Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
ae1b6579f0e122c29aabb701d1c1d2a5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae1b6579f0e122c29aabb701d1c1d2a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae1b6579f0e122c29aabb701d1c1d2a5_JaffaCakes118.html
-
Size
18KB
-
MD5
ae1b6579f0e122c29aabb701d1c1d2a5
-
SHA1
246e2d6942e9b2cc557504d5a2670fd066d30e15
-
SHA256
482e30d56139297951eabbbb99090d99e6b8239964765e5ef0fc7200abb15038
-
SHA512
02769dae3f03e43516e2ee0b8d50bfd181a9af4e687a590cda1df6a4a9405a3261cebc00d3c2cbdabda29c158947be00afbaa3868c060cc6f4041a7d89296cd0
-
SSDEEP
384:Ss/3/MqaMqTI6bNC0TdLuqRAVccqnsISRX3RugvI5sA+21HQ2gfwYPRVAuXq8H4Y:SsR+lQh8StAgc0L7TZ4kZqO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67BECB51-2B06-11EF-A1F0-7EE57A38E3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424611067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000dc0243d7e8cd3eac3829a60a0c4e8358ea5730f6cebcf05c7b47b99f3345b9c6000000000e8000000002000020000000ea80d154e853d455a860737b3266e9114b753ff67898afcac1f2036869f095af200000003a306aab886355bd096256a66608dcbb9cc6fc8a774f2977b4ad4da190759f6140000000654d685a548e00ef9a51b3a158801a49dbdfcd5360d2bf0b8b95281947eeabc1a582f7502ed7787b957f9c512ca4f7b330083eaa6bb681ceee02a902102e03c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02e7f3d13bfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2148 3032 iexplore.exe 28 PID 3032 wrote to memory of 2148 3032 iexplore.exe 28 PID 3032 wrote to memory of 2148 3032 iexplore.exe 28 PID 3032 wrote to memory of 2148 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae1b6579f0e122c29aabb701d1c1d2a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514664b0688fcb21c8a170ac38b7e158d
SHA1e8b218554fa094947672d80c4464cf93fccc59b9
SHA2569f8a2b4f0268fbd5d134af328b17073bdc20ecac1713a0f449717004be948d74
SHA512be8b1401a915899da8e60f93703b857cb1a2857060959741094d5cfa14b376181c9541364844db2f6c9389bb7ddecadd9c58c567cbf4f78ab8b06809d5d6ff8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf42f0846084bf6820c9711d08fcb76a
SHA19f5775b66614e26fed1dbf1e3b1d5a77a0d08e77
SHA2567d54a4332d76b4d36007038922633d68c180ca4290ec3da795d1551dfe6e8ada
SHA512dd152f6eeee5ed1bd8d9aa5048d75f547606bc94a993f297ef7ae39c69abc3697025c835dfba5e824a82e3761120ced7fc95e6a677d39d8135f36d092f1b3cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6fd5fc5c031aeaa78e58f8c6d75d7dc
SHA1b88d392a60a0e63c32cd2e21c9f6cce6092975c0
SHA2566abeda3bef0dfd6d1e84f9a62765bde1c5a889a7c7730278f7c9bf451c62e996
SHA51270253eb96f06454ab541c55299e206c85608eccf915329046299345f87b8ec7e27bd8fe415f65ffbfd233c3cd807ca1f1d0a489cf5c8eb8ab859ea7cbd50d105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733d2cd1c5608b3174a76f5bb1fe3ea9
SHA14129b899f058cc627018a7bee70877dc3d1e55f8
SHA256eafc555b71973dc26e55e51c4efca0d0e8ff47a1bf37edb7927b6da4cc211b19
SHA51263f0f149612d5efb41bdd9e66c7a4581f8fde3c2950de4cd5309132892d62f749fa73b93cc3b294ae48462ec81563d40e723b527e941c750035d9ca89305f834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd7a146bd08dc4fb1a8c6884d462e5e
SHA1ca4ffd6873f1a9bb587257cddd5f9ba6e773bbbf
SHA256aa984d57012fa5eecb588a85cee97fbaad84e0c63b3a5f4d49123e9bbc0879d6
SHA512519c3e39056432b4329398060f628a735c675d549ffad29695e2bc536a2f9c049bd8fb62cdfa422a088e684d6753c6f6bb3ab5764d811d49018bd96553e56257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b3e18c63b180031523adc5e85089b0
SHA188fa5cad85205a64b8088e48b91447ae2502c9dc
SHA256da0a28e0ec374332f87cf16f2704625096ead5f4b063f906ae82e6db8c80f258
SHA512a65d1bff92c8a255b12b4ad945c54b6464a68de480270e4f5673ae0c40fe3fb9bbaab7d4e80784068da172a41c123e5af5b505eba21a8e426e1f76195dd60ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85963446684cbde633ec8db040e354d
SHA1d4ca8dd207ff588472db60cc22dbb97667f8c678
SHA2560aa272be38a99ee677969de74be34d33bb6680484f320e6c4a7cc7378b033705
SHA51260035dadfe3b0249ff3f899d572e028773aa2643ddf7a4225aeb5d958c21d7b51eeacdc8a87125eda842f5038ac1cb26b4c004de87e521617525a28b93c632fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d2efdd1f09e0022bd756309bcc3b7a
SHA1e6604e3e42d0a943f85d009c2881ea3802a2d106
SHA25654096a899e30a42c2c6fd2472af362922b7786bad0acbd0f09dd1ba20df456a8
SHA512feafc3ab48c4910d7d1745b73b5e3a7c541dc2bb0057f6a270c36e9a8e937c1a45d0ab0debb37c046ef53c4eb943aa2ccefe2e3186db00770b3ee68a24487081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50963e1623e25ff1801ee6d54bb7444b9
SHA1a90ea48c44d18ba09c420099361bc093407e7faa
SHA256f25969fa1894b1e14d8aadc5831e61e86f07f128a97fa2c9e7794979a46d0ddf
SHA51240c768d4f6a1cd3aeafed7b44bfb7b516badb6083b73449154cf13035d908db29f31360dd855a7945068843889a274c85c0bb8c1afd12600ff0dece5732f42e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04c3bb6bea698ef5459a41ed2e06787
SHA178b9acf49a182fa8ef378ddbc19c33df11e1a268
SHA256d55f7b658349618e4374a01d648b5287b2c9f1076ebf0571297cf1ae3a6431fc
SHA5122f8b377a9a4d01e5745a01d5a3f5ef8e71179d9ef890981f0efdf5f59c93eca260f48de610a70adcedb43436221ab29aaf2177f1c2408438b5bdc2a8e9e556c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43b2f2eaa518308a9f7539ca4208537
SHA1c1f8dadbe9e19d4bbe99c08509491eb4dc36164b
SHA2563c04841f684d0cb7b945eb9dde656907a462f5d4dd2305d491fb08db0b669383
SHA5121486d926cd12143cd0820549f05621fb70a79b61f579c151370bed91b0a6f68fe4214bb4dd119b4381b4ca65d51caf2c4374f9a6d22cfa0eedd1cb5babe5323c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62e938410af4781e6edcaf149477e29
SHA13c31b4218e311a379b7a65184237d226fa23590b
SHA2565c78d4eff5576f2790c06ae0db788f347dd6b9a40aedc8fb7a232a27f5249b69
SHA512ab0dbb589bb4fc8e5ec0462332c5eb69ba69c17f31775f62ab0f8bb4339224a32deb2f5c0a1594d532e5386e8439646352356231bcd0774f71c3927c37d8bf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc4763c26e4d1bfff1bb444fd4faceb
SHA1a13035e93c82068cceb285722b7631fc37901ca7
SHA2560224907f3e55564fdf53b096983e96739620f76552d90d245a048f9828bea894
SHA5127a9cc33b1eb5f118c38af0110bdf71b03f7a7b6f5b325a7a42ffb9fbe8b31de8dd2efece0ca521b0ce6451e826fb887b77ce4258655ff554b5b76e31357bb442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592baeb70baf95e1bfa9142f016e656c9
SHA1ddbbfc3aa822ca3bc66d7bbe80fb7e70c56fbe8c
SHA256a878c3744ae641b437c0072324a8ad22c7cb16e426c756be811f5038c7ad6930
SHA51203d8e9876688d94f700dfd9313bde13a84496e3931155e01517b295ef2168e2f8e5ad9cee7777383611f57861db71f398a56379154f63c067a25a1ad820f7376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee662008617926983d05816b68ec22aa
SHA184d82060ca8a788a796aa1fa79c7a9affae45608
SHA25623d718150ffd52ce27c56f341966498053556539c52f12e731ececffa91dc1cc
SHA512c77d073b960ea6b11bb65c780e2dfb96f09f9f96a5b0b892cc93f533dbfb629224130215c0e4d455e928c7e827b06711d5a932053c68afd263e97bd10a608240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783804e2c3256cf8797933a37821dfa1
SHA16ad59e979a90c8363bf7b520960883013d738591
SHA256e7220d42d5b757507f2e969a814fa3c8cf01c7b0ef801fa69a26a712b9cbffad
SHA5128a3c0591505ce1ab903dd4bb471e69daf3ff8090d52894149786d057fc43f1e53f1991ed2832a4d999943706f756ea77ba165f04903afb84538b79fc80287b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd5ecd1af5a60d6cc5c0aea3a717b2a
SHA1a0d38b00499f16a963b6061a350da07dd937a41d
SHA25676ac811ea9034106a2ea1036bbdb2015eb51cbe43c60184d539d9a315b444b90
SHA5129a01fa44aedbde0c70c332e2ccb35f940fdc2c566659b5597a1717430be0587d2b27b35660ecee29be0d00f3d607439d1038991f32d3bb5df5ebc728a7705ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916bc06521510735e4375be7fd9f485d
SHA169e5708e906bafc795a6dde7a4949d75b503df1d
SHA25670b4bd73b1fa7bfbd13c23d8588cc7c95aa265ef0e8e05c3da34da2c37e324ae
SHA51266322428e3e42b3cbd16aa0d174b5679316a08d05754605543fbab423ebd62533c605ba47426b09450d68103f630dd6badc8dd11fd56168e69bfbb2e05e22735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52171dfaed07b2a3cbde66ba26e25d9ef
SHA1a3cff15a6034d9afd4198e541f2c34dbd18a28a6
SHA25681bbdebb775d823a16773ed963406333c4e107facda3fb0cb3f881705cdd0303
SHA512683eede8b152eec3a28089d3778743c6f43e741a4c35820056ce4953d51b3a2a2703b129f572f447c52d897a94a193cd61ced6f226fe4364ecc32b2477111580
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\wp-embed.min[1].htm
Filesize268B
MD55d98d697689671ce196431af2794d891
SHA1757d1e0ae74dae58f60d6cc9b336ae717359e5e5
SHA256d34e90f005ccc796b10478a1cbafb24712b3dbba06154f1300bd3d8ecf4c72d5
SHA51298aaa830a912a968057f0c6f66afdba07e1c6b4bc0a83968e8d8caede1f3d29d9a2efd0acfa9518b875f4a65433a62a5317a52114fa6e6aaec25c74bfcc9c032
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b