Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
5fdaf30a5c354fb2c844e5895e1f5450_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5fdaf30a5c354fb2c844e5895e1f5450_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fdaf30a5c354fb2c844e5895e1f5450_JaffaCakes118.html
-
Size
69KB
-
MD5
5fdaf30a5c354fb2c844e5895e1f5450
-
SHA1
82e42dbb7a630c1b6498c4e14dca90f2f4fc04ff
-
SHA256
2b9593fba45e84386681783932601d60628293f5b0031e9198fea3ddcb8d562f
-
SHA512
fe7c84026cc21014f5bc949fec584351dd95b9c3281b12e9c2fb00ea5dacd4621d3095d54f78e1e3201155044b2e65df9dc99fc4b57819a235842e7c35a99d4f
-
SSDEEP
768:JiQgcM/cT9WDr99DXOIAlh5K2M76oT2fQC2aZZ1MdtbBnfBgN8/oAOcRWQFVG8cO:JIZg5IjT6P280tbrgaYcBnz8PW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3C63DC1-16BE-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90da6bb8cbaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422381326" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f83208cad38e2a0406f7298ffae0b60b3214b90cd6ac2277306ff1b8b0c8def9000000000e8000000002000020000000b91387ddad24d11d7b265a879ef3f064d376013bbf4b44ddb42c7e4c298de41220000000640174eb3807a4755d31e5d5f445743be1a49dd49b460dba5523bcbce9f02ddd4000000058e444145ebf0131aed622899011675f4240de2a0932a358e86a8c2e2edc4d4f95638ab2471936ddd4ca8bdad9c222bff3fd6480ec0e3be392421aa8c3ee66d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2480 1660 iexplore.exe 28 PID 1660 wrote to memory of 2480 1660 iexplore.exe 28 PID 1660 wrote to memory of 2480 1660 iexplore.exe 28 PID 1660 wrote to memory of 2480 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fdaf30a5c354fb2c844e5895e1f5450_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db33779bc273ae1e4044a3fde9eab92d
SHA12f4452600d3c426e8f094d44ac9f41db9f3aaf85
SHA25653336ca914a94b2f00e71531da2c1a29024c534e191803f6f0c7930dd9f91ffc
SHA5127df3fae6da3c27c0744f8563d09a312bda10913b4b7f770e3205543b12eac606d1b0fdd2a851946c9b7ff838e1a8d5da51a00462a380489cd13eda790364ab5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7bfdcd1b9803ec558832e8f3cf7bd10
SHA1f038af684265c09cba8047ecfd6c173ea8d301cc
SHA256990f0ee6a4c0712ac18907b19263995681e0a47af1953d98f5f11b9d84d7c524
SHA512e1dddcaaa5c558f95f8a7019087b0f6b9d594ffd3a176d575fad8902f29993b20ea8fc1c0ce225476c33c546c2125e8b847d0ba2264f7514eff4c5ff6dac61c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbeb74476a25d92e255e8632c0aa0606
SHA128f6efe525329ddea72e58375294a2d18565e868
SHA256039a0e3c8fa784dc5b06240115ed29c1f40964dfa955a95a3e8a0c25ed1cf4e5
SHA51284bacf14290a29935d1eb17eeb044977f3b61050f0dcce515dc2b38abcf37eac5a49d2a632a597a65a6f1c3dd2eef788a8e41a51c73634b5a4a8818336422a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5093afbdd3cc49eeb6a2553e1f4177bbd
SHA1841afd7e66c38857f9cdffa923bf02036f2907d2
SHA256fdc94259fffed57de185d504995d19003f7c44ff524925ea045ab12619480f95
SHA512c8358c23c62fbb369489c236c872d47a2f45e8012e8bbb9edeb369594608cd3a782fbae53f86fd52e122d34d372a18891e6df3069f8503ae79b75fd9cb04d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595543c1de32d044922bed86dce666e6b
SHA11d90bff0c7dd74b4f7534207466529fa927a12ba
SHA2563798b4d4c08f8203495b3f5241771dc2eae3a3742886ecc6419cd968bc7cf501
SHA5129c6467701dc188e7a1670c3d575c71eebf6159d312d1ba0965a090db664bbffa0c262479a30bea6b30f21738dee044ce1049da0613755c99267a58d5aaf03c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a85986298d76d91fb4ed3e97c12e4d3
SHA1215e7229f4dde759a0ea182da6aed0f276636083
SHA2564a0780f4376750e81b10fec460bd9485d9e2f71f9ca81ea93f50a40d81874716
SHA512082cc34b6a84a2821f53514f56062a890627fc33dc3e9dcfe744b588d571fc0b1b2f5771967e290bc06cca524d40b5e09d3ba77f9ac1f9637afb938f6835dfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e43312a59f8b2bcac3d38166b57351
SHA1d4fc583f3320a941d6edd8b29a68a3065054d260
SHA25647747e897dfc5fc3a6bd9e43da2cdb65760f17a110219626462d84ba42e67383
SHA5121db87cc136946968239d648fa368b198e6b67fb054e1a8db57445671dd33f81d797e57d84ffe2206eaa08b503418eb0394432559da2e913216c93d6220a483d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575b585d1850671b00905b14cdda567aa
SHA1a666d72ff371bc00f3e82bcd7a62c0cc46c1bc86
SHA25652dd28019add2e97f95a5607a4a2a4e1daf82d9138fea14ab0d7ad282a1eacb7
SHA512c0f36d55f888e355790c426fb00482a150c486e1eacde4e544527f425d8aa57df1dc0f71c0752062625a2f2541ca5f7f3fb3bcc1050dc89c682dc9216d95d901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585250935e8ec45eb645384f53254332c
SHA15432e62fbd637fc59f7f6e6ffd8b4066de2c6240
SHA256cec599e5ce13bdca57990c50961c53099c7472dbe71469949a6952c76f629365
SHA512b814bbcf7daa434c1853b84b6f26ccc25ce2997359f74937e1f299ee4301c4d0a9b76f2e12d415793ab1bfa36cf691c4dab82667df29d2b14ec816de152f8a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5bca614bc906c5bed75b6d15891fde
SHA16383dd81df81f7d2559f4e3b5621299eabab3929
SHA25696d60a51e56d4e54a519a2fa02c318eb4cdb58d11953d020c13aa9bc9b9ec405
SHA5122bcb095ef4da707751dca50fc08fefc5b1a1ef9072e30058644859e1693327621717e2742ce3dc9d324015c92cd7712860df81ec952273387a8eeda4fc91e997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3abc98ec6c03cfa136c14702449dafd
SHA1b7d63daffb08ab04f7e50eba0616a67477eb18dd
SHA2563b706d4d7897361fecc21770e52d26c2ae22fd390ea07a47f2cdd169baa5f4a0
SHA5127070328f96fad724211452515298414f4268944624802d688a8e13d204d9e63e9f5e9c77de7edad71cf779afc04e98b54f332e9be96780a87307deb91b7bea67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada6ebd8ad50fbe0bef15672c3f6e1df
SHA16128ba378918d89f86e9267659b77ed38644cdcb
SHA25602198fb77b932164bf26b3f29efae848da6a576e0d83aad1daae3e43929bd1e4
SHA512a24043b1750cb488588bcd8f76e7804612f43ac3f20389b861ec840d5490041d295f103b6b607103b22bfbdfee90bad7aa0d6a652411da3f9afb04e9549c6350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242f92a1b52da65e24a05b04e5c4326e
SHA12790384fa05690c019f1e6da9e454eddd24ec59e
SHA256c8388a65ab557c52d8dc6005b9c49843769887ecb32c53f213edf17664603290
SHA512024d6fe9b0f5b30133ed7bbf36b3f4041c51cdb0973bb5939e950647e91fc6a9784ffa089f315b2cdac5e22f92f91237db0266f5d8f4383ac6b8311b2d8c3cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be450b25ef58c02f1dd9f585111f8b7
SHA12b5789caf4f9c615b5e890e9a0cb990568bf15ce
SHA256affdd608e3b56a75bae44d511caee9b494d1a7ac2a0d7b32de1129d9af42fb55
SHA5123251d22d871399f0ee597390ff7ce044e3c6e3a26f9ac1fc066d8761ef9a59768233e04b7a77cdb6c1e2dc90b15ad4afc686b1d25e6da75683ea6862f60251e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1cc3a02a81dab2cbf18dde296c3eb0
SHA1cef692f6753879fbe3d79c6c7d65a9f8dcf788f9
SHA256810e7bba9bdb931c9101cd762aa49b3109732f88d33f14e516f4cc591fb5180f
SHA512889c38b715bf383a8b3b123be8da11f93ca55d7258c7a992e5c63f56b70d25246a21ebc33efa0ee75c7a6c6a8d40df4a90182880051e4937d6667d6d89488f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014fc90ca1c7adfa7b6275cb58b3a7c2
SHA1eb9cea415b8d99ea90333bc1b6b4a8f200165861
SHA2567a15e5689840a57cca4337f251b6becc15ce72f8f22dbadbe38c90cbaf3320ac
SHA5125798fc43f2a0a0f960414b870f5fd2718197a64e11003d01dd520197ffbbc854ada56e84704c8eea4b1e0e3c8a017bc2238fb80a1524686587bb186929470100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc2e2c9d1278b79697e6dd1d571f157
SHA16db2ddde89d10358c136b94bc557f6a867e4032f
SHA2564310f5c229d403776b275a84e3a68916ed7d42df03f6b6694783d225b50f77ed
SHA5128504984a348c2050acc5b88d8f2e0010da0be7ef6cc35a3da31700921ce29d8b980c7fbeb1531d6ea351c945d4a43adb88119d134ef189633f37bfe6d4fda494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519eade656163f0a43b7d82f42592fedd
SHA1819f3ec4ebcbc906aa0c7abe1009637d2a70d9ed
SHA2563997334c9ce0b85b83cefe0b7436f041eea7b4fb5f166a16bcabc1a159e5761e
SHA5125067db08cd1b2c253ea5fc78713161e1b9292c9579a1dbb657bc95bf39f533ff49ba4be12a717b0ab8f4556846af81fa5473b833d382259994490edc60f3cd9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5aff8352e720bb5423ee555610cc191
SHA1721ccd793780d8c14c3602d45a20af1631285851
SHA256366bfbad333fc098a4da95ade60e9097be6040b20e82ea033c520cf6896c02f5
SHA512939f0cfd4d736819324b3541a21b57c32bfd6049a0a36ad8216d8881398b05141a235e6a88e4e0837f7300833cef390acd9f4019c70a7a1ec6c3da5c0260546e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a