Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
66beeaab5a13c020856b95edd6bc612f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66beeaab5a13c020856b95edd6bc612f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
66beeaab5a13c020856b95edd6bc612f_JaffaCakes118.html
-
Size
53KB
-
MD5
66beeaab5a13c020856b95edd6bc612f
-
SHA1
362d94f0c6010f77d7716e6e99698c5c32084b6c
-
SHA256
d4d33c42bc5a36074cb2b815c09f83a90dd2175cbea6da22635c2832d100376c
-
SHA512
b39494d064c279c09357a08572bfb5c348605301e5729ef611dc86c4d1d57ed94a465a20fcc12d7e4d8ac3eadae2bdaa3d92107d61db0372d1f99e23782c4748
-
SSDEEP
1536:CkgUiIakTqGivi+PyU1runlYV63Nj+q5VyvR0w2AzTICbbAeoi/t9M/dNwIUTDm0:CkgUiIakTqGivi+PyU1runlYV63Nj+q2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fd8338973083adcd7fac76f9e9615c9964d234f84c27dfc0a45e03d2885ae96f000000000e8000000002000020000000f52e43264561bdfaabd7bf34ed060b1b9ea8ba657d0d60334fde39adceb77af62000000046ae5ee6ae44a9a217cecb0903fffd9f171f224d08bc407a13af3f1166be8dfa40000000e783ebe17361002d08bf5e4e54c60c0ba8164899e354f408b308dd97016a2cd4a6e5ce0664768bcd27f5bd071de86d45828eae2418cc330948ee7367277e6e5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427885613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E90B5F1-48CE-11EF-B65B-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703fe963dbdcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66beeaab5a13c020856b95edd6bc612f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752e66fb32ac15eb4926dd235267afbd
SHA15cd1e23581797d72bb6a2792640cd14cc0731f67
SHA256868a45108fa0e1bc3de11448acd442df6a5c0c12d76e92dc0eb8587950ffa8d2
SHA5121991efe0625a070fbd99708bb17ec63440943619fa99824cfa5fce2e1873a54ac007d18260041aee171f06287df4f540dd1aaa57d420a7acf537964f95dbd598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515885bc02433d3a46944e473fcbab942
SHA1d13d04c2f32ff4f0df6a26d0f95b63088bcaa703
SHA256e846e27d77c7534286250eb9726e971fb548a1f8960f814431c70e668c34121f
SHA512a3d9c0ce6470457dcc8bd4cbcf331f81bbcd0c07f1883d5e2d2d6cd73898f5832a8c99c6f38d1597e183e1c5c64aca7d359158cfa9fe78086c57a7616b434ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6132f3287f35eaf0af86da3c346914
SHA115c71bb3dd1ae20fd9e05ccd781abaa3005b0634
SHA2560484615eef5b0a9ecb755130a7ee8d39dc74b9c030a1c475be66c2df7f3f3c6e
SHA512d8f27cfea106572122c3595b00c3f8ef897eadedad0ac7b2fa535789b9822b865cb51f644e19d756b946fa8258655a23935b403a0c355e07774b2fecfff67037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09f95d5399713dacab3d5bf70e4fed7
SHA18c3c0f585d9721452c81bf4f4cded317efce99f2
SHA256c28cf15822ec9853f7e7e392c48ff863d3b2ff0dfcb1c7b3f01ee79f9f8a0a2d
SHA5125e27ce0e1e958cc0b2088e266fbf92d275323840a46bbd436e7b57dcc907ff9ec04d0a4db32819b3034dc27fa3c09daf4bde2d40385f511673f8146fcd4f2d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ff3c9c61f401d548d39a180f18db09
SHA1856ed7a4b02d2446b84262e83ac0394bd904cab4
SHA25619f82ecff51138f78487c75bc1f0460b5744161289ef7a421ed3b3976dafdb2b
SHA512d65657361eaa0040ee6231588fdad87dce062f34af72061d87cbe5112fa7abd423deafc8bf349518f4b85d6b252da439ca714d237e5501f497f86cbe16ab3614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32224c30acf099dad0ac39fbf3f72d8
SHA161bd092f1cae4ce4b85c8d3fc51fc8f190288f7a
SHA256e1e46691de44cc9d9f9e181ac3e298e1c940da2f261e1ddcdbce80dbf3ee0125
SHA512bb4df6cbb80c2652bc8e32820c008eeed6568571189776950efbea7a2e84eae1a2ce1124886d8c7015c95281333d52a1a676ece8b2ec2fa4553bc506c3a62bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113448e7571b6ea2353599d8c3743bb9
SHA1f6db6ce28ee5f97e3d4494749b81076c0af4dbf4
SHA25637f01e97026f79fa6e2ff52188ce3de8a7b92303c029fbd24c171df1e313f33d
SHA5121b05846bf3266f35932fc50d78888e2721a32720b384158d0adddb64fd63be7003f4f5b660e6aa9ec0d9b5894ed99d9def7c955b244d81556fb617b527e3122b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592199cbc268ce2b25c80bf896d1ef59
SHA18e12a318ac098854377d28321386d7bf898fec11
SHA2567b2fc391373040bf30e790bb2ac4f9d0cef0079e599c1b45b7b9877b29016989
SHA51268549b4d29b709992962e7ca97924e0e8b91eb6ea3c2a9a5f9e849a3a4b9a3e86b9ff042f9a9854399d1f9107ee3e600169233b49ee970fe607da1dde7d0db83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070595d1cef7cc43281b52c94f1c8ccf
SHA1f36c9866ca02dfccadcfc7bf7f039df66223b8e0
SHA2563183ea6fe997accb98aeef697df229208ebad3c7fd3ff6db0dc1f005db8983fc
SHA5128a496e5dbee500027cdbe035017e5e28281ff12f39ab581ed131ac26661fb63228f6e9f0c82bd162cac8a8c720bcf71927d6fcbc39daf247bcb4845124f11cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564dd831ca5c5bcc031458c82aa19e425
SHA1f8a0872ce6300f916713a028a8165b167ec4b45c
SHA256093627a9701477436c6932dd4a2279c3050605e4d6a863b1082418fa1e9f8554
SHA512050b848efb58c8609976375e937c303f7293403e41d56c55e77627227312819c31b8f3278e98e8af4c43ddc82fca611d8dbae78faa0f8137d21a6323dfcd1d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac357587b3c8c969647702455f3a5dab
SHA14dcc076e2c7fbaf230307816adb93df37fc110fc
SHA25654271623dd5d156b84b13faf1150f477c682cd9f54f4fc522606eacf4035e48c
SHA512b8e96e9ded63bc927211e4529df8ca1170816662085485c25404b68d2f96e6025ac7955ead8971d41b177db72335cdbc1bff7cb2458bd5072db47c481f5611a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fd2bdf0070e63ebd304cb00c594482
SHA159b3159184d0feef9a0b5ba16c590b8fb8310782
SHA256347c482da4e2368cbe2450c865eebce0e7acd5b5860f323157ac0a2ed8ea01c1
SHA512360d48bd98a22ea2f46a27c1a4ef18de1e4699868301107e2388f252dff56c5fe2fb3942ab71d4f2e3d233927ed67ae5953f11cff47c64e7c06233aee3bac723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b72578ff942a3736e7d6852b7163c8
SHA106850249143336e62e8feea275818f75af6cb945
SHA256fe7e517c1c58a24fd084227406480070992661a8944325a0db43a362e71a0544
SHA512d74398dc7ce503c0099922eaf569bf6daab5154c33e9e2bf5e3f2f9bbd5bb3c46dc7aa5df732aeb2c0572f31d9cc7eb62937524f1265ce51a98e29e7d0b7c443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5411f777cb28c67170e83ddf8f0fa7d86
SHA1981e4322dc657d04c2a0c72e6933360fe426deea
SHA25619cea078444365260acb3ef8302e097a46bc123f270c7d33a18986e29f10413a
SHA512e9eddf221d2452153492e364fb1e89a33d5e6a5872ea61c9a07a6f9baf10c09f8f57596e3d760c2c8189c514fcb7a25745108a890f23309fb7beda3584eec174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ac2d86ced940ac2eff0ae2844f7eac
SHA1c28ae552dae6ea507844d7791b703ae58e4a7007
SHA256df0b4676d284656dcf90ed1bc631f4c8fc9b346d52af778a851c48a0c3e07d3a
SHA51249bdf28efc12b98c24539f17ecd1d7dbd4f003ef778dc46b37ae777807eb8d0ab5e62db172dca2d0d44475789d7f3b399c92c69b4f11d349d68cbc6df334b981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caff102bc45f54480149257ed3bc1fe5
SHA10caa077559dc74b8ac6f2b138f2ccc3249b67936
SHA2569f77dba07c93dcedae8ff96049253f192109c4b8ca7816dbabb66281a58f8ff0
SHA5126911f3045064ead9be56a298320c284520e0e54bf289f25d20b963027813eb2d2060da7699e90577b4c5fdf1a121fde5ceb632414a1e89acdf6e06f9a3aecbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad0132617b12126bf31e7e400deaffc
SHA1d439455310bac31046a5ed81428733d5515da45e
SHA256775219267fecde236b60882d10c0b48440285e64847878ffc7117dbe2ba87bf2
SHA512b9ef01bd98daa30bc1402f07488e7186a6d26daafd37c4a89529a288844d2ec6425161e2992cbbebb71123aa351459f7b12ccc34e644064ac8b3285f3a207bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d49d3427a769ceb0f0c443a4d74a6e4
SHA1dea0816f526e766ca3d100ae906568ca5f3de582
SHA2568e5f51fcb9a70ac53f180595e0a6040c44d2908bcceb872d7efb0c8108a7fa61
SHA512891bd2b8f21ca905e410396a60dbfe6ca48e1d809eebfeb931ac8805576c5e2c776a205d99618de70e04af7097e527be5ec490b7f9bf44f22412c89fbcd8cf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121f5af56599236221d31d1fcf8af5f2
SHA1b38e839491966da8599f14c26ac50e91b8060050
SHA256238f977635838153f5bd5764558938d5bb09539932ee9558a01d8f6d53e88292
SHA51250809b7f9113d4e623252c5323fe40c47b09b90cbe2129285ff8469ab9bed5de87e2a855ad8d7ac483aabaf124932d3e4b97d8baff9d2142786a0420d94fdd8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b