Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
01516f4e3aaf7d73c5b9d2f5ac4f2ebe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01516f4e3aaf7d73c5b9d2f5ac4f2ebe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
01516f4e3aaf7d73c5b9d2f5ac4f2ebe_JaffaCakes118.html
-
Size
461KB
-
MD5
01516f4e3aaf7d73c5b9d2f5ac4f2ebe
-
SHA1
efb8615808d5499bab937b5d300c8b517e404fd2
-
SHA256
628c41acd8906dd45ced087e019381604333ea3898ab34229fdf1cdec3b11124
-
SHA512
fe762658f3c530b2b0bd4cca5318e7a0808103d8e725bdb4956906e8cd9104c5ee536353f72faf90572cc9a3ccfb18ef57ada3e1692afa2bb30d501be4745c96
-
SSDEEP
6144:SUsMYod+X3oI+YmsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X325d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7463D41-03F4-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000436634b046d569a807609bd4f7f58178eadf6f5bd21f073275c454cf364c551e000000000e800000000200002000000086531afe9b65dcae2a94f1956969150ed0f28d7265d7b3c8849b92f629708e052000000050469da8fdd13b18731dbf0515adc45a35ec01a85a7a00eefa79ea28de8117384000000003d5de20e465def78d30143d27116c06357acc8b01ac30b954f4b725dc83bf42bba0b02becfbf4d65785539f81cb6207431a8c4866563678d2d97b5463c7ab8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420315373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cfcd8f0198da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2544 2584 iexplore.exe 28 PID 2584 wrote to memory of 2544 2584 iexplore.exe 28 PID 2584 wrote to memory of 2544 2584 iexplore.exe 28 PID 2584 wrote to memory of 2544 2584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01516f4e3aaf7d73c5b9d2f5ac4f2ebe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d27f89ac847ede0e8a9e472101ce5f
SHA1b3bb280f0e9f45cdb0a233869c0f91392d5beca7
SHA256347db157b34d6678e0658f84fac3612215bad3742ca3b72091185226de05ed2b
SHA5129b152a773c53909d4a8c985d88c326e70b57f864b4f57c5265420daa6b7c2a9253da169d252b6478c1d2d9d473339d5e2a30d009ef0f5dc323cb7b1624252330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59596c2cc7194327717efed36449562f1
SHA14ca65222fb1a6b37ed15c9fa3d5a333c15fedd6a
SHA256fb7a66e901df46064db4dcc4651bbe16842a6b58968ed17a858d171301d16d87
SHA51233f760ec26429a0e0357edeb2707f1f5f509ddf41d23a471c21c67c2eb4bf31dfa9342b042b35de27ef29f1aa1262ad927c20acdae1ffa3c94b9eff017101283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562e3c1d42f5c076d73bc335128b3d13e
SHA11a692b7986889621c2544a22d7cb7dfabf1504f1
SHA256bff54a1d23923acb50a292830960bd0efd9953eea381a1a214cbbcad52d627f5
SHA512bcb39dc03d360741922e2eb8d7f10e85f73c40ddb65a78d5028affc5d291c81b40e651a19da6d8dbfdd416b9d181bb046f1cebdd9dddc3c4cfda372a65c659c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6dbdf0b9a26aa9d20c0fff5fb1301b
SHA166939a38d48ac52e972cf70b617aaf406859d0c6
SHA256640b9d32b26d5eaaf120378e0cd44991c23cc1261d31c7b938c2f90e7e7d5453
SHA512376af18db569fb6ca892b15182ce0ba8e970b0bc7b7b5eb344560282a2721344076dd5bf5a7800edd6e1fea2214c065964e4f8ff6bb411c3d08478a4d7d16de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bafab3411f4a1e3a4590aebfb62422ad
SHA14ea5d6f1783735c58c1e6fb1764dcdf07aa47f82
SHA2564750b0f40866d2eaf9a4aaf672e3fa454500c62b54aef3dfe439dd0ecdd0b3f7
SHA512f4b6a01c576c954b8c08855da6c69197eb32dbe7f17daf37fa9a6b21270d35c7d3de8cbbbd58427e5955284273288fa1890293f71a71a2b889f5f07e9489c6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d16759596ddbc0e7563fc27f9af2df
SHA111d0d9afe6d6d71954f72459d84f54d9e79cd27b
SHA2566720f88a11e2a01b9c13e1880982c082a74fa215b24ec34e835cef2a0166df6c
SHA512771696f4a9578a0f78d42ce42241bb9a3a1ca16416d2c2814a2454832f54e3492863f4de9839e3a84e9f10a6ef1ca8c72ac68fb8b9a4100737f3e88bca0a71bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8633a3c33aa9092cd70c9beeef6244d
SHA1b06be7e2bdb2ffbb58444ab9b546dd0dc3697710
SHA2569ff761d108df863fe1c0d42c278d65d080f8ef502804e17d3fe9418f6110b464
SHA512bf361840227f839846ab73534607b92d75899eb3b505f99bcb34650cb0c0cbb185e9090c4a1c0d5e2ec4d9bdc6a73517ba865d0771a6470b6979842e78bfecd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dfe9ae7020d4304f4eedfba07b00d49
SHA13be3eb5cb50664037207b75e0c94f15179af5ff1
SHA2567e63f0889a2fc50f94f74d6c4edf7427f635f306775a52dd3bc726160578c5fd
SHA512633d947f6f08299ff6c6306c39e1c58f969fe8f9723822f6c1fba32a2babec8d3679a8c1f6fb7fdcb91647ada032226789d39b4bc4f934450f3ae3c8e8a59223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e78f6346d2de98ba37f63f5a345b01
SHA1796086e2818401d46b76435483d5646b0b1fe470
SHA2564728829538dda4dcbd6952e65116cbbc44d94a7abf5bb37cd7f6d32dbc332ebd
SHA5122a7c2dcc43e40fd1d8df9ac3330a8e291216f3bb16eb203aeadd0b2541fd65fcc350ae14234b33ddc4c0aadbd285bead9889aebfcc4453ce4facfa38c21f3278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570912f927bc670772256fcb49b3c22d3
SHA1a471293e219679d4b98e8ff830fb91a0a2e8190e
SHA256b7557543685177ce9b20bfea2ddcba72429c8bd5461592272b45e723a3751d38
SHA5126efc33d042a4947c4ad968bec0edbc718ed066ef4d3fadb3d3593ff0ced7cc609853de5974a2cb63773de005ecf985321adc7caca2f19447d903e1f3dc5d4aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5867429ddaa914055efbb09a62b42b2f3
SHA1a49ac43032e8b4ebf245794f91d33449007b1982
SHA256f4c11fd59d5101304e7fb4f3e40698cedbfa559e0eee2bb326d8060f49a51841
SHA5129eda556f75f5d6bdf74be7561004658d384ad5654e6b37a165f10eba30e29bcabc90826fdbd7f519d76fa5d39d268d2f1e40b4cce4cfb1c9406043980b1bd477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3eab94da4c7b6e4ff8f93651a6042d7
SHA1d1ca0f01ab2afd84fe577e5a50cc6c0c63811c5f
SHA256a14134920292e5a8978b279b72fe9c906b9e25894e3e83bbcbec716e60782df0
SHA512131a4e9d532e6c770289c0ea4565fcae264325c3599766e3b477e8a7f2f90d328844ca49771a099e92651af88f8e8e3334f26920e111493849cda468f250960c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e37a97ef705da51be4e6aae0bf1ae5b
SHA11c80f95cd79937ba651c6c05d72eb77055a1a723
SHA256a85cbb241e9d3709f3c572968babe6e59fcf831d02787d04b7dff0a1d3d27432
SHA51208b008571f48529659129f11ae453a635511c470938310d714042cc20c457ed41119723281659c1067ee0d756dc7f185433d893fab5974dd2508473f3580f687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58671fd6ca780d3e881b2a31812b6adc8
SHA1b019f17d6866f73d5b45c37ec19d9b0105016837
SHA256851d25e65e56ad461e6c40115b2de0ee1d5147a47ad2f63f4c9c5beabb866da2
SHA5125d520a1cdbe514a730f4f3098b93893787707c05933a780cd14a183f531a60671ebaf0c87d838ac12128920e2c1ed3213abfb87012bff82fceb0dc48b5d16083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda1940e693cb51e0f48fbd84ea975c4
SHA1a12e5d5eee87c26e948327c8826d3353668e99a7
SHA256009988feb0703b4d6e9c2406a41d5e3c5effd1d33ad5868aecbf48ad429130bd
SHA51240b0d1a9e8b7beb4be929389ce608b843fa3942a2ea5715136149ba74dcba054806a4ccaa70f0e8d975c4bb28caf810049aa8177465f461a232061df3023f3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552df0a11e698ef0368ee507b1e4af69d
SHA149687c16871be9317e44648d15e81157138212e3
SHA256f055b4d2526ce41a4fadd1b50621c2553b381ee418c7a594aaba77d3eb986f8f
SHA512d8d8fe2f1f367219ff5cdacf8da9c7c8c5b9aa83ff4a0cb7f637e57cba42eb1c2ec9d667489ff0c1b05b3616741aeb2ce95b89ecad8c536d5eb5ad2d3edc803a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f673d87b4df995967b103e3a1cb3427d
SHA135ed3e7a67cc033858f2f72640c4559e0011567e
SHA256e9eed4b593991ccc646a91b90f441f15604496fffcc04a18e3770279e1f2f22c
SHA5123984985d944aaadbd14cbbad3d85522b386a74950845b30829688bba19fe1c6748f7558cbbdbaf901c2dfdafd5efbbf45c760e3101031279e45fcb3ceaea75ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9459a2557e3291171577618e7f9843
SHA11e9f962aebe656e31ccb82680be914f8a9274413
SHA25652ea51b78ca9e8985f44d8afa02295473930e39c074eb514a8d048f9dbf0d3de
SHA512682c78cbedc9a841c8522da320cb79f876c13786eb06b71a659c078ffac3d038f38cf8cf36f0f2e19a0a1df57800e4fa26a46eafd9abd4d8567df6cdc8cb07cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521832f9f2271ba2e4b5e5223d39fa61d
SHA155c2a1c9b719e38d1fe0e21731c5d289ed6b8c50
SHA256dacadce533c9239b64546916be411fa1ec135b8f2abfe6004417d3ab54c7297c
SHA512ce9947bf19dd898dbfb2221a91d254f25fb44e5bcbccaf0529b6527a8be512712ae771a13bed107c53a88de210115256f02a80eb19909da43388e12e2c2ce463
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a