Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
25eea21fb34c1f1d84ab068a4db41d16_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25eea21fb34c1f1d84ab068a4db41d16_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
25eea21fb34c1f1d84ab068a4db41d16_JaffaCakes118.html
-
Size
33KB
-
MD5
25eea21fb34c1f1d84ab068a4db41d16
-
SHA1
6a37f658fc813c5befb3f688345b7bf29e63246e
-
SHA256
ddb38ccdde98041fd8bc52f61bf24faaa1300c6b2b49201199d661be4708a35a
-
SHA512
61f3910883fb03ed0c020a6e4e552fd9a927dd7c50130dafc3df949b3e6fc58fe5e18d701e0357cff66f1064f825ac306bd5107590022c1a5a9a8f9552052791
-
SSDEEP
768:vlOjImRgO3UDXR6xJSbVy6vjJUZDzvJ+RY6T4QBcH1E:vlOjIYErYuRLkO81E
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009a8ac4e94a41d1e53a124a56f0d4b4dba81d15a018083fa570d142d3b46739fc000000000e800000000200002000000062fa2af2508aad83089d19a422b249a98513b04c5f1b6dbc92004ec29a50911c200000003c72fbc4d27064e0b7f32ebbd9cb050820a64c324cf28fe7b64057e2dcd3ae7a400000001a5e213234feee321f6a6398fdcdae578d5ea41a5fe215820630d58b175154a83ffae6637602d9a808232ee61d2f545cf52c6edb5cef730a91791a9cc2eed27d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04788566da1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F21CDB1-0D60-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005faa6833367437007f472ae18a462feb3eb23f8333894ee7304bb7d3fc1c030a000000000e800000000200002000000060b550635387a119fee975d40efe776d721c6c73407d56eb83a52fbf8c8744b19000000038167d49dd05e646e8b624b2bbb90cdc20152ac02983a9dcb3dd09d7faf832621c371347a5fef5c0f3cf84eff6fed47902cf33f0e5acd9c2d65e41bc331da79c638128addedc96eddc4533ee2440e775f0cc7f4c68fd7dc8a709171fcc833ef2751dab30e9c89fc1f5a3741eccd5ad02675b776f580af35ac2e2b9cfc822d693809b314efe73b26d3224e1cdd146d3b2400000008909fcffe755924d366dfb13a6964fe962f0be70c8a13da60828e71aa74f015e0ffa2d46c1f508074fff61009b38e93c440b388ff4497d638f62d1c4400a2498 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421351225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1332 2232 iexplore.exe 28 PID 2232 wrote to memory of 1332 2232 iexplore.exe 28 PID 2232 wrote to memory of 1332 2232 iexplore.exe 28 PID 2232 wrote to memory of 1332 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25eea21fb34c1f1d84ab068a4db41d16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f0f2e1e9814df88dfdf941d00d82db
SHA1edf37eeeb9156dae8afd0b98cf46c6c44dafde24
SHA256efa8e9dc5f307bb07d301fe92e4697bc711a43fcb404bd05e9d51e71185601e0
SHA51279ddad22621103f7f3dca3e329a0b9e99b2803b05d04782b9702d627d86febbeaa70508e6afe41a47184162df67231d10c51152eb216bdf8a56134d5abb6fc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5753f82adf2539aa4a3e3715b93dfc342
SHA119f3a2070156a1bc564ad2620721d2e14b8925f0
SHA25678a1b2d1787083a92a12481eed08bcb3000d74907d55b23dc7c03350d6cdf9b2
SHA5122c6b988ca721b427a8e2d28772ea04a2e0da5d90fffc9fc31dfc7b33bff9eda3cd5ad2c390d97a88fc795c0650f4cb10b4fc2d89f8bddb4613837546c662f509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dec160a513bd0b99be1714df08d833f3
SHA1d310871817787e03d069887faf813355097349e1
SHA2562bf54e95ab06e3b798c275defc5daac9ddb02659105974f70de7934d8f24e7da
SHA512adab6f05393b3badc15b81f09390e103afe85cef4b714d94ec8ba2a5fe6a2c9cb608ea2a92555b56bc83bad2e6c148f62241348dc9268b33f6798e26e1e292a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b63351c16ceb8951c57226e7c830949
SHA15176a389b4049369f4c45985e75d271593790a99
SHA25687cf4422f00f3c5315e7378997d44202fde9f3bfa6e32a359108fee91139a125
SHA512efa4e928342a92f1ed6393a861a32d8ee6582e585b4ded4304441989a4253a5adb17629bca4b0ccbd5924d1ed39d48d28e2131b880611039b5b0ee81a0e5034a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc1d0db84c6b7fa4daee629a4fb9742
SHA124c34288eece1acc74f85f71f802423dea1c7fea
SHA2561e6bd832c375c515f6461266fd6e6da8052acf8216cbc15d10be0aa82836a35a
SHA512c89940d5b53d2927534b877abbbddb8143b83ff149c9c3f756df57cbb23dd715619cea2f5f6d35c92ec6fdaa8d8e7cd16d53830cbbb43e7eb161dd40009d37e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ee4b25b7a64c0cafd7c2d65d74252fb
SHA179c741e5ea03663c7d6cae0036b6bdc358e48a39
SHA25601bf808a910cd28efd4cda787d946b1ec56c872f662dbcaf9a3ab308c84a0f23
SHA512b5e4f4f4d9d01c511f89d68d7d43d1f6264cae6287e433661f9e103d4b2512e80fade96f997b435a953ab310221c3fe0d79e1ef462c79c3ac58f84fb8b23e8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9e521e028ec1577599ef7082777324
SHA10da06dd0cb7300e6d2288bf3b4140d7e861a8f0d
SHA256fa436c4a3ae424f4bb4c1fdbc5614883cbdb7c90c4c5bf13159653b5e607a2d9
SHA512ad8960213c622963af53be4e88f8fcedd148949eed2a514051d9ab5b0455d06e7084175dcfb4d2858a48c58c8d4114d24bd449227b1b40fe7ffe8dae732c74e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7afbde0c5eecf4c4aad6f8b6ed93499
SHA1747dac0af6e7e1d79d1ac49ee81c0c3b8c813b4f
SHA2569b2d6a70cb2ede9391407b2dfa6b0c63a128e58902faa3061e1e244e73df606c
SHA512e21cd02536d547900d9a8d420968ce1b88022995d5214211a4955782300587c781a514c2fe1c6720e3d8e17c0f9c9680886539481f5dd4f1f8fa604a03257c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49aa2104ee26acf6a4e7a5a7f57b424
SHA18d67a2611dbf2c218b59430e9748da2573244d2b
SHA256737049220385549a18ee28666594d78d6feaf5e039cab3d0a800fe464d9b7d1b
SHA512df9842919d12d1940e86340347c5f9c6a9468e9ecf7e095d7e92cb1725936f3bd714e3b0a9146700875373d48e432739acedc3f89d084ce7d4f6fb852a32f142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc969833c13ac58b482fad4624ed27e
SHA1573a27b11ba1968d71d79d6828e3605658c6e794
SHA256852580af733efb4b64ad0e100f8e38de79e26a933e48514f1cd31db15a79e4bf
SHA5126a9329453d315c842a8f571d51a726b5352646e9a8795ae638a7d6f1f9eead5bb7228b6107ffab2d0334239e25559babe388028217f866ee16fcd4d6f9bba499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56480b19f8bc055003b87614f8fc7140e
SHA194f35ed16d133a310df025cffb6f8a2b3ca3635d
SHA256670b000b11811c47313804cbdeb62b597b1d2fbfb9c4041f94d325a92ece1031
SHA512c565244018b3345f07cf9261f8799765dc5aaadb58d97764060d7b5cd0f194436b73e871985669318762fe4c2e505cabc0dc7c0c3fe56efaeb742021b8ce001f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d599f3b388289d5f3e50903789b8de91
SHA16dbcaf50b84058eceb5504586a69f587425d8d61
SHA256b958546da73acf5b4f53d10df00b9e931bd5e6335c6d3aa02a12dd5eb9b6d646
SHA5121cbb2e4c5d3921814ba49455c0bbd6c6361cba592c05f88823ff96d5c06cd971724785cca09023dfd54666120428bd6429810f2e64600d65f4ca15177a5837fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5980ba8c2d74b0a2403d2f8b8deee6
SHA173c958dcf989c148aff5d82fe94f9dfd5adb55a3
SHA2563aeadad074a96a9c90ec5a0780d1bb379919a86d5edca1f903bea687b70cdd90
SHA512f13a1bc75c375186666be28eb48df10be598999eb2bb033c3ec84819af5d71021e52ee3d0368e755c13316f7911d902b711aabc0872c19fb9255d0eeba4e62ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f4727be4e3492a1edec6504837431bb
SHA1c574a772f73bf9c1a30406f7a2fafee65442ad1d
SHA256269fc59502affa7e74bb65ba2e84e1753bed17709aaf4c21a8c2e35e24957d59
SHA5126762f946a9fe718e86098148a5726ca2c2475a4389a74761c4057f0e9c3d3dc83935f631aef0bf5a92b8eabcffa62654cea822a643ec07b3e03059a972ab7948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44d743a78f3f8ded1c2963aeef81702
SHA1669d945f35db60e96c43a9a869919ada81d0d11f
SHA2566494efdd6b3c817be86fe32b19aea0f354554227f4864d6e2fb9352589451f2e
SHA512c0814dfa820f44a337ba302957ce426f388f85c1fea99f7461cb47c4b24c74ae86088e7469204192707d2ddd2e1e68eff044fd3dfe638111008521e22fee22e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a42cca426558ec79a47b61318abfa5b
SHA1c1fe9a5a42a8cb16c7a4f7f53105312ca2587f72
SHA256edb980bad411b0582006395a3bbaa7479a6f4da169823be560c98557f033c1d4
SHA5121f75136536a7b0ab060c9165670afe024640d5c5fc7c6b0b20d4c8ee08ce4aed62489ca366ca7395962a422f934aaa90721c898eaa1cdb4f2f65d5511c296dd2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\bootstrap[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a