Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
62085d9ab39701dca716773b674ab60a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62085d9ab39701dca716773b674ab60a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62085d9ab39701dca716773b674ab60a_JaffaCakes118.html
-
Size
28KB
-
MD5
62085d9ab39701dca716773b674ab60a
-
SHA1
22a65ea16fc6ee3300e26725953fe3c389ffbac9
-
SHA256
4190d0698971587217a68ae2f5fd5d23ebb57517078896a8521d9337cc5b3763
-
SHA512
48b8304322e1b47f334e3a49c6281b3c4163a769acadb12ac218acd4e87ef074067be90ae9df4f6bb865cfd7481ca5a3097df8396b6696ec64fd8b557de8963c
-
SSDEEP
768:tkYFtevr7LD4kgDCMgDubD+FDW7Y0DYTDFWZuD59hq7AFdk:tkYFtevr3D4kgDCMgDubD+FDWFDYTDFA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427769669" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f48270cddbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000037c316aa8b7d98ea6271e88fb668d19e92ef7a8f73a0a2cef4b56a3a62d9727d000000000e8000000002000020000000d264e036ed6c1cff1663186a8321d5e538605381f31f7446ceadc632d7ed2ff320000000f1b222a21d2417035037b0eb803d323570542fab0dd8eda4c41ee3cce9d4a13f4000000070ca5e300f43348482f166fc650ae39a59e4abd29507660a9dada26693b3193d7e754c25ba7ce648ab3a20ef2d255755224ae3ada7b599075bf3d3af936f83ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99E9F3D1-47C0-11EF-9CD8-667598992E52} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2472 1488 iexplore.exe 30 PID 1488 wrote to memory of 2472 1488 iexplore.exe 30 PID 1488 wrote to memory of 2472 1488 iexplore.exe 30 PID 1488 wrote to memory of 2472 1488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62085d9ab39701dca716773b674ab60a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562244ae5969a8b1c2e4426039d898d8c
SHA126737e5e07030b2475b6d75f7985cd19dc6e58d2
SHA25619a2be8eac6abc6746e210efc679d542af7f5f3508b63c5460ae399a79706dea
SHA512c5d0457aba222ca1d072bc2776206e0f7e9900bc2d8a752687b89bb19f0d18b9cbc9f480de5ca54cab4e7f9d377b42ddce29ac3b26686c96168dabdede388734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550fa8c42a71b19060bdefcd9b055b9e2
SHA1110b9e54c2bf96ed057de42835db7bc7506c0c65
SHA256daaf4218b99eece7585732b9753230668d4822da9fd8d9f328660eb349336a25
SHA51234aaa8370142d4e6e091845c229783c8554ce8f36c0d33d12cb75ee096dbcaa8b7f45b818e2251d683ccbc114563e0d040fcd0e19b1ae29960581bbe74208af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523e61ee1908f9b81cc850c2b02129ea8
SHA11260e16926098799376087856555245077aaf9ac
SHA25638ed81d9229cf8d84554e821555d03679f92e82a8bc65d99577db34451a09fe5
SHA5127989910d3d379973dcdc76b7fdf67113c80715c917e618ad247de02a40d8ff5a20d669795155724137b57c6d135dd293371da47baa9d8dfa69fceaf925195347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575165351bbbb65a595d3e04cadaf2ac0
SHA1ac57414bd2276549c9d7c713ef5721762e81b303
SHA2566e9fb24b2f1e66a36768f97c50c37fb63b94f4a1623bd4fad086018ef1f6b6f9
SHA512e8484bca9b243563e4bed3bb46184920987e54de013bbf1bc064fd28888c83b0625281b0e11d456a8445d3600c14adf1b650d42b4a82f0674cfc86be1c6d1e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a78807b8bcdba2ab818fb0842cea996
SHA1d18f0d45caa2ac14f18ca88cc416c0248c76bb90
SHA256c4a2959a7928eb47a238a77c647f2f8d5721eac52aa11a87e34e97cc59d627d1
SHA512c88480a6a38c7bd0ad5fee87d913ed47fb783522f03727588e746e1f8b630178651fe0dbe7008cf74bb17e8ae0426b22bd594505cb7dab657e521aa8b36cf935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd7e7871c3384001772c71946ae620ef
SHA13b8841df55909d4298ed759f657c09fcf35f9e53
SHA256ca549c52f55b7333592151f0911a97521e2c32a0b655f6c5fb9bae8f64e05e2a
SHA5122db2e5111dc991454305f2d164c69d35a56866cd9405202cf80d7698a775421e292491a9f6ab3266bbf5a502b8eccb27ab373592159ab5ba26e2b288970ce56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52198856915e0477ac11f1bb48251b34c
SHA13417f9c025a34b6aedf79582667753eb6d09e674
SHA2562f1496f4434ce0d04032b0b2a0443aee67945c94a79a869463ec3faca0c5fa7b
SHA5124fafa88bdf505b9e9ef0112cfd3d94e9a3185b5cb5280196a74c6d0f6241eb619ddb8af772469b50208c0fe6951333fca86bd303e232af93a70a22c1a9f1d2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD553b53c478838fce93b415c516df100a2
SHA12d86de6d90cf3998e7515f3c221bd1cf40d1fc0b
SHA2562e0df3a24077dd670da3ccbd3b49f42eb4e46562cc87d77f2aa40df8cbeb7505
SHA5121e7da1ce74da4094d593c629a3d13bdef35061d963f6904ab2f52d5e5910820b795ab5b232f9dbbb560a0985e6aafdce9415bb3b85c136f88f10c8e38f491146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53cb490984c3795ba90e09bee386b8b5c
SHA15ba298430865cbf582405fb11a014f332ec92c88
SHA25673e3275a897501578936b019fca2661edff210f744df0726596fa1766d832209
SHA5127448fa1a779ffab8d685d9688503f520b500b51bd26f571c5cf587a865f8925f684dd63a1e43662afa83a0bc1408515fa15412bf0d83be6a1b114de44025223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae9ab9f94555101e034c02e10fcfa67e
SHA18ccb091e26ce89d4fdf8786c3ca6dd8bc686be4a
SHA256f2c92ec177e9de67a91ad018f2ef952ed61915088880b0831dd643cf4806446c
SHA5121dbcc83b633f249f9477f779538f17873b0a84d6e2c1fc3fe5b77a94d4258de713822d5f9f5eee7e8359e58b7489b25ac7f262f173e3bab7642ac86c7945fcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570b11093a935388e196a30659b029c5e
SHA1cf7f09b0f04cce6829e15f917f8a03585a281be9
SHA256cf30b4b350e389f0e7e8c27abb5f6062d8f091ee48b00adb8313042b7d680d36
SHA51252bd0e3c965e4b71991ba117481ef5ef4d09bc1b05ab29c852034e2326e548c8c6d697ec267bc67558b753384554ccef3884ee421d0fd67f5824d913f137cea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5696b956ced8b04e572856e531e582172
SHA1301c1466a7f24c3c9e8e28936189b58ccf241da5
SHA256c9f9b003ec3f235791f664c36b563f238ba75370b826a2dde81d00606ee0045e
SHA5124c06a8ebb9b782767a28ca68034a639c580c37a551fb79b7dc07df10d8ae5e20f34793a4cdda93a64cd4f74dbcf00c3664724a8a0d279b5a4cab18b6923372ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5657db94ebfc63b362de836686bf4525f
SHA1332c0692594702c89333b1bf9bbbdc7fe4de67a3
SHA256cc56d7fbc855aa77b0d536226a468142a98066ed4870c51385944c665ec8fe4a
SHA5127e92c2231c555bf724759b6121a70602abb7a63145232ae406f830c9156417edeb01fefbd225b99547b98f1f7d464acf320ae29337362dbc3d77606713413b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c67bd4dc427f4dfa9d234e3da579b67
SHA178995916f1463407168904af424756c7865f5933
SHA256faab9aa39fc3f315bf236c8efc29664b9949da4db209151aabea8e7cd3e593f4
SHA512c234b3b6e98dd4f67f96d773889b59c1fa88aa2acf68fba533c95758bc37a1bd623abbe32d334ba518f4ee7f932dfeef3af56fb80ca6bb82e247327b821caeac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a478e1ce746c9417073423f2e827a26
SHA1bf20e636bc9feadf86fece0ad00041a5c09c0fa9
SHA256b243da644de1a60f28417b41f22e12ca1d2b5f490e2d61d07424abfed2611775
SHA5123ad419236c9420ed8c2ce3a6f67365b8b9c1343b6e830d3dd7e832c56f1f3278516836e7530d2b223836bd6590099e8ed89a15f620d8af3f7475579bc80b199e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5558773deaf8ea9ad5aa6aba2ce65cf33
SHA1ff96e6c7841ba43c683a9a2610adda81b9d9d29b
SHA256dff71d633965f71339530b15e0afb106df78642b757ab73b367e217a5a509f39
SHA51200b460e01ed12a2443e739681204a6f1d60648a99a48f7a5b69e3fc8a6558356d2fb030a904dd2cefacd6801edc2a4c671c989413bf6641c178285763a8e15fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aff094af8de4acd2c368702f922c96c
SHA14f505de8882123048ce290ba716e7357ca101449
SHA256337c829bc533170bf5659c9dd936e647761fb402cb58950d1809f124c0a3028d
SHA512fafb8766db7333b87626109be1840f2cbe76865c49b1614b195b867b467495b647d1d88fb0d2f2c263a754db6e569952dccd140853f20a93fee2faa2c199a6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acaa1c6adc941bbd4c1ee324c9719608
SHA1a9e7ddab76c6451051179dd79ae09233069354a0
SHA256641c467c59a705ac9edfd1f819a7e064f2f95493e15951e35409742d72ba7e92
SHA51221f5a838973b81fcc0f37065e6b5579ef8a732827c4fcf086d25b6d95b75c2efd6d9d207055d15c772e3f6b7c3d3a8ee4727d3db891cceb3e51c39aed44526a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\smcf[1].htm
Filesize178B
MD5bd2695f4b079c71dbddde3436286fb9c
SHA1733c05da132193d6cf1d8e242d12e2525c03bab4
SHA2562e04a18ff185ba5b16f762a0538339bc4049aceaef9738edd43af77d2ceb788b
SHA5125b73af24d095f7593026d3f211da6775d91c2efb5cdb0e0258ccca8edd3f8645cdf80d8338c863794d260f4bca08637233be3548d83e7225518dee2f47560798
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b