Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html
-
Size
461KB
-
MD5
6477567e3535cfaa7d22416b0c3e23d2
-
SHA1
2013bb730bf1ec10236cf4e975b5b127f9cb7586
-
SHA256
4420027109d8ba4d3755ffff561247dec668ea82f4453a5400293ddc39c935bf
-
SHA512
0aef56350fff2d51b99f5735f4f1fd2ba91701d1840a04cd4f087846d5c7811780878ba0d0376796a55b93eaa5f7000fcf3dcbf7198c9728e9a01f2ac92ac743
-
SSDEEP
6144:SRsMYod+X3oI+YXsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3V5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ce272d02e9b4ceb231ccac4961ee5e4ec696562f6370d4cc63c5600673ae0252000000000e8000000002000020000000fb7020afff11c139c50e26898abd3c65a595ed6eb6373e3d9fdcb43a0c7cd3c8200000003f58cdeecd78d586612381247b0a08b35068ba1cf76e96f75057c3e24dac8c1540000000cbb1d723957ac4e549068bf36a35169bdd2a83d1b786eda070e6d9f5edf8bcb9611a50cf3c865ed9acf3902c133c9984c48757cb25d65c75222365b2ee2d9dfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45741721-17A7-11EF-B904-5A22F41CCA2C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4036f81db4abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2432 iexplore.exe 2432 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2432 wrote to memory of 2628 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2628 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2628 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2628 2432 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6477567e3535cfaa7d22416b0c3e23d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229cb93aadb291d5a9103a6610ce3583
SHA173606d8e32ac9355f21e5db6030cbec267de8a7e
SHA2561b632825b40ea3ae9a11798debcd7638b28855be5c11775fa5d3580c615ab869
SHA5120e7803fd32afafaebae5e4949ffbeade4b0439bd0a004f6bb6a6e211f1b9fd48a2791fa761994d1ee67a03dc76d2656c90ac2d1051e456ce535d5375a3849a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c8f8ecbedda4b4653267c454da78cb
SHA14553c8bd5b7114010c1fa8877d777fcd839c890d
SHA256c0876e00c1ed5f3aa81e30e06c831e17b58d285e4f9abbf04793b8c457380a58
SHA5123aec738be222c4aac1efb6f826bf38ca20921db4fc688a3d414e06570daa54a7bd93cf8ca96bddb999b37e33ca8e6c83152aa98b9d683e2a721cc700f201cc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b20f1cb3a36a26f47984f9bf702e8f3c
SHA147bfc6b81029e506d60e32f8caae13eb549ae29b
SHA2560b57c14e7ec3a04c580c5c8c240fab3fb71ac6a696cbc0b1c8c8f85393516387
SHA51279d0c1f40b3185e316353d3ef2e564b22d70e1e927121ab6017018ee375d1fb41bcb13fde70eea13e5f4cdc01b6be29f15c50302b33fa68865483996085f08bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d2ab3975a447a8249b10f57768c17b
SHA102ed5e768eacc2bbd655ee92f733db242e968c17
SHA256ac01055b3357cda9f7e8411e134f4af2bc7db9dfafd9b3f99cbebe5f85df0904
SHA512b57925e9cd2bc75a6c7b8fd4d776b8b8e24235542ba817badb7f1d5954ef68eee85c92fe9f4cada5522611cd1725b5b73089d05b710c6be4fab73fd33499efee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d537b9e3879feff634085b631ab69751
SHA16f94466058d4e0b96a0fe52784b2168af50f900b
SHA256e39dab36985d7e8bb32327268c39ed68088dcae61e5f59459fb2487ac0e22d45
SHA512749c4552c0f631d42963608608a85868c34d18ba8b4eca3a8d01da353032ec760b3fe7e91b6ac61826fa074cc62f6f4f132938b5b981ebd0dd0630559a6e5134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1cd66afcaa2bacb2495e6ecf82b73d2
SHA16a7f6661f28207bd2219b4995140bd64c86bfd7f
SHA256ad8f57b0b9b792c96d9657a3d0c58e42a90e0370709cfa2d2da4cf795fa8992d
SHA51254944bb9d933fd21354618d553ab71203ac1c10a160bcd29917e8b8c945f121a00cc0c8a12ac176bd774c72b42c8d7d1cca3d1dca104981d66262efa05a15721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5618d94ca78f8ea2933fe1edf8d7a26fc
SHA17c464e3f4065d16d44023227eeebd57da241e7bf
SHA256555e81496fa7b36ed773fde603b4bac5b9aac85599ff4ebb74adb7656d4efc49
SHA512a9218e9dc68bea7d685eb1ef521919e2a4940ec36cee8e95b9fa7a3784d885d0351298568fdfe84d7d498edf7f57a2f691b935103f6d7ad55fde2457cb59e6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7c5e6f4b5fb783a4a5b5f9e1f44b6e
SHA101ed3c9645a1a9e9ebff5b8b3f488f3ba4397b9b
SHA256d6507082b13d517df68a3c12a4300fe32603966abfce9371835068dcc3eed5c9
SHA512d2577c7295533fb69334cf791643b425622928e7da9176b4a0e29e20ffd7d6fec10ac6eb7ca219073e9bc5df63539fade9dfef5cc17f2e523ab615d7d82dd3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bff92dccd64a88aac9f32eb2edac4e16
SHA1281d22f48049262e353b93e451530d246898a26d
SHA2561903b0bfa01b778b7e745c0124ee1bbd6c54042675e64d717050b9d73552dbc4
SHA512d93b7f5b1ef7ffc27b3a6f76d6610cc346f86d2e3803f716e4617460c1f6d2617a66c7f87766cf0ac1c33990e49458de0d32f68664731adae5321345ae8ece94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dbc9b15c0cbeb1f22684df38c03786d
SHA13033fcd8a6a7d53a0fed0cc7b42eb62b9887a671
SHA2561421c6a7ec72ffb9ff5a60ce55d5f455fba2cd55fc68a39a9e1d1950af60cd52
SHA512c12daea1e83b4d4b9cb82c45763c0027a5b9879906d459963d141772f92d83bfc2ad56fa95d21cbaacd117feecd83b69a7cb5de293fac3cb776142a6b0d680e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59747a719e40c4afd24a305215ec2b715
SHA14168b9ae0a6ff74e80b95fc0140c98cb35a87d34
SHA256e4ea12578321c739a5eadf51510e8baf8d9601030dd87cebe34f4f2586353d3a
SHA5122748fe7ebd33eded60535a6e6b804df68047b46faeb4230b8be9c309da051d3a733ba6c99e2b2eb619c16b95e18cbed92951b6e7c885512fd5560abad1587191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c28c04e261c6851323c689e73dc056a
SHA151b1c15a03207da0acfc3b6645e411b33ca281fb
SHA256b0b9098bf10033d2d3cd8df651bc81c6bc389cafbc2e8ce6b775e93a8ec163fc
SHA5121e115dbb01dadac9492dda365425edcbd26d6f1f104f36870bc794ae123c31f3c1fa000ea1d496b7fe2786cfc0b52f437c7bc7d1069beb1321ef674732454ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5330d69567cd39b84d73376dee942e5bc
SHA18ef3e146324c379d7d59952e7a72c876af6cc459
SHA25637b449a426db830b3c3bde49756d46b09869573841bd5f41f47ab0cd1008182b
SHA5129eee85826cd902a2d896eec394f825dd990174fb6f6810092b4da98a3f3d97dcc9f41ba261cccc7397e008ab160bbfa8505107ebf53843f5a46eff3d44e9dd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8a41173fba776f36b65fc7096f9704
SHA1405984cf39be5812ad010a1900c424e7a41cc4f5
SHA256ff3fb03b62c8cd2addb76975f6bc9a1b7b58a16215d5090ce538d4730db62edc
SHA512e3b201887e61188132a86f1146f3b0bfb704bbd18d50af4cce888aa74531ca3b621572dfb9ddf18ccdaaecce101a75185997c291f989a1707184c77bbb1029fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5ca85eddb914539b6f6db072064cd2
SHA1c534fa3626abe524c7afc58c5bd3552b777e7fd3
SHA256dcb727a556323edf6138aeb5dbc24f589e4cda53dea134128a89a460644d6e98
SHA5125648243279be32f676bb8c4f8060e4a2cee50f627e2b195ae02f8a2cbd650d1b30e31111afe0570a528173744a4207a9a4c9b50bd841190579fc711417a067d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471ade50dd10b96bd400e72f381f9356
SHA181c88e4d1fb27ddb1943dd576cceb0eaace5f228
SHA256bcf2297ffe792fcd93fa66384ea9d43de915efd486882516c35bb98902db321f
SHA51205282d0accf707eb7e5256436a5a6dfd6c892cdd299c530c55f8e00306e51079a453305ec521161dc454464f4df14f0d4a67eecf0dd8723b78eb04a970e3e687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547c8241519d766e1e2de0cfb630fbd1a
SHA1f25ca181c6631182208d976f905100628b399723
SHA256b2f1a144919ff0ffca77c0adf9beec300dd48f77427dcca5acac373a9ef26201
SHA512cc1e3d4c7c180bf91b92e8196828a07075abf869cb088f658e5e9bf4b13064f9ffd2964ec235c48ee99950a7d9e99e368a1e05544a1856b9ab509b65192c7633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514988cf8133732a5f6dae22e8a082d8a
SHA1adfa4768cbd249c1768438fdd1f45f8f306ef7dd
SHA2564b7e4ccc239c059ff72d807c0f25472cf6fd06d601e405a6cad45058a9bc00fc
SHA512238dd46eb3a23517b2b253d2aa7dc62c1218dce95e6adbd24d137103925664aba174db0270b45b6c6ecd605c29540d04d6e3e21ccd1b8a27e7167d7b4a95fa49
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a