ff221f0932739ce87bf2f205c3e10ed7c28c2d93
SHA51292a302178919a77c762ec21ab82a2d3af08fd01e89509ee4dea5f5ec56d15d7fd0030d19ff4a29656f9764626449ef65a5d6e749a9bd693a924f28fbfdeadfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781c452e0e1028db076420cbd20f5b75
SHA1ffaeeb463bae11c76a91d004c1b44e6e259a2a30
SHA256f8128c0c8c73e5c20c7634a5eb873ea664e9c59171d4e58578fae5cb13a6e4ad
SHA512fed326cf3b26cd2434e878d6de36e0a6b58284cf6de2137f2fd361b90cb362e407d8b7b21d60f0a833f9894cd1daea5aedc564d9876d0ee722980eebee5e9ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfda7fcfb693447ae02e26d50fd44216
SHA165737a20c429a272b0d061444baf95fe118800fc
SHA256701f7453d2c6306418c5787298ede51cc32e12309096efd680a73ab4fe507047
SHA512bb0ec05a50f6fd0292f73cf66ed9789bed9841e2925fae6c1ab4810e107ac93a25aa53a43ecd2cbae027f9cb43ab534cdab886641f74641c98f1ba227c163c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ee8676a50d4082779ba95f61c989a4
SHA165743488e10b2d62f1aff7ae9c2b65d1dee83fc3
SHA2562a6e38a0dd467862d6982071fa7139ef3dd1317a6d82c01d72f019166d5236bd
SHA5122efbdeef8888aae2a82f37d24fd1e83419723034271913c67033153617e2cd2ea70cf4e2f1586ddbe34b30b864c0df5bce24e2521fb05cc34395bbf369041f5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b