Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html
-
Size
24KB
-
MD5
84d1d40106f6001cbd7ff7bfaa9875e1
-
SHA1
82d572722ead77ffa62a0e98b5d5931e2234aafd
-
SHA256
1002b89b9f665fd274da3c647d829b7dee46a25a59de34bb80541bdc1c927039
-
SHA512
7fdef234b433a48520aa334b66e31950200e5d7c72a4a29755ba32f98b98c0fc88219f055507fca3d69c06225ad0684cea4bcde4edc0e65bad1d1e9eba2a37d3
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNnTnQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nza:nIQ/kygcnnBj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423249630" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F8D1381-1EA4-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3036 2744 iexplore.exe 28 PID 2744 wrote to memory of 3036 2744 iexplore.exe 28 PID 2744 wrote to memory of 3036 2744 iexplore.exe 28 PID 2744 wrote to memory of 3036 2744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84d1d40106f6001cbd7ff7bfaa9875e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f97af4dcb1e4a1f9b3a344187cfeef0
SHA1f9ddf05df8187a0b17b8e79e7e131bc49a9f4ae1
SHA256f2f207432a9b1488b410e5fdfedb6c6ea8e5d76a50c40a87381d20bcb0f80688
SHA51263238ddf57ed302f6159a89bc376cd0339a3f73e74dbc3ea3496402d1df20e6a916861d2a6d7db5c448ca13940e5cfb6b4ae9db2e4ca48f8b70d5b267c660d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e41bc71a336768a198e0ee50570dc0
SHA1819284175e302a491b33ca2832d7f51aafda9940
SHA256d6eb653c704fc77bac0b945f4c4e1aadd16849596f84959a7e2b10111bf4635a
SHA51238c5cca6bee90089d8c7caf33fecea178dc8697517504049e1b919775a6dc68b1527e36dfaf411de72f3bbc7db0f5d4c3e4aeab60a59ff41094473bb29c3a1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd3c09d582ec38a4e058661d69d2981
SHA195cdc96ce9700de20c67385b26da7d025f6b6f2a
SHA2564b1d4e3467da7c0636b02d7f4f45d64d99487ac1f329bb9908a0abe7f7bd331c
SHA512a6c1d2528883c496b54b0bdee309d52140a607101f58ddf6d6a4c27561240824d7800d9aac8c824246f2039d3d5c4b051e5be252d3fc3f9649325432e70f26a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3d2d83ff1a3e6e4324a4fc8f58ee2d
SHA18ae9ec7450bc69f5a813dad8dda41584a0d3b61d
SHA25692da19aeb1fd96ffa49939cd710925639dfa278fc26fc91e10eba8fd56cb4b1f
SHA512945b0226a9fbfb147cab6f9a9caaafeed25893d06ea08b563ad048fa174210ecbb0cb7b1120dfba611350118dd9678fdcb1f7fe4a7aaf8f0103f3ff06d8a229c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb4d46e105cda37fa6d5a8b1d7ba78f
SHA1e4e1b69172d4d436b3c4579d15aa081b1b1c0a7e
SHA256779ba381082747cbbbe0db0194bd98ff90b4c6afd42d253a2183ca6213d94623
SHA5129fe2f3714fdf5510fb4d4939aa42ed51ec6deb81d03291e0059cdabe049d13d1098fc3bc94e56b40b74f38ce4388831af43fbe96d38744c0f550187fe6ae262d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546159ef9cacfb25682ee65fae2e58604
SHA13722551533b8fc6db5b7289c17de8c117fbcab53
SHA256d9ae5e6f6dfcae31669f1da7decc215220f5e48b03f2017da27710441d56f684
SHA512fd5da14aad5a06a394128a1ead57dfbade2c1ea8c15abc1e01ac4a4cadc0191de3c504d56672de66c5004e34d507937954629f456015923983b30c983faeda97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fa3469de86b658b3df4602bf198f02
SHA1abf185631a19913251bb726c49fa3faf5dcc29cb
SHA256ace7eb9791e35e8b33495a41483bdb9b9f3da6ed196df0be69f07bbbc213979d
SHA512c144db4e22996555469f10de87784833fa01a473ae9863dd7afd5cd94ebd9cc59fa8c4e41ce336970d5ed1e8de1dff0b1169dc5a01263756c818f7d20d3d757b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e934985bfea9d1f65af6ab95041862d8
SHA135f5b4757a601dbb4cb4c5f22b4e22d8073b990d
SHA256f93445aa3274f85c368bef2702a32c8f9a19c3db60317e4b7336ac6595b2952f
SHA51258df6653e17c919c3d6c6ee1dfbcc91f3ead238be4e41a1a7659619b27de24627a5c58c43367ddeaa730c9a901294d0cb0848a2d8a0e624bfa6e12d0e34015aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d47195c1804517eb6e6da4b1889d35
SHA1f9db876d2b4b8235334a2a4b1c6442a87ddfe151
SHA2569b7a528db22fa99a175db7b38bc9153bc0b07a3a757e8805bc36b5807bd3930b
SHA5128474f20820d0305a6449f0b4388402486229c7d3552b2b5465f9238fd5b74a7a4869de0e3bb23007a3d457138eafe8a43f09f881cb3825599b2315c1de6e9954
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b