Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
78aaa0d3eaaef9d210063af00a96e8e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78aaa0d3eaaef9d210063af00a96e8e1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
78aaa0d3eaaef9d210063af00a96e8e1_JaffaCakes118.html
-
Size
187KB
-
MD5
78aaa0d3eaaef9d210063af00a96e8e1
-
SHA1
9db602f90f71c83f4a5120443e44b36fa0633020
-
SHA256
5c9878861fa856f513139a876da1ecd5ec241a8598c2ff67ab70cb20d4f2418e
-
SHA512
6358cff6559dbb38f825c98f61a1d8fa6d7aee863ef84c6eeec6b1b670f9fbaf28bdbd24daa511fae03d8aabba2e04d11900a58f982c70d8bdf480430e6cc411
-
SSDEEP
3072:S9TazdiyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:S9TazdnsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b2edcb17b0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422963648" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dd6635e64ec1a4db779775f8b8a7eb600000000020000000000106600000001000020000000d2583560c126d4b5e893277b2d3c9e556ef72b54563b6923e06855748dfe5b97000000000e80000000020000200000007b253cff78408f20b67e147c307aa7241f1f3ef13c0b825257afa95605679fe02000000067cedc5af6c10b58533019c8ee806e95d9b53053d9f037f58b29c3a93095c83440000000895c0adddec47cfbe9e0951e2cc63fa6702ecf85455c96dacf54a6f76382b28e92a15a10be98b51ffc7d5f4c5273573d0c14295ebe8cc832f66a495be9c70545 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5996391-1C0A-11EF-9511-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2252 1152 iexplore.exe 28 PID 1152 wrote to memory of 2252 1152 iexplore.exe 28 PID 1152 wrote to memory of 2252 1152 iexplore.exe 28 PID 1152 wrote to memory of 2252 1152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78aaa0d3eaaef9d210063af00a96e8e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4cdc17f7549dd99120978182747447
SHA1d516d0a52d0789423bbae5be69b164f30b3eb59b
SHA256edc9571e1f8d4872b2f343c07a75cd30671f85b73415d3a6cf155329a2d4048f
SHA512c47427f6ed9b34e624fa1f3580e7fe7d5281d8b4b80d8a6956dd41522fce0f41883d608435253c1a5f9b3a87eedccc6e14ebfce35ca601a16d15ec97e5f8c417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f41f76f55bbff9bede2b2da2732c052c
SHA1991228bb3b36527c018b1a32430a983fc0a83638
SHA256b705387a1c89289a98b96d738b4df8679d1fa58d4743d0c381d2751470d0bcb7
SHA51253fa498f408c7b2129b37a8853d740dae3bf29c6b9229a1ffc7b894f49f63ccbef342bc9347814dc9affac87cea34af4921c817c73e6b311012d8830da82c8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55964b815e1f5bf70d310f255875e5f15
SHA1ae2c3d09cd2c3301cbe8689cdfe9a7f84ba83be9
SHA2560c112b00e3339d341fa1d05f84da7738894367839084b858c7d9a75054f78d08
SHA512059400beb45a053b68c6943a6c34d9eb535b9ea34249d0a1bf3884f67e7bb5d07fbbe7bd80a2524aeeb7c6cf68fe7211ab433a941e05ddaef771993c20f46809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c39ab115306c45972abf9f879dd655ab
SHA15eb6728c04217f36b67d37c9f654021ce36e6638
SHA256373a0957f6463e45cacdbc33179f4b74fbf5516ac0d4ed8e6b85812202236c0d
SHA51291efab7cc84778156833aff1c5dcab404979adcc0700afb637adb98bae3410b44e9cf3dd36efdcdb6f190a93c33888eee67c81f293ecc79784c320d919d918cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e6a0dc3c2b363a800b8606dd0a6f94
SHA10c47faa59b872ca3cfeb1ccd25a8766b9b3e9d88
SHA2569f0bcad50fa24071218e5361aeadb91148a243c7609b59038a20a23b8e67c989
SHA5128be71935cf96b3a2d17f7d50151c157624cd8f2ac062e55852da6826a99ff788918c1533df67b22d5d7d3102d82f7ec59c1d1e4cc601a0cbe9d08df40487449e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c962e72062e4db367d56e086b36d1862
SHA10af8d13b08d146f0a820e4e6bccfb2e5a1431f33
SHA256c1a6bc9f3be37a3a1c57f7dbafc159af44c65496adb852c6d5b233f3c9bd4dad
SHA512c8505c575ead76b404e40271e4a6d91b08f120cc73a25610f6d75aad1e18b35649faca3d9dfa577de1e1ed36ee5c42c86b1cb81d071a8e2d31a448126ff4956f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf8e56f17c74a28ed79ebe5f6cdf38b
SHA1d4ca9e526d62b76d82d048b9b7250cfa1448454f
SHA256a297a4aaa7076375a418bf5ee7121b4e2506c525a2124dfe3b7828e9beeef1c7
SHA5120daf1b31fe4fcb3aa1ad83431bbda83e5235f54f6eacdec502f2a8893c907c2b530fb41001bd471db7e26e6df7479d21868ac00a612e0998d247d0db4e85b9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180b3eb7330336e3f61673873b611029
SHA180a71488c006ddacb9892339326f89fd2a4f6f05
SHA2566bf0185d3148c064b6abdeb81aacf2bd309e0def206f0c8219efba23b6a41803
SHA5128b29be8dd55f8ce8d88ee6eafcbc9b38907c55a4a459f780df67e747a22af5962adb4c3cf96041f4e194f26fa54c95772c44d641d44f9fc32f436fe98984f305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491d34eb1411664e1bc57688040e37ce
SHA1239213c49a45101440001b7a9e305cc9e2fbedd9
SHA256c47c7fc6a89e1a05392ece2e168c3403ed9ce1433e4c0753c642a7aa434f8675
SHA512d01f9f69b47873de92e75f4d8aee4fa73e7f1b31b7d4d65942fd86e2e5df66002e52978ee3db5db2fd278c9cca1caf21e9c88967b7e56aee58d683d28e25864c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174cfd2490a05ddf3da0fa1b55b77496
SHA1f8b8cc34c4b82fcff43b99303a4ecb82dfd8d066
SHA25648037469e91ea23172a2be549474537b7eea628319099ebb8e99e42027feb88a
SHA5129e88b9ea32a870dccd254309a6c173ddaf704f324746825f22defb01ff43a3fa34f83f376464b1d0d52c375d7fe052ad54da4e381fd2d6a35648e3ec74d8b5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e09df9d16bdaa41acf539fef6b6eaa
SHA1c0930649a96722b9c114861f90cb270c6bc0a071
SHA2561c333c25654cb7622c77776d8daba652e762b5632ba2d1cab1281cb3ddbe1b27
SHA512eb7f9cfa2491ccacec1b8d977361dc6bb7ce67262cdd0c35df6630d3d81e11159521bbbafd746c303c6b02e3fa63d94f06a26aea8d9e4c55a94a2b42621f37f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12a6e209a2632a666588a9e2921bc6f
SHA165e3045c0add8d965559ba9366e9994277412011
SHA256ddf9acd4b238092e0470d3784b4b0bfb59a46f1fb5955120cc6d10092631b1b4
SHA512d13bb8862f5fd0e43e3a7f5642de479554d9481c19d2e253279910e95b1ba52c2e2a12a4e945391897035aeec1dcb64e9e84f3e78adba5f5f858482f8272b9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561e58d8e8c5f05b3ed434b91b4d5f37
SHA111ffed8f16f2cc664ab5b8c4075b250ba7c43cfe
SHA25667b1f4a6d82b5f3686c71d7ccf1ca79e4101dd8fa5d268b6f3648390aa00fa9b
SHA512f438a98520f77bed82f6a7878ea3a8daba85fa7246e8c9f83d4631e4f534ab439610ea3d5132a1893715ffe19f5adc1388bfbf0872ee42350b2d005c00a29bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56284db8f350894d70949965529557e35
SHA1d476ce400882be1a73ce1b0d8122364cda35baac
SHA2566995b00dd219fad00e55d37214d07e9a9b6980895b0f353eb733b889bb71b7d1
SHA512b0d5df9800a77fa523da987c7775767f9b90f70042ccff81aeeb06498cb09621dd11c10397c5219d37fe8da792996b10d14b04d6ed6d0a7385866c6fd9c52d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a01593c14e3e483519c666e4ecd630
SHA192cb3bd3aad8d0ce50b04c10260ab25db9afea67
SHA256a712bf64151538b7e99edbe96c78ba76ff2fabd75511c6d676032b8a443d1fdb
SHA512cfeaf1a37036ba9f74568feb5e4a296607dca014baace524955e7708f00d5f8e2039820e593bd79f93a1a1a3cda0eddfe2b92118f240acd87868fc9587b5bdfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c248dc29b3b0c1069a23d9151f4872b2
SHA146d64ba62e5ed789ca044380eb72440287568321
SHA25620566f44f597bebf67b22fcd6216923d62646fa6c0af1a730dfe4ac5670fe060
SHA51212ecfa8f516d30c0b4007866a693273c31bee3de82fce7752134ac59e4c0a08d3a6472d2b5bd18b6f204c50eecee9c272a08c002c6158f3ea40e6188ea4e15ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566771facfe443db419b14910edcfdce2
SHA1f74c1e548d49b3508647c903b48cc6e404c61169
SHA256e00c50df1fc46d701ce6b02905446bfe69f159545361badd75f7e2b60a0f8480
SHA5127f1eff7696d94148e4d83bed74ab1a34bef01aaa397520da2fe7eb788a110dc6f7b36ef0f7bc26315df77daa85e9721f9620ddcb6fbb1aad75856327d46fa5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3a04ed936775611f04757fa3946559f
SHA174061c7b9f50501f3ebefc061a47f2be9c93fb31
SHA256674a3117a1d353f519cb45fc7f93b7b410e8a03fafaf85406b72ce82aed40324
SHA51236fb9757cc0bb0484e6feb317e2129835aa5e7ece5586513466befdaf9ae85b0a10ab74d9c175242ec8ceba46e54479dd1f297f1553082a5bc7b55a8c6a418d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0b229ee810752a073c66ee46832ea0
SHA18ce53b39a2438acc3704a67308e0c8a60deb75c3
SHA256999b5e4c95e34f6fca40a2b1aed25b468a1f8b68e9f27dfadd0b07924359deb6
SHA51249fa0a610843fdadc3d77115b22ef74f4381ea3d3337da76cfc107206037f27b63aacaf5e3ef66498b74a6ccde640dc6aee66d36190145ee6b879b1a2e321018
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a