Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
-
Size
9KB
-
MD5
6610e4d98220bed073efe03da7d18ebf
-
SHA1
46f0743118b8f4132fa80cccbf0dbf0acabe0d1a
-
SHA256
43e4d9ef88b0fcb8a7dd235fe067030ea9536b543ab1cd910a564e622b106c1e
-
SHA512
cdd8e75482ba7d3cde0c5fcd3eb8ca7590792801ae351081838d06366a52024690a6a1bb1f6a777600243d282bca297f384b115891dbaba86cda20dee4f7a2f4
-
SSDEEP
192:D2Pu4IkFuCBAnb5j3lsZRbQZKtu+/iO91w0yysW3:YICOnNj3KZF6Ktuw1w0l
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e0587cbddcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006c95742d023693e29ea976eaf06855b76a9694ab41656dca76d7ae32cecb4340000000000e8000000002000020000000f2d9a3c6911190d903edcb4f48583e94a64f22e731733b53a795d93445b70b4220000000d9f23dc82b89962572b9c7f10b1811e138cf76635a5a418a1c22b2ee07721865400000009cf4fd908b6a7d8d774b8da39078347c881fd76ab2cc150fc2ebf4f29d864b88d5f4b0c6c57370cd318ce8ca7c2a4057bfc6320289cb020ef7639435c6f58ea9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A6111A1-48B0-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427872724" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2304 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2304 1412 iexplore.exe 31 PID 1412 wrote to memory of 2304 1412 iexplore.exe 31 PID 1412 wrote to memory of 2304 1412 iexplore.exe 31 PID 1412 wrote to memory of 2304 1412 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c577cada70289a006079d37212fb299f
SHA119d474c97b9a36a0bc8b9e6373f58d710400a122
SHA256820784282590c754a952f284c4298d304d829917efcd69a07576e644db96495d
SHA5128abb03fcab12bfb362042b00c4bb5bce3f40450ca24b36f0b0ab998a568cab2ddf34890cc10b2b366282118b1c7b36634972d9073a7601afee0df8a018172d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0979b4568cba69750899c277a25f92
SHA18e8b4a1a801fd9c7b923089939e755869bdb981a
SHA256acbe511e7e6c5480e05037a178d05956cf113fdaea62ca116753d3efec5b29b4
SHA5120eb7b53d60416e75f6b175fa9ceb9b2b3335f7afdd5ab72e1a1c7dc41edcb934c4b2b6ae5c589332da0e5a9d3bde1cf9816e6955eb30879d21a86437587fa396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f328911c95e362583fe3eea4fd9c8eb0
SHA1c97685e0623c66cd3b9c5fb1139763b16bf60e58
SHA2567c43a8ceb01bc4cab7305060a5ec01f4d0b6cab232defbb4ef579ef0de85f4f7
SHA512a29db8c3e6af3971f780d55f76932676ece9c264236aa0afb62e0c53b5903e9321e2ba5a035dd05c667155487f79219eb448f9b3c328b595d46120036747e4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a661baa88686b802f3438d4fe4543aa
SHA1557a597d15b08abdf7525e6c9e693aa623b51d33
SHA2562a5542f7a8ae10274c0f7746d87069c9eaf14120fc382ac60831a8676fbafa91
SHA512c726c095651c6450336c84b99b2d7c932733d35aa7116f80c5b2b5034b498a942aa950001932cbe66e61a9b4748ba59fdd0eacb7ae546d81c8ac98569499da4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb285d70aea49cb63002b4c3aef8533
SHA1fee12b518e80d51451c9b70d2e45c2902168a97e
SHA25655c907cd52bf71d14ade009fa6f805f0a5d4f1695b8bfec9d5dbcc98a58a2753
SHA51272d39a4d366e0c547289e2cb40168929d7a86ae11d6f3c0ff80798f0c0c55b774008f84c8da74ba54e2af1aa6cd037c8e6e7dddf4ffc422f6ee02cae88fb7240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432ff8b6c065e41516c683b21e4b8a71
SHA1510db0105a76167b0a910fda703d34e2244f8829
SHA256b81dfd0e30d7a6da503e67e6879e4306a284b6591a30f28b842b98bfef161900
SHA5126ec7ec5a2c8256bdddeba520dc3e67ee4e997f57ccf75a3e2005fc9400d610ef5648eba96348f164db1b299f02f9b4c1293ef6cced17b5a8dd774232d0e0a7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d04b5008910841b7f4802e2da5263cc
SHA178becca1a0ab9527d19669cf3e35feaf1c00dfd5
SHA256188d6df8047b1167ff3002c3984dd596ca3d325fcc15c95bdff26cf00ecd2ced
SHA512d5bf7660d9419dfc3fa7933c955aa6bffe83002fdb73098f606de8b42713b7025d3894a16065f6e16e104cddf362605f685ee25b1893700935f163f092b17049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ab801eead01b79f48ee82597b0d3b0
SHA12271e5e2688d53ba4b32df5d079f1bd892dca12c
SHA256a9c9a3708e7942f7a6b22fc4941030d1abe7e8a3744bd3703d1a99175ed491d0
SHA51273b626f2520634c8aeb96cdc8cd1c1205e5134e20588e61ceeaee91ec5767dee3f3eea97ed3615e1405051b95db74a5ebf6c8c17112f7227a5fec52f5fa987d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65d350b02502038ebec5eaab17187cd
SHA1e7d7c256e7b4581e7405b8f56b0251ac0706b2d5
SHA256f71faf7df11dd40b86b0652c01a243ece81b0a34e1b87b87f7e5879a5f6e80f2
SHA512fd13ee81610bc03ccf606f270197ce08a72d02fdb7a478225f2a3710baa191e5e0579adaca8f8f066db354d754175be0afd5e32439b1aa1a654db74cb5ea488d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d3b93338870909dd7d915f6daa8108
SHA1f0f896467e43b969ec517e545f1729911e040920
SHA25667644ff5c6b0e6739fc92e15a86b83680c3832737c5376e69bbe448bb8dc9ea4
SHA512fdbb3c482d0ff1b0456cfa423b87e53cd3aa2f6432d58c92df267d152eafadfe2678778c54493e2b68fce849b180ef52e14c8ba56049eac6492515a0e97f79ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50322c0be1f677939ebb01f0389468962
SHA105f82ffeca58a4ac713eca8acab267c936c3ec53
SHA256c692be4a57607a5a0a827358713e6fa31296baa7f48ac25df7312ee0b0928eb9
SHA512bdcbc02959477858c922fd8fab6d4537560cb9660676fe71c95a952def29b4010df4c471fcac325bd16e940912f83c6370774476d9c29dc0b642f16c2dfd50a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c80c2eee9eb10776482ac8b35ff6c4
SHA1d97cc3fc03185e9b6e6a57115dd68160f4b84831
SHA2562e2415fb13b2d3f21cb9f2545d5eee812cae47d92094b7c0f937b239de83750a
SHA512e77220159a0204934ca7f5ea3ae6742ce2574daebe94ebc22704b78ebbbd51ba7cf8755e9c7161d59cf2f884f02b020c3a9b7b96a1630b497266f56be364b01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc9f3290af35a378e8483f6df5ee19f
SHA125b7c05a89d842719475b30797e139e989b15eb6
SHA256f20d75e786f683793e6170e1f85e5395352742c70f7fbe83b66123e246f21c05
SHA512fde2966d0d4ab1e32745d26a7d4253dc19c20f24fab244e50afe48eb360caf4fa5df360aa76170821ceb8ddf16b2ce976f28f58e1f81024240b382c3190ca82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6ae5015d2765a13337d0cb0edca662
SHA1b7f52422435acac446886e168fc449f0c863f536
SHA256282405725c3afad2bd9fa52518d74cfbf771d5cf8524a0e7c1ba28c8c3ec214a
SHA51226a27b3a160075cfb564feef16a5bebb2b4ffcde7e98ddc91a46c1dbc5473ef7007b5e683acd16519311a718652c2c419f449dd5a28081dcaedb7d732119fd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ea923792a12ac282d67945ec70dc48
SHA17e6bb2b66db88e19ce9e88a8d28c950592b74161
SHA256a8b9635e667687539d983c341cb320c4e268708154d3311bba13b8fad3c3289f
SHA512315ad5512b9dd51045cfa84154922340309fd241a23105c814e23ab6c57a954ca82a7b758cf69e413438c1b493f90bbcc6642f94f20a0da9bbcce6d52db58ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd75b0d5b430fd1c8165ad9bbb545ba5
SHA1affb1f27595a414cf951845d8de611fb5d2513de
SHA2565a42559f4a3d28ece5d3b76492c879f8d30d47ce1515b39b507613842019c7a5
SHA512c9998955dc2eef81640aa2c9f70fd10f267f7141486963c9b2c5d29413658a96ff6dac26554a20d2f0a5e6803f3ef8a3ba9161008e7698bcf9049ed76119a87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521dba0cc594beaaaa434ffcd0d0786e6
SHA14b1ea15c3a7a0d28e154d9314d3581fbdb00cbb5
SHA25629bc94083fd6fd11f03f9c99d14d66abb2da5ce231c9c316f4d2377db62abf84
SHA51205f27dd6d2a0c95a068ec50ce68e253be00168b4a6d5ef7b37e93fefb7b6f91703a3c20404f54868fd899be1dda968e4ae309e5b44230144d72793994bd48209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51006f09c07f652b48a83f445b7f2c29f
SHA13765e25888093e5dc93a6fb3129e4f57873de9e9
SHA2565b4742b4e7e676a4eae2a7718c8cf55d4732f67cd4411b7bf117ab32d20fd543
SHA5123a4f34079f5f09a6df02ac71a1fabf142246daeffb85637ae26a9a4a2b96d3d983b3f76637e3a4e3053699c456d7d42083a2a2a5dc3faf06278a798c07d48e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb93aab1bce50dff7cee1cf9ebc5a47
SHA1931278aec98ab2685dfa07febe5e28ffaf0d2519
SHA2569ed2ce27c70d9590e5e47d427af6ad5c4f642abce54335550e7a71bda6aa2ccb
SHA51239d5911e7b6dbf3e90cf37fe87878a23c063f6990d6cb470e570a1c29c582504c2a3bdcefde8ef186cfbed63786feb4612c5f396ec96104239563a55d2320853
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b