Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
48c1f7423fb353b3eaf31fe51804a5d8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
48c1f7423fb353b3eaf31fe51804a5d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48c1f7423fb353b3eaf31fe51804a5d8_JaffaCakes118.html
-
Size
98KB
-
MD5
48c1f7423fb353b3eaf31fe51804a5d8
-
SHA1
dd145c8426705b4f8a93b9516fa37e685ee0b26b
-
SHA256
a409367b9b4bcba2495f5ce4aa1a75d145cf13dade4ee3a4cdcfc36cfb7980d2
-
SHA512
88278e4ec001c129fd0142c124c45dc079a71a35ebbbf51998782454d145bf8c169674f8deb11403bf3a9aa9ce3d06286595de806634d1c838a7cce430593245
-
SSDEEP
1536:/gg2qpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZy:/ggbpD6VxV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bfe34e28a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac7cbbb1e476f544abc64189f16177ec000000000200000000001066000000010000200000009648651645a3b0379de672c0d82659a83cdd1eb2f180fd7ef6f05cd07ac43455000000000e80000000020000200000008e94c698d8a6d0aadb5fda15ba77751c9ad1b21f75777250692d6332ff9a74242000000027d6dcbae3f4600103e751b83b6d28ba458d60abf8485244fadbb80be57d37b640000000f75c1506d3972c3de81b173e7b6dbc7cc0383aff137935b9e7014e637170d3559a9192e891e6906fc3b3c6752529f177f9420fa84b46fe7fc388449123ce2d01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421981283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{779682A1-131B-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2976 1680 iexplore.exe 28 PID 1680 wrote to memory of 2976 1680 iexplore.exe 28 PID 1680 wrote to memory of 2976 1680 iexplore.exe 28 PID 1680 wrote to memory of 2976 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48c1f7423fb353b3eaf31fe51804a5d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d01a68f7713d2eb728989a7c425313
SHA1a9cdcb686adef467afa4666def9c3e52f369935f
SHA256136b3178a215a4aca7f2b6d1f9d693b43de8f2b0546c52cb4bc4b668f5d269d5
SHA5120d9977f10cd654bb9e2a7912879b740c6cd8ab8bcd3c6c19daa483ab7612c8ce8c80f0928230cb0607ab4176c2cd9f6a70d61783acef13ca6440e66ff92a5632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58770fc9c3d8568bdb27f4ffc4b9bee30
SHA13a0c97cb9176c722a7ee3d1d4f6f855f6f63c5bc
SHA2568080b3d1656b6694b56391d2067ab20e2c240e1b170aa4e843cfc18e9004b214
SHA51270bf5c6c82986fff33501447d1922e8d82a522f08a7cf74ae6f0b09f7819782493aff7979c30c60a5589d32d95a03b9afafe567d81472c60e9b57b860034d6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea0484dedf72f063a7fff3c5054bfb3e
SHA18b0333dbf777939b2e6ea38b9d767ca8e59c78b3
SHA2565acdc9e693b199d6568603f6e0276e109807b5317b8a298fbe88583c84737757
SHA51286dcb53f802d01b791d06eebf35e50e4fad1a23291c87af5527a410ff09152d979ed67f5eeb80632dbc7621f62cbcdcc784d396be5e87bbb80cf13e3bb10faa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551180d4abd855d46963a47eca121ac92
SHA12c13f4597f354aef14e139f40052ab42463ec378
SHA25654a74ec46db3278f0ded75ece9e9735f56aca72ebcc87fc992c657e744177c48
SHA512343cf4f1be02ccd7f0bd12f5adf07bc8b77405e4e1c003d770facd79c2b4b208913a54867b24f81b3382244bf7b5c6e96d3a9993b1e0f218b7dd97d73824f8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8798eeb695737d4e3d65e630ed4e3d
SHA177fab62dfcf879671e6b0bc826c70d8717a8c712
SHA2562f63632d57f5e4e00424a067151f77a56adcb7861e06ce6bffa3f2ecf15fcc05
SHA512fe6e2501c880a6fcbe0279224e124c5fa796554f6090907a3daa8a6d8bffdd393fc3917c069e24621b9f60b7473cf9f0547c774fb269a42bedd3f502fb39b01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55566c16756eb4c22038a2854910ea356
SHA142bcd41e814ea741fbc0cb172f60b7cd60bf8db2
SHA256fc217e2576c1c521da8967109aa04d8c1c7600eec8d8b197fc71a2c0af3b7c08
SHA512a5f11745406ace5c6a5e272df8b301307562b2ab7a7ccc6ed1b906155bc17f5f5c2e2b6ad4a001dac2ac4cdcf8fe1288c982da1784cd8b435dd25ed70e8ac527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453321cbf400dd3ce15ccadbcdfcc710
SHA145e2d0c8818f08b03cbe47264bbd71e8e91e2c9a
SHA25617924077e3174b5f4fd52ce23713606eb5b87cfce9a12d58074a66b6ba5bac00
SHA512bee7723847dab351be70e257108a285c5bd76405546db2e66969872656b3c3369e9d13508653ac987d04619f2e566e63c8a42a66aa8e976c90addb9e4560d5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a874ded1ad4c99b7929086c2af9369dc
SHA192ac7bec3c5440e0fc7b87524ed313b43e7a491a
SHA2568fa355fb1440c8ced76c34c2724b1f6b36cbc2ff9085f9c604827030a407c02b
SHA5121949bad365453659994c24aa5e19247c56e6a41a5e8596f51ee4f52404fcac912ac40f7f9bee76f6bdba999db2c8485b3669bd5ad60acd4ee3fe5ab57c6ad6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2675e559af3279cb9ebc8b3a72a4c0d
SHA13cfe280b7c67095102278eed2edb682e90e0556a
SHA2566a1361d37c094d9c054d31b4e73706efc4b48e901e45275e654edcdb1c763384
SHA512c417a46055e27136d94cdd21a48c0e7236e3f9eb3618319ebe1037f7c2289bd8340c828153e9a9a5ed6a5261775753608dd6149b092940264288249849491957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d8995950b7534a972089c43da545e09
SHA117728e25db6d47c5cfd8eeaee45bc5386dd8623f
SHA256607d024cf278c53b31a8241d5230fc5f2656487af9df4cc6793b323214e2bf42
SHA5121a09e0c8de45050225f107413e589f5e84e2f44837a42680ad33d4547314bdc7c80117b1938636ac67180eea45a33980adb17c17a2f42f9024bed6aa65f888f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f97d2f01d27df18214d9f4c99c22d5e9
SHA1e9400cd558ad68a30a471f131176eddf0670182a
SHA256b79979a749d2b1ee0338e005eb1c075bf550e0e1a0e76871f294a15cf5652c5c
SHA512dc91395a544e88f22989e225055bc2d5e2eaaaf067481766c5cbcfec2585fce0e03430eee36363a38c6d6a7c4a1390b92ce2b92cf8229e0902a61f7c7586b089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07a4b14647ed5d5ef6fbb5ff061a7ad
SHA147f6db1a9d7541d4985a56736ebb52bf80571c53
SHA256c8ce64b313b7b722d203a8cd0457b84c09f513e7a28616548c0046cec5f26b5a
SHA51253ff57ff8afa6254a5489b2805c7ca51b15c79f83b46eff57db439992c3a2f4aa1025de1aa6b29d075695c82b6fb897957c09852d38703565c5de0cdd6318e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568e8bf7bce7d668d06f43a2da2bc2bba
SHA11e53fbfa461eb88875bbb470aa002e1557d21bd7
SHA256c42512f78996f0655222b3470169f99631c0fdb1130d3722e2706cae9f8e4cdd
SHA51227e4cb5166ffa6c61439bc8e7a9ea07dde4606cdd7aa38db155ecff41c3a1e5e2f8103e4ae5c491ab197a99137d9678d44dd67a665773c7bf10c2c79a626e3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac9b841052abb686b7193ecadac0039
SHA1c4ba24b166bcb3f16efc65bf1fadba461a1710fd
SHA25628ff576172c5784db754de351663b9b018f635cba95946c7c129632067675c7e
SHA512a7ef869f6ccd8e941710f38ca1f143a728e59e1119272d4f32aa00668db59cc5e0c4a48ccab56d5c2dda82d6438a19f401a43642cf893eb46bfe94cc5046b804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565df61fbd40284907e46fd18f3f48194
SHA1af37b839e07763d04e6793483e3fc43f6cc01522
SHA256a4a1d122e6c78be9f1f183bbf7b867bc91e23c0069e2a5f063f960bdcf8bdfb1
SHA512fc92e4a73d991e2b7784f3b50c10243accb05a09e93d918d0b5c2d86f34d8f01f53861433f6e13779eab037dd41bf95fcd1b54ac3ae203e1564b53e563a5834c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb43fe9299421cf5bd7f8e313ccf7608
SHA1f8cf0780a348ae1e89fa032069ca07415750c977
SHA256e78271612fb4f17c79da47dcf36d5160d8f5621baf2203f84d516a52430b0899
SHA512b6490acd3b83056d60a3361b9376ae5c3e9c639822051ab71bcc64c93d891a403919e4192ea3777fbf823e37ccb41d50997215ab61a97db237bc4f752a414a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d682d752c3ff997b33c705d039e5b6dc
SHA16d67c0cadf62448414275c965b2d7519e35d8ddf
SHA256af16236a71e367399b1081e03b8664375823b8b6dc28ab2cca8915a8575562e5
SHA5120dc1a6e974673acf69ef06d263f89641d3ab2f03afc9a548480c46fe07ce7531821c42c6b05bd37d682da0aa42dad662ab863851aa2a368ba2cc10cafaf10cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c574dc87fce7fe5b712cdd7596b58551
SHA1f01114a4a556c5a0e4faf2c00111403fc3a753c2
SHA25656c0d04a52b5cb76bc90d5233e7428f5d280f3aecabfe389beccaa0c0ccb33c2
SHA512bf50a1d09835f90f7abe7c13d3a44d2c8f816b4e0d4018e93fcc64664dea7789977ab01adf55e65db8bfccc2ff6ea0c72492863be9de2cef450fd8572762610c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4285c860a2400443f087192e6d98fb
SHA1df4616109c169f4cba8c5c2bdeaa6a3f730a2cd7
SHA256d36c8cae782bbdf5f88dfc6cb37e6b189374cf6149a85a7bd0568c7163862f88
SHA51284b5e33b0e540e4006aaa749923210c3c0c9bfaa637ef82e5f8e638e1cfbcc898f01b16cedf48c9341d21ecd9d35d8b336e022dca24590804b364e66c725814d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a