Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
a50758daf9f6928aaa5e7b1743d550db_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a50758daf9f6928aaa5e7b1743d550db_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a50758daf9f6928aaa5e7b1743d550db_JaffaCakes118.html
-
Size
2KB
-
MD5
a50758daf9f6928aaa5e7b1743d550db
-
SHA1
d8c4a66a3242f33f7f57702de5725eb4a0e33fa8
-
SHA256
bc91ae945994ea39fd2b9361f9acffedc099fe1e7224e10ab70173b844444b9d
-
SHA512
b873e6f797a2b83d6b35046d843e3f5a4af5945e3f1549f23b50165dbfb8712454ae1971c5dbf61ead331d7202ed127706358d2d14b8049c62df6c2e74d8a893
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424435536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f2b98b7abdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6911431-296D-11EF-A155-FAD28091DCF5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000775f866b34aaec23fa2463a6eea51aa11d9aef27303f4c30dc0123723405cdb6000000000e8000000002000020000000a60f53af1c39c0fb349afe1bfd4144fdc88edbbff50b214407dcc1bfe70667af20000000ba7cef9fbe5b73367d96f5ccaa02a95c11802817423080432bdaa19047236c55400000002854815d231cc8229b37fd15a14ee1a5029eff4fbca1d108c9d6590ee1b9ae78777406ebbeb62c17e97de15ec7fe21ea4580bc00ca63a6ac66d130ab6bd4cefa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2768 2184 iexplore.exe 28 PID 2184 wrote to memory of 2768 2184 iexplore.exe 28 PID 2184 wrote to memory of 2768 2184 iexplore.exe 28 PID 2184 wrote to memory of 2768 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a50758daf9f6928aaa5e7b1743d550db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa495a8413c4ced08a43284e29a8d0b
SHA113bf66611ce688b7bc2ef42e5a790ffc8aca4f2a
SHA2563bc1f9e6f2d3c500bfd7859a453d8fe7fa35d37c13aa575d6fff63e57ab6bf32
SHA5120dd72582aa29a87ee1eb6136527aa8acb8ac44ac28e2c76c42d06a165e4478ea815036df84bd5a3a421c065d5d584aae9d5f330564ec81eed82e62d8986c1076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d8707ad395119e1d7fe2a5072c3601
SHA1a2d6a7ac4314405511411d99353acb6f942e9b1b
SHA2567f250cfacbccf63846ba24c46fd6d6b537f31973aa42b3aeaf718f3f165df14f
SHA5120f482997295dbd0954d3355f131ca290e370bf7d07010e9cae126e0c3accf2237420873ea692e0c5d8c68075e420b11bbdd7381dfec27f59dcb1657317f17166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db2bf1761bd68b7d4505c1ac810c580
SHA1b3f922e2db84b58c3684ac7f75b8e77795fc2cb2
SHA25651af84f9de6c28131f500dea9bc42a9c1c0f16ac5da5160427246300baf52d97
SHA5125d628ab8e6edf4335e61aed0f12ac1804ff91b049019aac2374eb957544d071210e722f9c7d4b3a6f7414867a5e17e55086fc084d3ff3c33136ff8f11c02f13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ab26cd7bcbbf6d81f696eb18591b18
SHA12687da6ce66153ea0d706d164795ae46030e1aa9
SHA256141fe2b6b1d4a9ae9d88ae4441bcd96f1360300f127fe95bec413443adf91663
SHA512461571fc0eb7f8a65505509e6a656684cdc8ce896d5c64c34da58cea677032b7b6f012d7317e8377212f1094653b091bfba9f46f9d88727f5a90dbc4d0e71024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae00335016b46ce57d5a1e1cfd70a95
SHA1cdda3204a61aa2de2457da102c97cf49ef3dc577
SHA25658ee732bd3b39748f721aa4d8dc38ac3bbe83cfeb204563c7315dc0f23402fae
SHA5127db9d632c55f27fb28ceef26b8794854d1f672cac18dfb1c45c307a4c971f0eb41ea03d05151fc54114ac7f82c673d3ede30324ee9ea8ab34dda3fc0591743bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa00fefe714580197c84d4a88a2cc694
SHA1cb36e8d157e1c1c67b86439708cc5a844d20fe5f
SHA256ec78b0ffd74f40c1b4d16bb66257af65e29ab85494f4119c28d0f7348dcc29c9
SHA5122d36e9a4969f40799d705ee609d6c071fa9508507aa966a8fead3122fc5e3653dac585b7e4416d5065b666c4616ba8347ae65bf7c49d6b8e40d2717688104907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b021b4624c4243a97ec46e114e39716f
SHA153c6d091278f1bfdde194944e58cd5ce58cf7ebd
SHA2560a8b86b5bf7ad5e582e69b939a3387c36e2ddb804194c392d874f429ace01aec
SHA5123d911c254667f54f0c1d5088bdc0a359f3027db9368dce769613bd6187b779e6998c13d21e5fd5971e93f4c9fc065e871d82b6ecf298d2ed894c6ecb641672b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f325c0bc197c84947a8e26946a68924
SHA1e7474296f83bd6e30d4e63058e6bb09e6cd528bb
SHA2561cece627b97c9b6cb651d691bf3c805cf14d6080bd0470e415a65c2f4fa6e835
SHA51249fd29bfb6646bc264a67f32da9a4598b8fd31efdcee145f2b756d05af0fdce4a4381bbeb55a34675952a20ddc434a2c1e728cee120dd70bbf646e44a14cdbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c109b256894a206ec1c01b778694fe
SHA1ff53c5d9b0cc904d479eeb551e9aa47df84d67dc
SHA256b1dc9e5f554437756285cf80404ccd7c4d0637f7372c89cbd9576324ee2b9a13
SHA512325a828e8277e89e109cdb6744928b56b25ee86ffaa3dc76b399163019b69b99d3294135b55ee36f2af48cccfcbfe0fd351b865a5826bf7c5181d7300ec1de40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59369dbc1a2455deb779f0c3308096f0d
SHA1b69fd4896c155e1a4e7eed6ab9888b32a05a1654
SHA256105608bbe1ccedbf384179ad4c07a8bb7d2d433c985dae66d5229baf3d481460
SHA5125a0a03152d5fd4a8b6fee39307cced39d58b43b9a32643bd972c60c840e381c51fb00919bac60b8ee3864d53a6389bf13c1bd75092eefc48787675151f9a0136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794d33b6eacdd1b6957be011bac86d31
SHA1b73af7d3aa27054716b774b78587f2ff95f16220
SHA2567058f7317a2de6a9b051b35e0c2b4663f0f6cca369f9fbdc278390c37d4cc890
SHA5122f7e2d053f2522d61a3321d88f9e58964d73ad728cba0344b9f39482a3996dc1a7294995201e58c238ae6e7f162f80283584b57f1c3354f6d57d95f3df5cd8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7240fd78a0ffa966e4cccd24a88e461
SHA18afaa086b1aeb64ac2eafee6cc0b5921afe3f196
SHA256cca8da496845a1dbc929cecad676bbe1bb65bf6b3046d3dcc53647891271a53d
SHA5120204da570828fe1284b0795aa47ed1db6930149e855c370c5ca3f382a4ef5745517f91afbe53d31f3eae73ec8e9cd833afcb4d78fc06d8cd3fee479d341a3b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10c145587e41a6695fbffe6b8dde033
SHA13ada91c426ccc5882de490dcc8c2e6a1b808929a
SHA256db2d18776920d531f780dd4d66393a8388669cf6cdb239731b78656d8cc48690
SHA512f2e9e7ec767b33ca8885b0674ffc08c3e2b710afe5390081fe5fa0ba932248c08fe6fd63aaf5fa0168592a6b0ef201fa548f58667bd2d2f2bbc884af571e55d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a984f345820e2acdd7215327f641665
SHA175672012fbd5c7f3f6effc690d0b34cadae45001
SHA256f25cbb5c2d3801e5a8f952101d98155200e0766d12adfecdb2029d87825b4f25
SHA5129cd8c7f01e39f38e5da336baf739e264d079f7842c6c414aa82554fd822a4fa7ebe1e0f1ab302593a7ea152ade795b8fe32eda1fbe69b4b90892996a14cb37f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9c68c87ac78ca700a112ddc02e5e6e
SHA14fc2326646d2072a570f3147c58e3ea9a68ee96d
SHA2561bfa91b46edbc16c4e855a18a48a8e8d8175557a038804b83a956754d3280011
SHA512b737e023e18f63766d30b363ee8045a2cf195d0ece3d931965b4bf5a6deb049f5be6a674bdf593caecccb6686449859a0a3889357db3d4e7dd8fafdf010c42c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553adb9d80fb956957391ddb4eed56d7e
SHA110dcf5373d482d9586c4b9cf103219650863f2b2
SHA25687eefb69b3aa182ab73c3706f2041f338e6b487be8e6710d3f425665fce067a5
SHA5121190d0fcb79422a376e358a8f70bacb6f9f7a541ca3c3b9c202049866a596d2863a011b36e9154f42cfa5110f33a1723db46bf0b2e5a38ace33b68a6fd57a54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53202be8dd7c3b6b6acd116832fa9d590
SHA1492619ec599c2dbb9ed86ca5d144d64ba6a95730
SHA256e97f58a20d84a37e28e53077e6d27c5e6ac678258b295a0f2782672747ef79b1
SHA512fe9e540553cad0e6d3fe1251c5b84f9996923be3ab3e592470ff9cd8eba31772f2febdc8459d0ac17277739aea6d20a352a45c279977998c5d3f16c0618d987d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2d260dce6707a09a7093e62829f2a5
SHA1fe69a61e402612ae1348b56c61e9d27dc689ab14
SHA256a18100f48e24aa3a85776457a410b259c80e9be5993861722416b963a43c1747
SHA51218904ced6cff7763400b9c55358f0fbc3a2edc772cb35a4fed0f219a9e6af05848672d673504f1924c7921c02cd2d7f6b23b27c370106e7ada0c17d12f283278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dafd90a951f9cfed988494c849a4dbb
SHA108e98d6140faac47883eaa44b1b07ee17d87e734
SHA256a9f50494ca2905214bd277134b4ca5e3de3d73068af6abdfbfab1e56edc24fa9
SHA5121ef8b402d5256f26ee8bc70d4fd2b0c92532595da8b4228b1c173257110cfacfd84041f3e84b0a23c55cfa2aefbdb18eb14796593ba209f1451bf23c51ac8911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7623795e0c8533ffd1e5c1309e8fc1
SHA1ce1ade749fdce9c40dc3d880ef04e65cac6912f2
SHA256679a6f816fe832abe553a450ac0ad7181b8f4f9092b997695bae12f0dca47dd3
SHA512a03510027a7f4e045396888140637bb2c95fac1d011153fc5a08e627322b0f99f3f8c45ecfd95b5f25c8db343e7876d5cf85d877820ae47ecc7a2c5c8308260a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b