Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
0dffffaac7c1b20f29509fc0eed91382_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dffffaac7c1b20f29509fc0eed91382_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0dffffaac7c1b20f29509fc0eed91382_JaffaCakes118.html
-
Size
12KB
-
MD5
0dffffaac7c1b20f29509fc0eed91382
-
SHA1
98c0b7ac46504af37d387ed63588a7455908d364
-
SHA256
ddf3b63120f817dc4296628d3183acadee496714a7951cb09add7f2d72227eb0
-
SHA512
05dbe76ad319b089f5a88467b994ee1b6352bad88af25fb7202d4a02ba147d55d61446db5cfdc01a1484e8f360cc02d2746fd7c56a9f5f6135f51fed1ab69bfd
-
SSDEEP
384:SeyN2Wf6jIBiqtsFjAZ17By9f8SQCm+uI6lwj:SF2xjIdtMjAHl+6lwj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000070b108f7c0573c71c9290f5205ca2a1adce5b69232fbab9bfd5c85e5328b4c9b000000000e8000000002000020000000795346ecb652653683a07fd34c4c65cf9a7c8d3d0ff196e78c124bf4f794b9602000000073b640d96f047cadfc488940d30a75ac4eb3d1354bcc782eea4627f75a06eb8e400000001db542e5e98c184d9619d69f209fde3989ff209f1dd86681fbc9aae5defb797f111260ebb38b4f8753ff79388978ea6c74d229bbf9de12904a28bda32ad1b3fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ee4f256b9cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420800529" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EC1EA31-085E-11EF-9034-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3040 2032 iexplore.exe 28 PID 2032 wrote to memory of 3040 2032 iexplore.exe 28 PID 2032 wrote to memory of 3040 2032 iexplore.exe 28 PID 2032 wrote to memory of 3040 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dffffaac7c1b20f29509fc0eed91382_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768f1bfa629c3f3316db12635db42d5e
SHA112c46f5cc32d0345f8791aaaa6528feafaa092f0
SHA25639f88968c48b85cb2ec18c06b61378e61ac9588d41a4e8548aa472b47a50ae55
SHA512de3fdf77f60afe11ff367e7671178ccfdd83b16307410d3c11b86db544b9f1d4a2adfc07fb1a53897806ff3b7d7dfbf3e08a0b292e9db749edb1660911562ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb3191e9acbeb70cdabbec789645f7e
SHA188e661830e97d21924be4c8f0506cc0c607256e2
SHA25609bf2966d5a376562e6bbb9381c20a6e4344bdaaf5998c77653db6703161bd39
SHA5123451f592f9d2dbd17570b9c9ac104fe651ce6755af1f95b99e2120e05884658234b9c90bd9f7fed89b0ac57ca9411939fc5ecc4c8c2147b78bccf122258cd730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be86b62265e8bf32eeab33ca0cab17c1
SHA14f67c78da40e0fe08a56b5348ddbe04dc01ddaee
SHA2564b897ff99d4f1e8eefa8f4be12064fa27ba338e903c6b2e4e1c954e460204095
SHA512fe96400d02d2403f35ad678fab17cbf24b310a47aeb482cf1fa1e500ed9b199a4dd8bb161197bfdb4a0f33abb7f6fea778799f079de8968d26859a638e147fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561489fdc40bb12a5f630daf6a49cffd4
SHA17e4cf096bdf0c9c502d076fb797b17ab728060d3
SHA256e9663413c6423d62ad3228384b8299d5d2fa58310edbccf1969c6c3236d11746
SHA512e14164d56eb6aabea52fe5b0dec13dcfdfb4e1815affc7014c6925e5bda4af5a5ce12a9aa9296f1aa92d82c68cbeac99c2443a4f72dd8cc9ea5354fa4c042e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a475fb781146018a25795058048e9910
SHA18929300b72c915906e5648b152a67a0191f6b4c6
SHA256aec2244aaa830480ca7b71585e85b5384e945a3ea954bb916888b8dfed3da3e1
SHA51208dd4ca5197b1581f51c3eb54e652543a99778713ade38dd17ec97ad0fd7020ed0182bd58dbda4263665c588d3da7fd46f70426000fb3bda77e5a140bfdb40b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f65704b13b223219e73f63bd2234fe
SHA110f45685113617fc7ec6a42f7772fa156df19b18
SHA25696ff3f1a90e2845508699095fffc1bff42aed406d57729c90313bd1a3a7d5207
SHA51233e71d25fc8724e6d1b97f09f10e062e8df2653a2f7000deb0b7a7ce35a9cc0f1bed7cf03b26d6bccb361bcbe8a03228070c45577bc0fd8472dd1052e0da8e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50542ee32dd331e1df9dcaa8af52bffc4
SHA16ac28ea90692aaffd31b14b326807323882a2352
SHA2569a080a5f2352db6ddf0e8d220197ec02e67ecfc9cf77bf9e968450d6a7cd97e1
SHA51296584e7e398bb168d0aea4700e219b09e441d4847263e96ecbe88cf6318cf758ceee35f363726a35ef2b995b24daf66ffc30e081e25efb6d535b76b4e8f2e410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e4255712025c5da278e68905d1047c
SHA11b0ae9656844c6b6e28cab5edc09b4e05020139c
SHA256cb66ba4b97568f33676a083e35519f95bff351f6e996469463614269cd84bccb
SHA5120b7b8bcdf05625bbbd3436096ed2cd69aef99a40e622e076098ecff0f4a4268f50f66b47ac68fd47e22dbfa637f649a16e7d0e7132e95074dca07a361a64b806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3d760d4a6ac2d6334224b45d221691
SHA1f1adf1c0170cd988ca95a26c03c2ffb9d1441cff
SHA2565b7fee973338e8bfb1bfc16d277286baec20c3c35e92588282328e4d9a6676a7
SHA512f148f9443ce069faf4d3bc1d59e5726e87e799959e1901d282fdd30775f92d26c8a25d467abe87d00b816a2a7cf91cdf4d4986dcaf5d1d259c292117ac076766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3572a40a75d103fb4d031a5ef612b6b
SHA19e987d4a89b8dc878637ca6dd96d5cbd20649601
SHA256ddda42bcf168f560e7a41c6dd5631309719bfc76b5e0815dff26c6cd7f1e4b42
SHA5123da9651298c5dc0f99d4eac91453aff12f2d5540591fd4627517f105ac7ea415204148c86331279b1bf033c56487b66149e424bfd3037ef2420c5c6798cb2213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51171a8a10b2bb682c523804a55d4d0cc
SHA17244bd03196a5697350ab53bb6a80d58d5f91b27
SHA2563ddb8bf9b157da954f5b4f14e744906a6cacaf63ebfc029726a3fd2358a06cfd
SHA5128049dbf6f1a647919d2d313679b25beb297bde90bb5d420cddb8ad78e544506e2e7612cfbdce60ae9eea52c58c9b13692aaaeeb88eee0297a650cb8934f99b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bce9e03c92724b7a991159e37f9963
SHA1d9593a0a9368b0da79ee255f0b73b6a557538687
SHA256e59873fcf9b3d8713d58b5174592cb5ba5915883cd680f79e58cff8425a70a6c
SHA512697fdbbdb7b5493bce2cb2e4a36a9899d4252865953b0cf3f1242fcfdbb3082749a977c42a12e69feb1d72b68bf06de50c4d920c910c8ac97ae1c6612a4aa3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e78df1152e02cabac9f340cee9ed1fc
SHA184f2ce662248492cd5bc3d52ac141880c6856533
SHA2562cca2fd44496e61ac21023db5969968df247674181dde34d3b44cb2c4e507b83
SHA51268fd21f831e2a557bf8d1e52f99054bcce1075a54b26427ec6bd0cfabc81bcef41a941489c43f9e1ed0f1e2a5f7ae96aac256454a1b98f8c5fdf5ef45920867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c508eea761c90bf84964f60d2f300fea
SHA1fa11e43138ec9178f36e23e46142893cede465eb
SHA2568367161bc11668b77608c7b936978207996f432575d27ad837dff8c80e6c60fb
SHA5120f7a42818fc4145a441349b95feda2c97dfdf1b153a8285e97d7399dcf4dddd550c57131d217223c338b610137b16e7ee74a9b1ff7893efeae9bad7205c6b8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57df1edee9d79e4e348abafb77ab01f67
SHA1878a40e5cd0cf14d75fbd127008db6b0fae5d15d
SHA256b787d91d27acbfb1b83337a8c05d3ffe84e914c8d1a9275eb17a96db0e5195fc
SHA512c1e7b642c2f7cbe7ecee8976bc8c361c763a5685c202482947db46f1c7452b64f8d89b4a63863e9c0db80295caaa839359f3dd1ee6f3cfe1b9aec117d1fe32eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb26d0c79f39e8a5d04b5aa43b77e0f0
SHA1a2c2cc15b27763999052403b310e9b419cd6c4bb
SHA256c39285efe562088a6f673a78cb6edb0289a6dc3a80a593142dae8b8728f9b3dc
SHA5121de845b9d45cb520955994e6c8509b1d02cb842e5bdf30630c7d611e1d2f82dfcab960397e8be932f3952b89614afe17662df1b15dd7506789131cbb18c5645e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be17dee7d73c9b3511f419ee710b1dd
SHA1a674174e8c4c5f5c678c68cc4fee4becdb949e15
SHA256feb27f645a7865cb5e9a3ef2a7df38e92f2a9017af06fbfbed306ee30a6e62a3
SHA5124564c1ccef8e7420f4b1eb7f51ab3464ab64c0ddaff12f0bc5afcf549fd8aa41eb5c3092bc0cb7837690b88e72e466202075a95b5321e16e4abbbb8ca9b7b1a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2591effbf25752c07a6ad62f6509ccd
SHA13db93e1cefbe0f30b9c954d8525e0998de58361c
SHA256907da531f9dd4bef40f9b2f8f01ec5751ef4235056735018e1b9808ca2bc6ed6
SHA512fb0212c56882b94048601bf82f0f5c43858fd2d69528e705aa374d958d4cb8eae33d170570645602b87ab6fa8f96cbafeafea7f81a7c312130542392de5f3270
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\print[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a