Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
09ccfcaaec7bdfeecad5764eac1c07f1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09ccfcaaec7bdfeecad5764eac1c07f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
09ccfcaaec7bdfeecad5764eac1c07f1_JaffaCakes118.html
-
Size
146KB
-
MD5
09ccfcaaec7bdfeecad5764eac1c07f1
-
SHA1
0638bf572704630a337baa2e93b4d8250f0fb388
-
SHA256
37615bbd3853be08d896ff43ffcf4706774926f8db86be0857a4d4bdaa120cd7
-
SHA512
c16bd6f155a82bdb591c0b8e35341479f45d23e3b90bb524acc08e2150377ac9c525211c895230c29534f465b6a850a268acf6c759260f31dd4456d53fe30dec
-
SSDEEP
3072:9uS9GrJ4A5yfkMY+BES09JXAnyrZalI+Ynkug9:97sMYod+X3oI+Ykb9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e63326fd9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3892DF91-06F0-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420643296" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c4ab17fd97b894ea9579530caab19f762bb22906e052e2556c6e766f5352949f000000000e800000000200002000000005664049e0a7b8653853cedb1c4cb18f64653553e2d1089bea6d14c6dff07c54200000006dd5cf602803586e8d85881434e44b0f31a20b1f83702dcfbc6fe2049b78ebab40000000e66fa59c0697b4897b4b9aaa9e61db299497eee0a036244800953dcc22ade5343143941ab70516fac61d009474ada90aa17ea66b3e949e0ff74734c0bb132293 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09ccfcaaec7bdfeecad5764eac1c07f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a460f53a2f4ed78e861a5cf1bcd8ed9
SHA1388d0dc6d468dae3edb95136d572c26131e3d12b
SHA256c328df8c46301e812b4a201f5736c1e4fb0c1bba57cf2d7a049762ada4dc04bb
SHA5128d9d73a2847f7e84c0777866a942e3ad3487f43982cf8efe2d2c833eb11e49b2c1357e006f0021003f60a4f08cb19187ad68e637457459f9dcc3b0cdc1aa86ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d0ee052341834aa1e6e2403621b8ca
SHA16efdb7093ead79b4535091798e2684575d715378
SHA256b8b9743e20edb31bd4b28139800466605362bd07a03f6f554a02c6c8ad31c4bd
SHA512b7773474def603439e0aa5d6f0924646d223cc29f9b94f898dc3e4fb5ee7047aded784ea287fb3c1d8f672579958c49ef7a62633c6a67edc0909144c5418f04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf0abe7f5ace62e32972b40cd6d08a0
SHA1cdc85f0f953a692ed837430bc5677866cacc63b4
SHA2564f0a976f3b9da6c23b9a181b1c1d01927970db88d7beae94349f13b05443a86f
SHA51283ad87d0a2b6e8854e71c059fd203b0fa33783d16d359b87da858623dd9904faa33bba254ac883ca3266b82a82a139da6648110c5a20c1bbbbb814c9461d9f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59015c77796ed17e6971445f515657771
SHA11696ae83865a440508b776afe00d5457cfbc08fe
SHA256ab122f0eb397e456e20a7e3f9fdb4c7222bd472de87ab6fe6231f45d9197b9dd
SHA512cb2f62a0f80ebddc862c18405801db89a7d970490ac8e7f6ca89a1c8fd8c9917bbf4c4ee994c3f1f75cdc11d10358068a2b593e68ff007653c167f481ab1efc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f176fb104fe3704e531ab0ae296b3a0c
SHA13cf5618d145fa6e414dd371540f8067db0212dc2
SHA256c27ae0daa46ef0c3d920f3bbba5b445d8521efb3672ef687e268bed48fa74ab2
SHA5123744bb75f33f7de799b835057ee39e6882560a09ab5297cb19acbfb466699565b76012c31943b808483550391e4ebb62b6f475b73de53f7edb556c5b57038532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54335259e7ef79856fe7a3248ec593409
SHA1fef1b80add0545194db87bfe77480e2629a0d87f
SHA256ae18c2dbcfc70cb676ac5343685a90ab10dcc262bf90229f5db5a907a77b9cb5
SHA512d9dd5f09da45a4b9d49e88c7a606105ee0c418b33224561710bf2e399365fd2f901c02935cde4eb8fc7915fb5c28ece1e208530204dc2eed14766d93caf82c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6f6dc770d0023c8f0a335e8d0f80b4
SHA1cdb9f20ac41d4c989220c63089e1b675e510b58b
SHA25698fde74bb6ad9db1e22635f54366e943fd5c4f3a4da7b1e39b2ed4ed9bbfceea
SHA5120e29b562b99178d6e9580f3f585c2c6cd7de7baac1eee128819fa836d0158fdc82d34adb76b535125757f04801dcd320036ed541160602a412967da3c553da0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a827194974214f618f1ed588ff1e30c1
SHA13fe282387b6a26bc1c3547cf0e92625f14c14cc4
SHA2568b6dda25bde7809c39ca4181205de318a45312dba83039c41ea95628c59e6571
SHA512ff21c89f705e6107a5e1a6c6715d5046d74ddecd842b761b1d404150cb3fa3139aef6ee94494dbc6035f64f3ca5756abc49a59e359b4214dac8f7611900d8a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d8b8c3658061c2bd1eb467b4377d8f
SHA153fd09099eb2c0fc84f169ceb73e9897e7f84a05
SHA25627dff1f6e9efd8518caccf3adab1d9ac0e98078a252968bd09a872abd755649b
SHA512a5e43bc76dc1aa6a5ef45db0fa596abcc1eb0960d4ca80d459eca69f6301d0d31d2115bc28302110fbb9e0c8106569dfd53b4a1ed072df594d341e22ee641660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc0497b7cc2c13f3d444381e26176cc7
SHA1f7c196af06fbb49eae902b0615082f1e1f76ed17
SHA256e1bb0f6f7b978685b78bafcda07cd2c9dfd649521ddc8c8250b32abd00b5a1a0
SHA512af2d06f737647142ffa2faa8f74f5b02981fe8572635a536455dd55fa62115f8090a891f66f25198b94a6353a41f88cdc73db5373238205e30de3c43960f3b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584251235d75ebedda59f175cddabe3ed
SHA139794d28e35e952bfc068c19f4d7d7b366f39415
SHA256d2f2ef6ce4af544541cd7750eba842317cec3cd2d0788b0d22bc35aa5e155d78
SHA5123bf969ad988781c187c95141d1c7ffab6aadcd0e824573c47cf50b12831938faa42c922a9f0d44245ee2928f94593a12e756118bfb35ffdd486481ba08685e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8584547dc811d1364984500aac8bada
SHA1ad294ca73dd7e8e0eaa70998982a347a377643ba
SHA256fea1a23ba6650fe23155b2cda145d86d6b14db50b86aa6a37e2479959bcf4ad5
SHA5123ad2fc1b54bb9bf903c179dda9d6285cbb0b973bca8b3f525af953173cc3c1cd0ac9ec25ced99fe8db98f3b01ba20acfddb22a2814dc3cb99036e7a481ba22e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffa892cdbd55ea1bafb1117e3f00050
SHA13477ee17774ef3168a30490f1e8f68865930f4cd
SHA256b89ef4742463c84d5958c2b44c3cfa8743abe075fa380d29d045a7b00089a803
SHA5121b233874d9d85033aca92a7e4a5ed32a247d3df5d3dcb4af7cae6041681b6708d5b8d6c99b39c006cb2b5c632d1c4b1de43299c7f54d6c97df093100c5b8a7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bac523da4dca6649f81fc6762a51f5b
SHA1adfb30681900b53a42d5812af3e9e196cea78c3d
SHA25608d1165197608b18166c5857f52c40988af8f6ff03a7f65d573ffb8387a35fa1
SHA512bae63ac7db74ab91fee4d05156f3c6820de8e870beb37c00965176768b660389fdd018e8f6cbcc185dfb9d5976939839e5fd4a9f1a6ba23b048c875ead1d2888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8b2fe1f4cc0935b957662c7f88ff6eb
SHA190543b2f72be936fcebfe4a04f05def979567761
SHA256874779a218929b1300dcf40fda2cb54012124d83d0a8ee8e54f4394885833900
SHA512e488e7c064bb7b8e36aae5b7b733ed84f8e5cb11804db46cd0283443cb95a048906542548f4b14cb8d0fb6a03c5b8335081caef36ffe54ee54797fec347ab2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aec3d32e43fc4acccb43f9201c8a70c
SHA1c6adbc343575f1797ae96dc2424f8afca29a7c7d
SHA2566f0243254743dbc1869d66eba2576514747e31e1cc5089ecae37bb17d5c1afb4
SHA5124333541a6eeedced89b72c55181a4e47ed925ea8c90455dd9e5433245a5ae81e5453618a675b0cf8f674052e2f220f3cebdb966691a421de3c861bd2c7a72d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58821657c286031a98b800cc5087bd4d1
SHA13108d2e4fdae02aaed215ba4bd00f4381646ee7e
SHA256d8c45544680ceead12d2f875310de508c10fbeb39926f52daa2798528b53d169
SHA51204e43682af4cb44bf29a821a0bfc7508d97877da376056e3a725379f269a0bebfae864994bc4772b01702ed9712f73f460e62a6f6851fb219fe00c7725f48ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545badf027d6389df378378b8c8a4fd5a
SHA13a084b71e1808075bd8e10a7cc47d069ad1a18ef
SHA256ee434afe65d43a6865ca4f98e952b8730a86515e2d89b15f7e47d52064a4a1dd
SHA5125b6410cd8bf252c6b5a0f68d9792256d3048c62b80a252d1d8e2cc815d522068804bb412093d1fe74ee4c5f887f6558e5a0fa9a492f940efb677c26f5dd2ec15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ec7acc43de194b96fea06280c0c8ec
SHA1722ba46a768e17b1c126173a232d551130db799f
SHA256140e7a43fd455b0377b7e9c2fe8e0bda490b739565c84cc71dd1c7ead7618786
SHA512ae25e80be64e01caa7320a668780bef28a7df7099de04c59eed1003438e696634c7f83ed614015f9de31fd0ddbfab693781df6092e36bf7c0c98c552b33dfc63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a