Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
1385bb5e8cc1a34dcd2f84f1e260fb6b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1385bb5e8cc1a34dcd2f84f1e260fb6b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1385bb5e8cc1a34dcd2f84f1e260fb6b_JaffaCakes118.html
-
Size
461KB
-
MD5
1385bb5e8cc1a34dcd2f84f1e260fb6b
-
SHA1
7b0d157ab5dfb3fcb7bf282935227e34026f6c35
-
SHA256
bc58380dc41ce0500fccfa3bb7bd61a49368ef14bbb04f6cbd60e94c6cca8c68
-
SHA512
c5176a5f62a5b8914d022d6ecc1743a58e50c2219552502eebad5305daff122329fc8ab761506be3587e2b43c86306d699787a1771860e8642099359a86123db
-
SSDEEP
6144:SfsMYod+X3oI+Yz6sMYod+X3oI+YoEsMYod+X3oI+YLsMYod+X3oI+YQ:M5d+X3RY5d+X3B5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002227f33e9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A9F70D1-0A32-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421001445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000061630cfb9576749575218c9aa9d39fb5af5917ec8acce516129e76175c56723a000000000e8000000002000020000000d90be78f0558ba48e47b8b71f2c9fd5e428cc0f9b1b2f833c85fc48a8f18f4ac20000000575c38d01e7881cdf8822a3ca6cc67c3146a21657756381bd60f6ea7fdbd4be1400000001cfabf2148675a1b0c744b4c47da608bebbb51e2f31ae33a5ae564d613c9d80fc3c55bcc4988f5667ac6fec737407bf4d6eb829fa5abb4b5f89e2b3b45c4883e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1385bb5e8cc1a34dcd2f84f1e260fb6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20e7f9718cde04b0e4c6710d5994f98
SHA1cd0db16a3a7722b1902a45219f14b9ff6524c316
SHA25650b1694ae4ca848a494b241f99b22bc1ededb463bcd0b82614804590a5eda949
SHA512b29163917bb62eea9f574725272b4b6a32affebc8c106b58b740a8567699e5042ea73b001360537c9d6ccd0d250a3129da7fefe5770a2f15baf01ec641069ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d502bcaae0555e8eab7f46099eef064
SHA192369e396808d7ec6b50edab5f472eed5f7d7738
SHA2561166ddcd3812bed7970907c512022ce7f90b83aa10a91d15aef796023006e132
SHA512f7578e7439325b5c1cbe83c2d0bd0318a5f884d6f7fe6955f848b62d9f325656b635e1fa5c52b185080221c683f475dd4c71dea75de40fc3b9582173ce4b8436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6dd73a902f8c0a4ed5aed70fd472b81
SHA1446ef159d0a6b4007790f252366b0d566f2f7508
SHA2564ee81a7297d283dd8dbaed806e42cb5d6a9b96386dad85718f18eda67abfac0e
SHA5125538b823dc577ce03302d772f00c5b938e04c09b98cd713fda7e4589d9ba689046e4b4519044877a4d704efaba6507401beaac1179ba3454b10ba68e3a778e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453160666ef55c2e8cddddbbd54e856e
SHA1c22ce6302e8d223deae9934849db64b86f638da6
SHA25663c1f648e28b5ba99fc641ee80281c21f25b2c04ad67b7c1539c48bfe385c2cf
SHA5124ad32e583e0da82f60a9da4b1644002793b7fcc88ef8cfe34f08e9442fb4dd7634ddf51132f716f3e4b8ca0dd9746d376aea92482ca41b1c0c5730bf7d388bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577999ad245057c0baf214028140a6180
SHA188d03bc4e12134883dc196fa9626aa61f980d0ec
SHA256a451a451f3ed8927360d7f597840ab1c98192f4ee69637252fd7fb20d772c097
SHA512074ed02d21469d80d16a388472a9ca7ecd399063d2c114b24fdb6216f5750c9bba5be8013288001e35d7e4e56d152ef2543a408d44afbf85d493de3d5368e861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569fb6fb2de1ea8c777016491079de4df
SHA122717f17f6bf1a7e7958c21812294b9ef085a346
SHA256cbdfa6fc7d6043dd34e1be27736084ca8d569133747b951f32bdbfd4933b4c35
SHA512614c753c57d7223d82dc40c9abdb05449f0431e8eaedd5559cdaca8a6165129ec327c1bc9aaa4e53a02f57a668e162013deeef0d985c13a2f6b056660c2e2ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6fb1c2de7000a3393a75d4aa09fe10
SHA19e9c02948e0a41cfcdb0f10ee4bc77b5cb1ea7f2
SHA256e36b49d5d2359e4d211b917d9adf241b4d90c3c13fd470e182d6200c1ab59499
SHA51270aa194dee29daaed3e33480451f7abb803c97c7252d3496fa2fc96079121d55f3f9779652b2b212b8fb267d9e564d43c0cc0c7df5fd01fc3df44334dc2221eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563a7edccf7c374b456e76a2ac58453e9
SHA10075292a98719ecd97bb0f63d009b1554d2074e9
SHA256d6753860d3c8b8d2fa87ce1212c012ade0afe396feeba5073bc1d11937990439
SHA512ccd6b4926d6763e882655e957d55a5921eb467146ef4d81c384b5961009c28e0d9c6ab0dd9741c451d7d7785b25ed54101d3ab20985f6fba8dfc82f5c61934ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a0c46e916eb845da0a4ca46d168e2c6
SHA17fe6252a114cf17856ee3712b5a98e1fd9549242
SHA256204467d28cf8612a09e748fd4857038357f6256b4bb9d830f5fcb4ae6ca14418
SHA51274d1d9da1ed308de50966ddab87f40a75a38e87c90fd8f53f3d0a755e62946c3a6fabdfe4bb0c76ec9ee1488f6f175c79732bd37db021aae0a5c1323e721f59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565fbb541c8be2335e7bc7906bc74ec20
SHA1ece9f04bcfa39ec9c32500488eec189752b747b2
SHA256570429f677d8fdc9949727e5f7cf647fb0e79bb1ba0df3459cfe2c171a6722d3
SHA5127b934fb307b8278271815ac27c15f0b363ca81b21c42e83ae1480f6f30f521297598b083ca5455b8a8d8e6100720beac186de3c453fc99166827ccad24b60d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536516dfd0c4ff24fb1fa8c08ae9a2c76
SHA1532536968a62b922ba1d551a482db990c8821abd
SHA2562dd4cd6e27a5ca78ed60148c799fc1b197d65e3f13eab4de583465b1d91efaae
SHA512bd71c59f84e0e34ebea08406c176bda1d2dd4a82468e91be862d8d37340e8225ddd2f03a81f0ebdbd5aeb333b3f04e51ed58e1b9c66e82ab5c2922d4b9827858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af52e1ffcaa4a1e35e97a007bc475ef
SHA1c2334fdd4543f64786bcb941e95d04fd4245cebf
SHA256eeac23509691477f34da2d1a72a36904300a9f500a52b35a6a2b08823bc90e47
SHA512b95993b927f98949fa2dee697c67ee5e0e45861dc3fefddd45a057876eeaf81e64be7d7da51f8f4681d832b5f9ebe1e21ccbc7708cf86b2ad924e8d6ff1222b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c00be32206ee28966b15f4bf4f2e386f
SHA175d2620828acc3b828b5a4c1b5a6a1c80d39ef95
SHA256791ac845859d653b460d7436afc5de02938f0a160c08205157e82c07f0e0cd67
SHA512b0c228805673b940bce9df66672f63df535a2fff4a53cb9d4a144f2d0a286599c23abcfbc7df761f8fe7c42f1c144c3a55236f923ada04bc09617ad48bf6cef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e141e9a1000104ad7d2cda8d12410673
SHA17f7cd5ccbd603339ac017f20e2058c814f5dba50
SHA256b6eb6cd3e5bb9640258c6b001c0400c9e60090af7ef809e257265b4310917ef0
SHA512a415757a952d1b49fc0274cf46cb9ed8fa15b8813f64544a29eeff957f04354abe76a4947f272b13a1f7f358049e65c621638671dccb6ee1743a9085c63a5fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c54929ed71b62397eb0c2fdc9468b75
SHA115075d33d2f65ecf015a7cebc7c210a22f616c85
SHA25698648c50c5624a85133deccb80e19e1f6e249c3fe111111501dbc311b9d79172
SHA512d3c565d7546163adc2722573bfbfca2e6844f5c52a852529397f0cf6181e7516ee52725d93e2ccbb7a5f5fdb9abefc34952fe87e81d15664a5043dcfca8ab9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e137570bb65f35615a6455b16c12948c
SHA1e618520c2d330f35adcfab9f464bc54942596029
SHA256c880c41202251a227829f878ea6e0a5487513cb15be06422e897adcc0006232e
SHA5124284b67df08c3e6ebfaecd4ef1ca67df9782538f978ff92a873cd43adf8c76b8d9c4823b5fb6ae640f4b7c8600df50a3f16ccc9148299e8a0d8fae0e885d8efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519fe11c0152dac12919240449c5ac48
SHA1084074d3bdbc45c772f4b12f17f706741f38c39d
SHA256fba8362a2a2f61a3aebe8c724f22f0eead7bf8c3a63a59c4ac5404c67e7dc43f
SHA512be84acaacc5530c239bbfe21ad344356ed75208e63a457fbed8d689c834e835be40f9002e3019a85b70185ba7065afaa310a6d35dbcdf20e95426475e028d018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cbe41d684718677fb1b1989e71e4949
SHA13852e21d7f548780e474367406532e64f26aef39
SHA2566d99c1705659893178433d1a5c97117c32de463099bd0069986a1b028f5ddd52
SHA5129f35d9866d561023241d8a995416eb6fc1154a4f24ff013bfdcbf4eb69117538a78824830ffa2ce422d0e96dc6636293d3537ac226d56bac9d57eb17cf7b5a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f64e0836d639df415cedfa5e5bc51fb
SHA1169fd331e27b1a51702b26e579e3a13271b89f0d
SHA256fa279329fd44467c80388026dbe77ed546f1f662b72e2cf1aaa5aafa5df795f7
SHA512193126231e4bffa132f41c917aae8bebdc4a16e5da04fd6b0c39156a0f24e45c6e4c30465a6761b0d8008632a19d3a66c8efb2aecf478efd4fe34998def79a7a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a