Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
74beeaa563f8b3584615ad12349d6d09_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74beeaa563f8b3584615ad12349d6d09_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74beeaa563f8b3584615ad12349d6d09_JaffaCakes118.html
-
Size
102KB
-
MD5
74beeaa563f8b3584615ad12349d6d09
-
SHA1
b07ccaf3d6319e23bf6d53a84af8318aaabcaf79
-
SHA256
53568f76a26752a814778abe57d3781ef06b2329cf75977b9973e61dcdcb9d1a
-
SHA512
58403b886c424ee2cfec2568a271ce42fe58bfeeea8de250236cecc2670e330092e3911aec625e2e5485102b260ced2bf8de827cbfb3c892601741792f0c7602
-
SSDEEP
1536:/ggbqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZ9:/ggApD6Vxm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c914923eafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422870455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAD622F1-1B31-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002c4e4c9c28b47b43ae04ad516d94e0ce000000000200000000001066000000010000200000000f8aae363b35686a09bb373b71e950b485b65b1aa63480a3a7a82c60c4a03fc2000000000e8000000002000020000000980b0c5a2ef488b7fe92a752409beb69faea6ed3c73614b28fcc84a9b03bef5c200000003308c482c31f9dc58421c2b94e3f6002bacef38640ed27677c2adf8bf909440a40000000a32c9bc9f028ba494ba869466191c01756bd3eb049bb5abed98d0184fd06e3579d87ad8a680630eeb13730dd7bfc468a1efdceba5e49a03a3ecb7b9ee45ef8d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74beeaa563f8b3584615ad12349d6d09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0455777b4db36bb214c990fcdc508f3
SHA1b8aa2b55eeb1097cb5a1713df2893d28cb86953c
SHA2563e6e23f3d12da58171d8eea4efb906a50bd0d1d3e3d5149dfe450dfa03df7c83
SHA5127aa4297e5ab36cb923a891920706e51fa003ca3845cc74cac78f3ec2526216db3649fb538625b42eeeef295829a7ff75db0a01385cb668749e4749f8b97b47bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5027f98a16226953bfe3ef18d3a7e69cc
SHA1e503acb7f80e980fb2e7f50ab582410ccb7457a3
SHA256dc462e9185465d3f454865ea7e7eebbb68d0ec58a138aeca4c73c5e87d49f1a0
SHA512965bc38c19cc0098e5a19d29137236891ea6b1954b923c7848dc0fd37029a812ec94649bc4b4b27864a4a2f927d57c388105e68cfd7a902cfe0bc9f402fe861a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ca340f4b42282204f64ad9f9c537350
SHA16070a3c4b262b7ad26668fe42d9cd30afa27444f
SHA256e3ddc58306b40f1eb3f81b760848576caf7f3153c8d70d1c238d5620c1b47956
SHA51209202b558f793d6d3cc5d091ff5ed2f695fdec7c5e2b8421e1d5b163e7dc50f642dcc0128a622401945b63e6a8ef74fb3e029eb46b2c998fa2a2a0f893897522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac836400d0a9fc0013917545020124c
SHA1fc8993f38fbd722ce57eeaacd381256b69364864
SHA2566110cfb440f84caa16af6fc7082ac9e71dcdd7d2b7d939ade71c55ec3df5490c
SHA512a8fb1b595828dfec1f0580f7ad7ead4f09d63e28811b9c370214e612f86f09803645c9aeb2f74895fe60bf7239f3846308c3c7ab0c0d823cfc4d2598e719323f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207b25e005cdc78440bea87652c7d768
SHA16304b3ca1d71413185f6b582759f1b4ffbab16fe
SHA256165c34a6c35f10086910e28fb5d8fd013234faf1f6c838bd87ca8ae4b09e9961
SHA512b6f548328e7df7a2a76c85bef100b48b7ffa599a4f754ba285f016876a4e55b3258ceab9c581ac30efb31c27d23f7985a1281edbfb88a2bd3e6a1aa6acc8928f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a2a41ddb2905bf7ebf57669b53e0aa
SHA141f4124bbde0c1dabca5f70106065fc267f7afd1
SHA256205f069e09285691fc17b6fdcf77e169b445e401629fe1d69b41e487989a3817
SHA5125a981c87db699b70c4123baf309f05ff5b9e10c0b91d1104f702b4cce97224e33b3960767ae201a9e75aee9c7dae9d6642fc87155c4c60f0020f65a712b78dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc44470c7db2a96bd8a5e78ffb5ca1b
SHA1e188352254f7365a047695b971ebed5f6e3a2ebe
SHA2561b52c9a0421b319afc14cc67ea76ca5e860508abdef60b2fbbf2b39885d8fc28
SHA512140428f326f310af2f952b4386c5cc07143b9c31e9dc7eb02246c960971d1c90004ae1a754d46e63d00acf61eceb0c394139432d95b15d0caac0d7ed345e58b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d19255d76a66be0ce7c73f0cbb808b
SHA16f9a00b28d1fa818d15e1028dee5f13fc5eb038e
SHA256437633a8f32c766cef3e54048cc78c9c2c1e8343087b5f133f09585e52eb6eb5
SHA512bb52adc8fee25bbf956e6707485bca1c21ddff1baaf23bf459b0e26ffca34e5b24862ca142b4f5163ea2b380aa7b443214f2d0fa1d5fd5a5911f88ffb08fc0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc84c4778181203083ba951e8254fca0
SHA100ee1bb08d008fd1d5469f29d23dd0242edd2042
SHA2566e27373c0851dcbed5f9b35716768cc52f489f7f1809b357c11475e152cf2824
SHA512ca64df490bcf0c68ddbef5ef8753a6f9400b6e11aa50f16a570a449f2afbb462018387a97ca7319cacf26bfdc5a4416354dbdcfea8ec812a9cb6d2614b12c911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab46a641074014ff038b2a279262e406
SHA1655fcffd90ac0662b8e20fb0eaacaa5cf1168d39
SHA2569bb0d9921f7be65274538e6e1fc6dc6bb2309a2ac64b7655bcef032e57a4fa4f
SHA512a714ec77454c46af55f15ec6be56902d6e2ec2865b01294dba46d22db19c71b2ef6e3a569f19ec2c270fcdd81629fbb1dbb56b2be2096b54d35aed5415e081e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd00c79f65333601bf88b413848a445a
SHA173115ae9eaffa052ac600181162ce47089b13345
SHA25609a6d1d9932277e9f4bc59e3a3c3840801e311fd8856704422ddf70690618085
SHA51216fa775ecf6121aebe6848bf601ed17c08abcab4b621ed735ce92aec7e4bf02b4df76b7c3e54caf82b7ad2fa0a86a1ea72d68272396ad9416b78f307d6e53542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc1f8b5645732c1e9501fa77be3e811
SHA188bb745aa80bbec2cbea40e7e3ec127e0e1365d8
SHA256f294f9d57a7d83893df60657aee6375a90a8f578a0412a75626f658247d132db
SHA512e4f6cfe353cebdbfd15b636bd80eb489f0fe9602b3f6bb3bf540f48fc3f009a5c89b70a434e7f9faa1015d0c3689ebfc0170d3497d81a737f979becbe8ba9f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c09b53167e99df17eca5e11c240198
SHA1045ce437371b28e630e9aa37a83b00ebab7d5448
SHA2561c5566a0c94cd0e67a91cef95b417effe0fc745dad7ccb99e6bab5175c7ba390
SHA512fa9fe475482a8651fba3420715f463fe179281f14cae4bd8266d446636831bd3d3d7d3398283b2f496f9c1ab3900b20639a65ba314ab8c2292611c38658ed610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b870f32c968a0e22f36b3f129c4350de
SHA174ce9a20a2b4443f8fe4fbdf55cdd4d3a5534ab2
SHA2565baa8bc2266fc3856c05eb74cd8f928031b406147b993bb38d7694b80b1eb746
SHA512695ada5fdddd06dc9207ee48b52fe561205942ff4dec47de08fc8008b7f2f3d70f279edf17aa01005589fefa0b308953796e762a59aee39d5977ce3287dcea7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5755c4b683b6bb05857c2e191b6ab20d3
SHA11011999b032abfc4a9e8511ed06833a61e2e0ee2
SHA2560c0ae42c942b9a85c1decb4d395be55eab8c4c4803039c9a46471bd601cf9e6b
SHA512af7f31317ec50bc445eadc556f4a399a816cab7f658b317fad3e3264e31157e127c564d10b972d18a1a45a48e932cbdaaa392a45c7b02723d89db868cd04c59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e14a58fbf46d133a00dfef16606ade5
SHA13e922176a994d06c116bedc17123a7c0eba51072
SHA25680567bc459b2c389dfd83d273c1fbc6fe119820fdcf68384737d5bf133abea56
SHA512e9d9c2b347651dbc768351bad15b26b39a43ec5c88c572abaa5646a7ee814ab6c42af86f0085fa8c1c035ec2dd72e9ca9476dedd4740a20529c854febfdc1ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c68e8c4ac4a9489a0fa4f20e44b9ffc0
SHA12a5f5c1483a674efd4e6181b3cccc41a35d73cba
SHA2563375fd46204c0e622da2f5fd85c54c5284ea3dbead276547bf6c2511b7485c17
SHA512f534382bb8b2f88d0626cbae35c31eb6252affe2d30416196e8d70d9a567aa6d7f27fffbb7f2da4ab67f7b37ab0e43da8445ac3cf374c016101fa422d5ff5456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bdfcf350d8006d9cc00eac4e3717d2d
SHA151fab9499c6cce9ca44eb43e9bcd6cfd9c2291be
SHA2561fc56773d0084c82a91b09b25c6ec2d76ab80007440b28ee332818618c9c9192
SHA512ad8423a9d1c9dba4751668ec40c9d0cfb11c70c34178301fb12c17bf8e25cf4bce8b96c9635286fb1f8571171e06e4f5e9a978002370991a995c1da9fd1c13fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a