Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
aeaf9f0f2705c14a31ce04b65f66e24d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aeaf9f0f2705c14a31ce04b65f66e24d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aeaf9f0f2705c14a31ce04b65f66e24d_JaffaCakes118.html
-
Size
4KB
-
MD5
aeaf9f0f2705c14a31ce04b65f66e24d
-
SHA1
b8d224d829abdeae550fba7c778f7d40d2d2992d
-
SHA256
d60ba0d0a928f1ae7e5825f8b21d038ffa63ceda12862c937ff5dd111befdb11
-
SHA512
857af365f172c1ec8ee02bbccd0c45122cc07408fccea3daeb70cfa231e572dfabcdd99ba63f77b46618cab0298e4b455293b7845fd8e68f66de9503e3237fcf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oh2caA3d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDG
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0400fa729bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2918EC1-2B1C-11EF-ADBE-DEB4B2C1951C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424620694" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000040945c6e36d005e831298a8e284a021f5a2e0a02c154e117a31b456a2416b7c1000000000e80000000020000200000003c61ed3d2076baa53731bc07561384058af8d2a294405a3392c0e269f26312042000000046bee69c8b27d175a5d7a46e5a08863ec5a56f91c3e75f169818a4446333e49c400000001abdd04aa880d46715be211d343b277bdc26e3fd85c0ea30a8b41732c653e0449de221d4dfddbcaca4aa231f243726a6ae89772fe5bc8d20b9d68ff936d7399e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2108 2212 iexplore.exe 28 PID 2212 wrote to memory of 2108 2212 iexplore.exe 28 PID 2212 wrote to memory of 2108 2212 iexplore.exe 28 PID 2212 wrote to memory of 2108 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aeaf9f0f2705c14a31ce04b65f66e24d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad36c6a70ac5afa05bc03884cf673157
SHA1974319d1b424c6611396ea435193e5cea3b2ffdb
SHA25631ad7a5bd26d6b0feee8610d6ddd8dc6a4a80246021ce600aa972c258775c454
SHA5120ced9a258a412208797a7c83b5fe51d2fdc70448ceaf0f8651a5a9aeddfc56c58e16fab2561ad1d400a808c565e12f41defb0329789669fd117dc41c856b24e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574556c2a76a5b9fb87805206c955ade5
SHA10e93ee0b0906ca89fda39cf9def1173e8a7659f0
SHA25617a6fde1084d3944c10cade299ac2f3ee1d1f8c1d56a736a04e20618b4a0e286
SHA5121b889b7027b633aad5ce99c5aa95cd21e65cc985ff2ef0f2e2fadaf8bc332ee38dd99833db31f7200cb9a335325590d5284cabc8f67261d37c6f5f003e3547de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370352a49c3aa312ea65108de73aeebe
SHA19aa928187c98b94ed646dbb1719a5d03a193863c
SHA256fd85010b9e7f0763fb3dac703c6a4eba3a080a7b9dd048c3a6e9a77a1e88aa8d
SHA5129d6e5d0abc8a19c77fedfd96c971450e0c38685964bf36928f08eb1617382b48e2101ecc30d80c097b04bbd6d0cbdd9e0419f1708f29118ec24aabb11639cdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb826915f486378df6fd595f598ed3b
SHA1d9ccbc6324e6ab875391ff36ac28b0ad4de80af3
SHA256ef4ce0ee0d5a39b7a5f3c9bceb06af34bd27783db1c06945d3492fef9458de7d
SHA5125843a3c56d8bf6c145fe77ccddae2f9e8f9ea9dc8478e61de69d4cf54a9395145022b28f86051c519fc7fb32460e17c00add8de4bd924d573478e64e7cf1f61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d14443047465e3a15281cc7afa6832
SHA19f3d463fcacf11e08644c46fa318af2f7d1e7f11
SHA25605039b0513f1eece0002989cdd39db7ff4bd7b8759dd2e7a77cd03647fb80e6e
SHA512eb8956481c1c8eb96331d7a6b4a0c1abafe4409dad5e63acae050cba8fe0816996f3a6f560dc48d4f29a5fc9a1536977f6ec790d1802a5786b98d88a46f982d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858a494449ba474a7846531f64b85541
SHA1e212ab6387fc6a26689628f14caaba7f18fa3f57
SHA256bf17952b62c4ec77f6a724cda7a8ad08ded6f402c49e62ab91f5f5a98cdcfddf
SHA51218c6e5dcbd80880d4cc3267a7eb8ed395aa165a6ebf1f8a071c268e9a1ec5088f469191ac7c37796e6a22b9e3931d857b9fce32c0d4b502483a3da76caea9725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f833170580f3763f977c31f2d1cc53b5
SHA14a9ff9044e6d3566c5d6bb82742be50c9d51f7f1
SHA25643b5ee1d7d79eaceeff040cd5142da08440e8d41b777539a5f34cd5f2d967008
SHA51209a82bea259c9f91156b5e8985d2de9bc68d4dcb53af1527f02858bba2dc6039dd896e2bd4fec5ddcde32c3ff6b688a39c55b03112e5a9b7a289f6bc345ac364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50819a238a847b4f759566a09983e3e7c
SHA1607ec385540f06bf8690daf02e1a6d8c1f6cfd88
SHA256ab3f93630de8ae866c7abbccff1f42d2a0fb9cc653bfad316ead9806ec549b20
SHA5128fc454cc25bf8bc00399ec1ef9842a14a8d3bdbd8a96c8ee9584e3e61f1247f67092b42d6782ace107fe50d963fb234da0902c22f9b680feb489f259c03086e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bfc21ecec69b8856d31b91478b2d28
SHA1a65afaf988b0c906c7224409ce33ebb2df9025a5
SHA256fcf81d97df35180d4a1f0a1a638d69a60f2ee0bc19c1571f2843a9ef39e0e3a4
SHA51266f41ed98fe37f598ffcd7823e9b6bdffca1c4a08b6eab8e20cb82162f769e9074ff384b9f38b911e0c07fb3a733bc126c75a62696ab3e2bb72c859e8416f9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565af7b554b5c48ae121af3d336972a50
SHA151a40e70772cf1806c543d173c460ce150c45714
SHA256cde1514684cd0fcdbb1e627b5c3822eda3391c784d9e581d2f4805801dfac555
SHA512059291e0f19b6d969d5190219e69e7282d9b91f6ca4381efc8947074a689278e51e653260f14d3afcd5f96f9828c7ad22cc6bf39a5af8e5df7c8ec47a36eb16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c22cb5023a0f549c86b139fa735b63a
SHA18c8e9009825a94f54185bc63547f28dad036da4c
SHA25663ba1d4183bcdf2cd2174fadc933796b846dab4ea647c2cecd326b4e6b0aa63f
SHA5121b18225c1c39563c35548fb83efc962e91726395e32065a91fe281e011bc867e7d5d6e12bdefccd30cec3f6307563545a13243e3b07fd1667a4a8d2421f43a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b92373b6e0709fe06a4a6a2e0c5921b
SHA1376fe74b08989d4e9daca6e120e70b98833f7145
SHA25673ba13e26c0eb665b71b174f6f8ed7d71a0c2d6728283e58ce0c11f966c8cd91
SHA5124fed8a989b03c23ec39713a67fd2a9ba71b3a9dd17918efefb076e4b6e789dd276d7c6c12e1d17e89dc6bea0bca689cdfcba05a3896912e1690bfab9bac1e61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77411a702b74c243807a471b0c9d47d
SHA12c8d2ebc9ef1f8a9c8cd18571a94c599dac67957
SHA256c28cc0615ceecb927fd0b1fa0f83ec7189adcbe3b5ee8703de0dd3fada8124e0
SHA512a3483fcc781eabbf5c798d38e7a736487bfda2cc1a46278daa68b4d6cf00b91121b13dbbc4a88dfdff8b465579007c6c733bf4efadc32bcec3c264da8849f309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ee4d285ef72ad3b8f919f65db760fa
SHA1a3275fbd152b46b5bcb1521d524b9059a06957b7
SHA256994d8a382af1eb177864628d4ea523f91afa8b6ec7cc08ce7041c652376c256c
SHA512fd0ca0a81d9219a4c27f780110ab0ec99739f34f4b3d9d645a4be1a4bac823346e74906d85d9a85a475fb1d9111c75357770e1351cd1fc48c020d0513fd2730c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107d49295286bb306fcacb3c209667d2
SHA18cce2e2ebbd893a09ece4e6e376aafef474413ef
SHA25680c202d0f6bd770ca4393375a4e21e978ae455a39244ba304f3046e7cab6ceff
SHA512a860208a1d370af1a78502c67cb94eab9825c3581feb115a2fa36313c8cd44e4311c14c2f01cd8aa7668c35a3f231c0cc9f2243b3aa049fbf3471ef4cb0d5597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb97e29e3a6a711e1f95b38f227ddc6
SHA119affc824b03124661b356f2c27720daf37d2771
SHA256f482371dd5c4758068314521fa0509b10408c6ae899009c2230c8b177714309a
SHA512b185de4659859cb7c365eb90e750acc9432837d2b3b130210f1e9142720b63bc062fb586a56e5d0510b9dab4c28a0a4fec29b9e89eeda637dac96ba98f3d8991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd78abfc1d5d64a4d8e4ed2edc026103
SHA127104628d3ea18d448697024b799017c3c659257
SHA256f4ce26cd7e1f71c21b9983451554e8ca48f594807e8662cad60477a45ec58a39
SHA51247236ccf0dfe153e5dacd61e45129825ba5fe0a9de4711c56f3cbd90d520f238c0032aa91e80c3f0454b4e1ecf6fd3115800b21195e48fe69d3ea8b550c2cd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54406c5378592176ce456192862fa1d7f
SHA1b0c56eab77f654a5d2cebd3a2728c57c95410869
SHA256601f97c9cc9ddc837fa18994cafc317ee4d601e5b4d90123d6b2215da5e2b284
SHA512a67984f9621fce692d26c62ab762ce041695207baf20721d96bd9a2bec5ec34a8c3d8fc50dd3bf679d2420ed19824af112cad599caf088a73bb0ab072d8878d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57873b137dde98b22c3ae038557fca120
SHA1d532fdf3517f718df72a5689500c8ee1ecf47aa0
SHA2563ff26884ca9014dd003772fdb2782582e2e0bea607c274a04cf5fcd9ef02a4d2
SHA5122f6b600441cf2b3107b75c09e876d6922b4cb1cdd6ad0c4084d3476cd3bcf4da2f04ba82526461345e1c510b1e5cd873a7d2184ad11f34da76805cbfe4c0b521
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b