Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
62fcab493ab9288248edaac2a1a70eb2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62fcab493ab9288248edaac2a1a70eb2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
62fcab493ab9288248edaac2a1a70eb2_JaffaCakes118.html
-
Size
4KB
-
MD5
62fcab493ab9288248edaac2a1a70eb2
-
SHA1
c01d48a1f2c50dc46461c953f437f30ed8c07bf9
-
SHA256
dcb0fcb68903770310a8d2e01d36853df303c6acc0a5967d864147cd9ec4fe5b
-
SHA512
d455e695cb3c167ae001d23c1a3d8b6e0e83b201f0e855fdb52ed2192c543a8d97c234bea77c9c3be09692af0334e688dc4cf029528d28c76d5534ea66c7bea8
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oIURd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b3c5a96aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4F59B71-175D-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000071f9d8201409d57d67d2719ec35939a86a5531fb6918a318ea33d0767eee51b6000000000e8000000002000020000000d7ebb57d05d67fcd40968118ee038ab7f9633f9b09063f7bfd7f638af5d2cdcd2000000002bd59966f51a1c6c41c7c952db16508d81caf41810accb8900fd0d419c1636e400000009dea4945461f351b47e7a903a1e745df0651e774330c197fc3d319ff399a37cb99cae876b0eba95b4858b531a3bd20c4513bf9db89ee6123f5fd64ee933c192e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422449593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62fcab493ab9288248edaac2a1a70eb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542c06045a8413c90844cba5dc05ddd40
SHA1a03f525ca921dcbfbc1e751efafbad20ad18d9a6
SHA256218a7a4e00f049d193f37d12b8186781be842634ca2ae7a22ba0928b2cdd4c99
SHA512906fca593e492b310cfb62421fd58be0bba4f75856a37bd01ff71b537e9aeda287af10fb9dc2204cdf1df8e9b43d5b9b1b677b2fd215734ee41a2a1460ad7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781b3cf95c402cdfcfadd4f51abb69ec
SHA1995c757254ced57c5252140cc96ec189569d1bf7
SHA2561c1d3116e9b4ddd01491bb9d96a2e4c5cbf7e6db1ad0f2a69b31a2e09d0deb2c
SHA512fce7bc3051b54d1fe98eef616414da1501a0e2f6921803c37cfc53ef846e9d48a9a164606ee0e4becbaa5a7a9a4db4cb50b9f28f4701c254ee6abcbb15cd36ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf780239f5be0b438c03e86bc600731
SHA1fd25321d8900be522bcac6c5bdb1459b2853e9b2
SHA256b4dce0282bdb6504fe11e6c439cf32cab2916f4572059ad070d05472039a5881
SHA512e5d2153e8b15e5320f44ebf6527364508e6a55f0a57cc010fe7a12b36432f04c80527e715b6f82079ffe0ed2f85aa98eec444885838c36196e7e9f829c2fbe49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5219f71b2a6f4f9fff21d19dec6714661
SHA1de98e1169cea7d4ee4fe0094ba4bb0c9b786802f
SHA256b1042b42e7a6051882b9638acef22a2b6ad86eb271d808b284b78b73b9e89f22
SHA512c684d47740e0a3b0ae82166ece99788b8d3018188e13d1b2d01535c2c2aadae60e96c3fc97cd56e28b45b1b406a3f8dd82325446dd60ab5c7faf3d359d001645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de508c8558021e84b114a9782ae5a20b
SHA130d80a5b84c661c469d93b4c7a6c832701eec900
SHA2569ab446d5d698d94085953fb31ab36f698ca3cb598b392acdd4f9f9f07c2e603b
SHA512c6bc9317eb2529b267fe7d92f6831935f67057c08735c107cbc3ab47be1d7304b87be324e199cf9a61e6b4eaf06f0192377780af28b726bd7d7c71164c2148ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aafa54ec39abb1e4c73e6aaf069ac6
SHA120e739398ed10d9060a1f38c5413c7fb2d22555f
SHA2560f91fcd9738a34ab636595cd49b9727f2e920bc49ddb6fe7d498038caa55373e
SHA512b906e222109a9bfc8441b2a81a6fdb63824750838ddfdfc8f8227c41e5efd305b8c90ba1a6e176f8ea6e7ab7e9be4e2dd154287863953682a2705fa07bcdf8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a2f91b269b4985acd107d26f44f7ea7
SHA150a73c6bb0129482b9d70a579e0aed36aa303477
SHA2560e6d538b840f5236f7065b3adebbffcb57c5c379b1e0799519e98702cbc0191b
SHA512d3eec08a0c4dea7940a891383906bdd930d2f7f3009e617e5da34843fdbaf5de7d90adb7a00d429ee1657a7a152e2f10ed6c0b1e70d926f65560cb8fe6dca780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f35704cbd9422504f86f7765636fcdcc
SHA1e82fc7143087b789debffdd378fad82190f89972
SHA2564802312f260f795e109810a471f32e7abc8b7b8e81d5389485e6089faa13bd50
SHA5125c899cfd8f07c162ea6f7a70fd81afecfe426f5a247294ebed53055fe6d1d876b34a0d328d0d62dd2ed34f62ab988f0c4962e2f95ce9136d8d6b48b43f5a2e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e82ad5290aa7f171dc77a4d5ee6756
SHA1dbd73fc02151985df8edd3e1f19334ab731fa158
SHA2565a3b4191f19a2968b662c3ba5d125448a617b5f795bd3996a863517f60578bc9
SHA5123e5fdec8df8583b9815f250b1c64a2041a5595e9e35c3119edeb67f899c2c9739fc5542c5e4bb1a515f3638cf95d1f2801e731391542fb7f0bfdb01f7455ba4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b726f71bb7af487de362c2ebacc60db
SHA15e04bda3751871a36f08c667ea0ae9117f27a95b
SHA256e66f9676614521080f6f87deca47a43c804bd4cd68b9f65b3675f69449015055
SHA512bc2053723d9ab0e9cb0c0451d46775c1d4b8e60e5d84c3338182c3d7bc0bfa27a91f274139f3a086c3afb984b50dcfefa827795b72d8bf7b7a8037ac03cec560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a07bf99343124cb7910fc7bf962df019
SHA1a280d5fdd77fafc106097462142bb2ec025f5ccc
SHA256e43f19cb148a296b73e761a39b74a376b37268ffa13fb33f49219f9d73c21f96
SHA5123fba764e7c69498e19ca7289c7c8be10b267e4b5868807d62b45396ac5d8f6139500c69a2da7145c3cd62cb8a5178ee873c43440547d257600a5abf94bd509d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236b75a7a177ae1e7bd9ee1691a87e88
SHA1e43c037dff7e57847f4514f2abb91fece1a42b7b
SHA256eb3b5798506d139b13e029b9192e39a44efc824340a881eb722f55fe69d4875d
SHA512a86cdf78c4ce42ad8d70fc8a758ddf4516ca2692dcd9adb05634fc72a00c20c72d86ff185f0bf70c7d884bfe754397217483f78a2a2a02159a410c8ee05dc204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9e4eb11136538cc13e1ff30f47e5730
SHA12409fb03b1d6526b1bfcc4d172ea43094c6d7d58
SHA256333bd941f3d238c4f4fab7ddcff051e433eaf4e6d7be89e7d13c4fb90cddce4e
SHA51265e264023400c73af3a013b01f4b9693aae20d982e29b50ec0feafe82d1cbef1d60dba68c5707280cb12680be488a0bda17aab5fc74956fe00ba48be672d0ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da46b6a30e5f4e122c6f25f03bd4bca
SHA1101ff4b64f714ba2a3495281bb1552e28314e4db
SHA256948b2ba7ab0494e26f99a0eb5cdb105df6349a0b2383c7e3a3cbc2cb7af7a3ce
SHA5124d50b722e682c9152593e6bd61ec4075fbcc359994bb844b4a8b8735c74a29913c3b52003f0d22ad780a0487d3beb408b02d98513cafb218de58645ca7e2ca34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd8a8b651456e945c340e4b4c2f03eb
SHA1c5d58c3f070bfaf1746d9e1f8bcca924a7c915f8
SHA256cb830b100cf0f28c969abbbbe73a171fc96ec79464f5dd9bb250b0ab91a3651c
SHA5129419af37b99a88366337e006944f9f6e9d9e5d75cb4744d2cd386b6d2d46b858b110b317d4b94db2e9f9b873a1868eccdcc4b4b908ebe4d6ea777e86714e915f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595951df8becc265a7b20774fd0c13271
SHA1ad1419e8495e58cbae587c527de72b560d9cd918
SHA2569112e3672609b8fe789d4852e72317ba4cae4f1e6e173c7fffb78f6d9c200847
SHA51265d62f5845b57814c132d7406487d3a312ed7fa590e39cfed01765f8a60fba40cb4ad96ccb618ea47d799490c55c8eea088229cef31a08f2182bc750948a9129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c15972e97323891482fc5132dd593e
SHA142b59d2549e60188d79b0ecea13555d1535f253d
SHA256b43fa9339dfff57763d9c3e20ee7a6d92f57dac085f2e79657fc47e9d381f7b7
SHA5125d1536be3a8a039cabb17919c7b9243e48a3c1851391cca88aff99725530291c072e3045d375d29b544a5e622a2b73489c0f7478de10e2cad735c2a561314359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543deb1f7214a2159f096ad439cc1d9fe
SHA154b854e3d4f2dbf4f3eef3854839d163fc63c78a
SHA25641fb81d144b66d50aee76d9e407594b8e7fabd8586ca1da70cdcf87ed550ecdd
SHA5129f0fd7759c5e7d29746c845ba89ab2ccd972c6e4236e500f3ae9333e7d645f07ae2cb3bf1da817a4520190edcae709a939b953e8d50a496a9c19240cd137aa04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5265974dfcba2a60007bba0219f08e5ec
SHA10b3607db8bb776945a78bfabd35431e5d1ab3038
SHA2566517d97e98ed57903c47fbdd07a5189c246cfdc1b786c10a8f627b2da6a97a9e
SHA512cce06b2925d13d68fd5082eb9a6adedc4e83c284ed7eeff0a142b1821865b2b3e5f28a79032d59eff03db8d46126e094ff2c7530a4c8aeaaf2a0ffb1cb4f3618
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a