Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
6dda7a92ffbaec409609690364c268d4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6dda7a92ffbaec409609690364c268d4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6dda7a92ffbaec409609690364c268d4_JaffaCakes118.html
-
Size
462KB
-
MD5
6dda7a92ffbaec409609690364c268d4
-
SHA1
eac23ac77e9418153e1bfc76e029ea8397d5e503
-
SHA256
00a212c26b767427dac552e70699f5d0a4dbd4ccd5e91b23507c80b954896f51
-
SHA512
50d287311ee75d72314538bfa6e0b5b98662738f6f97452dec65f440a5a16a4a032981a1f71577cd58683f6872325774384ed0903abf85187043efc339306c16
-
SSDEEP
6144:SssMYod+X3oI+YPQ2sMYod+X3oI+YCysMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3P5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007a613e3d78a708479555bf8a4c9492a5000000000200000000001066000000010000200000008a5d16f1c057c83ee016e6367d2253d3a88910a17a7a094914b26047b79d5402000000000e80000000020000200000001ecce32d40de0fb9e9949fe4cc1413df961bbd502b6c91abe71ecbad2f99d3122000000048bfb23e971f80a2f33a0c0e38bd2e605e730a3cb205e1eb7d60af99ab88324e400000004cd4d7b60aa2e22836ab77147f649da6fe94bb6a6a17f9956d355fc19e2bad3317aace24e162786e76b3a3a396cda48252b61fe5c83a545458f4000d39228913 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C85226A1-19A5-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422700396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807fdca0b2adda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2200 2064 iexplore.exe 28 PID 2064 wrote to memory of 2200 2064 iexplore.exe 28 PID 2064 wrote to memory of 2200 2064 iexplore.exe 28 PID 2064 wrote to memory of 2200 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6dda7a92ffbaec409609690364c268d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be4a1befaea269ec4ae7db748cf7a583
SHA1e3fdc8ce8660a8942c7aaf8ad47289bb2994d732
SHA256d99fa9fd467d4985edbecab357e3eb92433a12cf933ef11e875735ab56d4c0c3
SHA512535fe65e032f55f16bce2965e5dca3273dc4ef76343bf1aeffb8ff83eb2d51097acef23d9844dc4f497f4b972d9495d20cca97968a7ac58b1ad940c841ff63dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f1160411cd1603ba93ae9187cb0e9d
SHA1fef8c46337976b991018f1bea4fd365753fb3c91
SHA256bb47fb0f1216df9ef282f189016b9d0692d4f16f9be80c96b5037b2ec634495c
SHA512ef2b1a4fcdff19d32aa6caf342e6a96de2760526b9dc52862eabcf46d313815c20c7cd4d444eb9ef668869ee9c826bb49ce65d30162d9fa898529d0514dadeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a819914a0ccaa6dd32e8d277219ae61b
SHA189a8ae62de3b87c5fc4201f9beaee391468e20ad
SHA25673cf752b7c45e91402ba0834769a671e1527c617750dfa93ea8a8ce623742b80
SHA512361975333216a3ccc4b8dd242519a79f03bd2ac15affb708b06a429b1eb3c895f7048bf77b05c9ab3f617a35fc028b1a11c43aaf4f9725335f14c30fdbfbcdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d27caf0b0989180e41773f1f6ab0a896
SHA17bc7cdd58287b8579aa8cae6167275ef92991fa6
SHA256e4e8fa3ffb8ad4f4b5e1c2a345fe1188a3f42e66fa599569c92ed1b816006c73
SHA5124e8cafa2c5d188d7826d5568e2a3e63177db13fcecb4fe6a0e0a7eae84e7c8ffe3a9f8c68a1145f0bf7b0da4a74baf9195362ede9df020c5a3c541687636b9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520dd78f41550bff99aa15e57e187736a
SHA1d5a3e2af4b4ee45aadbb6a6530fdbcc0238e9c7b
SHA256544b92afb37e97fce8356507e9f2b5015df9def076931236f938315a805f5419
SHA512c29fb15ab64d503a35f4dd225d3270164b1516b2a06ae1bcd9d899cc208df89bde6a2e8afb2f02899dcfd723a11240eafdae397df19ab5fa15f6b9c99911721b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c330ce1d212fe149c4b48a7572e8b19d
SHA17a641a9bf6d5d25aa8114a7b68101dd9677d48a9
SHA25622a450779eed4ad9579b3dfcaac94ce308948b02dbfd6bd434db38f29cf8f548
SHA51287aa94a264582628651638efc16712bc590f7b7b774e67692728014d08b3ce9ab225962242e3bebc07ee6b7bb254757343c18a21c0e9248956618cacfc004c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546aaeb166b364406d38ee8573a7826fb
SHA1c98312cd62beea962c1fb59d3982560caa6a79b1
SHA256d128ecf48fbf00c6188091c157d6fdf70a66516be7883a0313c8b848b0077545
SHA5122e58511d4232a73a354cc2bd15f321c3d1036396b4b3739ddda7b07ed3395122fb5a44d4c7884e6623ff266eb8929bd6b4734bf0d331b1d68863c47b4a26da98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f53bf9a0b2b6f3f5e2dca2f9a4983c6
SHA1d3ee55e7b78c37e7bb8d038551147b9971b10445
SHA256d3157f4fbb1b6e2fe19e1d6497d87aefc91a821da123cbf5fceb3af60046b358
SHA512df535f57b6391895a26a807a5e49fda9dcb4573822b0330ac9971904ed862b129c2c7cf3d28b9011aefd1272efe0c158d2e4f9693cfa11d02d03daf56349eba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5489e6e7b409be9c043dabbf8e285583c
SHA1757a95bceac1be6a3823f393d0097edd6bb020ca
SHA2568a7301f00f5779409eb655d4e5da2881349ff5ec0995059d06a11d4c0ae33e95
SHA5125da00c891316c1c53d0a043b36834a9aa3fb8283c84241a04ab9babf1538ca9aa3bb972c4f85ac7697a689e682ae604a8b788ef4888b82e8ea5bace33ec8fc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced8f2c1a2f4b5b65e14a406e5a54f90
SHA12de99b1d1eebf478ced2dfd7f85d96562de9929a
SHA25613d9e140c28950f7f264d56897e27dce71188cc7489294c1d7aa437b5b8d8b88
SHA512da6ce5f6bf6af44194a8ffa3295aedd7aa3beea71c2b6f7cdb664f8e3bc62ffd15671c7e0be175d09c50818ec361d1e348015cdc7e479794e8f5bdaddb7e4b50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a