Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
899a7da48400093b9e2aaf1b1961b449_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
899a7da48400093b9e2aaf1b1961b449_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
899a7da48400093b9e2aaf1b1961b449_JaffaCakes118.html
-
Size
937KB
-
MD5
899a7da48400093b9e2aaf1b1961b449
-
SHA1
3789b5d12e2f42a533f82f175e858f45679b5c8f
-
SHA256
429c17fe3a4cd711138ce1194c376d0579bdf248051793a85315f12b3f2e8bc3
-
SHA512
be015a8818bca11b045771872c72ca27598d62a51ccde718589895146bcf17002edab1ac9c1fa69b29577792aa8accdfb6de1d611e496f0506637f7a36494688
-
SSDEEP
12288:5Diol5d+X3poCPuzmrugwG2qH5d+X3poCPuzmrugwG2qz:5Diop+aDHs1+aDHs1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423385072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ec03bfecb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e38a51e1bed66a4686e78c2313ad53ee00000000020000000000106600000001000020000000f1199c446b26d09c688532571b51cefde0ac2bba767279e4050b2d32f13ef7ee000000000e80000000020000200000009ac7f1d173eea268f86c285abe034a71a430d0dbdb081031302ac32d5dbf664320000000fb7efb9493727072290ae8ff7b2d26f52b6060265bdade14e100234b061242ba40000000f404af4b7856628e6232e60509f946dc847682989d66164af0dfbf4f54f937f8c13dc805fbdd18ec3bd8fac86731196c9536e76cf74b72cf420ef2f78cb4b391 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E969AE41-1FDF-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\899a7da48400093b9e2aaf1b1961b449_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445903c32348d2320db3b520a141d162
SHA125760187adf5104e8da797af8dc324e8af41e6b3
SHA256059f6cac859ced7def5b48faba16e8bcc7b1da002cc89a2c8b4162fa093b51b2
SHA5126102927aa19a6eae1180b42003d0862119c3946fcc62d9170ad5f9c0e3578b01fefef1d7b5312d45870d21cda60797afe2e0b6082f90b3c33c538b18471c91e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869e38bb198c67ca1c8cda7f772e1716
SHA18ccbce42009228067c7aa8da61a6981d5400056a
SHA2566c2b268bd75b7322b3bcc5d0c74b001bcf9f232f6069042e11315b2433a3a85d
SHA512c137f50614dd358f4ad6aa3b6a10ee5af24f9f2a6d030582b75e40af1b7ca81868463d6f2faedf96d44bf0be116e34e4ef9f4f957bffef7d8b768106ae0014e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d656970c30eec8a4893dcc265e8317
SHA150914898b7c3b99badcc72c744942a47e0118be1
SHA256a5c4e37ba46c33e923b70bf017c52a0232990a30fdf09fe58110799147d4ce22
SHA5128cd4f04635fceb40e858158f4d8e94c366cdd3948f86e2061d870d615c023d80063d460525cb0bc6547e17b8ccc1f2cfaa53f6ea75a043262417c421ca2e365e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55171ab8819f723a0e4299e44b0372cea
SHA147b4517a2171726010223fbd95a67522085cb7ed
SHA256ef81bd912bf051f0f1d124deff2913430997ab2583680fabda1bedb585563a44
SHA512856d4ff7b9b11a54c9cff00fec46ea3415f3d83bf3a30a32e1f8b4ea1341f90f63d9960a7bf9aec6c57e13e7a1d8f84cec8f2b840f15588e55e071fd137e6443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46279dc453db33657357cdc3dd2bcd5
SHA13ac71a60f6e4b1ab4756f771da40331533af7b9b
SHA256b5a44e9a42cfe5f0cc6d525951e6da9fc80f7d0f6234e0fcd46031afd80f8158
SHA5126a696f57fd2972d3811a45ead0bbab4887b8de24485c859bd4c1cfdb57c75a57ac431f97bcb37c862a7440af7145bdd6bdd5f10a7de9c9f9714ed9e4c29880d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d58b03a12023635b034c501ad412a9c
SHA1f79a67658445b11125aafbc9d6c7f30fb690a97d
SHA25686e8b02b96f1ea529b89e1f930c66d78526efed6b94dd75d747fc0b70150c805
SHA512c62b4412cd61cea505e0a158b68699bdcff4b7dcf807fb5005fa26141d4f7378cad06b574fc323ee0c0a6d60cda4eaf59738d97cf88192139e03e506feff2a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56932a53e2e32d1d795d9247935ad3475
SHA19aa59ca2ea994176e9ffc5a3d17dd7fa4f0c81fe
SHA256177f606e9825308080e98ac4ddd2beac7d8b5a650913c6e625312c8646246b19
SHA512dd7ea3eef57c21992a30f1706934e678eceefad13190ceba5a31572da58cf58f89a2399118cc3a040f22b73ec95ff77a9ef7ef46010b35118e02985236a96ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50557462a52a52608502d57302a8cb072
SHA10745458397265809dd56d1a29442b6de0b54e3ed
SHA256f96d7449820a5a2eae327ff5b5c41192bb250579cbb55319767c5acabcfc0e2a
SHA51210adefe0a602e2168ed5cf7138cf448d22b0e9963ab1a65d816e22763bc9987359210d88779e624cccf15ed358c697d065146cce49ed24f3c8eed3e9fcbcf960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bd28e405a8b0986b3371d426f51d19
SHA164d8ed88cf29d4116430522afc01066659d6e880
SHA256e8678fff6f6aa0040035d1e1c2797a51b33c3a1f6fc26150ee6934bdaff67962
SHA512f7a832af95b20cb2751b921d707a77158a20cc7cbda40b28b79107c00a1cfcf95da200c8fe894c8c4600acb97ac66740717f9003bbd83cd450da4ead832da7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514100e60ea3e3ccb7d3f85e6181344c9
SHA1b900894e687f7e46eb05c6407a6521da42bfad23
SHA2566a5e654c8c18afbc5e106f180d46a24035f309f1b688fc21fc6b1f5aaf1cbb23
SHA512ee58883f1b8020770cc396c4c29dabb3c55705f963a2775673402bcd86325d86ec0fa6b98d60f030287d467cf5e21ddb6bc3c7869f02dd4acfc1c1b7dedbd7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaacc1537d24c0b4c7f5d15c316d1c0
SHA1fda4bfc21f325a1705fde326ea762fcee81c836e
SHA256b8bfd8bf17c43ed202de5228189f5e62ff39b0a2197dce87ebe42e27909164d5
SHA5120c0b48ee9bfa2369ce780f2412d88997a7ee7cd0eaf8f89271d32672c919083fab56546067bad0017810f63a7f7906cf5513d74b02b4ea8f6256d6d3ca1a3850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e49aec036a7150a9627545973ced547
SHA16cfee71e3c36a44473dd2341a5ac81caf2a564f3
SHA2561d58d37116849b7151b288600db603256ce95a36787594610002be446c1af601
SHA5129b3cdaeb1c72f7bc12463dc7d32eef8ef5ae5104c8d4ed2c4f91f05c49302a3908e0c2fbb00449aba2910aad0ce3986ac29f9e482aa5c60db1a53a6daa4a3040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aece983c107e3df75a3517bea2fdb591
SHA1791e8edb5ca586c9a72f222a89a0e2359bce8685
SHA256b236ae88bb1862c1a11457c7fecc0441315c429a120f1506716e48d66edb97c1
SHA5122a97bf74b13147cbea98ea837e4ee4012d75b08198084f9b5907121fb6ce2fbf6da1ec94490ff0737ef03438823adcb68ad5177e3d1d1d6f1ca02bbeeb4f9d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516dd2608999477a1aec1bb868a660ac3
SHA17c6605b29d5acf2737465663cb2a224cbf2f2894
SHA2566a10b6356d0096f35f3494503dfe98ec04465d7f519c5b8f0a4afd4cdc723911
SHA512f3ea73a809a10abd2baa35110e241e1885516ee5ed748c08a8f23058612e8735a931d98a8b5be305066ad286b2939e68f63779978a7719a5ab48cf3ce4818dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150555cfe5e969f45e070844529b5a7a
SHA17c1180a9b9c0aa808f4b76aba45d3f4560d46717
SHA25669f4327adf4344dc4b67aed7078ee2db6c7e5ee6d43081d661010ed73ccbd53d
SHA512baeb14aad2eea2d9e8941c810d4b80cb6a98bb71c283c58cf455cc3cf95f539b09f41f51dfcb7d24513acc858d62d0074419c81012b285992a4387e57fd03c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8e20cad8234f9fd551eaf48216591f
SHA155cf93826b0b998de8808f70da808b94450474d7
SHA2565c59f1ec54c863eb4634f1452610273b4c400fac036c2fca24030a45994e23f7
SHA51273a3fc247e6696bf6e941ecca1e72eed5955a89595fc996bee34ed9b0cc13991cdaff49f32b55616959c3115b612dd3c1221cbc75effffebe74e7dda298a1bdd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b