Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
faa4a53fc3b7390b41f1c9ea8a35d3e8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
faa4a53fc3b7390b41f1c9ea8a35d3e8_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
faa4a53fc3b7390b41f1c9ea8a35d3e8_JaffaCakes118.html
-
Size
11KB
-
MD5
faa4a53fc3b7390b41f1c9ea8a35d3e8
-
SHA1
56617ef22d717224abcbccd969d51804c44ecf3e
-
SHA256
dc86578abb8c6a84f78743e2177cda285b6e388afecd1867cab1d9867af0d56f
-
SHA512
8354fb6fe6dda9b755d5b4dd65c5acd59537daadf6c46906de07a69487fa1fe8011d78f1e0e67a7cb95cca4fd208c944f0af723eb4d8cbfe7fd64499a227395c
-
SSDEEP
192:iXzUuKFl3w50KcwJRqgB1tgMI/U52bQpktwM00dSWekCrgPKaAe7+mmT8:iXzUFl3waCnRdM0sakCSDd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E9E0241-FE65-11EE-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06018637292da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419704131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003fb506ea80ca4bff22d69551bd7b393aaaafd1b6537c8da8b214b16ad77dd986000000000e8000000002000020000000fbf782a743156959384bbdf7043ae8fcab4329ac85662068b40bb058f0cbaf65200000004a17b0c763b6554115412d81cd0573ff0c717bbfb72336a2f1b4822400be542b40000000c6417a1489bd2b2d5ca607c6f3cd0164f9263974a8d3bff1944f6ccb80a3a0f750f0b35e07e8e685ebe8007776156c059f933056f669a9ecc5eefa51d7ad546a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faa4a53fc3b7390b41f1c9ea8a35d3e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f977f9b8bba0da65d3097c79ea3f330
SHA16e5d66333422ed78e781d0db91d6e9a531ce8156
SHA2564dbc00fba2d482ea2c58e3eea41eb3935416a16d5436c37564e14dff97457318
SHA5122e1eaae5a5386a14317931d3b038e1420b3e041cb57a4d9d5850e8c917bc7bc8b03ecd9aebe96ff62a81efed0d4b3259edaf0df24ab10eb970f999ee8804a299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eadd5a7a4a8342126d60991552b57048
SHA138f872bd3bb59318d49bd2a0ba9c4b752b704b1a
SHA256ae7530ea084117cbdf74eef625cfe2a41716647c066f9d84a56cc2f6ffa63210
SHA5120fe127a7ab4cb84467d08315a1bb6a5bd792cc775658045b7dc60dc2a0b2debf752f00e726d928c215448f17b0852218c9918c11e1dbe9f795506317eec4181d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f318cc2913949e27ac60d006219804
SHA136be9b7e65fb49c7e3059e8a02e635463503b225
SHA2560231e3887837bc66379cb71e184027000abc52209272f46fe1ddbc398a9520e5
SHA512e7c6c5d62838c13a4b214b778fb0a7806960f60e2a0808cc7b4953c5b59ed02d5001b578c644a3aa6db8883b6f491a162f7032038d5e2ebc03bf3442426fc8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffeede0bade7b0ecd734706db34979e
SHA1b54e3e6abc7a4e46d0954d8833cd03a830d3564c
SHA25695f6d64b67a6508788b98fbe2767ee8f052d6e120f4e36e6f957cac0a86556af
SHA5121cef8ccf2fbc056d25fbf1efd4a14a1e7edaa2d6df1ebf21d66ae78c64a517c2b2dd1839ad191b6a0d8f1afe35b5533afc6996562c66d5fefb47ee3b28ec5a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5076d408aaea63b58c875e857072e5173
SHA11dd986efa9218e2a096d09af033116408aeedd4c
SHA256bdf46e0e4102215aa0e35b0a6b60be2f06e3ade0162bd364d45a5a200129f50d
SHA512793543cbb82aa15fdb101a3e85b7c1c6286a6423fce75bb6bccf4c5977f8783003d8bf9383b1578a2895e3e3ba5a0a911df2a537621997aaa3a4ad44eb944f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e35a2e25ab0fd44ba7f4f5fc26c9ec
SHA1bba1f931fb0a1654c646a9c5c6f971c7741aeff3
SHA2563b0aa667fa4fd65e7052babd958e45d5944fcbe562133a23ecbf6d5036f70d0c
SHA51201157462642448212d281cb4c149060be72ffca325a7162dd12cf004586b116dbb9b99d948d51efd0908024b6519b1770ee9fee50730de50a9772a463816d5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e8de2a4951ae868460103b953116c6
SHA1a9db71c3ab5e11f49c8cc7a29dddd8268cc6f265
SHA2567817ac66087ac5a0c8eebd674ec4e67e90eadf837ce8683c9db4317eefb4f02f
SHA512a948ea2e20eff4ac79571d1f4df70b511869b27307c01d8b6a1b7eab1afc122b75b83e4e62bbe3c87406c0145a1aac111e6562f8a322b62dd007adb5a29cb586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad60d7ab7786f2eefd880e5eddb0fafa
SHA1fa11532418cc421ce2b85d47d2ac8993a02798e5
SHA256f6aa215ab2d4b015fffc33d738d78186cab97718c00e295486227e9ce01868c7
SHA51290fcbb348418b2285994082f4444d3243850daeb59033a159225442ac19c9c6deb602968dece10cb1b30b2974d06e334746a86e5b4393e4baeed76b27a9c4175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e476837f09ef72d1539adf1f7bf4703
SHA16f62034ea20a230281c1ac6ba5438c6d744e11ba
SHA2560314dc7199760be88c94a0640cf1772e14955b0c733addd4764bd9aac3746dd1
SHA5128f368c0d48e96e963e9a1aff81dd18b3a32061299c37835fc2d131347ac4abbe23decb592b7ba1905ce73c065b452c810431beb71d42dc37779e933bf4b32238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595eb4688208ced84aa5b406d012cb21b
SHA189c850f85b0bf8c3af919430738ff4ea15c4617f
SHA25642037c0981c3491a9fdb674c3b1e3c5e0981c285955e6ea3ff70fd42e9e4d53f
SHA51263ae1ece028ba5368845c7f532d6ce887a0cb496623c8e9ecbf86ae0fb81afd1c0122d783d37fad866255787b10139e40401b69bfcc936b1d5c44f42d94fd895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e07e84ea8852da2fbecb172bca44e6b
SHA1481d914d2b6717be004f18d28bebbc3cf02c8261
SHA2565f7bae8524a05fdf03dce78b40230898f051fd01db4d1670126a8ae0d2b08747
SHA5120ef2aed7ca987420e711e456f0c14abcde3757e97c1911a22676acabd037e7f7545394f8165f6dd8163b3f0e97d741287d5a85f17156824d60cad470e4a37a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816d16cf605b4ff649f72f74ab7a4224
SHA13fafe4220cc03805d8c9f662a29dd50be811f37d
SHA256b023289b1164c41a996f88676b78d30b50e9b9a9fe89aea2df20c60e9c3a1017
SHA51230b1b3cdda5e1eeb0b0edbf21769ee8296d5d8daae3c5392e11ffdb0ad00a683246ba8dda611607488102b8ceb027ad43049a3104ad122542a285a51dcee5254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368009f7f5358dca9a95a09096f7437a
SHA1519bb20f10afe0e241b88dbcf54b4d8b1315e3f7
SHA2561bf48e0b4626b7f644396def15b2fe0ad29db5ab2f4e075276e84d2a4792e444
SHA512f7e9ad09e3e5e25b05c2967b3cef364dac4cf15a8c32ddfa886fb7a82377cc21c0d871d3e5505f730f4d751440028144903f3c33873b9d23af4d437814399ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5191d6a83b85fe559a12229c837b1d056
SHA10cb0c88643890a93af39a6e135dca0926526bc61
SHA2565946825b4cfd845dbe316eebb8d2795a992b502f7217f7d20eaef72f039cfa5c
SHA512a5490c36c6632e8df3458c6e75faaee847374e2a263f4a1f86a9a1960dc389b9c0f21d743e10aaf732d3d66fb3c7e83c07be428c2ec61c54a2959355d3d4be51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8eb472d2ef12e26d309bef5315d76c
SHA12200f502e673a7ab04433c4682666f6c79911fe5
SHA25671c3da38ebecb35e676947c10be878a1147e99698f836b5e9fad7296bac5e3bc
SHA512b34f80a46da4cc4a1afa1a27848bc0100d03534a4cffde88cfeb2fbf645391405b8b9df4f123fc8b962bcd19f571f49e948ecd14ed7a188bba41e5b9d2494a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a4d0eb56f94b6dfed89beea121d94d
SHA1cd2a2b1cbe644001eecc8b96d3faaf2f33610ce0
SHA256b0bca0eed6245750adb385ac2aee5594f5b8db72f5270ef3b6eae88bf75a518c
SHA512124b8a9f4614469eae5f5d74cfaf08c5764ebaee274d7e2d3ebe857a8b8466ec6b329e9814a1c2db0dc32f574e5377f18b94091cae3190c64069cdfc1348319a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547906c7a97d816d214b77c4d5caad056
SHA1f5954ad695e359e3860f32089a79c026148ea791
SHA256f03e1dedf383a78434ba01577d9dfc9e2fe891c775c95cb4bd12e00f761b60e0
SHA512187a52d7924012d8cf7927f53d6285a3aaa923cdd43b616327be183fd13fef8a3ae54b3d2d73e88a430c6525261e44c729c61497b18152de6c3f7fee44e28c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667ba28080746e88705e2df6a57e82b7
SHA171d7a9f4bbf2e8a0d68f0af7f717091c8b45e012
SHA256f6cd793cac054472e65cf0b54ab6421d6241d12f701ba24b2d0863676eb5e1a8
SHA512ad3f5de3ea30a275a64b53a74bd39efd5c1fd7c282052961d579eacdedf2390fcca22be85937e9e82c5e5daaa30ef3bacfbbb5fa90cfc4379741f641552806a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec7907f3c3816e6583712409fc9a6cbe
SHA13996f253cdfe5bb9ef78306a5307df3ea6c2230d
SHA256171567715e3e6fad7a7a77536120f49833ff4fb637b8121330a84e9d5ba84c21
SHA512d60472b3fac8cc0ca900ad12d3f0aea95869b2b06fb668b9e809518624e68cecc9d99ee9e49a05748e99e72c3dd4744de64fad1cbe2400caa95ff855507d7660
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a