Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
6064e28a9eff9b0ff8aaed88e0b73e60_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6064e28a9eff9b0ff8aaed88e0b73e60_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6064e28a9eff9b0ff8aaed88e0b73e60_JaffaCakes118.html
-
Size
73KB
-
MD5
6064e28a9eff9b0ff8aaed88e0b73e60
-
SHA1
8c7b0ec63a0652e75379aa10ae0d310b72001943
-
SHA256
a6883e90c4ee66aa6348cb5c837ceedb83d93a170613fb67f7c33a8222b0a2b3
-
SHA512
fae02bf4a77287e4ae4f0495e811686a166a7750e9f45b9c61dd93c6d054f61648ada41bff838ea15f9efc6520df80fb5e895df5db6e6a650a6588a140526dd5
-
SSDEEP
768:Ji6gcMiR3sI2PDDnX0g6s76m3Xde2FHoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JM/D2TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422389140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601a73e9ddaada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14C816C1-16D1-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000099d426e84ff319190abd5bafd10a8525deabf987b2dc5ff9970ac2ce911e8f47000000000e800000000200002000000072c94d51e7ff9fa8dd8f043d0def39b75aaa44e52d1bcdd6451509f2e68e6b9e20000000006b2812c8bba3a8ecd1cbeee5661f5d6d153d08c3ba082e419ac8f5495562a6400000007d3de58d39729dc2395193b768dab686d6a0e8f3458d2a031d6a6976bc7292af24b9d18303891bf3c973d8dcdb4b90775c1ba22384046f9b37e58ceeb1f972c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1308 2408 iexplore.exe 28 PID 2408 wrote to memory of 1308 2408 iexplore.exe 28 PID 2408 wrote to memory of 1308 2408 iexplore.exe 28 PID 2408 wrote to memory of 1308 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6064e28a9eff9b0ff8aaed88e0b73e60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5ab97b4d8bf01af6749fed6ffb4e1b
SHA1b5aa698226a7a4db4c0d4d9bb949655d0bcc1ea6
SHA2566eb42414239fe698302d195b5490e8d26c013d26f8171567b811e7a2cd5d80d5
SHA5124c042f246995c00b2c0539cc807beffcfd3d3f0a63c3f6f1f6b5f5b496c771d0421a94af3547aab411a735592db2f2c054ed49efe88c9ddeb3539f926f2a8988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e5b47689754e873553b611a516e531c
SHA1b138ecf6f00cb9fc602a33d20386a3aa672ca99e
SHA256cae6f64293740d3da2dbf2bdc3a7718117e153853ed646b15777b3730bd100cd
SHA51294a103e3b1268008a988a8857bf7ef724f3db38016d1501594482c6786823a2872617ad2756eb4824eae3149210074e063361fc74c2765190aaba5f62410546a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e316ad604b8365ac76a3e35419664d60
SHA12b96c47af5a3fb463eebb86177ff2cc852a03a47
SHA2566915bdbe2e9bf0f9c5d8210bedd4bea91d6798b37b948d7bd3c3f93029b99dd4
SHA5122d6100e3032ebbccc55df37e499d396d3537468547f2a1c52e242b6156a9eae5181c753bb539d79b614523843f287498c8065758e8ca26b2afa50b17fc6bc1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506db210c07a9cbd299661ede15e2bae
SHA15730331d6ab095e3ba9b103e98cd1b3e747531b2
SHA25697ae92405d733a560f37c0c74bb16fb31e228278c2d78163e671ec4b3e43f6c0
SHA5129b2c5e3753cc8fe0618511c34d95a1d981dd640028648dda6705ea1e1c3dddff41661139500a9a18e3d7c9f03a4d2285db4980c9886156bb1daf3a69c035bb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bacfbcf8428bbe715abc1c17aad3137d
SHA10e36a3117cd3b724255c31c9509d333f729dcd42
SHA256d4076731ad8f6004efc22c0a40d875e1f67fe50f262abf02f110f9f531739517
SHA5120eb177cf97872473576866e96b464fa7db2e9c5ec965396590f743305f3162230fc91c811e987eb416e8ff1ac033e535a6d5f6a590769a78745cb1cdc9a58290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5871a51d8c038caabb0ed2bb2ad441979
SHA1a6b6b8b44ee07fbe9cda92e3dbff400c364f4415
SHA256f9a813ccfe273d2c037eedc3ac2d7a52228dc6d331c6f1dd2b2bd4ff530d680d
SHA512a09f612b9dc11b40db420f151a87183cfd34e6c0e6f7428030ca48c19745357919ec8dd29cad6a75bec9e46ad9a8624212bbbd9cda7f3d5576302cf63a92bcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0aafdbdd4654b24cbec29bfa3125811
SHA1f783ea4c274cf53433c44135918ca160ac540c97
SHA25643efbf351ffaf7e75a8be1f15f73df2bc4721557aac9d704344cdcbe78c59e1f
SHA5126a0d046aaec6701bcbee380af5034c831d10474548f469cb6ff9dac7162629a0ffe35f0bc622ad39b0421546dca63b6ee878578f544fe095c0f25eab1cba0855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cced0833b8cd8d8b04d19f5b9bb11b3
SHA1c28d98c48967f489661f26ecf1956b872a916490
SHA256bbc5ac5f12070588c17116f6bcc6f1124a3dad4bff336011a191f2c8b275914b
SHA512f052217a64ccb8e242324a711913899c8effbf3bf5543cd1a83e44399d034c53759af2f6f7dba651d69d8b7e22e2a51efa91686bc129e421c11eae9048aeb505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c820cbcb3e12ebf6cc52c01b767ffb5f
SHA19b6bc7c1c4cbe6f130a6de5ed9620e6439971a52
SHA25667838592473f1c2422f4ec872289c30628bf6c7e0ad95ca82158163bbb593f47
SHA5129c2b93ceb68d00cc2362f10feff6c12c007c9e48e2720a0c1e400d696a5a90d992e75ac8a19c71844837a3dcf2c5ec0545ea2f21d5f1685dbcee559b74d37abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca90119a5febd5790021cbf717fe2f4
SHA1d27af3417e86f11ce80c42211c79c9fa533f022e
SHA256dd68186b4cf1bf7255cedfbebf721e201ed4e01f0f2e3aadbd34c8f412830479
SHA512699d6848a40de3f73ebafe0cb37bea09ff4e1d0790b3e89e712b830d80d8511aae9060912843859b28e2140e9b714b46104c9e54f39efa283750ad1ec7d9ce73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d889a9583d9384cea7fb3c127a0a0852
SHA1a8309f4cfc47bcd2f0db5b1de6df9c99de1ec763
SHA25617f1c7ac775cca6ed417e199672ffb292876024bfd631655a2eccbf3bef1b4ac
SHA5125b1eb7ae4aae95563c61f0b3aa5d97806335d0f45d4a410d577f714b674478b56884f90fc414eba125795a3063c8c597042f00c89d054a78dc94f2abb5c2c532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b9ca63206bc572522603ede4b9fd93
SHA1d41e286a00162c7f91858bda620d4a3443cbcd96
SHA256f7cec0f97c02888aabc5bad26a8d70879aaf5279e1c043854f1307417e06dad3
SHA512a52d557989657fcb5da3a63c4d443b33a1c4e4cafc9ab1f75e222deb5ac33e8421a622b508822c0b232bc099c673acfc3b498e17b0350d5e2b3aea45e64cb1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb460979e427f150b9f61770cac25c40
SHA13ae7d4a8bcf0b6416d57d3445cda1ea5c0289201
SHA256e7bd1320a822e11c5d241bd558d49addee856c0297e0caec1e84717db8441b40
SHA512ff5ee8dc69d88bd566b908c575e1a1fe6eacb773ea429c067e4bab897e1c3c43e9104dbae8f8fb61503f77de4dd449e94da0a09ed43287e690e4b43c5d1bdb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82c346b61ac2e14478f7c282476c375
SHA19d0e0d7b878acbef4269c79bba0d6b7c514d71a8
SHA256fb49df3aa00dc33467faab1ce097b1019de4ee4ca1fe6bd5ef660ea6cb65117d
SHA512bff3f5d3bc2db73d95be6f762e478554fad8393258dadb58a2147248cd08b189d68d0bd91439f22cbb009888e10c05c0d96212eb97137dbd4dfc7bbbd2396bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a0b5092c0d648194915a6531c503b1
SHA169932a35afdc4dd2f1e44f8ec6cafa49faa08553
SHA2565bdcc891d4d00c3d521478d09655463173768edbf2deb9d330d904c41db1ae4f
SHA512d9fbf2d9d83ba17206bf8881ae1ce51e2a28633ffa9d55278ebcff427e9447e0e0cf2715dc4ae12cc3cf8e747edd86846a1c3dac296899254a483364c6dbd3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595c5d134ed5cf88c01ff385ca16b597f
SHA1e9e7b7347de6a59376b056c3e351402fd9ad52dd
SHA25677dea8d7f620c088ee866b4446b8db7d161c09e52401a583121ed4c7cb30c618
SHA512ee0b3affabd24011b5b6e62f3955f6d91f6cc118cdfbec546d14b8b410e457b8f738a09492fab0ba52e8f05ef9173945407912960965d41715a9bff91da9942b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7fac8c63f66db98da6350519d1fb06
SHA1ed57e412a410190ee25f0cacc8139e7c397650a2
SHA2564bc9bee7c3642a4b58fe995838f8dc804121b7ede9fb246b9762328f32097b12
SHA512faec3f21dc4292d79f8ce0b5521d3e05da012c6684d1592814caebd3e3709a4ca0c3187c1ffe8c02cf39d1c7a4797463d8cb796118e9df08ec6f92ec0e65b309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daf863bdf13d1577d0c1f40f0b8e377c
SHA1d938b3e6ac88d133701b9cfb4c2925c6dc1784ce
SHA256b147d6bfa2d35aa5377403e9ce52ac935cc9043b0c7c42687279cc1ebecbd928
SHA5126fecc7857e0df93b082938767480318627960ec85f2a4f40c4245861f4e185b8c5f4966b1ac946328cdbc10d3a1df7b389633479eef3623638fd5a99209d6163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5376c11c422b32714345330869bc0d0f6
SHA1ec42db47949d06cbee5b3dd1856d2261fa614440
SHA256cd5fbce30abd4d2f86c645d7d0fb446a9fcf496e74fbdfaa78930a12f5a39791
SHA5123fb04bbcf9472eae7b7b6243f8328c66eb2fd577f387e943103d74579adc6b88ef1eabe079d932a69b2a5aa748cb95bad0e263dc3f3984f865afbe309572ea0e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a