Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
662dbbbf141eeea781b7d62c22756aa6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
662dbbbf141eeea781b7d62c22756aa6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
662dbbbf141eeea781b7d62c22756aa6_JaffaCakes118.html
-
Size
53KB
-
MD5
662dbbbf141eeea781b7d62c22756aa6
-
SHA1
352952dd126bbd068a2566fae45ebdaa8b91b33d
-
SHA256
969743fd197ca7a5c69a5db4ab25e318dc724f8caecd4a1a638aee0cbf0caa85
-
SHA512
640189b39d3779696749427bcace281015cfa03525ec8d688ed0d30129b14a0600b4349490582c9bc1d12227c9824af1f8ae1a53c3844268aa0bd1d37d3f5340
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlYj63Nj+q5VyvR0w2AzTICbbZoc/t9M/dNwIUTDmDJ:CkgUiIakTqGivi+PyUQrunlYj63Nj+q9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427875457" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E90F1431-48B6-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403dffbfc3dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000048cf4adfd9d73c600187eba2c1655e597e0dec48cb5b072628712e957b8b72aa000000000e8000000002000020000000668c4256fdbcf7c24ee1e61a8ff28d0c9dfbb61e4df49683fcfdcae7d333bf49200000009212e062137961476ded4543dd91f77f3374b0fc80f0803919e19d281322882540000000e6815a4ffb2ee627f95d7b8213f0707082050d23962630a3fd64ded5b0a52c6a219c35a989a82aa6fed451ed68ca1aa41a1b37d7f004a6455a9ef94acf1e1d68 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2396 2320 iexplore.exe 30 PID 2320 wrote to memory of 2396 2320 iexplore.exe 30 PID 2320 wrote to memory of 2396 2320 iexplore.exe 30 PID 2320 wrote to memory of 2396 2320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\662dbbbf141eeea781b7d62c22756aa6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03ebfd0acaf0224943ef5d2cb7e94b5
SHA107c0870d66d3b5deb63876a183d84cd7fe0c36d6
SHA2564c31d02e93c1d29a9f8b81e39fe6fb7eff7d06a8d71d70b83aeb7ce72a66da15
SHA512f1cf300c4f473b03035d2b2f2874a0304c5d3989928bd35ac950d1aa4dbee89050ba6c165eee561dab4874b930505f96ea4a2aa00762cfab4669cf10e5edab5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab93a9c262bd97545035f0e93340e296
SHA1eb46382cc3b63d7267882fcc92287cb5c4054e77
SHA256e13bb4691701d41351a028d6021c71d2c576ca5817ec6b87c9aaa206703721a4
SHA512e6122e73d91213bcbb8d170f4e0294f1107018d06d80c24cc234395225b733cdf9eb5328bd3af812cea78bf752259ee71f8f2e28d97a31b864bd258419198514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefcc3e3b9509adddf7ad8e88bcbc3cb
SHA16df6119f91bd30dfb346efdaebea35cc1b1a72a5
SHA2562ba0df4366cfdcc84d4c20f84b1629a7ab3e278d6b58d8244a5d5ab37124bb96
SHA512d4d335390bf4fb8cc05e1009fb1f7725f2972f2b5dcf6ea43dffa7b2531d6b088c3bcddd639b3c97bfa264a7923dda6d65b9d908ef7b61c245b38686dd2f41a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ccb36141fe73b0fe2273e3d01d444d
SHA137c165da8fd85a39615a1cfc4b2283ef8826d844
SHA256230509e2904011020a29287bbd2881e37301411bb3657560d166fbe2f5aa2069
SHA51278c04b10f4a03193461228a3adc614ae69fd887ddca127efc5d451d3984b4d118112f38a3ad01bd08e49721ab919dc3b8d5f7ca383221a7f05b923339464d390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52198077c0aa746a0d6a60cd00e0181ae
SHA1889309ed1013de0bcc3326ab4ce31dcfe002f039
SHA2566749e5b029df83c7eefb6c51b9f0fa45ed7d006dcce7dfd57236556cef95772d
SHA512e16a17e6ffd3bc5ec6b6ba8eed93b1c2dee5d5f9a823398ec077c318f52c1a1f3f2d910f224f721bc026a03fe0e6fbcbed4fdb9415669b6b32491d03d10839f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f40c73a9fd331ba3779a51875eaa16
SHA17f98b56703ecb513efe177609a652d9d8b064dca
SHA256b91aca435dc7d5b3e22d6bb91de3eb61ce942798b1bb5cc6e09cc8454a21eb46
SHA512c34e3b86d50c5ff5aacf5badc7dc1ff340ca998e5a2e522db87cc55edb2843e9594fdc68306b063f6b1b118f144b9e380696620f61bdf8496141ad60fd7bcc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463138d478b4b20247836c2d781a6213
SHA155d7d44d233089ba0986a01366f4e269dd3864b0
SHA2565fe6217f29c168a5ebd95b4bf548c7d8e353f8d6cc7e29def84bf69f19f7d653
SHA512735e8fc501676e3b679215e87e9b2bd3445bcfdaf633d4dd8e303073a0e2ec85be3b325e499fe34f686bdda41a3aa8bb2b5708bcb4113a9d95eff99da08834a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c6dd5aed9afad39196e12f3b44d765
SHA10b7a327c623bc2f9288ed37dd044ee9febd52040
SHA2567eabdca1dda6290bae9edfc1155cd1553953c69c80544d145a2afc226500503e
SHA51206920075d6d57c270c0def7797d4dac5706d3feb0363650fb0e9d1923cb4ec5ba9a7d8b912b28408a2c7e241af1774a8b44aae6a91cfe41d7d65c2d6ece6fd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4a6c47d8b48b138f87965212b0bbd8
SHA138f54d5f75901e5d4dae98f0658328ff855b1697
SHA256c0c336fd639c71f0cb0cdfcfb1ffd62764ade94f99559c2fa9a19ce6122807de
SHA512aa3bab957371a2c13e61928a0175d53fa182bf3cdc87b404e5d046f5f21816acc9f4a6da5611b81609c83d4e48a0e2adb0615c9e1eff2fd0267e4ef0cc35b9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5926d01ad665d6104e51d5de0f1c0a2
SHA1796dd78c2727673d833c2d79069692c6741f8e2c
SHA2567df1bb7107aa5d9eee7532f8cf2412ec62ce15c4a39cc370f1d3ef4e105730f6
SHA5121808d163c6f3c0d20e3701d03016a541bd210bc0a20a2477d6777199670deae48b3f0579b73087adf63a07fd70cbcf21729a95a3bf1181046162381b906280a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9561190432b6b47819e0afe0766be7
SHA1038de08af981ac261e0928c6ae5d5f82d0a47187
SHA2564e403b5f7517934137c6f37aea995d72546bb2074b0e003c5947afc3d64e926b
SHA512ace03ec5b492134b2d43c7389df1369b6c9379e29791ceeb851dc028481219698f8a44f974ee3b9b36879b4a03a51c9263e9d4f2fcac0871fb52bb7821b352f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab64a7acd6a657dc0b1a1fff12ca322f
SHA14a1a19a504db176d0a0af78139bd59aa3e2e7d46
SHA2560df2e6e631cd752916bc5bcf814dde839ef386ad77c9b93038ed9f875d2da8a2
SHA5123228d036092194d017d5ce72bc43379f0d1f26b9440c0ae98157e40c86e5c704702ec4b085683e8caa56bf00fb4082c2842967eb17525a974de4f74c06451afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb9584532908dcc0e194d58d45dc9d7
SHA1dbea12ec921e4a5086749fba4fff3d05c9427fc1
SHA2569481e0fe24f9bd4fffb72482dd49956b1443404a3d7d3fbf0a370d91bb35c867
SHA512b4bd2192b71375b62e44d20f5f4694cdbfd2b0ffd94858308788fd5602c5899051acdce261a1233e10cfc122111a8601fefa7bae5f7a97b69be559b7428e0b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576515644bfea006fff8d0acd46fd191c
SHA12e71c2279b0339d000a4a5723805499179b9676b
SHA2566a4bd65a0c6f5ce9df1aae69fe0ac6517934112eeeddb71f7dea3ad9346353c0
SHA5126e959b1fcafcbbdfc5279771824e1575ae24025e76f958504024dd25e1dc443cf8df5a1ecfb0a8934565a9c34d1ba2307843cf29ff4d0c5bd9c39d007562ed38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa39eabc0a15a6bc7d9fc12614d28cd
SHA1eba12bcf246520ff8a8116bc65dd8f2a56208e0b
SHA2566c3ce107043c1b7c0391d5a2d50fea1a70a3496ce985349cb9d5921177aa101f
SHA5129f39272f20d6c72f93e336127b1bfc21dd7afda71c2c252d60c77007b303f58e8191fcad0cfde1d3bec3168d51def31e6e45cdc71662b6760ae63665dc30a0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383a152291631a15136eb08b211c869b
SHA168bff86d20ee7d82a0123fdeb4937b56ddccc261
SHA25641a4231c109e0f155712f6142b4a5e7b436691d27dee6749a43579845ed8459b
SHA512f550af89fabfa3e7a64ef010314f2dc5d9452787e6819fcd93026a8642afd024d1b310c56b6f530c86a35167da403c0fb37365fc37faa8c5de2bb75d66e6088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4c45bdc3f3294c5f976e05212f9eee
SHA1b32c99e06dd5b66929c56a3e49839fc04fd9fa1c
SHA256bcd55cb9e0c03c9ff7b7f1ce6afcacdcd371da6d21776ceec0938cdc75b4ed0f
SHA512b453bf81e0419911f3be8680ca1e93aa4b8e234e9031d74cad317b5ceb55055a53842ea4ce97cab2a23d938e897cab529f3c18e28fd7c7898eafe1a057eb09ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd9c206bf808542627dc343c63d3b50
SHA1c5cbf69f912852788da181f8b3a886bfada32c16
SHA256f43735527b6c3c9edfbfd28498765507875cebb67f21d41cb5c5e45b1b7d01ef
SHA51236f51c5a8453b2518df9c45b656240ed4576d79cbb51fc9a011cc7ffb3234bc719f4940b8b13fd84d27c7be6a80676dcffa19b88f4929768853002f1ab77ad2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3a27d1b93a1596dc892069fbd05a53
SHA1ed5fef5b2ecda6fe52720c19eba73d78ca5fbe6e
SHA2566c0e519615abb63d629dba5243a228ed2e9d183bef689afd14a3e1bf68303327
SHA51252eedb79aa5a9b405714574a7508cab55dbd7f1eb3b461ed8264f5f481beb68b35251222b01aa662996525bf82115ac0c92afe521b4c543346fd9c136c7b561c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b