Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
0e2ddfe2f6146c2c1a0ad7fcaa9f0800_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e2ddfe2f6146c2c1a0ad7fcaa9f0800_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e2ddfe2f6146c2c1a0ad7fcaa9f0800_JaffaCakes118.html
-
Size
2KB
-
MD5
0e2ddfe2f6146c2c1a0ad7fcaa9f0800
-
SHA1
0953683c3505a4e5199c58ff86873d8f8168e5a0
-
SHA256
b83fa8d40128e5d917c34be07eb4556f349133bebe26d9b84abf545e2f4f540c
-
SHA512
c1edb0586cdbfc8be261f09d18a4155bc4829c40b7d5240306c3818cb234abfaf859e92e63587f77b0d221e5bbd9d5edbd7bcafc9281f326bfd55cacf5d54aaa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b4db2f779cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B4D2A11-086A-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000001a7763e30a250ea7c87350f91b5ce68b79337177b485e7666a36aa1c68ac6902000000000e800000000200002000000016f8e9fb263a67c302c1f30b1c9303f499bcb1a2fcc9756e82084c2873c0cd7320000000dfd98b377ce97d045f90165074e1c5738eb5b2a4a47404870b1624f40779bf8240000000942f3ba7cc21d2d4b094250f7d5b57e02e05f9838ae2998821e51fa0ec9fd03d982987b816e1cc3f3033c224a9aa71830b39fbb0cb639e734661bede32ca4d56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420805703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e2ddfe2f6146c2c1a0ad7fcaa9f0800_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801fe3155e406d5e65d083334270541d
SHA124bde54a16add27f4612b6bc1b5c8b3907a0a32d
SHA2562eedcf44f9ae3bdd2a68ebfeec49366b0b940500b2af55044f6666cd3118ebea
SHA512b0c1ccaf68b1c43b30838694f0ab3b328ea48da9f67d07cc61d8fbe385c460ed1bed7be7df0e1c701d1c9e238a5556c103399afa3f647f7a14768b138a443c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b33db6ef157e3fd3e8d9772c0fbf82
SHA138b66629ab596689e68d1a8d096fd52764dfa694
SHA256058b05c7ced4b78d628f85b4f7e8dd0185cf6bd70005862ee14d3ea13e2d4026
SHA5120e0cae259570e1452205310090a66516fb8557463cca423ca44df975182737bf709652b125fe05c63530e882f9f0d93eda6dbf28970017ffacf077a514d5e1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5927f6ad5a2f5a997a61079e3ad757bed
SHA186ce3bd806ecff1330f558cc23a79636aa084b16
SHA256aad73d4966654aef87f3c639a1e00a68f36351d5cb635fdf3131e1bebaf15025
SHA5127657a3ab5cbea1fa403c8f3dfc048ba915faa47d3a0ea634ff29adcd97c24a750a3eed3f4166f9eb6f657894e8026261b98461691a5ec74f9541d4940b058cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c10582df40da5d1eb432b7329e7ca4
SHA107e8c603fadd0fc9ad06bac5d9bbd1eee9274cbe
SHA2565c226ec0e7960162ea443098882424aa1285ae89ed9fbce1e0bfeeb7d9b8f68c
SHA51210e0fdbe3306182055d979153061900a8aa418af70f0b8fb89117d356327f4b418f616db496ad5439aa5c311a61d1913c48fb5397b4b136d78e202cfc6aadfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e24eab74e58e9de3676ed56223ab7af
SHA1d4d5015c4526dc359a4a8b575e3901fcd3f0c75f
SHA256769acd3ddcd79776ccfe3edda6422bd6258eddd69833ac641bede3059d800116
SHA5126866a63c38fabe301d5bd4b9a9d79a75a11c65ec97b5c7f302f70f98a7156fe352b0b8de8275f5a4127d3f362fe590682ca5219928c8bd48b077df61a9c9695b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292ec0a9438d1a679bbd54d0aa1dcce6
SHA15939c909573afe4676df5816c1ecf81602d3f119
SHA256fe1db6c82b687ef3e0e56d5ab23cd0ea6e507082340c9f2a2fb0315f1f27bbb8
SHA512976f88032c16bc285c573b4fa58c70fbe54d47eda4829b5eaa951dfe090d5839f3cc78142b176fe8b67392a63c0f2841388af59fbd3db687eb9b2d5910c438ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bfbf721366e265c0b88dba08a44a44e
SHA14fde16b3490a3f0fc7871e69b256c019992eb7f5
SHA256513db314d1a7a568e3668fc4b92f8b6a2c663b499e0fd94eedc89efa0f52b28b
SHA51221f2246e51003b8e34ec63d7ab6be6d7522acefa50f88adbcc906cbbbecc8de3a6cc07e086bc071ad17c4e02ebea52f0f39d5c326b3308b5b14d76dfd0346e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b3939094b4e0b474f620ecd4807a4d
SHA14b7795e6f4eaa361f4d69a3abf44db32bd49810e
SHA2563f737876016da87f51b2d00303186d93c7805d499e2bcaad286420d020e528e5
SHA5127cd05062c57eee89fdbd8013f2815b3eeecc7ae4b8cb65c4f4b63d7cccea26657904045585767fb02f1b3318e7a1b9823b85e9cb8f41f60e27507b358ed1e594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a26c2412d30a7e823e859e87cd1c5eab
SHA1e36086a9216ba5ef93942ad686ffed0cf76f1ac7
SHA256ee640735c50d4421059569960f559586a01eb4b9a3e8bdb83f77ac8da7df3250
SHA512cfa0f0f24108001a3099e81592d00f4cf564f85f63cc6309192bc078710a954a5ca8ba22cf3eb651ef54f7cb1f2cf25d3943861027952dabd4ec9090b4ede440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef809aa5851eef3c79df531375221cb
SHA1662121957727c1360fc3f6d7c4a508fedc1cfcbb
SHA25609187fe26ba129d4ce933e1fb275c7abf0752d9c96b0d1511615337a6c1ff4ef
SHA51230b766f9abbbb5b52a1286d858c850aa12a1220ba1455f9077de38fb863accfc481a058d913cc2cbe8fbe80dfc6ac45f30bcf0ac10872db635e156db46b64f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cb6e3b27e0a4f85897c064b30f5d333
SHA10aa38db244ee54529bfdeaea055244dac5bc899a
SHA256d2c475aea10edb0f5541b400d2670c490cb6b640979d86d2048308d8520e92fb
SHA5122f8b84d076795dc28a1f6d851cd110a7a9509d43bc066bbc1813e8d9c628e2da450d363d12491612afc4996ee365154227d4aaa8252d6f2194cd78f964af4d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe258d053d77aa0a2bc3c2ac81c4281
SHA194d91d86b449d1d1503d626ac6bd65e1d453a92a
SHA2568b8e0acdf89ad985e0c1c4c594e81e69f57e12c679d1c8778e37bb46d894caa2
SHA51272b616656606b1a312a192e78db73d99f5a41dafa149764fb3043340419179891ed17cc3916991c85a5bff746e14d70234e8965ac120cd430d7be6476abd91eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59154bf90bea3daf6d0a0b63d0bb56018
SHA17a67d90df889e827fd4fba306c01194e3090ce06
SHA256c8f26b94f849741ae4f8001c0f2ea040542ce57d3d8ff99903ca865ca20331c3
SHA5126ef180afa03bc5564db48cced4ff37c809b7f7e883dc86c8645ed7f45c589326d25ec182d982236e5cacb1940149a2b9ffc633030deacb89dab379e1e491f128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5173b61a44d0dd1f34a191d311867cf51
SHA1a6286c3065bc7bd35363e6cedee7b5de31dd695b
SHA256b16b95c1db612077f09499f600989dbc2d23a2024e24cd911e71dd1edfa7f96b
SHA512b2ff9d5f09d240c5b97ee23119d76451b29e6744839fddc56889d895a436fabe70b96373fc4248624a1e83f00d7f0d729575297a6d608778ed147665cd5a156a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ccf4b3cf3b374b7b0ac8dce33230e82
SHA1730f3cf97db1863f7a0f826835aa0166cbb80b62
SHA256acfc4e148f4d07f956e8e44b485da638b94ced20a890fe3ffcea8d7cc4558a7f
SHA51285a003cb957c8b4f4cd8dfe058a5dbde1620bacde6e9f55bbb3957c1047597f6792b937baf79516730a00f73e22466bf643080b162864a5232e3e8344eb9c94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585706c787279841851633d3614b99f2f
SHA1891efeead8ad600f0d206d117302ff0c65a0bc29
SHA25673d79a8f873a46deefb2162cdfe310938d76d73a17a482a8c6912646235c2048
SHA512a4a693130b3683ceb353c90405b91a585d9a0d18930d2e6c6dc3ee6f147351c0b0b30e2e5450aead516f23671d7c6acec92dcac14fcc047e77971c42b0696c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55044a0a092387780e64e7542e03e06aa
SHA1ef288b0da50dd85fd5dca9901f4bea214ac758a9
SHA256ce54ca9d2bfe178e2e8da695a0695bf9dbd8da00c083d3274acba362226362c5
SHA512aa1f6e073586f835a9e04cba872a80db8a08cfc99d89433005eeb782aaf8b1d158ec2012296d3d56364d9cda51d96033037b2599e3f7b4f37b4ace2143206e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592655e44e662ef94045c2899d62bbfb9
SHA1e020fc1cea5716326f15cadb1d7a248eb524fc29
SHA2561296e2a53cee269a1898e44c89a40b1afeac6139b7c700b40e5c80b0bfb18f7a
SHA5128a49771d73d518c978e552c0bb598d0cd20a535e44b3dd92d7f9e7bfa86169b15badcc04ded3e313736493698047dbb0ead455652fa187357beb5fe2cb715526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1db6833d69d612f3f4817fc7424ac7
SHA12126d9d4e3a346d3051148681238e940b7e4d71a
SHA256195843cb19a9ca39c2f05ce9f778b72d949737e1492e509afb4968585948dd1b
SHA51244c6ce3f9c9094246084123ffa87c12354ccc2759f72d3acf40862a7ea5ca6b5b5c9286be94d0cec516b5deb29159b9b42c341bf6f78e6307760bf8d10271d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a03fae7630433701ed3a6c456963a27
SHA1b28f5ba4627b33a5ae742e2ddde7d4ee596eda09
SHA25692d5b0e87ed95f77118ff65811c68d738dd7a05f8f2b51b38905f06637905ead
SHA512b2c327e7e733703e8be40d9125042d33617fffcd945cba2bf21094abf6d78e00e24f91b8a3f5419436bd29b9ba20dec4e116da2c6383866036c133822d99c723
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a