Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
2d80371f8cdaa4b28cb9a2e365abcc99_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d80371f8cdaa4b28cb9a2e365abcc99_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d80371f8cdaa4b28cb9a2e365abcc99_JaffaCakes118.html
-
Size
29KB
-
MD5
2d80371f8cdaa4b28cb9a2e365abcc99
-
SHA1
b66714ac402a8d59301229715d3b21a3d096104e
-
SHA256
71395eaf06c3b1011d00f905cc2b6bb3cf9fc5a7b0b690b91208ef80c70b1c82
-
SHA512
c7797ac8b55c5ccc7d04c0e7ae5666809ed99c5be238c2325cecc4aca03700740cdb6fcd44402f9edb8793a44e2e63996504a765dbbcef4b602741d977f620ed
-
SSDEEP
384:F3Q/gB4dB8R0eeIjeO9Z58XQ+dOQZLVHkhl:DBweBe0ESl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4075f9df97a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B423CA1-0E8B-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421479450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000457ddd32b34d368eb6ae05325a6dc1e3bf0f13ae2d9eb443574d41af0e62971a000000000e800000000200002000000058e3d8b5352754f27978288515edba69de7c98d595927cf93550c09d16b6df6e20000000bb76c0bc25b3f0f52ed4d88ec15f26decd460a940bd23a6a838d3a14683cd73e40000000cd017080bd5621d2a506beaef9b03408284ff37e55d8f0692226d8745c538714e7669a1b8293a711f91f575aa15cb91dff1a0ee44b9b9f35f67b4622cf36c784 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d80371f8cdaa4b28cb9a2e365abcc99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f330c665ce4f08310aaa591040b67c8f
SHA1f0db5bfc4903e699c2d74c1af6433a03d7d265f5
SHA256509743dca1c2bf42ef39227d386ae60aea250ba461e23db0d3555e175253f862
SHA5126db108a6f7aafd4e30f5d6b65e113312d33a1344643341711a1d4f71b919226957fc295a67b657e8ced7497bd05c4e5f10c7ef9b8ea0147018148c01c2ff7f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16b9ae17fc4f263570aa39fc52f62b4
SHA104685d766cfa94059a84ab7dc151ff7862cba7e4
SHA2561bb80cf1c58e95ae439e334afc52f09efcccba51ae8f1395978aae6fe98a30e8
SHA512737b0093ef4a8c549aa9fae94c18032165fc888fce887b66bf569adefa1d5468dea6b17413e54272ea4c41594a522f1564815fe3e477d1b9878604ac45f92be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c356e52654418270f0866a41a3dde5c
SHA1b8731359cd5ce35de530f5922780f1c4f66aa2ad
SHA25674366a4a7caa0e5b6657fcc7efb838919a88b052605e0dc41a82a09d625f9eab
SHA5123c8daeae68fec6e96f9ce6691eb079654d2b114a7532fa3d9766f8570e4373cb1864b5fcb414a331e27198161c9c0a60cfce9ca8c01e0d5261d2065d4b36576c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e985e5fbb5b7a1c54361310f29e353
SHA1a7edf7416ad1e9aa578e308fb8dee3d0eb6eaf71
SHA2561f93187abee3268d2b6a8bfab2443c60084bd8ed99355fa892b92fb10239fb3f
SHA5125edba10906bd2330c6f1e9716c8a5870b2894b6953cbb8caa22ffb4d83a72b96d75cc2251311a0c4630bdd8a421e0f97708bb622bec340ee6f147c148ebd4a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a7f0dc69dc69e8cca54e517883a26cb
SHA1fe8a300ac9fee298b6b869c7436354d4b3eb51d3
SHA2568e79ba603fee429a1576279f6a046304638c39bc75da11fc52582bb0da52ef32
SHA51277157bf26f60c77e75cdf12ec354f41e307ac3f0680c0062150f3783e961cbc3aa28404bb84ea8089d6b5742d1d76c3ccb1595d748033f3e156afded423567c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b74d8619addafd5e2278e2f67684a6a6
SHA14918cd1167a10e49be0783015f6e817e641519d0
SHA256b5fd75979d5bec0af4679194df828c488efa385799288f500638668851a8c7de
SHA5124df4420d524fd75a82e9a03bd13969eed3f875ddf7e4431e33bf2703496c66157048946ad895e6ef4d1209a66007e9fdb0dc712d47e05b6f5da1e67505034f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93fd91e729f8e354d1861fdd4fa74a8
SHA1a42c9fd63c765941cf3211436c4cc77d0827955e
SHA256ba1301d1e88dd234e196a517fda5f799b55a30d15842b14653c00e1dc7f8bf0f
SHA512e8ee855da4049706d89f58c6202f2b8175ba5c3d4fcee5c97c37f0e0d9f37ffd7b3025c459608550710a22a48e84de907629d95776a82e2f3e0729ad5a4d8381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc652c998b39da815c248abf9f7bd84
SHA1df570c4e8773e0c3a8eefe3e7335e5bd850c363f
SHA256509c71b2725bc1fb8707854ceb26ee5ae59fa448272397056a15c5f5e6946701
SHA51271bcbf2819ca6ae63e54d5ee53700327e2bfe8043e398c05faa059df7127c3fde61fe939afd60637276c8a279c1ace63ed84a29c24809226e125978ca4742e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567aac7c4f3cf29477a5fd1da3d8dc1eb
SHA1ada5ff958762bc9e82116b83705b7e03111bcc71
SHA25627452ace4af3ebf192acf2bb801f9696a82ae6b0b86ceaf4ab40b4f6bb6fcfcc
SHA512353901839d955001b159de2081864648b587446a45db5d0520eca33b45ed2d7a27c0ada11aba5ba7db365d59c40cb516682a944d38b81357783ba8ae2eb58ad1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a