Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
746d0f7eecd57d5eff0641246dcaf236_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
746d0f7eecd57d5eff0641246dcaf236_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
746d0f7eecd57d5eff0641246dcaf236_JaffaCakes118.html
-
Size
460KB
-
MD5
746d0f7eecd57d5eff0641246dcaf236
-
SHA1
7cf39325f7fe05d492c399bb2444958d65b0b3bf
-
SHA256
c1844ac5e91da8309b3f2a40f976b30daead55293485a42fb1a5a830273622ab
-
SHA512
14afc9b1a25a1791e2ff7a3d72b9a45e06d391e674ca442b8db1ef8a8a8aeb8f9875125180edb43af6d63840faed77fdbd5e7cdda7541c13d087a52dc8df9cbf
-
SSDEEP
6144:SrsMYod+X3oI+YrsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:25d+X3x5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007f03b1e3c5550640a1448c70d29b5c840000000002000000000010660000000100002000000004601ae808742188ea0b8cd2fdc885b8a5aeb413eb5d0982edf8ec951715857a000000000e8000000002000020000000ef1b80a5037b74400192d37c2b5e2e7df07a15c602b3c5de4c9abaa99fcb166c20000000d10393c315ca21813cb4b51f620932b17430f73a3b9d95a145addc099e1ed0cd40000000d4e7757ba1373541c8fe2d691e448c3393dcef65b1fe0d733b160e97b636da6ec794ae3d0077b3f0df515a67a56184f670b9ad048f0196efb845db463d4b39e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422862333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a89eaa2bafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1B6AED1-1B1E-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2640 2080 iexplore.exe 28 PID 2080 wrote to memory of 2640 2080 iexplore.exe 28 PID 2080 wrote to memory of 2640 2080 iexplore.exe 28 PID 2080 wrote to memory of 2640 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\746d0f7eecd57d5eff0641246dcaf236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555bc96f5641dbf58e8c2d131643faef
SHA184e84d7d91db4ac28030060992913888edcb5505
SHA256b320c6a3dd593e2ff7e4476e71d4cc30a27e8e342bba53cc06d1d0f113b2c049
SHA51275a842689ab6daac731ae43a0560a5e7c39cbe9ffc8bc6413645ae0491525266e7ef60a320c82d4b3de67fd3af274513745991a44baf185f5e98afa050d12cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1adb146a389dba258ed2f520d7491b5
SHA1b7d50ed0e0ebd92a7efe559837d48cdfbee25d17
SHA256ed7495cedb22468e8423edee8e9d33ed4d8c4023b8c1cc58c2176b5fe73b2963
SHA51220adcdadc6a4bd6490ead9c30a5d47ca7b804b4b644e4fadf579b2cdcc63279b8c69b36af15092dee62a26b4c85b99b4279e2fb415f37b98f6892f5991146735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527525aa9c2dcf47a2cc164c460746762
SHA1b394c9619f5d4e289d2e860fdc8319108455fd2c
SHA2560c120d14208bb0029c366a33df3ee67d7d74cd7440380d717250695479b9d56d
SHA51215d6c668afd34fde6e3222fab76512e78264a1f2c44f2f0cba732103126651d3add9920996437b5d87ebeee7fa7924bb4fd268936774412e61d1b283ab05debf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49f00fa951b0719ad78911b5e2d17cb
SHA146fdc837a6de8616895680c506a0a3bae84bbd99
SHA2565bda3c5dce9af2075d90ccaa73024dd28f284fc44d41d176d6529890e07c2b65
SHA512b7399a91baccd626e34994ac71d8a1dcd8c02f2aca0b46bae7c98127f2d661674e48e938c55b734087c92101207e5b754b3600666a7567cf8139b3dbe2b137b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4c48258d6f4b30001ab056331fd8f9
SHA1c8581353cd71dd768e6724cfa033d008561d819f
SHA256af848dce340fd511d18bb4ae6f27c97d236b2ef03f723eb89dea3e621907265e
SHA512b2139fe89055e017932bccfa481e5c09dd55201ec6799a03285ff6671bc6e672696f8609d39bfa836ab9da48d01efca2f2ab7ecdf4250e229bdea45ab2a469a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd0b5958581107e054090a971fc36782
SHA14feddc84c1606467d8b42ce16450d17ab899b672
SHA25627322d7ee86ebe7cca084db80cd3a3b0cf5909c94324b04e54c532b7094a8d84
SHA512fa7e036ad97655b6089dce48cbaf297c468c36415545c598f526bb2ac66a3a9124ff4b5af56903d059b7ee6720e8d26838f08fa44240c196ec652349fe694fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab3397e9d76a9f9fa7c2138bafadcc9
SHA10ca8847def9881b1cdb168184c969864926c945c
SHA2567657898ec3bc4865198a991124f90a778b0d35b9d4984050d0c04b68cd8183a4
SHA512c3d96c9253252ebd9cc87306e05b669721fea920983b995227611cb2805d98d999bd0a888d292bda404e2bb513aa1a7502fb6996409118ecc33c40bfcca7bf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b303750f0de6b069b50e1b9f4155162d
SHA19103a6092a7fa04c7b1f8bc1d8ac2ab2299940b7
SHA256446f7c81700320348e4f4131f16ff21bf26e85a40a65a940d2919ed653fa8d4f
SHA5127cebbc1f436efac2ae7906ebaf478fb001eb13bb9c76a67c51708887055ee84307cf0ef5e573bef89d1b55da9999495af27bfe4363d7b8e50fa07f7b667eb4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf17daf9c9dde098b763534a4647ba6
SHA13724722163b318a273058b0afe188af8f6d3e5e2
SHA256f76280daa44dda4e200494a23ff254228498b1102b7b7495c86d045b5a0795cd
SHA5128260488c2b0ee4e5f38c89059a1937f2c35353236e3339aa2ac0a91ec029ced0a5777f08e3be575d97514877eba88fd4068eb6bc2d20a37ccc416e9f9362f403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c88c4bd17d328382bba95a476df2097
SHA16c079f64348524da2fd86703c0d831100b3d3f35
SHA256efa3fd6d6976a4e675381f1b22b24d118d1e393d8722bb498d8dbc7b475f16b6
SHA51204bb89a9f34ad7900f001fbfb1a0b9fd9f3d28ade0d68809a447ab474289a1f1ea95758900e6c8dfc82f7f9e78b4fc80aa8400c45bc84fa33b2da5bc30ea62a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a5882af7c328e529f6e3b85578d81d
SHA19193cf84891f4d47291ec3fee6c4f29a905960b5
SHA256e9b3197982a0b22ef9d59d2f6188da62f72b23c1f1ace8a4e23b60f9c5e4ce87
SHA512d59937c5e7258c0a33c4c7476b2d916a4ae48904bd657d3da1d40ba7bd7006fa56534ecf619567fe79e0acd0824c509b9cb305a044c902bfc427cf87205f8257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec7b5f83e72baa15cabf8977b00f705
SHA11f21e8ab45fc45d13c4861e99f11840c50ca321a
SHA25679b3c7d53f66f807a961332f65da95e8f00174fae83c42f62bfcdcc75ed314b4
SHA512bdee4789918f79c20729771f18605be0382faeaf72264acdb04408318b4a3cb5c6b4f1cc54c8e3551cfd2ca92d985a144dd45ae8eb158db0fdf5ff9766b7e80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57996f975795292d900aff21b24721450
SHA13927f2bfd3875cb8c5dce45970685ffa5240a725
SHA256be8e90165b27b67e926776c35b6abd6ddcac6981929913644151395b61fb9242
SHA5125d7d24c0f68bed72d2c227c48515a652fdd7dfc02416d8980af4555613ead71776cc508015ff271f123a90f8a89a6c7fae3bcbe2f3fdb9df703d05d1a9f0805b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c63c4f4db35d4663888a825480d96cd4
SHA117c8c86d66f49bcca519f1c0d90e75afcf1012f5
SHA256f474ce84a83e73b23a55d874a2360b3de2b27c6e53bef5cba7e017d57df6353f
SHA51277d18537de9941752d16f43ac4bb4b39086cec76cfa3b5a9c30217d9433d278f457107ef28d9b77703ecb53b5e4126ce83375196e3b745c5045f4a31b3990b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5172cbd23903bae5f9323918d1e7ce857
SHA1d54732eabf4b04277ef9ce6444c18cce69333a49
SHA2562d0e63f5751f05edd845331de7780fa3396e9070cd33d1200fe0733f19ba7fd0
SHA512d79aa7430a04d1866fe7496644ae65868674d877a295062237e619767e414b284e4af9e0f6339ac2994397dbb41d4b2d074019ba69c13d17a257931b079e890e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b97377926c7141d029c56643ce05480
SHA176fa9e3ced2550f1557ba01b3add548eb84df5d6
SHA256e121cd49fedead9e8ec912ea87ed77ad56b3b7e36a6d2d9c3a635f4483a6e71a
SHA5128af417db869760ee49b39a45f154c103e7876a7dc267ade5ccf0f1a15c9e4d6b73c8051124c91e57a5ed76ceccdfc4785bdc4e9f4987ced61d5b99f825c74f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b6156aa52378cd430a464b5f2047e7
SHA1042d0f86d830c1849b22ff56d340d0ebc05eae43
SHA256f5ec6e40d93a73552e8d5a9b960baa2ff51aa29380b4af081cfd96edf5228338
SHA51209f1e1fb8dfa0a8cbbcb6d7e4686fc480ddcd211da126a8393c11ff97f475518a31e00290b1e352c32d4b9d7aefba1e0de56c2fb4680560152596b0881fa6adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cc4c0f443990b7d84ab16211329594e
SHA19bf2e125576111a56f6187a4b7f023a35246d9e3
SHA256a1ac1e5553b684f9d88fb117dee27ee6c1c1d487a5965da86a52c144ade267ba
SHA512e45a9746cdd2ce7618779d39b8b1dc0ca5968d7247969a64ba2ff83a809ca9c16782f985d2bfcef8a37e0934b62b4668bab8f3927eac5ef8ee1ede8c047054e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a