Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
687caeb89d984b89fffaa784d020af94_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
687caeb89d984b89fffaa784d020af94_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
687caeb89d984b89fffaa784d020af94_JaffaCakes118.html
-
Size
5KB
-
MD5
687caeb89d984b89fffaa784d020af94
-
SHA1
680fef372fa0e9dc625b7fc384776502e0e91fd9
-
SHA256
a02b411b2b36bc7970e432fc42ecec89aebe9b4b1827489f1c84d649dc1976bf
-
SHA512
09bd24911631ef1c09553975a666ba4e6cc24100761f1e4b731f1953954ebb52ac6effba80e6dc586e57d51eb8379cf53e2d48916b017858b654e2fb72eac8a4
-
SSDEEP
96:g+8bjnYJ33TdexYzUZAvmGidSVRskoRa8O8CKn2q/Mt79YhVd:g+8bjenpeG9OPRaCnFP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5017460885acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32829ED1-1878-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000babd12a9a8216849a46251e92e42a3890000000002000000000010660000000100002000000081ae577bbaf7eae4628b7fff2406b49933dc4505c432022e553d3325ca4504ef000000000e80000000020000200000002beb9dfd8582ee3bbdb4ed7d85cd3408ea85eaa49713b24d0f945205900fbb1d900000006dd92dac42038512eea0964531bc04d329cba6fef13070f64cfc69de77ff4bf09b7e27dd5f406c2dbd80aaf00895b0339692a47a547fa07fe191d903ea08836b8989cf791a7a670a7cf63d75f6735e8a515d5b14b746c6d38447949391ad2f7f75cc7b087fd292305018b36d87939cdbdebbde08e665cf3e90b20b31d44af7ae7adc6526165271d95f5f5c5ed63f0a1240000000e05daf6f98cf76356d771499ecd7de9c6831e68aebc7f9ee8bd30c278cd7020706438f3f8691e035a3517cc749f93eea04cbffb1e179bf84c19e1b697e7054b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422570877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000babd12a9a8216849a46251e92e42a38900000000020000000000106600000001000020000000dcc4645c8a1163d6af95ebb370fc744eaf5226d54d05e3797159d3bbeb7afdc4000000000e800000000200002000000042de6d2fd083478873f9eb2dc8c558a06b46b72b1436699fbc56c365f0540cff20000000ef976dedfbb06509204f567efbd78e883505365f269680f044f6b604b46dc185400000002f1a802759e19e3cfd25c21d7b6e2391b8f1c346c9ae54f90af35b0fe98d218076184126ac39abcee602529cbdec15815988e514a2f27a75b837460553021782 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2524 iexplore.exe 2524 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2736 2524 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\687caeb89d984b89fffaa784d020af94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5395d4b4e2f9724cf0d15513537a96bd7
SHA1e2500121921e38e2d5b0dbb38a733277dbacb3dc
SHA25655d19212a7f257e92d84fa4c172d5fc3e5d87bf7e9347a24edb96589db9ec1bd
SHA5128d46f3254be6a63fd39a65967fc72b3abf558a0540f4785c10937fd115e2720196bdc685a15606d3aee5aa1433214f7e8c579cb4016b606266d11666ba7df2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53025095d730a4e897829f05add995ba2
SHA169b0f25b5c87ce4308ffb1d8c6c1385a03b37a74
SHA2562250152d1a8e28acdab0fdb620ea6f58002f91f4b4c62bdd0488c8f715067320
SHA512c65152d2b771a23b1cc0b18ec4f888e92112ecdb945597aade86b2670e7a2162dd4808811f2d4630e0db9a76c9f3a7b63de04ff691c118aab138b0613c007b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6adf6b90ab267c765d40cbb26396a70
SHA1b29067c19a7dbf9f400b1403894a5aea9dc00e1b
SHA256573b1ab47093443b1e6ce4bd48f5a56ec360e87dd97877e6aa2ae272209c839a
SHA51276a3a381d695413fa6333c855dbb9e058e387e88030702cddcec7d0e5d5c020d1f13b78793659203721ea7d98f3e5fbf257b4532ce5ba42fa8ab4cf64cd579e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7044c1a0ccf2a85de6ffe750381b806
SHA10cb8628d99487de221b435d506eb4f1903903e60
SHA2561703c13f2268ee059b30183b8c7205f3715d7c8e7de3af13f783e67499ab5706
SHA5125f2401bb0c6655a82cb9af230f9653f287df9b6af65460a0c305e1477913147e041dd6b185916a7e7dd590d2aee1a221a49032ff63de945dcb3bc54edcf5636c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d2fb19c002fea0a1288df08c5320d5
SHA1601068142d381c2f6d5389ea7c0a521f474357db
SHA25631fc41fd36cf992f59fac415afa1c2a6dea33eddb6f78c94802dd4cea40b13a1
SHA5126daeaa86d28dc7baff4def8b31f0c66964998324b3257bb8ca054a5aa5519effd0850430bfe0f7cb12067d0c488f310a7d2fd011ca05d7a945e246c460c50983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb04c276dd0f4b297caf873a551ba64
SHA13f1159f1a63667a53d28804cbcfbacaf3e18db19
SHA2564afddfb4c1c3f33b0cd266e7e7e32308dab431bf82c7e1f7de6fc388e9a3dba9
SHA51208ee8b900494fdbfd43e7c80527811f293e2233b474d5ca7d79ce5cb681c15b126c3e92da2388883845cb0d34933fadbbdc9ac0f57b69acf5ea8c4484b164a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5568ddca293a44714542d0ed859b9368a
SHA12df900d886bf299ccb4ce2a46a05febba5de459e
SHA256a76711148476e9153bd779e4c410a60e68ee712bf35dbff9d070ebc8dcea8289
SHA512f57d0a2705f5621d9643ee502cef7cd6517eceeeb4a2ba4256457c7ba0bef4e1e53802b14e5fcfce48cb2df8cac251e8a6e3a9a116cc8e29b94e1cb3830d3bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473ef25ec87112220995c4c74b4f46af
SHA15e7f6bbcc650cfb556d8f6806eb20ad524833857
SHA25606a79791c3d45e6f6f457dfc0b6bc8b02de165f2dd19702f4aa584bc8d4d2d07
SHA512b164506e2cbc9a183f8829dd0738d4a69cb40a1e28339fa9fd8f95582ab4f46be3eebddc9e484f817017bd446d20335d113d6bdb96ad7d00164c0a062f0cb111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52026867c32db7751dd516df27bde5186
SHA19db96b8e117bff04f06b659d63a543751590d273
SHA256c7d7d50e79a9766551f5cbca8b898d6249873a874b0d749a1eafa52217d73d5d
SHA512c245539b72b1e6f69196445846caceae0bc992eb87aeb5df2e32d9a51b34e7ca5f7a7fa66188a030692c11fb9aa05e9dd2cec1df464f97854a75a7a93376b6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97a5e41a9f81f09492e8f8d6dd2f378
SHA16dc217b78c060f532ee406fd8851bd2889ddf983
SHA2560eb1ce207fd514ba0caf5a55178dbdb0e13d2eac77322b2413b164e613aeb68c
SHA51241b6ae95967d1ec22f1414ee2fb706450c4a61edb55c95fb1e3f188a4bb289322b52bcbd51b56bd71728fc833141e5b0492a70da7dbc5d4192792e03eb029393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937aebac9748c8f1be3ccda9120c7c1e
SHA11839f73b688b9bea1689c3b8d7356665dad173c6
SHA25625bd0634bb49bb19abe3db23209ce197b5f85616c7071330e23851f5542b8fb4
SHA512bba6a4211843f891cbec49f9f12f0b556c13864a68964174b302036a5f6cea2dd6d408b8d33d695487be6c1aa0fe179970ff452d1187ee86450b9d143f3c73a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD520a7c2c3e7454f45df899571f56c1a26
SHA1501edab996ea4ea1899070759e94ae4a685e8db3
SHA2565453be88a05c46a13404e7b6e5b74087ee79ab475f540eef92f5735660b33207
SHA512665a05fa51ef00bfaa8628ca26cc63a58e8184f5724e60ca5b313e3a231ce4e95a2d5c0d94c5e2cfaac0f279b758632000c461e8bcdd70f67991cc0edff522f9
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a