Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
998cc94e958ba1eaa1ae31dd7a1a7863_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
998cc94e958ba1eaa1ae31dd7a1a7863_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
998cc94e958ba1eaa1ae31dd7a1a7863_JaffaCakes118.html
-
Size
460KB
-
MD5
998cc94e958ba1eaa1ae31dd7a1a7863
-
SHA1
06b49df95932544875d2cdf521d7d095332fa57f
-
SHA256
226f629531a95d1020f773274f94485b6cf6d34e0578f5dff78587056f461358
-
SHA512
e6b37f2e6d95facba4beadce17ad81b084a1c962388675bb23d24808d692af0efb096eb09ad9dbff77846536ddc13a58499c81ff96d07467d94e642f941499da
-
SSDEEP
6144:SRsMYod+X3oI+YwsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:25d+X3U5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D8C3CA1-2395-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0af0f66a2b7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423792937" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e955b262c478c387f64c6101fe1250ce859e79f7281153631335aa3e9ac00b83000000000e800000000200002000000083d197f59bc5faf331c2188286b275c9be2e5129334d4b09df3c652acca89900200000000d507e44d18e06ed85c5c6342ed4f77d391afc3f9220772816dd1342587da6b840000000a32875fc010465454770ef40ceaa37460b3d60802abdc281b94d0942388b7e34961a5fe5107a1a3bc45c6441d0234a6c511d29c9cf9ebf661c170de6502bb2ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2460 3056 iexplore.exe 28 PID 3056 wrote to memory of 2460 3056 iexplore.exe 28 PID 3056 wrote to memory of 2460 3056 iexplore.exe 28 PID 3056 wrote to memory of 2460 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\998cc94e958ba1eaa1ae31dd7a1a7863_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3abe4eb2707b541f8e94caca94deb1b
SHA1480038b33b5cb3f33c56f16ecf2640460f049d66
SHA256d7f3200d30739f5c2d4861407daf173ff6cefb538985ab385f9d58815d42cf87
SHA512a201385f67782bc980bd5b9eec1f5dc15ff07d9252fe3be8fd25b5be5168909efc0fdbcc08555a7ebef65e8b149f64b023278a01910ed22fcb1ce1848b5c0d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512a6e469dc9b8c5570a9f55fcdfb5da
SHA14dee822b03ab699a59e025a54165d96d09cda017
SHA2567bf74c0b824ae0d0a0edbe6803b49676e8f9d8f936c0164be36d1f9368cd7e0f
SHA5120e3bd28b44075d8138a8ace973fd52b4d531adf6854f20b885e4c12d9bb4064e9b96375a987e95871a393446af893357ea57000c2a0c0d31eea314359b8f7fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40df2f02631ebd23286d007f7c71cf7
SHA1651b7bedbd1531dbb87172a1335db257d96ea065
SHA2561cf351dc79de63ccb4b1a3cb835dbd7bb3fcac30c100315360004cd696b02dc9
SHA512d9928fa1d4227d5c885dc4c90bfade59b1b301d851ab40014eaea215571018a872d48438d196e62c19af350ed807f37d714975bdd9c814580ecb44a503610b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de0f10ba2e3291039b9a4d7002fc15a
SHA1df1e201aa7e84f9679de3e2184b90134c66c3fd8
SHA25691197a1cc4323c066b51676f2e13d1e1cd2bef189d52805450a1695b12a9bedb
SHA512e4bee784be3b7793674df9c9d8b212a69f6d93fe2cd9aa8dfb357780e8cb87d9ac0a607eed06e0d0eb20be57bd96e82c1e2b574e3627bc7ad3e675a09ba9d7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d962ce08ba039e18b8b603c3207a042
SHA1b05f2730db7cb7a714be30a62070528027cf4f93
SHA256973dda1f21b286104e3cddbfec8061b28604add9aa6e4a2cc36734c923536dd7
SHA5124a482ceb7c37dc9e4db15131cb2ee1d19dd29597945215b5f47d80f0484fc2f05e2d962cce9271fd8dcb045e6b0887c2895186210340283c3011b8eb4f8da634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731e6f8bd29f3afeb3b687bf6b92b718
SHA1d9c528335302613ff31d8bd8d6a917ee2916a8a3
SHA2565b9ca44e36d625315ba66030078c534672bea150d879734e142a38da8d44581b
SHA5122e07b855e15722b78f17862029cbb4b806dea678919088bf1fa6cbcee9c3cd30b3dfda28455860bc89b8fdf3cc6bc595c5e59e02b372ef0bf40537fca47218cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544efca2793ca1c86f42a6c4e58c950f0
SHA1d8147b2e8a294286f7fdb7db0b8597384f9134fe
SHA256fb98e17c4e6c7b2c74319a22497835c99596054f47faa075b0325dfd1de60f5c
SHA512790c2bb278359247a145121b9dba96a2eb4390aa97b4c0eeb4c437af9c97053076fe010b0b09120b17c0ad7aaf1453e9a9d7d3161bde6a298c1d6414e0ef583e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1e189bc1f1556155e22a9b4b474b09
SHA135814cc6580f8281f9d40077d6b000cc27f0430a
SHA2562db715fe1945f4f15bc3b3db5f98d575839d73688849ea934c833cb0d28a74a6
SHA512dfcc95fac1e999dceef4db49490dd38c16cae44c7abfabe900cf0f70aebf2991a4c2c2b508cc9409381b0201011c2a430c834448c62b35588742a48a0e9f7a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6f07fb46cfbf410a7ee6c2c53a2316
SHA17264c611067dc9574241830f7d5cd158a60ba1c2
SHA256a702fe9298d40bb2318652cd7f7337b2ea5e58fd200f7a80af1fb10e278fa474
SHA5129f56ddfe001656bf81953307f6f446f382e33e134c6806c43f2d5d523c8b19f72d0b943258976796ef73d8268d6331cbb01bb35f90548b446a51ef8e24cfd373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9a345703443d153767eba4c7e9b2ba
SHA17edd26a6cddee2d445000f68f5f20e9188f059b5
SHA2568f0a9fad030ea507ea1fad9f943d5f9c8d7c23969c5543d05a78793283891cf9
SHA5128ba1642779f7aaa563ecf18d3137ca339ccc67c57410b210e28036175f9af0b6232a4f116551e438197f3bf8fd6b425794ef8e5e334076754c345a8e75a73911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d2b27c69d943fec28980b9d2ec9376
SHA1d45969b6f9ba9445bf51e5a144698ade585b1890
SHA25660441824a9b890a75474218fa3c741016fa52f4d8b7137b98175a3da33492b76
SHA5121a31d3a940340a26e6aaefe121e00ba16a87696c965b6617338aa2d237165657f2be33ac1e3817012bb2f7c42822e9f727cae24bc14b3c1ce1f733e936112994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584b55d4cd652b6cc7ea26c9fc803d81
SHA15d5512d28102c4fce9a17f4f11ee50c128e75403
SHA2564e2535b6056e4cd737c88c6930306bc4b40407cf2a6c42d0573ad4446b29a7e5
SHA512fe92ab4d633c614d838f49a35a43f62290ebb056ab01635c2bf2338ec089fe7be1c211d9c3e4ddb35e1fac9fdfe7124ff9ec1b9301416f3616eb7bcd9ba64000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f161a61a4a0d41f8edfbfa032625c9f6
SHA1d0b69c8530a424f167c657400ed73cf9186bad8e
SHA256a8a6605ff4bc7d1e7445032824c740194e25626d6798b866819d39fe40f4a989
SHA5129d0fe43f7974b81dfc7f198c15cdcef5899de7222325710a632e30f3d9c346240c42d2bfb1f07f1332c5d991bb2515bc2d021208b451c0714fc385421ccb54b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1e949dcc8dc1aea4ed8c739bcdb76a
SHA13e708e07c5a456b692e60cea8f7574a2ec9cf490
SHA256c65c6ebffc47d707d072861f6514b42f23dbf9bed02eef79ac6447aa63d3551b
SHA512f47c1c00aba57068e09ec1352b84c80724783cc0b8388a4e3e5109b843ac4f052e43afc1b0a68f20629d4b43d6d4d13a0104bb8509ecfdb9c5474a2f3d30dafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57396a287093fc4f6870d2a22413e6c65
SHA116e2d305d3697c6370a11002870610ead7ab4da6
SHA256ee39f1cbec20100ee9aadaa3a54bb29d8a697bcc3de31415f7c674121f13443b
SHA512ed60545574eb44ff88fd95d14bf9153a794bf832f901e5228161793fd607ea2ddb8f4eb24c698c97bdf0ca6da8bc9baffa189029368fefab045f55cfd4f474ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869d5b3aaab703624734753d660101c5
SHA14afadd13aa6b0471cf3187322fe7b2f423f4717f
SHA2568add70d091c1928f70213f853ba23e0b0f41bad1bff36e54a90aba7702a17629
SHA51274f82d7aba4cabe05ae913720c1e63373dbcbd6e000e06e2778ba2d2d31cf91c79430d301d5e9d495df2e719a4d954369f16629b0810d7e4c8957f18a7e5e15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0f5908ca268e12b647bcbd60500e4a
SHA13decea993c724d4dba35feec82e575a8e8d6c55a
SHA25670f86e98605ca20a6017a151b9027fc0b6a1a7fddf26ca92d68e691974228ee9
SHA512159c6e9e0d57a810f39cc4c5b24a81ce63452c98e140a68b5bc7bdd1e3e72152f7dfbdfd17176fb5d04ef4672f17481758588a43e63bfd6459a08613aaa792d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c1f63f6985862ad9ba715889ee6f30
SHA19853f122b90dd604db7109cabdcc37387fd705ef
SHA2565a55e9897127beda0e2ccfcfaed15c91f9e590288b718748750ef92c6629a45e
SHA51299d2bb21e577d30e7085c789b659475c0cf63984fba8dc7d6b609a280a00d293775f6d7fc9afc9b28dddc90ee8e4e4549797f8214657813415247c19ce87ccc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372aaa9f9bfcc1d706069d35249067c9
SHA1ff1586224588216bcc69699f9804e09d4eb9e60c
SHA256e1083e9af7fe91372565221f1ee7d5a59a2bb4952cfd0a3ec59793fa44788d10
SHA512360bff1956ee1cee06f9c7212f4b98e5930a49624a14d83905720f82c65c5c402436d5b7df0e42ce0d3b425101d525ba3654a2b7f79afea3ce252c2e1130479d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b