Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
1421b4d0066c98d8f1eaffd88ad75174_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1421b4d0066c98d8f1eaffd88ad75174_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1421b4d0066c98d8f1eaffd88ad75174_JaffaCakes118.html
-
Size
140KB
-
MD5
1421b4d0066c98d8f1eaffd88ad75174
-
SHA1
b4266118c7c597d720875ff9225161bb6fcb0ff5
-
SHA256
d4b8e936213eabb601b11e195a131f87d702982fea66bef8f9e956ad1d506f98
-
SHA512
d1bb902ad7b3f4c4aed6c9719ee2a9c4450a35c250765aedcbaca1775ea57590a9f9b1daa1f7fbc32dfc5332b95fd4ab33b50691b2c0e253eaa9ea1e9005947b
-
SSDEEP
1536:SqZ9418WNnEJl919lyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SqZZHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AF43B51-0A4B-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421012345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70dbb68e589eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000017fc7c354d949f4c8031b0e9c53d09c9c0e20845b4dcc8c7010287a1156adc41000000000e80000000020000200000008066165a29110463eff19e39fa0b70c7b84c6b6cfcd805442c4635b879736e6f2000000096cf01b18741fd883975127550b38088387b7e810819b5c855252be93c235cbd4000000073e23568cb19dc908d3d060ff4ae39ac7819d865d75f6c6395f5e4288c9619557a0ab4466a74f4128a8cb9acf36d9cefaf1dffdc7660e830cb778466937d4800 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1421b4d0066c98d8f1eaffd88ad75174_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230bb0df81cbf0cd6c644abc59aa4a35
SHA100c78983a10d60f538189289ba2081258e18abe5
SHA256757ccc2d3cfc37d2965ac6ef367d503b1d27efd47abd431d44f00d775fa73f01
SHA512e07b6b849fcbcb8cccecdab4d70edc9328d734aace1095b2dff136b9927a2bacbcbfdf4c0e97a702a96253e8c87209742c46771c9cd69326c5dbda0a14319029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b181e981f136b6f444e9a426e9cc3df5
SHA173f44e66f6d178e5eab561357dd85a1f5b94de49
SHA2568c5e5d6a9c004d57d31db01b4aadcbffab9dd027732e35c305c3fd42d09a6a0f
SHA51201091b1fc3cb3d8c8ea8cada12a6063462f0a5d03ef0627580634f3caa85d39f718966af8c1785a5dfbc12c4943da41dcf79391c5beabe5802ffba9a96474275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f0bf77d0bce4e91ec304d4560e95a5
SHA1a37473e646c15808975666fc915417b01de6cd24
SHA256646ae481a62c50f53dcec7931905b1565e46263f1ef37bb07cc6c465ab5253fa
SHA51262de0a8ed69de87c88c802e8e493b3d0f53e6904786ffba0e32117616a88f0ba6df6df3e6690a8e4cb375bf606180faba0bbab63e0afeec1af45707e795dfc0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f78d72b7be03da8808694d255bf0fc31
SHA13546c35ae37c3691402bfc50e90e220bc54e6981
SHA256422bc67bc56d2cb148b2e23edcafe22619f1eb4afadd21bd272e15415c424027
SHA512737a066248953c1bada12f28e3a717148114f1895c44d9af9d7379b0a8d3437b7228f7c327c09d571a5cc2151de0cadd67f487d365dbb8921f2586eb5ead71c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb43128dfadd523cacab2e3a8951ab35
SHA1db3d56d5bef645c4a82631e80fee4f4315c68655
SHA256a65b9e3616d465ffcc720ddc19cd49d75c4cf53a01e04b0b069a2bfc66fa309f
SHA5121df7ce140437a77a50c5392e70d658066326e6c59429f23c039497ed34e683819b1071dc2ede6662bfe4fd7589fc21b1dd9023a7f85d23c6ecac86c55e395dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746afd05f4a620ddf9fbae44253effe1
SHA18d6089f8fbadc099b22edcfe61f1d767472ec69d
SHA2564cb7170061c8ab87cf6bfa701143f1037c7f5b4ae76e39945f7fecceb88749f8
SHA5126f58dc5aa5629a3f698ce14d3d29cd15d36248db78a3701ec01f9ccd6e189cb8237aeb0f0d5c47138f76985a00f598c11b9328b6d26b555bdb371766aa3776e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560331e5d33d2caf863faa13f7a0e7be8
SHA193afbf09e840801dac5a5f6b0a3f89ed937b0729
SHA2566f5a9af70b0b14ca58e0bb56ed2b7122614b95d7bd99f43fc6b909b7b751816c
SHA51275feeb4f639e3515ac23dc486ecb490b9d3db6b9989f320c295a04cb83bc6c9bd3757a99b6790f8aa10da5e8ae35065a3b171207f7aba220b17f5ec88c8eb4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f74deec86ce6b50b08a6b9a6ec2b3d
SHA12e561be84917eafd2b5f328dc0b08daeb2b79a55
SHA25656b22f9a8d3d0b77c3dbfd0c340aa625e43d2e6aae9ff597f1d5b20818bca4f0
SHA512ecfebe8d3f82d6cd458dbb8377d896a8e1039bb0793044da0b5ab5a9cbbc98abd50cc5bf1d390f4aee539612a83a46fed0ba773cf7d511d958c812b8d2f6b6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1626df9eab968f0b1c2d6d871240502
SHA18daf5ea356c4f92550148fca021e2de3582bd245
SHA25661af54935d8add0813c1ce62eac8f152d3f70da897919fd0938535266548bc3d
SHA512e625145b71f2ec911df015edc0d6138efd10ca93eea035d66dd723a3fd814686dd5503471f44eb685a398d84cc5478f737c54e32934a5ca275653679b630ee8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3a1a63951545fa50b36b9dced62eb0
SHA13e0bee3e4ffd5b2c165f95c46e60db75a73b2452
SHA25688fcdab5f5106b0c2028bba550eb1c022a49a0383a21984bd768609c64004210
SHA5125796e19aff4218842b9b2479c3277801fe7a7765b3ecf431fa18e84722b22e791da652b1486c8c99e2e7bb3b47820cc18f4e7b5462a56fa0ea301343be852d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a06a6bad1967122232c174fc28a20a8
SHA1739211dfeab96ff0e00dca8998051ea08fff538f
SHA2565d4598ff6d94afc0c46563693ce9994c207420d3aa7500e1e789fc81bcf581bb
SHA5123676139b21b65c0e0ee2ce9edc0c2c9fdb895b5b062b3b6c82a9551134a868c0a4dc23b0132358c10ee3281460ff4c00502330baa6d7bed914bd6930f5ac7e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c0cb3624bb672f01e5184f9226d2a3
SHA1c255125f077d2c828e9410f669bb0b7a3c187ed0
SHA256eca6678479fcf227d4fcb02d1337f3421392bf7018c4996c585dcb3839912c80
SHA5128a2e293ce64483f2a7570630433edba0d49f0737d9fd9f8eb4490f839c27bed64904eb47cc0e617d3da15af5eca5819271171e32e86e2af05eab25c0d10cea18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8f8c7ea578e2d9cb54a00af068b237d
SHA1283b799f0bed7af840e7f1883a11937be7e6a370
SHA25626a0f23ef72f39913ea1905ec4fc2577a25ffc6ef669d5f2b7aa70ea8ca7d710
SHA512a33bfbc72934fdfaa084bd6a1d92191131215e76276df03988409fcec0acffa9b3018599fb2525e5475a21e7a8ce679d497e8792a0f6e0c01dd432450d54c48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52468505fc2c70cf3bf6d61c70069ac29
SHA19585b726a0781b9718bade2c5f5b771f86c5c39f
SHA25636df35e21bef73cb0e9ed413d43e2d755d21dc3a05132ea3631b6caf909439ac
SHA512125b3da408c4c122cc2e566e87aadeeb9b97590e4e2fa590701d55ebcf3a70b74934f135e7b3f6494156164a9f91310adc73f21be66abd3ab55ebed287f48d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd45c644f381a06424a6fa043c0956cb
SHA18db12a096d84d05371a06e99a27e3f51a12a3b21
SHA2568a5f81f49c43f65122152370e45815f619154b58589d3d287df2e2f9d24cbc70
SHA51251c1fb5f97150d3149e4935bb8b2e201d247f42306ba1fb407330977573f3bd59aa4b7c3cd9bb6e1b51dbf40425eb868530619952541dc95b6a16d4aa386ee31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aabf24547c264f4d995c28c8fd6c81df
SHA165058b71e677899c057c3ba79466da70bf7ac5c4
SHA256dc928a4b724327040719355dd6fe437e53c9ea944de07e312daa4c3162503224
SHA512fa0d9a37074da0b20cf02ba27e59245f8b8247d13690fe8201d2b4cb01f48bfc1bd82286549bba00728bf897f4ab9f65eb0fdb5d2102d35f90b8ad5e2ad17864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578fe8634f04c0dd78a550b0217dbf0a5
SHA16bb72d4218f8cf7e42d569589981fd221cf63ff5
SHA2562225f87cc6acffe566bb31b5683fbb2c04301a8e3d15ff17b4642f879365a665
SHA512c4a0308ef19873384c082a127590dba199b6404a9fee88b901ddda9c3046fabce6906799d86388763357b3af8d5257e4e1dc95a635a6915f50085b04f6eb043e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a