Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
62f953712240351e71a215676ada931c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62f953712240351e71a215676ada931c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62f953712240351e71a215676ada931c_JaffaCakes118.html
-
Size
6KB
-
MD5
62f953712240351e71a215676ada931c
-
SHA1
7f990dc74af2a4e89bc58ebd9460584da451dd99
-
SHA256
5ba290c7d64dd1bde6d63a68ff695919f6d5f60573c451be5ede3ee1cc9ce162
-
SHA512
e02797533ee3f17eed4de40052ba5d944e8c3f0f5d4c50c5effa4283dc2a1a49d2a052e6955ea7c88df593804b3007595876bd12791e9fff8d147baf79952cfd
-
SSDEEP
96:uzVs+ux7KWLLY1k9o84d12ef7CSTU8ZcEZ7ru7f:csz7KWAYS/zb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DDDA8A1-481A-11EF-8FDE-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000001fff24ab4bd2bb832bc75e85eb8470f98322e422faaa765a9651b643ee8b88a8000000000e80000000020000200000006fe0306f6253a4ee8e7b1c01e5de2bec59fedd22cebe184ef2d54e9835b57cbd20000000edba7b1a12651f87d183c1a6be22d5e64daa5765451c4dd64738941d2918d2b840000000eb6ddcae067b9cecd5114601cff8262dece2ed32a054ef881fa2ffb06221a7b9bc591083090d4443464aea771163571cc9c93bfee705709c655887fd1ea60600 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007c6a3427dcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427808223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62f953712240351e71a215676ada931c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1596e8f6f80dfbf9d79e97943a7dee6
SHA109c10e98f7c99639a379264104bf7c31e85e352a
SHA2566e425075df924a2b828124d72ba26d9fd2ebf2678d8bff1aae1943038d4db3dd
SHA5125de4e9f2ea9435251a18868bde088e9d048c3575ef8905714f1bc7f71ebd6371db9d4734ed44dc603fdf5853a165b9130bb42f206bb651ea91a424cd6668c245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b30a7f242e83d5adb8809e4f5fce0f9
SHA1389b1f640f2be3afeb6d7fcd55ed656a720ae15f
SHA256c3dd0c25ab12ecfda8209403e40b85ce1ecc19ebed4e44e5283e33920c32651b
SHA512002d7126196dd27348ee6dec506c9f9f0c37a79301ffa6c81e08b2316a0250dbc0d8c45175c80e0904bdd8faebf58b59371d9affe7feed6c9cfec4a2a67c4a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba6949e1d39c84c542dc4a73f169ae2
SHA125f51c01dd06847b1f8dfab747be7bb842f29bbd
SHA2568823591a062c8b73337beffd3bfc7a7b148ffffcbb2abc6acd28f83d73be0222
SHA5125335644b08bfdedfd031bb78c0c732731003249dd4b802169c58e3e36c176e7d990ab8a091c25fba7a0bc0ca66cbdd40ccefd2693a3cc19e33bcffb7fb135375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a92eefed56cbe70669f28ca9b67d291
SHA15fc1fd1aa67183174f96c64178c86a4692806c89
SHA2567523debd52b88f0825f69e53c62418d50b47bad921d47dbe6647d13d822a2f50
SHA5128e83bffab2520f8adbed362ae35cebfbd25212ef45e126d44820b217f53f3683c7685ac81e4b40798da4a1a85b381fb1ce50352257459678af5a2f2a55384146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cddc6480b77689fb72c2d8ebf923127
SHA1ff39511f4f83e9d3a2c0404526b4734a1f378490
SHA256ae90f682e6160d1bf6e248a3e63af8e42d170919c9144b8290b5103adfe96df5
SHA51214bdc8c6033cb95b39e76fca62539a91df414e6a15be15eed808da8ca33d63020fa847f104a29a310f1776b50297a66413d4b9916bc39690cdc39f1fefffbefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c2ec7e9e38b2ea753e0aef83e6e297
SHA1be47d14c75199bb7b046e4032e37d7af9468d382
SHA256d01317d920c09f6ebab2ffaf6c814970d461cce7e4b60e69307cf892828ce10d
SHA512a98b8bc6d0a4d413975353fefb769775986fd4f39ba031fcdaa1a53daa611ccd38447b45e312d57b948eebd9217e08d1fabc89b8099c83ea68ffda5bd7f6ba08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a762f51a448cc4fd5a77599847bd2ee
SHA11187bd5de4c59b64035603815866c2f9bec591fc
SHA2565f3121732cc14bb39d99092a11eab7c27eeb3c0ed21ce8b37a65fdef404b2089
SHA512e56ff9bf30cb9f1148f647abae8296addebda722b62fd3dc58dabc87dd1fe6b2adf07a35d139584c7be09e86dba4d439995e0ffc59aeeb94c52b6502c0f5f5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531865050856295dd62e213cc93eacc69
SHA13cfbedde97dd64175bfb27eb18330ecb70479119
SHA256f3928f1ebfd15dcb6fd99e8ad2a97cb3d6b927ac4f9f5dda9b9fd5a000c4038b
SHA5124eecd82658cbed40d17cb1612c17d1951fb13cc024e919fb3d4114f89f65b9d6691a928dc4f849bf727801cea880a5434f580db326e628b5b8c8d6fcf4a659c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7967c2a456f5bc528c104676806fa86
SHA1c30a469c61dd39673ccbdd2824dbd96a390eee0c
SHA256ffbfb35d51af01e758ac4609175ab8a8cbc2b446e9f6e39020045d4f01308c50
SHA512e7a64cb82b3fc057b3cb13e727288a5a87c4ba3757a87278ce15a45936e6c45ebf7535a2989ddff28a5e71f1ebd8072c6c945fe7fccba6e1fd4132860a187304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8cb03616aa9687c81a1a61a6b3c6b6
SHA1e331bc1ea251c2772f89d7fbf8976d2210181dc0
SHA256441e26443dc7c96a30f0cdf5adcb13b4d5895d1ee2f675a5179826132c3af55b
SHA512d2d4b7691641fd4894fba04652fe33e07d004b3a1b0dfe22fd735b8315964d62f88799acb53af798c44a0bf56bee3ac19960301e1f746f758f6083f8aee6a922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de03d853043f0eae577c7d14bc3b4b4d
SHA19fde1436ae856961c13b4e71d487db49b9550fd0
SHA256d81de40151d589d30e18f3cb1b25c5c04f38b76917d1ce3bb1126fb1d6d76b23
SHA512a4297df08b9f8ac2be7315e479af79580e86b6b0f042692ea476e5f51783ebce7defe41bb0f8a4baf71d82abdfe3eac752ac2155a3e3b68ba6e8f5786d204073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b219a2f35e9c3748a2ad98c22107e1
SHA11f3b277a0828b981a21336604e21ea47248cf7b0
SHA256692b7cfdc4c83f174d1dfdad94ba6440e25e6fdc917000c0e5897dc38b71ec77
SHA51271f3ca69635630beb35eee6024c9a378a9a76470bb283e9ea66ab3e426e8cc86188962b2615f29dce6dd353fbd6ebb9adf68f618ce3899b6c320f30e70791826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68c38e03e57661b8f7f2301a0ceee99
SHA1024dafc474c6f85e1baa640bed544c2129989240
SHA25603c210007505ba3f6374f34d9178e10300552d78051457644bbf23043dd05541
SHA51254f6424882e52afe42cb89833fa74f23f84201ce54621623e376c44bf371cdfa979beb19f2966bea7e4bdfcaceea1053243520bc581fac02e0a26f6a3030ee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536418cd284ed4efc4527aeae6a0929d9
SHA1ae68c73aae02c6aa063e42d4d3b5386d0022ca40
SHA25654017e72e51015268509544794163c56665627e8d52c4cb1fcb55638bf6c7f92
SHA51203fe261c85ec5ec86c93a1d9a90cb66deff42cd01e902e1de4041c4a24a2f916145108dc7519ab329fa0f4effc1a4fbe89360b69abb6dfaae62751e0871592cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f1a70a7b88ea131e0d8999febcfea2
SHA1aa25f9febf11a3ee1efde0c1233050284aa018e0
SHA256e42634471239b9a29492fe2f859524c963e5321653050de037fac39ee24e5fb9
SHA51201ba16ca1ecabcca26d1dedf3d6a30dfa374d2fa42dc00e2c968df634caae733e7d407911c1f4d0b528260cba0d30e009a411212ec79e1162681f23cbb60707c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d669c636cebed776e38704028f1a2b
SHA1c348d2ef79cebd558635cd0dbac0f9541aae155e
SHA256cb4d0444b25081adf9eff86a27d0a6ceff749dbe8465df3a38abe0b3f4ddda1f
SHA5120feb03ba02fcc0c454bee68f67793b2c27d89ea1dcd9995205266322886d59af14e7beece05a86f2c5306c679bd948848745a35c4c5e967c1e7a6facf1d29ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9724399377ba5e7598d5be0b31ac89
SHA1009784e6021d343110f5fdf89bee6c85ad324761
SHA256c09cbea86bd50bb3d2047d9c53e2611098b7b6f9aae816b1c54fdc54f791f700
SHA512eb4c85aa8096bd0fffeb6b18d9eba36f78cdb0ace2d955818cbd4293328775dc23722c4268e848ed7d5d56bd7c96e5b62fbbc6b9aec6d991bb2cdfaca219eff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55440d5b53b784bb453b673a8d20823c7
SHA1b02dde822a0f32530c15c8050b76c44bf6251825
SHA25682b092d0c1ab9578960bd190574cfdfeacf0b568edd39ab00305a4c3b4fcaf12
SHA5128191511deaee91ab1296285836f42eb9b77f2623e7d8ff286164c97ab509bb37db83e3100087aecb447f6a702af830d8322737fa1e98df27d6f0a59893a7edb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e853fff6bfbbd11ce417b5084a754c
SHA1eedef4f33597298931d31d67c269ef13a5bae45a
SHA2567c6aa81fe7a12b196505bdf2cf4de26c599630fad2e42bea5cdf240fdb977a15
SHA512b7bc083fd5c8fff771a745250dcffe90af88c8e03dab724dbe60ee3c045f76cd2e8ab655165551e165d2342a2bdafb3a2243fc146afa116224b859e9a926560a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57482b78b08307efce44aeb63d77cc5fb
SHA15fcfc1e3dde0711d16540ebbc33bda7cb12bf41b
SHA256581469c81fd976cb5ae69ea6c000f1a98c67e796aa028fe3c739586caa8d0661
SHA512fee27c33f774396b13e658820c68923606c36483f6a28c4db28fc0db5b11a3b1a6538aef0188871544c23226c9835af3a1f38204990fc7a1829caee8bfbe9202
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b