Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
4dfd1d2c9ce2d1cb6ad0e7c500580f10_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4dfd1d2c9ce2d1cb6ad0e7c500580f10_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4dfd1d2c9ce2d1cb6ad0e7c500580f10_JaffaCakes118.html
-
Size
68KB
-
MD5
4dfd1d2c9ce2d1cb6ad0e7c500580f10
-
SHA1
8f413139776bdf5284b093eba7839e2902a47ee1
-
SHA256
d788d77d2a4034cca2b5c17c857d69611af3638c39fb68be6e56f771325c56c9
-
SHA512
b470c55e47c26d881f25728db8edfdf60055de79c0fd6de4355d3d7b9f46bdd11c6e8508c252a25e64d231c638d1655130a7497179b735475afcc94497031d5a
-
SSDEEP
768:JiqgcMiR3sI2PDDnX0g6NuhZaPcaVIoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JO7PyFTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2DA8CF1-13F1-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501d93c7fea7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422073403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000001046d6a70a0a273f9e3a0605e39d7bde5273cbb49a3bb85547b4a2dbcdf2d3a0000000000e8000000002000020000000b927967b9f89ab3e0102d9c18397dd53d37221f9367d8844914f0fff989476382000000061b5c3c12b02365e18e57b54410d4ae5f84c712cec8d245c69c3384c71e3f576400000001cbe59cd5e922128e3a5b5faa840bab547a9cf71ac80320a1f8df9f52f6d305d5b41ef4c477b322407b2629ed14c76c5274408e03f9d8a78f8d8106bdef60595 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4dfd1d2c9ce2d1cb6ad0e7c500580f10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5313b4ae2d4c2e68b8ac10e2bf3e3b4
SHA13d1de0bbb8c669227fb1e4bcad95fa1dd07e1405
SHA2564dbc0f23bae4e5d6977c28da93fac7342f2f5603472296772023fcd2c23d6d00
SHA512d3b7013b463bcf9c9cfcb61ddba6b338297fbeda8e02cf327a41d7c3c5ce6c36ac09e260bd1e3ff357da82e917e779232bc174896aacc2d85178444e62b2e35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343bf8c8bfc89a7be58f87a1af9c3f07
SHA1e9043c418d0ab8b17abfe957104fa7c67f3a7d34
SHA256edeb84695409f27a466aacc35d459cdcb46d35514521972be3e3d9294aec9ad5
SHA512a2ee0b5c3ac320f0a4fb4ab942cc5a24da0636cba20a4402025e4f7fe1bf8b520f0092068cb3c2e28492e48efc8332a3749eb6a78001d2583f4a95c5f8c77ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53653c2ac88861a2f816b65dffbe1a44c
SHA16ff2764f4ba858753f3d57fc4bcf90b1a32459a7
SHA2566b2d484c0b5d0a98f453998b584ed7297e7ed71a5e23b7cbe0fb6f8cb472a56f
SHA512ee10c7f91234c672b6df66e6280560e53f0f538be78339fbe400369c86ea90d9200959d12f2d4ca252cdacc3d3fdfdc1077fc6c45611c6ac738efb36be8ff323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a94e764f276b84e30e0113f81bb2da
SHA17215e7804061725721a1a92bbd511d914514b53f
SHA25645840da68a02e279ac4a3e49639854dd9a26fedacaecd9654fa504db7dd26011
SHA5125a7b44dcc7d0cb3b5420e1a00d1121a0522b67381f96c851d9eb3241d29af87769ca5cfb0d04af5dfb6bc4b7bdc6faea2399b6b939123ac3a41e0a93ce56ba71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e974f67a500dd83b01cdeb1b2cfe42b7
SHA16e325dc0e4256b51982864abb2748747b5b5a698
SHA2565f3e3151d63100aa40622cda905fe1ebdc28ac561da2970d37cdaf6c24ddb82d
SHA512e2c9fc44debe3fe37eac573c1b5f7d9858ebf8a05fe1bc637fb0c573966be21304784c73232ca53db03debd8c150dde6997c901268830f86c5d6a87951e73da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548816869fec82b3be1b391549bc3c94f
SHA1bd10fd48d1ea3e7925c57da7acae57e4ed6262de
SHA25673a58c69be498b2d01f565a019f5e9f6b796f95a8840c2a6d3ede04090cdb9ba
SHA5125e909611ecf22e9e7e556ae32d9d23e58deb0a92c3763a0a2bd272122621d8711fe592b57c541b6eec703b329b3ab3a0803af4840071f6f06f51eec9cb9a6fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553266f300d1ac807185e66255cfd14b
SHA1a6b71614eca4b6e210efa945a1207ae24dd19b0b
SHA2566bc78d50b2a99115f081fd3666bdaa90ea86bcc3fb55d13898a81d0db07a67a6
SHA512983ebc5b9fec6e33a51df1e728f987c2cb9486c8ddd50374fdbc1732b3eaa6a044296e1d993b9e692bc30e94c27b98c75d03da229b6d68fba528ca43d252a39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e754e27eefb358d7def7257fed972475
SHA10f97c93b7ebdb0f3dd46860197b3f39607b5b166
SHA256bf2e4e4282e3c0114ebce96970bbe11b6af12315a683076d59527aa54758ae18
SHA5124a9344c0e150b681d30db952855075842caf4365aacdb2df596afc077c04ba5f183c9f8d418fe3956b56941ce6615c250083170c0f5386957d4cd7ef3744cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9f4e4332f5d06d69c9c62f272a2a2f
SHA13015d3c8cf8276d966332c7fc80932f1bf846189
SHA25637cbf396ec57db801f2d930cd99f0f39b7d5fcc977ed2c91cdd6d7b3d61d23f4
SHA512eaf69363eb3b6c1b76c7624cc40ab3504a995c00fc33fd9f1dc7bef3dcfcf15458e4df07b6a6afd54353fe83618506526fc81057d7088d5f8e444eb27840060e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36fadd1cd12967b6def972acc293701
SHA158b04434c0846262e4e2c9696a8cd0f2b232119c
SHA256143e07d9146464b51386135995a0e69ee8172e71dabf702bc550de91731a5b62
SHA5128239d1eddc06dc647d0e44101f06f72ca2f2b67693bd27a883914dfafa96c7f3a2f7769b6290c250e90dac16d7eb4868a0b123153ec9f1f067d7e10adc5e91e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547407ea8c7d6ce3a954f53b0cdb7fdde
SHA1931d456f74aa5b9e2d7a7a17f9c4be6eed446367
SHA256cf692f8f6fdd739568de682f49fea1060c4085f36df278f8d5b6542825b279e3
SHA512373277a6bae99f3f434c75d103681ba9211dac4a35eb0d1299998a983627a89a05beac0485d0720ca4a7650d4688ec0fb1fd821c5d4396d047dc043894aa7993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560df25e4ceecfa0c86ec67a5bced072d
SHA11cc81fa0e32b432ff5099fdf9af84269ae1c7e92
SHA256644907144195ac4c1618cc4e77d1173c8ed6b845579f058fba8a199b5c6479a0
SHA512fc2a8c5cc35f9bf842819edd69bc802e75bee8588b94811eb015e1c640de97fc7a7c4c62ce652ade818a39b1426214c72d8dadeb342cd92f4bab9e278c162970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2fbdc79e4ecfd21fc8ada5b73b82214
SHA1526c25362c3c661a0530bbb97d36454eb0e4e207
SHA256ac26fc6bc4658596d90913ad2b16ccb52632f976406d6d7b1bd247517e113a4a
SHA512c7ac70c87186ee34ec1d652ea59f43ce9bd424f5ffb404b949558b7f6efcdbb918bf8415fbf842f85f8ed3861e10b82751a954f95098e785e8a68c4bee72d5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a703c435ff9dd3708d11e47a7b06319
SHA1a8ac84ffeea38ac70c7747583502a13595d270c6
SHA2563c3e410609ba80bee953eb28d96266b67f18fd17a84187e02a39564eb0fc33e1
SHA51299089cc0fd0d22fc1b6be6f89dc9702e6ff909d954dfb95b758aaa4104f52f176d0c9240987dc1ff7b56f2b91d29fb0f85f704923f319245fe6ac08a61094a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569244fd3a8d7b5c37211567a119f1e4c
SHA15ab5d8d30b2edcb04ed3c0b2807171222c4c928b
SHA256af2a4206092e1defd3dc98c5e22323a497834525e9631bcaed0a0e102bdeda3e
SHA5122d69ece4537f44bcc443c8f832df9c2b52f5bbce7d23195ab1fe871d0c28ae0655dae530a24cdf660b111a90dc5dda7abe3b05d27fc26d0614eb83081323781e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8e23d5d2167c54719657c795ff3e41
SHA1cf9e83a71c313feb1de1b66e1c839e9be7530f5b
SHA2565f4110d43352400dda184e08a8cb01a753c0242de58fc871396c43b8112d33fa
SHA512ece04748c9435462cddd30ffd1dc800cdda2e9c87d0e4571099ecc5be6a6b4ec11495d79c8026bb0651b242b2be21ba0aa726ad07d62403d07bf39cfd36b27a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d6837d5189b3fe39841936030e9cda
SHA1c6b85a334a9339bf85b7b955ff2d4f1dde894639
SHA256e858a938bac6b41b05c4f4f8ed1961a0f6322dd3c3e030044fc3d9b08846653a
SHA5127f48cd173cba9f62130bb4d1750aa4f0e3bb749452c24ba1c82197f6160ffb752ca8df8e5717989d701588ea70eb2903ad8c5e9a48b010cc88b1a5d92a667e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56584c2fed751e07a408860354d3c636d
SHA1b0990f989b969f2575b8b5b872f414601e8ccb4c
SHA2564e702aee53e9aad1c32f344f3146625115c94a44c729cc21fea07c6e556355f5
SHA512720f3aee18cb3cff6ada46f0db9a73c27ab4effedd2f7b9a680a0c9fc918c05895a5cd1313f4948c4590c1ec2964a933754f3379b6ebe69a24f3be8c2c7ec86a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a