Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
639954bc0e0fdd33aaedd87ffda4c6d3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
639954bc0e0fdd33aaedd87ffda4c6d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
639954bc0e0fdd33aaedd87ffda4c6d3_JaffaCakes118.html
-
Size
461KB
-
MD5
639954bc0e0fdd33aaedd87ffda4c6d3
-
SHA1
14bcc9d600d8a02c2348d4d9a2f031248dfb30b9
-
SHA256
ab7c686bf3c9bfefe8345e371a63c64f1a81cd7c4d6e47b5ac9f59b600082552
-
SHA512
acefb853ead1d583e1b86beac3bc436f28b9ba1e1150e6e9bd6d5d041d63b0ae24f23e65f6966bd80574bdc9e8408d5bc85b746c34d7879a77d73d92fa3e94e7
-
SSDEEP
6144:SAsMYod+X3oI+YscVsMYod+X3oI+YGnsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X335d+X3C5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95386A61-177D-11EF-ACD5-DECBF2EBC4E5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000823edc3bc5267149b6690236f689cfdae8ae4d62a75868e48486056d855ff841000000000e8000000002000020000000acc29ff7dbbd961ed36e286627352632020f391267705064adeb41aab8bbfadd2000000059f8e33b478d305c8828ee7dad35e160966b5284447a02c8981a175b9609e2ad400000008ec9261e6e0625b5166a18393c42a26350e1acab6c773d15bef909acf1c68a1f02c893141005b1482d1a3c8c817cc05af140c810bc1bdc12e25b938fbce2d2fb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7044c16d8aabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422463229" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1620 iexplore.exe 1620 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 2252 1620 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639954bc0e0fdd33aaedd87ffda4c6d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b4bc82297803ad90695515c27ded76
SHA1be6e74392e0c15267de3aa1c4ced060f6d512782
SHA25647621b68062478eb1bee565fcc95f3cf8b6bd6dff96041adb3ac151b02e6aa09
SHA512a8e4637682bc8651470c2130ac3e8bd1cecdc97f41c2947847de11d8d10d201cc3fda04a40e4cf7bf99dbb8ecd487958f9a1a0176c34b202e7cb214dbfb9345e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596eb2b7793e1683be349a771a18f0eb2
SHA1de40ddd2dc828218bb631ee852de51cce9e84645
SHA2567562a54fc02f508cf6342465093117ea0b7029e6c956ab630cd4f6fbbda7f304
SHA51201b69fecfa3fa26e7b2edfb627b74b8c3f64b4a7e8d812f5bfb87e704313b0defa2e6a02eaf5b8b10096b46377aced5cc263b9be5a35436d8a15b0e51999de82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb5d66ee29eff7ecf276a69f55c3d03
SHA17354b0cb6f1289ac6a5d56f43d19dc5dca41059c
SHA25601750d5545416f3ca96bcc34619cb221498aa4b95538264baeb4a1c726c2221c
SHA512660c847121adfad324d57a4eda8b8e9fcc90c12f4f5a1034f597aef9a35710093b64afce4cba62f6202c7e44b52f5fb851300a22759662c2f539b947f7d82d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a8d3eaf45e3a96337475f0ad27d837
SHA135a9e45034b8f8432e77518ea3615d50a49d2252
SHA2565d99a7229133e13ac00cd4831bb21bae57fb8af8b98db6cab5c66ef8a5c86102
SHA5123b7f171003a3c5044857b7b21f38b7d3c2d079eab15b66e84ce13f1fbb39ca943b3fdf2289d0e30068b86d3c7da6b74a3a7f5554b8b84c14a3ab7d68d5090769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dfd5bc5f1ef18b4e61d958b5ee1a904
SHA163cbbe9799e7ea325317e8aa97a72d37912fa2e5
SHA256030e501890f63f038cc01e0012e607be3d734a1bd52957a1a5e741bebbf375c6
SHA5128278d6c1cd08978e8a553447e0713d25cc341941fc69072786186a50f1f0c1a4baee3bbdd8d6e0d855e3abe04ff29b55cd0382fc53d299f6a35ab10569bf5ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26dae34ebee706d913125cc1d417d3b
SHA10917234864adf4d63a4da6348d20d47d280acb2d
SHA256f66d816cde69abd2d77c436c188ff5d9d3909f9150b0635a2fc6c0f215237a85
SHA512cb843f12baef9bd2df15ee5a32155d6afcc39c3951d01a79e033801a57392fed4231f6a94226063d2f36b33feb86efc5ac60777ae3571bd635d5e43b2f6618cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349623f15493b69866896667b16a4328
SHA1a6c4b60139ef88d0c9b57ddd70c34cbd59eddb67
SHA25600d9856f3007946f1e538f0f90c742226b9a575b29f5ab74d1195a298df49acc
SHA512fee3578640fc85abaf34c5eb3650732bc99ab9499304e33f6509b32b41ef1668de0e2e8459a015065f278b7a36f445bd8fe396f79d6e728e2d0dabc1424850eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d708ddab5b591330c1ca9fe5e0bfa35
SHA1bc4656e46c0684026790234a5c4d42d9923d8e87
SHA256e4938d01210ba4bc5ac2c736f609b2626eb2e2fc77d2aee710cd1ac9e14a2495
SHA512ba037fe9e44f9743a20f67ef27016ac573d6a5647208203866db0a9a56eb7926480d7870843300ee0228cc7d9f3a95b77c1dbbb10c9ff6a49b9f30cc3e795ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d50d160bcfe17da6b8ecd766e40f32
SHA18127e90fa54c5c49c8e103110a0cb88cc0c13851
SHA256919f310a97bab5b29b23ffc423e44c455305458c2680390128763f81801c4db6
SHA51213b524bb3a2aaa8ea61f3e860b7589152ec2c3ce572908e16b2b3a7978ff21295ea2ba49c92fa4cb548e3ce30dc403e882ea10dceae0d94f1e75976d8b4097aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3414a3b42b0b2ecadffcd04a23a87e
SHA1b15e23493ae853b3feb4c65462b19a0d9a61d970
SHA25688f4eef61cc0786d35d8831d9c924dce097d510ad476c14b53896605ebcd33f8
SHA5125d1fbcc4de94e6109be923621f341d02ea232a755fadf3c7374e0e012c7a7b375effd7bc2f42b33952db128b46c5bae74bfdcc012efaf7fd2bb7ce1992dcc14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9a3145134248da3edb9d78c314ddf2
SHA1ea1f24d0ac688fc6bbc6a44d222943e71df1858a
SHA2569556f2fa7d25a93b180091db1c3e81a004f193ff8af9c15e1d51f6a6bfa449ad
SHA51284e1fa1e7bed0bf165a8f63a310d81974a7ee1e16337523c59c2d8bd07b19671a60c940bae6d42c3471d03c122e16272c3201c65710a8a9061a0b4ef3608b5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d0584d1d972c2bcdeda359005df59d
SHA11b21f29a7c2dae91cc9353bdd1572f96be70dffd
SHA2561cbce42cee670489a3819bbe8e389a10ba9e58a1ab3c15f23c37dd8f13b26caf
SHA512777d6e01be8fdd109ea9476b81622eb7403b7e8b4e96d6e726c2fc7a94af9823f6b04d57ab65275b76149933f7503f234667ce61e01b4ae50f1206ee1becc916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cde93254817ee1f51fe300e39099284
SHA1b236cd9dd201f2e76a220cbdbeb05c48733cc649
SHA256915ecc9d8fa42ee6a3d02fca24ba8ddbdadab92d7064a5cc1040a3e5752e13f2
SHA5127fe0cdef5c38176922c5f2c43aac9b927ed335a9599fe29e1e45c1e0f00ea1b8f695e1da4eb3870137b5baa06eb41861f14fe31b204f827185d6f347fb9de244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b5f6502a3aa7ad6c88967982f20d4a
SHA1477efe597842fb64906ecec9c529201498f195e9
SHA256f88ee5300f05ed48555cbbaeb82de8219208498eb07db1fa6728894f545f7469
SHA512d121757a6404d8518aafca01524f4f97f9645454c21d380a12d76d1c7348a69f6c4267e60fd8c69163ced258bfadd1514aeacfd80b4f1d4312d9ab583c85e806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75d382ed3b1321a71aba460d911aa24
SHA19e8c71468605772cb0b507b78b93f2b4dc70c0c3
SHA25667a979428a625b7c4e19c2db2d81858e9f7720055f8f947b23384d0b481bb89a
SHA5124584a4ff18f7432026867ad8b74f62701792e7cbd9856edf4ef03a3156546c51895a23022e4f702ac6a0ce6523d19a91c51423b5a43d533997e85920510c49ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552978e6dffe6c068734d6dae844d73a3
SHA14a9290798ad42e42913bd962ce4cac59d26e599d
SHA25699333bcd70ec8a59608cc505f8682544cc327519fbb929dfaf7e397cb8dd4596
SHA5124220803fc30082ccff9f0ca122f2c4920c494921785e47ef10ed40530853136a29771ab30eed53760b990e5b5bc53c32b2ef848dc3bd772ce5ea9bd18a19bb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180c1899d9641ec911f5faa51d9a3ac9
SHA1d62cb3f05ed6f19bae5c1c8fd7ebac264309e60d
SHA256eafbaeb45932a4282c9818e8fd87e8b1336567c3038792727727f9537efb7d15
SHA512c0e04caf1922d175087ff7f7b487a28a0a289f165284dbba67cec2241975ff18ee2dcdda0841b3ad718a1684bcbfc8efc1c5fc95457192fb0fafd33a00abc164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59747cb0ade91fde534fe061978a1d127
SHA1c622ef1e0fd019fbe994a04aaeeec4243f0dbf03
SHA256f94ae1f4fe0a6509b12dd2afe6658ad6f754c3346e5570dfc28f1216cb818882
SHA512001d0c7830499a352080dc25d5ac8b324fdb18677831e51c5930659e23a8123a03dd093b7a649fd884b00b779f68a37a39ba75c4f8ac7de4de975a1d19b94488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0dc50b25c03e970f2e9284169a12e5
SHA187cb2e262cb0931f0450140d755bf42530389aa3
SHA256a9c3fafa7db0749ce91ba5fa6d06038ab84e983ebec6b29e066feacddaea8704
SHA512402a0e03a0382a251e8b30d85e1ecf6f6efba3edf14eae4bc92560439f585481936375cd7bbd1db6de1bfe8d887e0555ea968d16fd5d2bafeffc5cbde2da007e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a