Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
abb7c3ce8797d6ac50044e6308b35a09_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
abb7c3ce8797d6ac50044e6308b35a09_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
abb7c3ce8797d6ac50044e6308b35a09_JaffaCakes118.html
-
Size
45KB
-
MD5
abb7c3ce8797d6ac50044e6308b35a09
-
SHA1
9494d7f0010bda4a7184e810adc39ef660759360
-
SHA256
fa261b25ada9f76817f77df98022a089343eb0e31e5bb73ddb48ade43a9bf30e
-
SHA512
5f21374e789a14d7978ae62479c6bec94e085ddbd3e44695bd7050a75f59c6c7810ad366ab1175213695b22d21bfdb8e5736e0caf48334f2aa5770541779aec8
-
SSDEEP
768:KFGggGsphif02DaiNaFLHuDhcS+Y2m7OLY5aQVV:KFGggGspO0SaCeS+Y2m7OLY5aQVV
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424565307" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD4F5CB1-2A9B-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90710dcba8beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b476b7fe50fc34eba183005f37a166a000000000200000000001066000000010000200000004af789bd2f658552ad7d7dccc022613961e53c61833b537710d4e1410c2c9409000000000e8000000002000020000000276c6a3bd294d29fb72557a8b8ffd2984ffd60ba2958896f074a8454710f9043200000007ce3a7642bf73021d6dfb22036b2d95e9999ced7c8e0140be323b94288b7e5ff4000000079d077fc4b8702c367568a217f9f5ac6960e1d185f1d08c8ecda77eb03efc7813fe05429d5a6a3bf4364758b2f7c26e355e6c582622a98d2c72ee563c81b37d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abb7c3ce8797d6ac50044e6308b35a09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e20e123881aba7c4a4b2c8f9fec34c
SHA102e0d8ba96ea77b4b76e1358b7f3b0da978a24ff
SHA2561b658b4b5739c013b5d72552a414b04877a56ae200b97865a245a8559d07e053
SHA512d5b8145e5927f4832544d2d487e74d015d3c62789fcbfdbbd2077be56124140084df97ad0104067a0a5027d3258b95e6dde51fbdc384f17aee2a93cc9aba2aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e64fd1e5481cf52060508d9ef8ab338
SHA1171965f38fb2d50caa0e68ffbccd7f93074b5fb6
SHA25663b18cd52dc07d622407ead773fcb66574c6ce593457b75bf207e29095c41f0d
SHA5124f619d9f6f4140f7dce433d582a08a018d61cc57754d7389cd3699a834c2ca1ae7d0f9217843d3d1e64d5b99603dfa46cced05b17e700d2ccee5f0d6d2be16b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10c977fa0a9cbded1f02884fc5a289e
SHA149dec4afadeef633f4cdbf542ee9792fcc705f00
SHA256f6dae80b1af57ec7e8887d5066e76df89b42126284aace2ce12756400a8c2a35
SHA512bdedd9f151c259feae0fbd999adc6dd2e1f73f2292f91216741e0addbe97f9ebdd96b15ed971d117fd66c987815be0e0dca0e3a00c71a8390d7705400869c606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97a89c1361eb46a5238f891ae8b0022
SHA131aad3ac221df6c1700876e01cdb65fb7ef51ce1
SHA2565d12d057c30847522da7000dcc45eb52f0bd884a9a8ab644c3606c31ff49fa9f
SHA5122f86db285acc839b050e2ba242faa6a4dccd502390f2409af816f2a529183c1e405ab2348b4eee52e72fc6b46916e0d33b903e49047efcb53ee54393c5fbd055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb18ca69c3bac13e9ae5689e62d700c
SHA13fc2874671c1278be1614fe9f2d625ce6da9cba4
SHA256b366c058aac243d47e4cf721ca44f3cb8c4d12e074eb63abde27d0f230ddb5d5
SHA5129ec19a342ff414cbafd749ff29f428b69bd6586c421749aab8d55f9183a27121f9be70f5e5afb60e5fc184443e1f548801649b55a342a5015d0513b46b26a563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee765359b4edaaeae8e003fb3f079cc
SHA1259f0a0ff0c3ad58ef2fc2e0d331da04c628e198
SHA256d91fb4f9bd1831d08b813fd2b4dbfd563f214d29f2abf354678d6f73e99e9e7c
SHA5126d2b5c67582ccb21a8451a21e5cb099ecb692950271248b1537088eaf1455e19baccd85673da68f9c51db40392d712144c1885ea7cea9c74899e455f9ef559e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200d7843f8327c11316d4b44bc1e640c
SHA1c9e91ce8c579303a8fa667c540fb6d74c1f0592f
SHA256c103d178503afedf023ae8024dab2fe0d93fa149fe49003a33d933e408fb27a9
SHA51219aa13e70a56c58f21a2081bbc1dc949e9c63ef960863fae89476fae6a22ebb81e8046bbb31405598cf93d761f1db9d73c21be8444110fc93af87717b4d26a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ce4b7f5ea40b1719bb121e00b0f2d1
SHA1162eb4c86b33f6513449d7010bac1be9158048ec
SHA256089d58ae3e3c669c5f7e31d4a33b1fbeba0b5260729b853c369b55188653a10d
SHA512b2ba873e99c61e97d6828c77b997cbd768330118ced0c69825a7b5ee466e5fcffa022d8f3f3a2775d1c465cdb817e92cb329113246aa8e3f5d53a618435aea31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e79ace19be9d1788bfe762039a82fe3
SHA1383da081326b20e200fc371f8e64a43a0742b9fc
SHA2560a6c5c1919ff108f59dae65ff2243cfa9ba3b7492e6e171062185d3e3d490a5f
SHA512be731aa73e446a7aee10732d46e45207ddfff94d07f37eeff5d19c726d8f4f869178388078ea7ff1a55392179fa437c1a2d58dd328b106526932fe3550c5e5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c09d94d79b04511ece4736399414369
SHA1fef9eb2766bc382fc3f0cc2f19d858cbcfc3eee3
SHA2566969ecf990f1641dc1ec48fc876be69e1b86807e2b13518744bcbb8a1ea6e515
SHA5121b0344baa68726b5ee0b9ecab3908f6d901ebaeb8d64dd6d2d5dcea7606f9fa031d30ec97199e3491c067df28da2ac43e72c2702004388f3c8145d28266a34c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e99603eaa9ee3396e94ef02df7ca56
SHA11a58d8a317f8f7268cfd529f0d9f8898203ef756
SHA256bf519cb65de0b2b81b465e9af42c6e1c812ff3474c348dcae772fca74484cede
SHA5120067d5d6b4ce9f9a0a982fd59ac3cbbdb2e44c2f6b3d1a8029c05a270406554f99837d38301140936af85526b00ac4bc7e22b11ae784a36e0c182a6d683fe029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9a62f8c6ddbcc8f56b0f74f72ac4fa
SHA1aba7ea1020b07ce352288cd4b16e6a8c784bbaae
SHA256b23f9c754dd807ccfe35fe52c314644d9a18e728b1b1e08e35b0c0d523fd4e7a
SHA51235a708d6c41e9b96f7ffacb23007e2350e99d6d42bfbdc02d90cea50d3726b5cdd760759a4b9b780554e0c965decb8ecaf3dba03139a78d1db8f66b93b1fa9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a9e0855733d44ebc4ebe3d040f8485
SHA1d9dc306593f47aaf18f4cd07b19aa07b27f0b9dd
SHA25609fe7cc0274034733af385886a9992d8bd7b52291f4158d97def3531ef6d755f
SHA512b18ae2e597769ee9388f5fba321fa4d2f9e0352acde60221b31c058eb40603bad1a8714cde19f84f81ca61ca53fb3012af69a70cd6a6c029728db16bb8a504c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50feab2ec09e96e84443fdccdcf7432cc
SHA1bded6c619b01abdfc690bdc0935bfc861a6dd60b
SHA2560813bb64687ccf38f899a25d8a3271d29ffcbf5ed7f03f5096b2941c44d7b476
SHA5121b22d299765d99ab9bda41296b3190041252e4461fa6846675fd322990a8a7b1bb314c256950de439ba0ef01c06397c8ed46aa9a5aaad9e816863325e4ce30b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a28c98d8cda38c190ccf1cc67abd9c5
SHA10f9fca9badfd8fd022a2a860f93c4dd02c3ea62d
SHA256fd89dc4e6f7d349a6e16c6031f14eb16c8314d1e45e3629340ba8dcda663cf03
SHA512a987d5cf7ba873f28a82342c4b502936a4fedb130c6835f55de47e75e45f70a32dd9f3e5f2b300ae0f5184808626b6b32095185e7071a23ca78322dfc7c322d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c86afba18a72aeeed5e40f2bda4301
SHA1037148101a99f14abbd74966a714f911dfac13ca
SHA256e7bbf1994556a0a76aa2e3aeea261af7af3667887f1a2b0de5dbfa5d882f15b3
SHA5125ceb7bda9b2d9d85a732da69f8bbebde8f06b65dd620515cdbc770019de0a5902282e5c0c313eac9ac027e8e91e54c54ed1827304a892174591fddcce9744546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528306c6723431475c8ff148d1b911189
SHA1e3f8074f292a4eecd9c774d378b79f1f6646ee0f
SHA25699b3be4fad4a80b2ca3c491239717d7824b988700b9adcaaaf6845a887262fb9
SHA512e8e53f801b7281e4ede7c72b8949223cded6493bfc177f215ee8e863baae7f0d267030cc5b37f26d4a186fcde2ba251a1fbb705d1d7cf7ca92fb4aa4c02970ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59468486c44548442a927612fe271414f
SHA1e2c387fb211caec9843fccd6962b7455808b6012
SHA2565c2072107574734194aebfe604ceba94ed91d5e09417517e886207a35613c7ce
SHA51281d9b2e1cfa622658543c0baddf1b4e1f0c1a1bc82daa9db47c32bc03e94853a68dce0b85e93cfe26f3b3a24fd67607c2e907358f17b35ba802d87312717d431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b9f4355663d0a0c33693ea8185b08b
SHA13b1362b2f4a3a21f689fc8dd476ca30e7a550488
SHA2561f9f5c850d7e210b4dab0ff554f1e52a0b41b8d1a0e3546e4b79483165e4cd8a
SHA512ae8d02b4d9bbf17c0b82a19c065420fcba7b1ddb0662d88039a743b1bc2465a9ea2f60ec6391a0a6f56705d1c429629ba845c5268b857bbb0508ac1466fe27a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b