Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
73e2f51fa793a9173fdbbaab49457b6a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
73e2f51fa793a9173fdbbaab49457b6a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73e2f51fa793a9173fdbbaab49457b6a_JaffaCakes118.html
-
Size
99KB
-
MD5
73e2f51fa793a9173fdbbaab49457b6a
-
SHA1
e38951a0db98f2df3d6a02e1c62cbf0eddb2b1f2
-
SHA256
9f0ebae7a7f79ed1f8ae7cd383681d46c6d664d4281a9c52520d6cb69bfeefb5
-
SHA512
856c5dc49eb2631687109a7b1119390e0949617cf801b1161fa9ba827c68fb517e72cc1a44e5ea4cb872c957b73adb5ffc2c6574b3be70e40ae627b3e7adcd92
-
SSDEEP
1536:7C5gGlL+NFH+4dFMAoYMHoZMQoHMgotM2orMkoLM1o0MiohM5oiMQodMSoyMeoPE:7UlL+v+uHGcgP/blCy0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC0D0E91-1AFD-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422848179" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008595b62018f86709f5cea38c567f9c611c0b3a579e99496ddfd65b5c7d22dfec000000000e80000000020000200000000073fb1e29e69b542b949281a100038a6b53e3134aa32696e11ada9c71ad37a32000000087a553c8332533ff0dec1707ab4547f59da5d22922db014ef67bcb524efee7e740000000e496edfe4c126659d615f478144dc52fbd7e7e9b6aa94e4bf70f75e1f557c234d48dafa272964a285ad31c98018b1e85ed3ae4c1b191c31a36dffce933a987e2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90de3ab10aafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2892 2180 iexplore.exe 29 PID 2180 wrote to memory of 2892 2180 iexplore.exe 29 PID 2180 wrote to memory of 2892 2180 iexplore.exe 29 PID 2180 wrote to memory of 2892 2180 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73e2f51fa793a9173fdbbaab49457b6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3405dd782edf385f93cd1f5b6df04bc
SHA1d196fb385e8e51bc387b21ac6e007bc572a07181
SHA256fefb90e65d8ea1eefe0cc7e72f8ea8553fbabf087cb2a5772fc91eb3dfdb4ca1
SHA51229865a5fd5c4a03c5824f2564be0601f984fe194fa909c5d95b1c3cd02c5b92e1f570e17928f35c5b9dc50fc9a77dff958e8fe4d0e091e91a3a07567dbb63567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f82cd871a6c5986ce4101736f5f4aba
SHA1454a21749c3d82f9de7420db20421ddf211bbabc
SHA256eb19d53284ae18860a1030cf83fce57a4eaa9865b80575b647d2b6ff53cf12ca
SHA512503e374176bf13c3216af50d2c14edb21a91032fd77575126d2a951b29842b6e3958b2e8f9967ce59bdf82fa6bc2ba05e169c82471409579fd16b29f8878d97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7870e42d016bf5b207e520d5cfc8774
SHA1fed7342988d3363aaedcdb6d7a68a98af5bea3b7
SHA25650beeb5dc598327f30cdf74b984e166d03ce0577168467ee9ca665fbe913ef09
SHA5126421740ea64daeff7f16b67d7facaf4e2438c3208b478490dd808ff31177af9561b0d28604fc433c347e2ff283843acbf4c7e638bc33219229640c60c4b02060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33d9a93034c50c636930da0db29e58c
SHA1eedf4255900c4d23e555a34c08e0292dc974a2ff
SHA256c2ef4bba9910af0166874a9ed31c4ea1e9dd6579036a8428a7a6cc475c0deac4
SHA512d6b75a2f7707bb33f9047a60c1a8e10e1650284459cbf2fe132cdd62b1bf5cc760679d567625050a3ed36f633e22c26df1425d2dd7c9147eb183c0e49634f0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538496cccba3afed399a9f40fe75a16f
SHA103e7ec58b86e3de67b1c410b06296a115806e22e
SHA25670712c775e5045e6a0e66466cb4275e0085cb27262a6220c89c1f83df73dfe06
SHA512c21f77afa024d122f9e9267a55048012f0ef62d05b735c32db868446bb66b9816b8c9d5d05ff5fc20f3e21e42b8d14fd10170a128e59a7ed5f17c27ecdd47981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e8463f572ae29bee7519c133b5beed3
SHA16cf4a1e7edc00f1f62b104b0d7122f9b5171e17e
SHA256f4f7a2788a93f3ea05247d56ac9aadacf7c0f887909398748402dc7b88c93201
SHA512909487b987789a5cb33b674572f0e7de4fb3dfe72782e03d6d38f391cfab71cd442fc3d4bee9a7119844c36d5ed62235c8042fd1263df08c2adf4f8751bb935d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d4a2ad9d8dd50d93a7a39e2ac367ce7
SHA1e1d44646b73d52d3ea74d5c2e8dd3842c1adf816
SHA2560fbf1f85027e03467e20f991f719d7376435b64c679ea59af9af27ddb9fe280a
SHA512437d94d8c7d7b50923124ce18cbdb13f9a6a704ab4f8811e44282246c88275f7abd27bbac291c2baa69ce2c579f0cff6633cbc117aa11b81c733268b391351fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afe836953912fe0ed85f8f5b15c97002
SHA17aed30e503029938889ace45c1d2562e2f21e65d
SHA256a6441e65fcc7a931c3386162b21136864f6d54ff5810d08ef7db08667edb8a1c
SHA5129fd6f89d184dab71ca060e42ab3db77af9475279bb4942ef9fb273b5f3985936aa4c288099dc02d6285aed0b83088d8cabbcb83b4ea58a3960a573c5f7ee1a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ab80393216cd5ff5978399bca3ee72
SHA1397bbd3eaa284ab32355edcf55bbe6bbb84793e8
SHA2565ffac71c91b5ba3b4b3df2dd6bfda45d0d147c6afa7499d74945033695d49a1c
SHA51257c67b85576fe992711451bdecc2f921e58aa41d7fee0f616578428165d8590568d0a33d9fed570136354365b55971a1476a838a44976a9b3b97bb38b692be52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53010ff9ecc62bc22887cd9d8ee732896
SHA12bdd10daae64e38228bc255b7b9783f81fa07723
SHA25699eb762e8d965653facb27f92f1e4e72eff604006f1fbb7de91ef0ecdb8a48ed
SHA512088f6a848f8844e4904f0ee315375daeff939151310f2b777b144b66ead1abbbc67f521a58388e10278b83787777459bd9b5e7eeff2d75364692a9f773fdde8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c00812c5cd231995ef55e535847c79
SHA1a2f6fa9f495a4b977ac0eb83a30a571ff6009c15
SHA256a7ff93a004d56e037cdd3714edd46ec702421561a6cc08083c339a11c25d07e9
SHA512c2b23317b86271a759ed9cd95ccfc2a593515524cb0454658dd39226d196a98d79350c0c4df2082f7598220073fa2bdc8ee9eea0aef66c18a08e1d5abcf9d516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606651669e4447b8d9b9a8e4ece4430e
SHA1d676615f13f002523489581fba4f9fff64c52a3c
SHA2563e6011f9f7a4c2b7620c1712e3987d5e8e20257fb07bdb5c78c9f1294f823274
SHA5126a257860f7aedf939df653490f43c8f5ce384d6a60a914a3b402527f7636060086f88914e6462ba477ef03c193446c7e3cc94f6e7ac0d89d5b10d34196b680b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567312813458baa7ebcf2542d9a23a5b4
SHA1f36208e13b7adafd03f39b22899f4da6b360cab6
SHA25681363b3f1f2eac4ff2aedc8a732e10ee0c4994097f4ef400a48373057eebde45
SHA5123f720d8326d4c1dc1743074d90b620f00071ab1cd5f6e432cc28d8baccf53c15784f35df2cb8dd5e8696d4eadc386416491f5c7315f446f5c9ff082bc4a3814c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589996a8290f6221437d633d4a3d88c3f
SHA1b963077a6592f7903e792a12cc1c7e31f992741f
SHA2567eed344a2c5e449e12e96352009cb1675ed373e6be825a950f1b325956a1fd40
SHA512d1b46e1a9e920d61b4a7e7017cd535c52de875d98fef729d397ffcbdc19de1592e6a6717c2737e6ebc16773cb4ac301546e84e3c7bbd446d9943fa937072c517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5ce5ef0cd798fdcbf2be86efeb0b49
SHA1f994e0c9e606f592f744aa3924371dc6f4f81526
SHA256431dc7c0c69adf8faf5998c9e4da56598d37c15d23bcbb909e52040a4fc873ac
SHA512a6c98c7dfabd94421aaa7969f46badeccc13239972c2186121c57d17c8183c0d1fed60ea3b3656c8d1f685a8e22d6fd65928a3a99e54da2e2fa765f964a76a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586c51e4ad0435f2366aea6555525acb3
SHA1628e7264ca01a40b7f4b7076c06149a21ca7c03c
SHA2562c0acd86f3a3b15a88899c9839085a7f3a4f8dbe705e4521fbe5055550bf5f49
SHA5129887af0f646f20b99cb493278f102e203bcf1a36b97ac74a25244f0f3488698a601c11ef7d83b5daab816ddf04e3ad35755b51131b0c19c017ffd693479a6573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c6452c93cd96db25393733fdf5f9e7
SHA15e0ed4c6112e913a2ed88ffb1ecf291fe055f5f0
SHA256938629ebd7db11fb8ce0274f5685543efa5badda8cec4f02e08cf8cf1fc71b4f
SHA5120c9e82e0abc23621d24254f5fccf033c32598abfb86c2fd8781f3cc57028684d92aee8e8ff7cfb667dee727d4cc1f9401f16056671afd991f186474d9dc8b7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb3f95d2690c7c62e0693f1507327b5
SHA1d075ac6f2c875273bc63d3c8fc899b73141db6cc
SHA2560faa91ea9132cea58391176043cfa8ad16922aaf6b612957e0167224c925db2c
SHA51278e5a325b6a8908c755b48800c871ce2a88999e0724e81365ef1acf178fb7b7768fbbc37886cbd203693f341816b621d89825655fde6a44eb658d40c15df941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df67a389566b0c3f0bfeae6e241c4f3
SHA1cc20b285071241c194709b57c79a2cb077c804c5
SHA256c0bab8bc81a2ba9fe7bb73e50a8f999258a6c386428d4dcec7ebe20b01a36108
SHA512a0a91fad63a75fc708008cfc9bb2c0899182b50dfc54cbb2a9643fb207ebdfb6977d6ee7c3b691fd77c293cdd22be7fdfe47727f5f91bc986f84a2088f1de5e8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a