Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
89a55c225ec6aaaf7f98a3f0b9b558b2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89a55c225ec6aaaf7f98a3f0b9b558b2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
89a55c225ec6aaaf7f98a3f0b9b558b2_JaffaCakes118.html
-
Size
1KB
-
MD5
89a55c225ec6aaaf7f98a3f0b9b558b2
-
SHA1
83d83597094c25178edd7d4f35a1bada309645c4
-
SHA256
bd451aca5e7885ef3cc778a61fbe12dbdb0034c15a18d7f0d0732fb4ba590932
-
SHA512
aba5f88744e8ad6dc71c645713ac8bd2453f2fe4ff36eee1b27586145699632bb5c657c3961ac9ab0206727c80c0db645a07a3578c9e5f657cf89aba46a68cb1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000cac265acbc04740693efd3566ff6e6412ed86bc2b6fd67d1884e49dc95cd8ee9000000000e800000000200002000000034d2dfaa372837f6e5832093455b93956419af562a724bf1cc12d7585913151220000000ebf83388c5ab5fe54a858a0a20896516087f49a8e50c3d752332da5753c93c3040000000beb4812d1314bda8e7fdc4ca6ea1065ef8424c387b544e3f38a8400638e564252274c41b754295e2f0d5f7f43256f63155aea19524f8f81bf5b202b452322624 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7047f01eefb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A6A9681-1FE2-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423386091" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28 PID 2416 wrote to memory of 2928 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89a55c225ec6aaaf7f98a3f0b9b558b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc14f3a2c16fc672869ed18f8a534d77
SHA183d3ba8e7e3f01465f4ebce02499ac524740b0fd
SHA256a404ae532275882451698d5249a0dba0dff9e6d054993bac09fddd8bec6dcdcc
SHA512aad0b3188e0e68fd158da19d5220fd362d2eb1f1ed32625f9cdfcacfd3cd62c635a4b62496998a6db6ad7214e88684da5ffe9253f88c6dc9237a117107005a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ddf5ea51393e70d43bf885e50cf358d
SHA11dd480e3ab61a7857b975b3d35349884ea23c5be
SHA256c7ac8b7495be45a28d8cbaacae301e8cbd90feba9fe7283a9f496ff8e0c005c8
SHA512c20a730ebe40becff951fa480d4afde83f83d56304bc26d210babdaa023cc76bc395146fcee8a2be1ad51410b9348d553b55153497cf33a14ce4358ec6dde9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297a607e825b4cbbd11c85262722a98c
SHA1684bc9cd746c060a355b767945f8c2f9a048f82b
SHA256a01e98fdb0661b69bf44dcb05babdf593cf17833be244ab2a38ba4fefba1accd
SHA512ea0d4ef615ffe5707eb050c79a2105a81aa4be3edd8e0e6f47c9d3ab57e097e63857ab54fb26f036e406a283022781b81ef9e9f2e7a18f7eebf86d1ae4dcb876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582af02c6eec1194847683dd41454ad6f
SHA1278f017135f29350a223ad21dc9d4e192a944da1
SHA256b93f20a1fd4c51daad8343566f32626781cc0151729e0aaf5602f29522d879d7
SHA512b1cbcd0da67f403fc57ca203cfdceeb633ca6f492586c520438cdb1f893f563a8195d5d92672171d00302d5de479669959382795b2acf9b251d2323efe632492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd08f234a63cb505504e4b2b8d9cf90
SHA134aeeb8631d5a3ae5e03f62211d72979274f867c
SHA256d8d6508a12f55ba6ae2a688c249d1d34fd1fa699c21f1abfa2de88dfe6e59044
SHA512530eae24f41539cc2dc08d0ae067dd6890e75218f0d7166cd6dd0b0d44f06d727fc525817c891d8cdfd1f25d285d6e1638bc3505f25a1c5f53e05c368bb4ebca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57786a686e12b7ecc292eeb2774b4e4e3
SHA1f52dc3ac253fb6ca0f5302e35acedd72353edf08
SHA256f3b161edee0de6ed8e2cb8861d9137ef1c84b355c47b1f02006acf2269abd88a
SHA512b93a289f63cfd1519b9afe8d7c16a0be8bc3dc0ab76a6fb849f34ee6c87fdecbe3e63dff8c30c18679f64cb0d164dcd50d6f6002a0ccdade251daa9b53836a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af688af02e96c3ee637fc0642fedc28
SHA1211771cdfdfc25393c6658428d0b5ae076f9f7f2
SHA256253ce9a8534a61c2045e966b51365302d7622283481f0415c0d504f19dcfdb9d
SHA512ea4ec0dcb3b1690b15e3032f4188abf2ebb65d322d60e59d181e42779012fcfc1bcae8507e7f1fb60ffc1e26379f2bca4370c7d69952769c2dea9a64a6fd3cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49875cdf7b7fa79811b7eacf19a51dd
SHA1f7a1c6d96569ea5eea8c2f38e8eea9d164089fa5
SHA2563f7586b163bd4ec6c44f62a19598e89d73a0807110eaa55f7300e0c48d7b4ef6
SHA51294801bc480a0d100ad48d7d63c87b57c8c0410a2a2231459f2ada9fcdb5bb29c9f1bdee6ae61629630f6ae8a2e79dff066103530017fec74e3b2f2ee90ec6ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d11653f3f67931de33ce2ab10c50553
SHA1191f24163c03513663a883e79567a678cb197908
SHA256b5b2f39434215813c6766eacbadd077aca9a8473f73270b1b46ed25951cf87e0
SHA51239f8b335988836f08de5ac3768bc151ba41428eb3b439464a8c02623311683be6d2e6dba82a22565d60201d8d3b21a263a8e904765638ef1a57330ffbe528a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70853886b7bacbd0a0009fab8043fd9
SHA1ac06e5fa57c078989081ade04aa0762a626db986
SHA25665be3b578de5f59b001b6916ae9ea9c4cc1ea79af541ebcdc80c90d1f4593dea
SHA512f55a77fd3dd3f40af1f5b4d384110c4b97ee1dddaf62da6c29980a7ee94c2c6c9fa404e18c68a93a4c57106e019242e50945e150e9430602179a7b6646e9010a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d8f68da43354bf56c2b23a81c9d027
SHA10979a760a4b6b57f39557de11be55c574671ba2e
SHA2563c25987a2bb4f58e223c73db28c52c4628d04b0e02cd78f8997b57ae027c26fe
SHA51252a07ee992d8e6508ae9de1584a2df4ce78ff5a212f49dcbfc7a3fa18c90c4bb0a59addd5496e7a7c7d7a7bc2cce35899bcbc68fe97da136f83a036a3019e0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2b807f8773024474dd3f1e6b7e2b50
SHA169af95baffc15659865b9060ea92f181ca205ef7
SHA256759eecb26495cc9b7a35df3e293120b1340298e2c8f73f9905eb1e8eaeec5409
SHA51249df16604e987b951b6733ab516d31dcc03fdfa6b5225331eb2b2872d7d1e480c9b75b7c9fbc060604e48072ad27a651d6cfa483c1c0845ee1639a305c25fd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064f9b5ffb79bf9ff17cf4086504d719
SHA152c2d0edf934726f711afc7d0250d43d205aa312
SHA25647caacf2c2f95227bbb864f06939966c6ae6b7dc207f678917d27493b5328abd
SHA512d3c9a0f044a4dd30d800bcfdcf21b04c870c151d14cc77bdbbc6ef7fec14690d29db2fcb4de96f1d8f949bd7928138aa63ca072edd6224f31392ea61d93d13be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f141033284d37e7c4eb1b3a68f8ee5
SHA10cfc8871531e501a27fe8eca300af4d07051df34
SHA256265bdf5e1dbc1d33d80d69522ef498a75090cc75b653f54eb817a902d4fdf9b7
SHA5128da622f02e10df1b654c3142a9137eb759f7c9fde1460e7c9eb93b8bf90f0f7a0dcdb010c80b5aaeae5d4b93d6251d11080d8bca2c7f71e1c70fdf7912d6cb0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254853b11f48b6b9a8b3a65c6ed86383
SHA16ee88c71a655ad1bb6184623c35a83b2b3c8dac0
SHA256469beaffa6040cce8d824bcf2c5ffe8bdcd115c8c74e059610e84dbaa3fd918d
SHA512590c3c3759712210dd98754b89a9cb19b552e8b6f49b33a463167f096b7c691b717c17cb1799fce2ed509edf7ba6875b5bb4252ca75a0b95d55b039d72fbdcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490a9b9523bd30902dcb26ddb50afb58
SHA113a680d710c405eadeab33a0b7e74e9a89440ffd
SHA25606797b475d9f29034833fc9be7b5f147182504fdf0e22ee031f1a6a64b797040
SHA51295728eb9fba0f2f32f5bb715d38e5e38211dd21f12042b98c68bc976161967f1a7f02ca64a5676b4943fce6722530c917850c68b1af4e53fdff2940dbd3b06b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3c63bc88bf87b2c0bddf360543dbb4
SHA11cbc3f93c85fa63ac5c284844eb26e6240c3b0d3
SHA256ad3ca31d4aee24b94e65ae43acaf45a6fc5a7263022af120ccf8aa39fcc83deb
SHA51283af4daf0bac8526d8453b98587b46e10cb3676fe048ed9c3022a58cdfb3511addbdc53c0d508a021042a7e2041223dda16ab11b3340dc876c06d0ef9e18b262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e3ddbf1fabbe12284c3588ce97b892
SHA146a4cfea387eacc64e11e8f73bf4a4f4ae67a04b
SHA2567835e60e6d28f3340a3e346d4f0f9019a963c026e63752f746f0dfa1dfc9e438
SHA5127fdcd63031d9832567744a89ffc34f6dfe866c55357d0055deaa30e41c04caf116a9ecea31292cfb4f57629c2747f9fa0aac15c9e8b68edbb10a8e2818798cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cb71e83f45836289099e3fc2c7d96b
SHA1d44af6eda5063790f371f2bc600f31cc90d7a3d4
SHA2564327328c777a765cfa5f6a59e00d343b12f537b39ed41b1065faf22b83d30db3
SHA512c8b3d508b313396dbacc40e50a20992190604e9bf52d302eeaa13d0a1682d0982db469ba0b8caf4b0d3d609e0f87c6921f7b56d4446f9ccc0f6cbcab9516fc6e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b