Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
0a2bcbeaf4ee5fde5887866dfd5202c7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a2bcbeaf4ee5fde5887866dfd5202c7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a2bcbeaf4ee5fde5887866dfd5202c7_JaffaCakes118.html
-
Size
67KB
-
MD5
0a2bcbeaf4ee5fde5887866dfd5202c7
-
SHA1
fd899829c640115ed5931c07bb159cb7eb57b05d
-
SHA256
fd0efe70f618396b8d541c6265f7abe3b17c1e8321fe477c3a74e5fd99b22e95
-
SHA512
8719b7b44384705f29a8869ab333f2f5af3273a9d37e006979f7bd679e3eb900fd82f702741407a5c66585963d4eb9d7063979b76249ee81ecb93667699fd021
-
SSDEEP
768:Ji0gcMiR3sI2PDDnX0g6sEzPsWoTyS1wCZkofyMdtbBnfBgN8/lboi2hcpQFVG8X:JgPTzNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f89502219bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DEA1A81-0714-11EF-9340-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000dd3343b060abda0ef41c05e2eb779df12175240f3e9197d55a244410c24f3105000000000e80000000020000200000004ff5eb5cc304f40f9bd9cb649b903c06a536fe46b303ce344c1e4db02424bf6a20000000cb272344345a8392d384a8b1ae12aae6eba4ebb15f80996456b6da1fae30478840000000efbcfebf11d797f0983d40867c7e16c6b18e22ab1492e39b5ad0a8aaabcd36800c3cc8bd113414c4d0128fb4b2c7fbf87ed315d7e00d76ac665cb9cbbf44c0f8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420658740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3056 2880 iexplore.exe 28 PID 2880 wrote to memory of 3056 2880 iexplore.exe 28 PID 2880 wrote to memory of 3056 2880 iexplore.exe 28 PID 2880 wrote to memory of 3056 2880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a2bcbeaf4ee5fde5887866dfd5202c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df13916082803555c26d84fc7279014
SHA1657b068c95567132a75425e1a7e92e2fe2786c68
SHA256746d5bc2ada492aad9bc3a8987f1b40452d2afed0d005bda6b25b223ba1ae748
SHA5122b589d9cd7e895f9579249573ec951f512891da5f07dbcf1b586d76e5990fc4c8433d3ceff6a28681d588392a5b044346d0eff2fddfbbd63d6dffd5b7059c880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572283ef931042fdfdf39389abc79402e
SHA1c89b1a8a2f8d2e35d34e3ab992fc1c970866642d
SHA25659d08f74196d60957b6179314c617c9b78eff96f61462c42942753cf0799f644
SHA512d36d2bd9937e21391c301964accc3c4b959a9f4315192c124988ee542915f054e7d4ed61f0ca5e9c42dccb2a91049e4a7713089ac7ce6d24d0839e03e5f4e1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57947d26936613a979c0ede48948359dc
SHA153ac9d560a09898da10bcc8808b7bae0dcbb61f8
SHA25641c0c0cde1ceca7207500903c803cc2c9687770d39bbc12eb1818d67502158ef
SHA512a8a87d72f0589f9b645cbe3f15d4d6bff8275f2b0fc74b6eae3538061fb4d740bfec89d0059124012f5c012f101d05bdc6920b7122a1ec63943b2cbb4c2d9564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504875a0c36584b9f36597ff21c7d00a1
SHA13d3b3ea3e488aba659a397d6d65fc6e00417e3b5
SHA256941ee4458981d39ca9bdc2983ee41658e14541629565c0ce831abd1222d5524d
SHA51237072cae80f7372ebf7e41cd7a81f17675bb84b2b7869b38fbafab09c298aa2f7ce6768c01755a2f3e7f5bc4cb0e06ca1636681ebb3160b7479af9e2f7f55ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c626ca8bd87ae6e21f26598200e4170
SHA110677505871cd69b4067f939a1cd0ef25759aa95
SHA256f85d7016c395234fe8c3a51bba71f5d207cb62bd2ff6bbdf93c0186b0f12543f
SHA512030e4d6a9098bc5c95fc62255adc4f28b46f5838fc2a97c46f1e45041b890466236e3718533906cf53ee88eed5ea1280c5fcaa76e0520845fd85c7ddf6606629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d0be005e1687ca7302011ad5fd833b
SHA150eed4aad63e132708a921812de4dcad19970f34
SHA256ab06fb34664bc8aa76cbd88ea0a8ae61e5f5f9243806dce643e1e31da2e5ba23
SHA512fed37997f62a12fa03e95a104ad789cc46d77c48b31e2e86355709044ef2c808c900c0fbe44584682648a3f3af469c257c43d85f5e353a15d946ef2799e0dd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed0e9fae1acc83680c7e4cee3dc678c0
SHA17d71cb3517b057f2a0d0fc74e38497bd3586f681
SHA256a8eb87a7aad798d2864c6f6bc6137e13b526bb19f1d86ae543ced4d62bbfe5f5
SHA5127f5e93f02cfc66ffa56d3c019962101912736d7cc47f3902822d8ec3ca9a403fcef763d6c1a86690dda083cfe8c07856bd9cdbcad3dab16caa5f001f023d21b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b1cf5ab535b52d4efdac8d7db12a34
SHA13583900295b4c7b582d5b1d24a805b434994bd75
SHA2562d2c08a9d57920ccda7db21dca8f3756e49641264e8c356e4a6d4f88ce09c7dd
SHA5128025653c6254274a74d36c59a31af63854b5c1781f52f8c02d636add64a4b2bea008975d1cba55574340502515c80d3f3961b156a6acde1b9021ed972e79b5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd36779f93bd6becf86b08a42956897
SHA13a9d6d9eb2ec1256c5aa1e4f36a0367dcf7c5dc8
SHA2567c31df185b738d012789ec195a5f72302709b6e3e7077a423ca1c1dd62bdbc83
SHA512f3907d0aece6a25b6e591aaa8c0eb81e29cccff563fe2f71c3e04a36ba1cc5c5abc8b157482c92983f45e26483a89d01ac5ef89ed170aa4bf14b2f1e898b9cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581ab5b3e83ce1e615a9155e1595b6048
SHA17cdb3e3911c17b755ba95306e80763dd0483aeda
SHA25673b5e43a61ea1d8bea12764a496e0037d57e63e6ab8456e763a5a90756d4632c
SHA51225e5cf3013ff1c99060bce45c9540d0d06bff8fd5a33efdfe670dac76f793e0294f7aea93054b621fe5e59cc2fc0ade48d117bde0deecefb3b98a9e0d7dce571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e18d17ed9f3f4676808dbef4538040b
SHA127b97e94b157d0f7c02d99b3d1b70e050cf82dbd
SHA25601a3c9c7535e30c9681c50d86214e669c88a3b26f63fba9ed481057d66db3272
SHA512b178100af079c4ef590c6c73518d3dbce165dd751d859eb91384ad2340b51be0388d61abf70975b08b83790e52a8199eac08888d8f3f76b291c6b18d64822df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dbf6ff4136a4a10219ffc55afe43ea7
SHA12876c59ce8c603001e6d9cd7c667fc38f03c0c63
SHA256ea09142e8ae9c979d5e61063ec2d8f766ce599ca6a6bff3147424d12aba0ef70
SHA5128d8ce34d88ec6638974ebbae54b26efe20bb5d8512900f9cbceaa8d417a76fc18e679e111a6d930004fe0e1f0e612ed002810da31dd383b00b926dfd5bf50a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508e22e107d43bfd7fda766f35597cd42
SHA154622dcd273920e297bee7cef4eac0b17dc45865
SHA256249a1ab2e031206872d4d3212c50dffa5ae4b6f7e70714fb6b78c45f4800707b
SHA512f0f2303d65d7bc48afd38a25acb4e07a95ccc299b123bfeb15647a0566097d884e0af11950183f2b1e6a647c495ba62cf8d91b8e7ce0206ea2457ea4295dd8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e96de907c95731757353eb1ae02cb6f
SHA14c895c4c5ffa544ef48e71b4bc615ab78c7ab24b
SHA2564c07a8310300884f717a885d381c3a1e902267d2ecf473d16dc160f442afda65
SHA5123a610f06306742eb89a0171b13ade5cfb1ec103a8f1a764f5b4773a18e346c171b7cfd469e42dd93048cd0038282e9c52aba91bb0905624236794bf5acb9bacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55364759eb057d44ae0c9f22c49b6cb2e
SHA1089366081a92f305694f338eaf03d1df8386ce24
SHA256030ce651e65d484f373a5510d41cef245741744fbe5892c1a2278a9325286cea
SHA512b30d3026748f789cb04731cc69439f73a2536ea7771f0d6075faf20ce044b57524eaab71b165c44cd718b36aeb11d3d38234cc98c958b03dbfc2301839c7660f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef625a0a6a3b5c6246c86eed21647236
SHA162bea7ffa6303a2db49d22db00ef60bf50fc47e5
SHA25624beeca95857dc2c2488905d482440b75ba3a5d7e4bce711333a0e093e362446
SHA5128d56b239bf9087083e1ea08cfbbe3e5f8230b7c6b20a27cacef1363648a4ca5d9feb7241d27bd3beba3d5626bf7c910c09bc9318e2802eca4130c2b5bf2a8f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55432da60e35c8d5b75622ca5752eeddc
SHA1fdbf7d1dec76c618382d93bf97f25b97be06c96f
SHA25625c8ead7c9ad9d6fa2ea07b0831f050e71d6621a0d6ee424d2f42f0c97ddedd4
SHA5123fd294f9b5c55a65220a934dbbf8dac1cf84aaa3fbc91eb27c52062040818e9ad384eea73013d08fb4fedbec0f93c38e303a883b79373f7967f94adf825a1714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540dc704c5252941d0f0c116d9b969168
SHA1e09efcbe51a4fa73e64866f5d43b3af2acea963b
SHA25697d2ccd660ce9f4c5f9320435a210164d82499c2f561f515048052b014f40965
SHA512d0c365d0d9c582a21a4a81f4c122977ea6a4508d92119550846e7b1f0a5722df4eedfd8d2adcbacf5472950f3f2dca01cd4b685249a845cc7e831e17e536ee90
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a