Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html
Resource
win7-20240221-en
General
-
Target
97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html
-
Size
21KB
-
MD5
97dab30418595de64fbded0e0b8db36f
-
SHA1
7e235f51abf0a00c3a06fc9e36bd701f6b21838b
-
SHA256
4548e8cef3d92ec171dbc8575956c63d9506500497f12d6176d47a26d9674f2d
-
SHA512
aa1e8ddfdc3197acdddec956ead33f59202946bd5059c8c4cc4e17b41f6ccdfd97f48d40feaad3655574065c3bed06698b88841dfaf754c921071f3c26c1d34e
-
SSDEEP
384:xfuna6DEKEqvO4F4QIy/r5XTkgkENdT+6aUPh9KOl4WcT+F2+Nz6:gLDnNvO4ltrNdT+6aUPh9KOl4WcT+F2R
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423744891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF34CD11-2325-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f362d76cc255248a0f480d57a27f09c0000000002000000000010660000000100002000000035ede1d0f1c4bbf8f4acabd81d01c556972db1a6875e80d06eb984e33e9d2ec0000000000e80000000020000200000000287d824cd8d9132eb1c5db4e68e311e4c51cf4cfa435b0a58a4d3d7c3a4cd79200000003b99f33bcf5f5156614605b6bd9cf1414d202984c95e152bfc9ef9827ad89699400000008413711f82cb442e2f74ba31b4ddd6b0b00a1a80e0821b396092c197e685462220046c4ea7950089f083278b91f8a4b4fe470b1a21b2e223db5e861836255d05 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07a888632b7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2140 iexplore.exe 2140 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2140 wrote to memory of 2084 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2084 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2084 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 2084 2140 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5e42ddacba238792c8d0b7cffda09741b
SHA113c64a76f7be516ec6a5af3a0c79c4283c886ff4
SHA2562f0410d122fc9d419e1ea9690fb2c7439744c53370befca81090f03d81dd7809
SHA51234fa953b689a9d8347575c3e11065e80a804765d86c851f30240af00c9357b6cbbe4627e651f855f7f487a78e51e6eef7aa6c88729e21d2e82fbe2481f35b76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD507077fd73a2e2fc3796c3c2df0ba00dc
SHA1273b60f25a52a786043cd7fb4288f8b84a2c3552
SHA256fb9a5614b714ed557507d87cea8e722cc3ee73405ea512ea7e130e768b993e06
SHA512d73a61e06314d648e4a83e19247af17defcef7c0d9f04e65273655fbd9f95537867072b885d04082a4a9de3f657feffe8cdac23f5618b77632aa0e334d03a290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD523bfd49de0770d129571c675a15e6720
SHA1a50df6b97c7edd7bceda68f59d7a34f69d1bd435
SHA2567897e245646930ee05752a89ed65f3b1aa583fb16ebe3c2f2f01deef91a87956
SHA5123ebe6c1237517d2fcf0b91914f517b8f3398cb890f65ae393a16fa6de4bf4e2989304a1d39a972911f68898ad52df07f9fb50e30d9627abd2bee975332b99dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD58c22f09355aa2e6263f6608387b790a2
SHA1e5f7143506761bf34a8f4bd0b82c36a1d7624ee2
SHA2567f5253dea0533f9501f7b2b2567dff094c7c3f6e65846f2bb7c8e428ad5d3319
SHA51219dd75eb938b54abc06335ecf15ba640f0fd507e840be67e9c2de4c0b6d470db27b01ffefb7d5aa9b90d1c888fd85ff7c3b6d4eb4f47ce5b14aac65552a69e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5b6dac4462b6f2db56fe99bf595a6223f
SHA17af49fda994a85dd35c46f37f5195aa8eb6cb034
SHA256238e21b93836d298e9614de724e3f15ff1e8c4fd03d0d9d71315b60cea873023
SHA512b83618d78a9ce58d851948a814b017948f974fbd327d29f01f37d9aa4651acc5b18e4b585acb5269e2fe77d8eef21db3d49d9576a9c9b717e2e7a98157c85cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD51ffd037f569cbd1003faddc2ee61558d
SHA1baa42d10e5918b376553020428e696e6165a7028
SHA2567f282852027d31e56635cdd311660ec430422702fb5f347de97e2c38920f08ad
SHA5126bbf18ad7465138de4268e499657d62f03a2e8890d4f173d3cec6d9afe3bfdac87b9498b5166bccaeddd2ab6bef983c3b84168768695926c58b180ef56002654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5b3224f8e52e4620ec64c17665ec84d19
SHA17b02c72877cf661640fa2e99b07352679fb7f970
SHA256dfc921c7fc4026e1ceda9ceb14532098cde300fb346a986ed8f88de7497cfe85
SHA51270c8cf02e3d738ac63675f1987182a2fa4801d2de2e5a204120c858fa7aa382f182f95db9ed2d41cffdd00165b3b875e049936db720b9dc3c396216948bf4822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5c7802903786479278484f353d699b7f4
SHA17853290837973a12d26a4c1a0ed1a39837a99ee0
SHA256e84f39c1abe6b312b0b15b725ab1b33a004432ea1bb28f97e3c00b32d81d3c5b
SHA5124e334dcba059341a9394dee2dcb0288e5a7af155245a1bff3376c9001e2edcc1e7c5e516b50169d6cbfaa7b56dfc9b2404bad3ad3fbf473bd9eda0b0c49420aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD58bd6ec8bd2d5be870aa8b8d42d5e0815
SHA1b6a3c8022afc59f1911277a446020867148e9b23
SHA25692fef4669225bd575316a40afd73b7888b0f2dd081d690e1a75e7026193f2318
SHA51260a02c887eab368cdaeddaa581b640b1b7a7c491729de990e038664f2e790156a8598940da4540cb86a12a0537decdb300bb11551ba8dde1202af2e7bc6a2983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5477c677eef9d0d6bc72196941248515b
SHA1eab09f95118f0aee3cd0899f9263992bcd7299b7
SHA25610638ef6ed443fbfbef5900f41875105a96ed87dd64021e299473a861063bd4a
SHA512d7877c3eb26f7429468d9e603870817843ae97b33e4679589cc5150766c7bb3b0fc388cc9fbfe5eb9c95c6440b55eabc817410284c24614f6cc92277a3ebb41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD53a68c60858758e805bcb84d88a06d294
SHA1b579111308352fb64df997ea2f8d2361ece71c7d
SHA256435f4eabb0b1fb6e51632def041dd7baa7cdca4b2e202026eb010b77a85fd5d3
SHA512a780bfd754317444190ef31224cb9bcaeb5f408dd465caa5439b85ad2ba1fbeaae4372b2a255100f027cdc67251827163a024cd816126eaf18206550bacf213e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD595542f139dbb1b5c864f4e111fe55e62
SHA191a45a3d55251ec78dfefef13f68978f4d7b7d99
SHA25676a772511b6521c1f27f9605a5fbf49d0450f3ad67484cb75e65df489b85d52b
SHA512d7418b005b254415f1b38072009aa97fb62e11d1f1a20d0353463ffa850fce63d25db687d9ddd7054677c2aad7824b59df0f8b37c8b36f94e89de5209a8a22b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5a9c0fab71d1510bdf69d13feb11b6a7e
SHA1e3be29d17c256173106fd8254e8b0555716089b8
SHA256aa53cbab8cd900052769238c00617e4cb913a89876a0e308fdf0caa2ca4f4b48
SHA5128aca945d8255e6a9e50b42081c9787db7e2e91e8038a48b2e95ead64c4aa62b8d7353b4740392b5835a26972ab82bcf80e263efd563b043b3effecc8144c3744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5ad5cba86bde4975f5b2ed15724a517bb
SHA1773f0eb825b3216f9311f23b71958ace342a4b0d
SHA25603ed5402ffe6722ce63a1838c750310188cc2a81442cb4bd2a12fa314cdd30ec
SHA512633442a31a70cdd01a4ee7a10ae14f2a66616cbdc66608d6b2d96ee934370cf22f869a4ee401054780987c0915d3210ed8b2a5a3b32e60609c70c09f02cec17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5fe6035f9b685a9ae160e90ee3d18a255
SHA194e7d7be85bfa586890faef000015494e73c2fa5
SHA2566fbcaf60b7844c264a9df4bbd672f421c2881c43879a076443db8a130116a303
SHA512d879d6c6cd61bd48341a0870d0e1a3b13e508220adad7b1cbfb1d05f4c1cb646a44cacf624efda08be0d1f926f77f12094cab714192f1b4b6576f2d0b16d23e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5ea9c512c23970c42b42e40e5f873f553
SHA128abb23b9f58298dfc75f9f907189d2c949ea463
SHA25661987f36910f25bd6738d12a421cb1569107ae1fbe296053c2365685d95c5cc1
SHA5125216d3753d5469d8c38751b1f8917cda3b3abc1f7d59f4170a28342facf3d1d24e72ddfa8047f25ba295f1091406706d090de2ba530377840b7829146b221a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD551dee39a4f91ae19dd6f832ae77fa4f2
SHA1d32a82935bccb9a1639e819b45495c222f3b03dd
SHA256e040d1d253b9bc01c1a471228d8c5d44a36a95af91fbf63077b0d5926037f904
SHA512423768ec85fe3b49213b4c7812ea6d88a76283a86d76d6d29cfa637d42e0a2a24c48750bc73546a24483cf1f1fc65102a46afdd091f31d9a7d0bd837a962b37d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\colorbox[1].htmFilesize
798B
MD5362d154e34dfadab2cf592149162d42c
SHA1681dd1f0019f98d255479dd2202c57df29446deb
SHA256e1fa9752369aa43ab626048b36518905fb52d045bede67a1f118a62d418cbe03
SHA512f9ff1a99c11b10af3fd0ac23c309fa4750e787819bb441db7035538231bc42322c9e22d7b7d6750df5038a8804052b5edb2062b766147cfec5c7324874dc5628
-
C:\Users\Admin\AppData\Local\Temp\CabF4DD.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarF65A.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b