Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
4494642774d977ba465fdaf6b5b23dcb_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4494642774d977ba465fdaf6b5b23dcb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4494642774d977ba465fdaf6b5b23dcb_JaffaCakes118.html
-
Size
4KB
-
MD5
4494642774d977ba465fdaf6b5b23dcb
-
SHA1
6aeb52c6f1142d0d1fd85cbf0978899f6dcef67f
-
SHA256
5b53948a7be3c773fed827afa631ef2804e8a85b717a50d6f010ec3daaf29fc1
-
SHA512
e59245a35acb487ff09ca89fbc8f162210656de5d58b212d375b822a5da3bb16120d30041262dcb04cfd6533d2cb665b44cb4e4575c01037567c1ad85b5dcb83
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o3Dd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007320ffd0822fe6317e3d58915d92db660ee7f1cfd03e731713cad81a7390d9e2000000000e80000000020000200000007c26026094c6cb9dd4c3c972cd8a1a64b9fdfed364a3b05b2e797dce24df5b2c2000000001f72664deb4d9eeb5191ab216588fd3c7cccf8d5305bd0c6d9490707fc82e22400000003021fcfb83c3718c05bb4e0c41c59d7934267bf19d9655ac779d3b7b6ea0519bc3d1e881a92e42562ca495acea8587f2ac729b4e8cb7a35752dd5abcb27ab0c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d039d29682a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C25840E1-1275-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421910112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4494642774d977ba465fdaf6b5b23dcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588cbe0ad38eabda6d4debcfc889919c3
SHA1fc4ae1e99ef4c29a098cdcf000a3433f20d4a440
SHA2564ee66cf268390e5c7e5d988e67bcde75d81772ece5e369ed8af08d79ab1026f0
SHA51217c9ca7ddca0dba5f4913b337735928bc7a8d30bc09edfbe903c26f2d9fe1395571ec892242b9fc597e0a5af05e3274af693e3a2bfea86b65d0eca2ac1c6ec8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408b196ddfe5f690902e202b420688ff
SHA19e23bac366b813356e69a409d464255a4e9aa22e
SHA25696769f92213e4c95090f4c4ecde76673d7326059884f7e2a61fbbff92d6906eb
SHA512612014fa4bf6657114af0153b1a3605225492619d4aea03779ea245273eaafe98c835a75d48384042aebb7ef48759df34d8f928b90e3f9cd62d3d6533bd3d289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc3274bda6936995e1e9ff348627272
SHA1b92460c869ba8e27d1c93df65ccb97665ead7310
SHA2569ea4256dd8d9d2cd76b90337f096762d1af546592e556321fc2569b4cbd6c910
SHA512a4d8d19de480bd86710c5f4204dca797466b92961336ae635b76778b03abdbe66cafe7aef951f6df3fff7948fe6e9ec116bcc07c56998fdfb7f5d09140d3063f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a1a03983597811288b1d697954ab69
SHA1471a153ab145c653f2d03073fd139e6f446b23a7
SHA2564baba7b6fe0e820b8c33fef1f08c0b0e2c23048f9479c41830af16066e46ea78
SHA512622f518d05c2d83cf0e85783426290eed4a33bf90e5793816d97683ce02ff8ec294c2a441b5beea933e1c54e1b7603c2c0d55041767fee9b8514e43850823f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579cc92eea69dc5d3dc6873eb4da666b0
SHA13fdbb8f1ec641e0ff97a00e75f7c44f742ce8526
SHA2562dd6344677e446d2e34b8dad720e95a336528bbc1a9bae68df9ae3fbb5decdc5
SHA51273438f213a4af3aaf4f46f53d06808c53514c983a9079f6c5a29ffc5e68707f03ab8640468c41a0329459b38160ebbbbf70caa32b1278e9e167a0717ad436fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7f597a39dfbf8b2fdccbffee2eaf23
SHA117a77d3b1b3013c46c7ebd90043e0ef9c640ca73
SHA25677f9701d26311342b82c523df006c3b936d20094a8880638d6753647e4c01442
SHA512191a743d732113dc29d8220847bf78e27711f7c85f36879333350dbe04aa7ea16098b2623c6dd1771fdedb1d49b447329b7cf78ad59999ee115d038418c74ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc6473ee9fd4fde70a0bff873d1b400
SHA1fc623b3ffcc72cff19100580e20e50d0a610252e
SHA256238d5bf49bd352f5ec03b14c414da60ec58c81328737459ae5b8835a4a545ba8
SHA512dd6caa9d97eac6137df0389e277c8f77bb4c2b99c040990a2478a279f02a81efeaae766a06bb1256b81321d87320d3f3132b867871b5249b9ff6abff896b7ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03b29e9e662569d9a610442e64470cd
SHA185c2113615ade61a361757d331c8eea6ddb2a40b
SHA256a9e9353a0b77071b36c439faff86b3e99a7655facd4a663bbf164e3c0c484834
SHA5123c2f0dfec86ee67b3bd91add2efce78acf89c03a66379a5144504f49a3aa65e79ab214c4e2ed6f26e8facbff01e4e8b35ab5a9ea43e8f383277033199b082d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b4acb4787bf422a6c7af3c8dba6cf5
SHA123846a16b05f3fe412f8bc82ceb3664fcec2ca61
SHA256608b5be70a4705a8ddcd8d6f7cafafee2db0fb5a442e46ea274947831ed8e5bf
SHA512c5a628bf807ff88f600e60658f269c0d13fb12373bb3996471cb045d677d85abfac036b6020e66311961c8a3ee62f094ce8cd45f7ce58fb3fadc8a5ef8e82f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2e19eeab17574c84f0600995a904321
SHA1de14a53247f85eb5ab7d18ae7e79b8b72853344b
SHA256b60d58d222f5bb9c13bc855c6f57f36d9911e692de62b71f94df036a3479d35a
SHA512b765f2d4c505aa429b5b52dd236ebc592e5fd9580654b133dca1b7e596fd57b2a09e2291cabfef4abedb03b68a6883cfdca3a42b8e9997b842a70401c38c49c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5f2d94816edff2392e0051741279d2
SHA12d8a7240fd850aa5c6b4fc15cb5393fabf5becbb
SHA25685d8adab1f5a7e82d4cb12aebafdce86e2c8ad2777976509b78a689cb6de7c40
SHA5128cabb2d15ca68ca8ba1781e9b9570c9b5bfb0f9297a619bddf15100540d2d55349171309bf32e4cf4fd3235dbac1a89eb6262be7fbb48e891356a79da0511519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55548cc607db1839b47c4569cf34b1e5d
SHA1ce39014fc2bce2d15593d9158cd05a4a43d3464e
SHA256a6e95428203053cafe209aca6d19eb9521c6e80fd15cd0e7c9c337b829932a3f
SHA51233e3503bdd7833f450ae564bf2fac873733fa9b3f962bacc67e327d7f5b4d5e721df6c82be15462a557cc47c088f62777c20ba75a52ad928430beac75fa44272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530cbc1232c8577cf3a9beceb050430dd
SHA160e0f889da2981437763e99d91ba6cef00891e15
SHA256764ec9f0264071c15ff1e18231c03f47b60f84503eab5ceeb85ab19485d85782
SHA51270520bc27ba2f2fad92e5addc71b80ae0434877922b128f717a32b510ccf6e2afb3cc94e0cb406051a3e5e8303a10e4fc5bce8a4903ee69b32d38d1462a7308d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314d96aca42ed6d28c88d66048e584cd
SHA171d1cd7c1514d449b695e369e699f67d81608a55
SHA256ab230f0dc399cb339c2590a041e6f27afc7bfd574191a0f4e4637d2f834c2d9b
SHA5123da5a3b065d0d7b1f4fadf63d44112ee9d7eaaa418dd67cc30f23ea90d12b9438eff7f09d804f80623dc77a39664dc8f5a3ed71d1a204af606b7f080db265186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7303e80e173a7372f370a46d0aa02a
SHA14a1a0045b2f6436adfa65d223294ffe7dcdada14
SHA2568b85ec3fbf7a2c2250e3873a68a0bc96253e397e8aa7155d233ba047a5dadca5
SHA512ab8795f2091dbb68f503e408debf37bc5a72a7e91824dfa6d35ddf02f474ba2219326f85081fe39860e82ec37d1f4964040218fbfc99b363059c8a4323753d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3552170682b14020c44025e5ae39ca0
SHA12ab024b7e8884e267344d56f05befbe58b334596
SHA256016fc16e37a5e8f336e66bc1f6b85ffd6d8baead3a4d69762ad53f8e80e8eb7d
SHA512de8143ecc3cc2587d0594f2ab586bac7f2a113ee808066a609997f3ec702f7820bf817088fc62c1a880e96095be14d77c2b5d7d3e01f16b9abee0c87e1e4e90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0b30289028ac23065e5624ce69fb27
SHA13d217e0b8a50a31a1c3491736fccf4975ac0ffc3
SHA2567a08b98d4069a7cee6cf43efe602b1dbeea2174f06143fad67b7287ef57cacae
SHA51242d0c0f487fb0737eaa883e7e10bdfb45d5347d484b9fa728be3b98e4e882f591a878ff1e1e85c1f52fb19ea5d5e56ecf3189a10fc0e75f8e1d6db390e845a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f187319eca2ed80bba1351f4192612df
SHA1a6e14b641c900070bbb9fd48cc82faf47d314f6f
SHA256fb362244d933c28b306df99d70699cff6594586ef67e0ba677cf1315a298f3eb
SHA5127978c5326cc42ef5279d5ebc49a59dee1f12e023d16ba853b58e4ae9f6919d5c72fc59ff2f6278df75cae58e555fbbc13d75bb6415b8a4e19b4076f485f712e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f5d0995c5a115d06abb1e87676605cd
SHA181e9c59844dcd9f87e60516b7ef637c322f4d58d
SHA256ea0d76e8114849842337ce2107dfd98f2dd8d4f5b5787a637326de080662e2f1
SHA512d889757e0c482d70c2743d7cd63054ca118fd7471e8d82e81eea506039d4a4008300515e2c293babd527d3b1a923995b4e904b6f51d2e326a6400527faf6762b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a