Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
a52a7c4b0a878d608ae5537a6e1c81c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a52a7c4b0a878d608ae5537a6e1c81c2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a52a7c4b0a878d608ae5537a6e1c81c2_JaffaCakes118.html
-
Size
15KB
-
MD5
a52a7c4b0a878d608ae5537a6e1c81c2
-
SHA1
ebe8295a0ace359a908c87d6b684329ddf501e1c
-
SHA256
c88414165006d83b8bb0928edce0fa4b68534311932e7a935f37475c5291d979
-
SHA512
eb1e046035dfa60a0cc5023cc5d4639b85456a78041eaea8a7ea27a7b91d5dde1bec3f19b364a72feb717a63ec7b2f797cfc931e3f9a4bac1999b4c08ba5c3a6
-
SSDEEP
192:x60Ua1HCPpNLr8x3qgtvW/OrUjLsUCR/tm/G/ecaWxD6kDK1jsVNOkdzldlQi+UN:MJPD/8PlG9tjsN+AM/a8jkE+MAEM
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000539c18c993ee84fbfee89d3e81024e3000000000200000000001066000000010000200000003c2b5f53546b9d8fc9172fc64f5bb336a1df95ee74badd365e95f5400e164287000000000e80000000020000200000001c66fdcf226f8d9570c3157879869f1ab2cfc473342bb1b25633ee7bd65b0a5e2000000080165cf9e818a8c9c5871df412c339ec2d54cfbe2b4f406ede18176f51bd087e400000003fdd6066d3fa863236540b924fa8482b043cb87a0d23a5472925022c55add34634d0d3304d1a8f596a999f15a731a670b1371cacb759198132d10cd6d7fe6ecc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424437774" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDBDD3D1-2972-11EF-9591-6A83D32C515E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fe1ec57fbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a52a7c4b0a878d608ae5537a6e1c81c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0807e74b97500e1817ce0eb64f30838
SHA15c7a06cdd0f2cb799512e6a3f2742bf4e43d8e75
SHA2566911bd2b4b791aefeb18e1fd5bb6dcfaf11107829d99799fd91339861912489a
SHA512e0c394dcb3c7fd22a20d514b7df9e0a41ab01253b1234a1071a51a0c8ea17d2aa81f3bc62fc1048e5b3ba525f0bedf200892be48b81988095aefa6a82f84f3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58747773d361c334b72008cdb0eb8ebd5
SHA1be1b07a1eb6eef03378d95cb1143155e79459f9a
SHA25625b6df66558271ff810a664ca6c4d52517c7c9f26db40cd7162c3f7eaf771e27
SHA5129623bfc00a83e107806254fc8d21d3da4832414cb35ed8d5546bfc95e96cea2997d0d8891a5e1f78639b200fac46b964a5ac7e609143d724536b0a3724f92b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf480a07d456e808600e4413f25436f
SHA18cf844a9123c1f2d5bc1a6d53d590dea938a4c03
SHA256930b16e129da908eafa24d2b80990f906bf1700075f98645b2c48f98d91564ca
SHA512e571193b7143a704eefc0f334bc9b1202cb30db96bab14f0a642b857e2c346b087a97d153a67cc888d3f424efcd2aaded93b5646fa8ad302b2cf1d4186507d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58865973a287fcf79d8c4aa26b7a49d05
SHA1b0af428d743d99109a371819591f41a9b1cc53a4
SHA256c01c9f588e852e16404e847baff76983806f56dc9fe8e5202042c9a0fb167fe7
SHA512a6ebc47e0ff588c799d3923cb46abf39253647c66858110bf1304662a10b2f880a4fe75fe809cd333aa102409668a5a69dda54153f669ba9e1187971e8fccead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15a9ae06347ba82bb4a3cad41bcf730
SHA184837176d046fb4f0f97e2594bf5de85c51e0002
SHA256400ee8318b1c56efc6c1e36a3a49e10900b9fccf531a9ed3854b44465c7ba492
SHA512ff6a5924fedcc2d11328ebeb82b29a88bf858822ab884cedfc2fc902c4febb5cdde0ed8897da702297d0100d3d2bb034191a1a3dad5544c5d2d0e10fcf1a6840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55306bf6f1019e131f1c555c49f25dc0c
SHA1b00c2ae80c281fc2c04511029ed9f3f31e1e1142
SHA25642cae86965c2ceb926bfbf4e093f1a80de62109be8e9146d0efc3e36ecfe6d52
SHA5122168fd8f31c857de150eae33c2d3ea3e8e1b74c0aefd132c235a5678556b925435a22e34ca27dc27371c0cdfcfadc626a5712511112af4f86a59f59fdc327380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501160068b02cecadf8b17ca400b6118c
SHA1c13508fb7adb343b141f6eac61e45c75eef48d66
SHA2568be1948af65ae0dea4c17a9114ff80dcd8a31858865ba0de7af70c1b5b8ba579
SHA5123ca2d515d948d5b7b477e4e753d9f23ff906837006ad3b20e869f97b00ba40030d0cd16ed93f3ceedda515dfb58042a6257fb4db2c465d725943aee0bba4411c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5455eaf8132a718ff535856ed2e63a
SHA1c4f758dd2a9986774b3a1a435e2b964d39633fd2
SHA256aa92473bd8c9167d4e470274457b4929ff96c761ff7845cce2d85e6fb23389f4
SHA5120376734e35019a23eecabff7e69696e576a1b32e2b7f2b37ffb05a5e2de717d08670fde05360a4ee90e68569c44310068393d0ac92f392385b76932673d189de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82b3f5ef6daf24a8f8090a9cd7a6653
SHA1c4852050b69966e035a72a8be4b3395a8b4166e2
SHA25648415b457206729d1190dbf5c43dc3cd5365b5340153d41271990512b8282c81
SHA512ebe6093159ed26414d2d15e7c356a0c4527d0fd0ae22372ac220927d7f81da7db6ddbd563c92ef4d6b588f8ce47c7c270bdc853d38d220b5588d584eba949546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51275dc5f0e5ed3203eef5ce04e85905d
SHA10dfb7c3fc1130adef9d66c61ecf0de40822e55e3
SHA256d96fe071450ec43bf5a13705575c1090f7c385900a9a6c6bb65df5278753196f
SHA5127edb70ea466e26dc98bfdd78f76e960f2dda27a26943bb8f969ef5594085c574efa2bf808f100827a8db2a13ea95d1e8fafee1958714baf4fac2229268a352de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e399ec68a0d96b0133e42dcad1d761
SHA146953cc9b795ae49330ae61eca2740375a9b9f1e
SHA256df8ca4a4e84fcdf9335d32b29015417889517a5180b574349a7b623cc75f3849
SHA512f320221ba78b78b15b26e2661ee991ba9aefe192cb4b55ba6fa7901b58c39aedd3d8eecfdda04ab910e13a1fe89809c8e24eafc2a7704f50156d9efe130bad75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbf3988f0bf1c9eed9a1c1ae33fdf9e
SHA1cc6cf23678421cc90412addc52a247066feb49be
SHA2562fc97b469d64e5498b5ccf1365a351472e6d896ccff09ed8ccaefe013183269d
SHA51278b5b8a71d8b85b1cf1f10fe973fd42097207e194460f6b1d64c2b31bca4b16d7484a0acd5dfccc4c8b8182515c49759b6b954585a78c38067a60a3199b0c3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7ef4f2b11a924d9e4cb3132eb5a52e
SHA135febe3764e4117b85a03efb696e2b7c433e929e
SHA2565769b48e356573cba16f9170cca2c39ff86e5d941342b8031b10ee99dc0944dd
SHA512ffa677e8700bc1888b321cf76fe3725bb7fa27d273936dc743f6d67b640accccf56660eefca33cc353270cf27ba3f69706c029c1edc20a8f33a9aa72267dab35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfdbd79f40c22e031ace9d48a4c47053
SHA195f25f68d52a434dbd470b3c1f22844d9e8fe8f0
SHA256d111c9e626d645b1fb63f9b015aa40de9c1435d42abed757d956c934cf76626f
SHA5122106468157c4eeea7329a07fce19806f7f11073e18fd01b65f2fd04a7b406f086c20daf695736741ca1c8db1e978a776a11c5d53eec2f4d9cd7362b379df3c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3d2a802b731aef02ab878410eabbad
SHA18cf94580723ddf82ec9254e46bce41b612e2c730
SHA2565f5a9636bf0695a0a2b8befa7589edbe3dd6fb8cb57cee2934a4125bd74d3288
SHA512804109e0294d5eed578d293eb21fe61f4fadfc8e8dac2efef909050bb9be2ec47a60747c64748c0d71b435b6d94e4ae18e3397ac7a38f8f133a0d6f99acb92c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53828aba6ea1ac6a794b390246ed8c224
SHA123cbd785ca9b2ceb61ff2af560f2d995cd3fe774
SHA256283ef703f521e89b7627f6d6dc2fd5d92f5553cc74cc29492dc839d6efa4fc60
SHA5128ebdeb21d38327aee4774744799634f47db218f3d8af75f18094818c5b4d03dea02e1a4bc74d38dab5358c7325ae40dcb7dd781b3c8b905177671f91252d9211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be771af8d23e9cd7dbf4a12a89a8204
SHA15884ac34b282975d5774ee4311939b990e2744ab
SHA2561c93d409e68aa8357fb738521892a37d8a0d49706b4f6ad21ba8ae24014c6055
SHA512d42ede40d5fa8b052c89defc3e41d77208b2f53c3c1c8ec723dd42ca79ad32aae3d4786cd2f70ade81b1d9a6935aa0db623c2e22feb5b8b1a40de9d154a01acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592584efbce6a95903395a33a87b3da72
SHA113f096c110ac49c88fea811b6bb399d99d58b69f
SHA2563523825f47128aa8121be37488a5cba01f362d08b45fd531228facbff714df7d
SHA512d01822504ad7be3c8d3298f2d467a0ddcd3c04cc5dc8f7adcd629b4b1ddcc2d108c3e4f37ed3186d66a38f61a1d3a1766a688fffa02bef0200a332423284589a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd184aab76f93c3766ea8c91e2c5513
SHA1fd85948e399d7bffb5e9f97f4f7f89af23029500
SHA2566ae6ae94190468dd41150455f706449ce0955b23ba5b4ed4eb96c74d0e5b77b6
SHA5129ee9fdd7c8a3b9ea2b9cebb8840f01bba14e59dd3ba3ea1997b1441d1632c3f72149b81e4ccb6ade016999229b754bd3bc1b4996e16cc6917a581ac63bb0f7a1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b