Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
66c6d228ccc4ec5d0631b15e5ed7a769_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66c6d228ccc4ec5d0631b15e5ed7a769_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
66c6d228ccc4ec5d0631b15e5ed7a769_JaffaCakes118.html
-
Size
305KB
-
MD5
66c6d228ccc4ec5d0631b15e5ed7a769
-
SHA1
20d73e3fd3d03932a9b441074b9d3cc1bf2a88ed
-
SHA256
4935c4762d4ad2df51b23f62a08a3fe44c8458d3c05eb8c74e027ed4fc4eb832
-
SHA512
20ebc2aafa7b7957c8b09c0ea68db412ca880d9d43eb0e91df1af30e1a14bc683cc8125407dcf75feed2ac3f58b19102c493ae0f0662db8fd9ab126fde84553d
-
SSDEEP
1536:SIRXtUXiBT2U8MlZstjXPcBL5L25YIWioO1M0kptHf3wXP0lBZRGU7EXI7V8nM5h:SUQUjz/vR29oBraUjz/vR29oBj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427886200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBCFB941-48CF-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001dda30d71b70fb9ac18dc13033d2d9175ad90350d8c4cc2a57b02963e69e2173000000000e8000000002000020000000a8468cf08affa711db209ce47b74173a009a0d0e7506c93e7b3266b5251d926c200000008609697745d553ce58b7f6f4c1752321c50dbba541b032cf703cefddc824508b4000000025ddc14e9ecb493b4c4f68e16f4755521b0ad16b6874b85e77822f3ee6736f2a6089337eb14c555f7ec47f7162bc2828d4b0dc9e9568d1bfe136d61840ccd30d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304c5ac0dcdcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 340 IEXPLORE.EXE 340 IEXPLORE.EXE 340 IEXPLORE.EXE 340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 340 2564 iexplore.exe 30 PID 2564 wrote to memory of 340 2564 iexplore.exe 30 PID 2564 wrote to memory of 340 2564 iexplore.exe 30 PID 2564 wrote to memory of 340 2564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66c6d228ccc4ec5d0631b15e5ed7a769_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587bb6b491d1b134e00e5f53720234783
SHA1b04102334069df04f99711ab6996d1338818d104
SHA256e86a612f5ad1744d07653eb40deb6f251c56f0f81999f40eadb9fe4bc779dfaa
SHA512e4ac0562094236e31a49e6a590ad4de7455db40a947a1614d332deb5f205ba62903359dbe76255dbec808675a1bfd2674f3a04c4543ec2dba75ae6d9e25fdc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1452a9135bfe0f948a3e2d4339374d
SHA1d2084579573048e7200e9b80526e421b09e43424
SHA2567e16cb6a30928244634e21b9b6fbaee4ed5f885d4830072ed12ca497e04b2eb1
SHA512960ef63a5b09fd29f404de1f1aa6f09a1184bfe2d40862d08127e12296a6bb5ae928cdd310c7c243eaf80b4f52e1a1cac725f42ddc5e4816a2c026da4622b307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121af269938e822599436f5831400d07
SHA12d492860474cd913e2f94f1181c6894d7c2f61d3
SHA256d1193583b13221cbc4e045287e44fe15d75aab3e882c12245678c9c7ade46874
SHA512d26670a4d32a60dd97d4d992f61724ad769443e51b8e0cf7d6a5bb06d6f61b159ac312cf1101025ef9ce285f2e59197bc006a69c0a3e505822cf2422797606a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d513c27c46d10f2422d2df16a6e807ac
SHA17ab517f681d043e0bf56d72a87844682275e17ba
SHA256891f048aa48bfeefe1e1f0de090dc74d36791c624522562e4f56119fa608d6fd
SHA51240f86f9c520e1fb54ae55e3c7e0da1ebb3b0fd66036590c2367f380bc71774a24a836c5154134fb20212d3a2cd777519d6012114a781f6255a6b28923b9ab62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53719d44484c5ac4178fbed78d8464db5
SHA1fc4b895e39d85d7a2196fe29bd78ccb96d4adb39
SHA256355fbfb461ce8036d5ea91b94f51a7b106c496b7dd782d8455293b4a746b856c
SHA512962445bd915712283b7d6566c9f865a9be42224aa4443a3b58e11b2fe0d9a1a1ad90dbafe590c351141ab9582efadcf5ae0e7f2cdc4d2eda22e7d41f109085cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401d9380b8138675c70ed0e885ec0ceb
SHA140fe76aef85e79d049aea7d40b8cc5a796eae679
SHA256c691d7ccf1f2c570559223af183c7449b7cb3e52775a6a4849f5499bb52653a9
SHA5121fd12469669800828264cb1630bf409749d46d37924dfbb064ba91e013dddd67bb00e6a1941b87f2e459093504b044ace9993bf6f9a72ac612d5a01e19573dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e56a25ce47d489c2a7f4dfcfb2db14c
SHA105cc5d91b3925327f69fa911047189181bd45d9e
SHA256d4e02f0daf68de4a09f2dbee3a844e1c13546f8ceccf8b0525e80ed4b5e13d57
SHA5125b40f601f355e0cd8110060ee43485142bb661ced20d385a026af8c6e5d208de50314ed3578e0497bd8d99cf0af3087fb536891a776a27f33653600a72677187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc79a024231398b175fc8a5111e70a66
SHA114252b741bf2679de778ca5c36199fe42451f82b
SHA2565c5568228a43a279dfcebe6637aaa6ef3f1f3fe903e6da516b2fcaeb111f4d94
SHA51209513c7e28191360b3e5696a1170d5eccda46b71e248ddcad247481821178c6b63ae5641c71485e3eba4615a44d5bf84104c9b511c543ad64a75979d149980e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b2b6c60754e9436ad571c1c47cf5e5
SHA18e4347cf90547509d93cca1c7386f6dd95b1f3f4
SHA2560a5be7c791bf6363016c407577d2c7e3e521f79f64b397ae28a29301caf5cb96
SHA512686c2a39dd43c6d01f37c795fc5188a6169575fada7527a5f43185673376f396fe5a3bc2dc76f75c0d4f732fcf2c467d81ab7e2d7a045dd15b21af4628be713b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651720723f97809f683885061cbd1a84
SHA1094a2ffb2cdf7aaf8b6561469a9f5cd729d61cbe
SHA25651590d6f73a999fc5e070cbcfd1de8a3cd99b30c4111bc7a2e664e98f2529b8b
SHA5122972ad8b30bf1e759d93ba019c1186b6a54b77361fa111e0a67b1f748947fe3218bd262723c6d0d96ce4da2ea432949542c236714b1dadb1a7cd6bf2d387a8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938850c0463d4c0c8cb5e02be2eab9d8
SHA17d6829b18a9c9b0a5db5c97b114778cf5de5a5de
SHA25641c1f9613c35b23f860b8f15c2cf5228541e9f95dc6e1882a96e2159b49461fc
SHA512042decb62fba55f3c1f8308a74f5318c1080249ea4b0ce328a789715e00cddece368d11a1c88912dc51dbac624fc13d8d3bfd2b674f00f4182d66e4790d3fd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833ac66f5669f845761bbeca8589d37b
SHA15c0663bc2a315fcc39d7e2bf55f4f6be5d4d4d02
SHA2566bbbe709ac02dccaab252574c3a16b161e953fd7ccc139686ef8502ceec260d9
SHA5122b39b51a5b1ae211221a90d47b1c97a821feb696171c24f59f12ecdafa0190ec9e3bf29cdf6ebefcec65ad886058751e454d0a7b9f97c07b6a308df77d19c3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c8867087416017b0470f1a493c1c9a
SHA1861a9910aeb301caf1f95b956d08c44e9d51f90f
SHA25675e8a520d5acb1be4fe497f03fc0f3e3ad71b322ce9ef2185a2ab2ae4d0f7c08
SHA512806aefad27d75b3f8ca9d38366e4c25ffeeb69d43013530f4d910e73bd25914de9f2b245029e1b29b06e8a8954a51d184786cdebb65a189660b487b9f3497a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040c075380d865dd2ca76f1bec69ca78
SHA15712a7016809c1ebd84b571a338ec4af99e73d2f
SHA2562dbaa29462263fedc8791f42a190ed362599e2ebc2724988e9247e56e8b0f2a8
SHA5126b4687a9903d5b21074b049d2c0bf8e8513435efb30c3114bde5009c9fa5e7c290f9e7d0db723ecda9fa8927e34a41d8f10d7395a5e9a88ba50dd9ff2c3828d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577840e0d3b66253cd063be02c32d8db0
SHA1ea26a56ced82373723c08d0663a487d3be970be1
SHA256b6f678d4c32a97e1753f15e4275e10c350bdf986cbc74931d9626c01f94420ce
SHA51223871ce829877bb6d63de9707c4dcccb9f3da1d042d6de1e45e59c2513bb038a4c24ffc58a00ac9058db8498c7b5819ea83416bd73c880f35bbe8a540c4437af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a14af348fdde5d532e8f2c5c15e52f3
SHA183fd22540bb818e403416f6c515a3820ebf72e0a
SHA2566a8b0953b1d42493668a20e481195376d9f4bfa6210f541ec4682c5dff912600
SHA512106dcdcf630142e87508a3e6ba532b6230ca8130f2f89308faec6d934c0417f650f78213d6d629343da2cdcb861a8682d9503b7ddc01a1e3e50053e1eacf2110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa52cbffa3aba1d08cd92bb22aaa716
SHA1befeeede858bb280c0d476b68639f3cb4f2cfaac
SHA2567fe7fb7137b0843293f4a76c08d94bedb15e8c4898f0557382ca3596fa18a259
SHA51288f7677368c4d9233b249ca8b645b84d3b98fe1aa28d8db9d089192832381963e3a3ef48a59ead520d01a91b58a50d6d46d739c34dc652edc0034d5a43fcbfc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce86db3ddafdc7125d47cc9988b4ddb3
SHA18f8e9230cf4b76297a4035a6c370be4caf062c3f
SHA256bb8606bf74cf2df62408614a1df8d60e01085e1238d1466be8caba70acdf0eec
SHA5122142ccd71e1025f3f3b5a74464bfc10d2602578076cf3d8149b373f09b9176e23bd5c34c2bb80adb4d7c0706d1a9814a1a031bf1951a84975279f0d8360cab93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b5b6cf32628016b11b261921286da
SHA1d00f662349fbb06d595d4864f43eac99bf12900a
SHA256eb3f77533fd728c25150adc202ce29b4afe80f372cfba05607d0cfeb8e588886
SHA5124f0b5df88928246db0549e2efe399a67a778aeb9d6bbddf88ee6c3329ff5bd323e043d241c81a4b590fc920b1001f561000416f51c5d40288458288b2f96147d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b