Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
b17df3a59b2ddfedaa6ffd2764ba144d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b17df3a59b2ddfedaa6ffd2764ba144d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b17df3a59b2ddfedaa6ffd2764ba144d_JaffaCakes118.html
-
Size
73KB
-
MD5
b17df3a59b2ddfedaa6ffd2764ba144d
-
SHA1
ebfae3b8fa4abc3620cf4b3797ac2b57c998e34c
-
SHA256
36a12788e0206054c48fcaa3433eee9fa60e6a75d2e2a1b80c2efddcce582906
-
SHA512
494abcb8a80650a54be93f596e7273380a0ceb4aee771c1a54ca56cbb03a1af31f358fdb4d188db789c2d7f6f1cc6f8e08f95ddd5648c9b859883cb8930c470f
-
SSDEEP
1536:5HxDEu/t+tdjI1mzJrddCFnw6VE5xEUrNEouT5mCvJfF/vzufxkAupDCt3Xalk61:rDrt+tdP1CvpF/vsxkZDCt3XalV1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b44c059bbfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424669382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E5F5221-2B8E-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ab589f4cf9b3341bee0e92398cd7655000000000200000000001066000000010000200000003850db7f40f428353e69f91788ed32dee99dd8485dcb8c4e37898a37c1a06bcb000000000e80000000020000200000003936659843f81ee1e2e6f533043fdddf6ff6cce12948d069e6d41927ad5bae3e20000000889b03901c05cb225d42e8dd0942d0cbe538c90c6dac0a0f1a4a9ea7e333414d40000000bc814677043549430ad22caf00151c5c3ba236b852700a350e8dbfc5fff17ea571eb1aac0dd35f285da783a12ef6106843b4d164b0687c23001e2a44373b6970 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2688 2872 iexplore.exe 28 PID 2872 wrote to memory of 2688 2872 iexplore.exe 28 PID 2872 wrote to memory of 2688 2872 iexplore.exe 28 PID 2872 wrote to memory of 2688 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b17df3a59b2ddfedaa6ffd2764ba144d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185dabec12022420e3cd0df5bcc1cfa6
SHA15c608198045b256a9c09eb99ef9d395c43cd3065
SHA256a2c070d6b8b5603708d2ef3118629b68ad382ca36aba3bf834b03bb096f60142
SHA512c8ae82ef46febb937afb8c842fb50d05e7842d08d39521fc007f65305aa7981b2bd6667fbbef400675ddb82c2bf8c6bdd03d0edcc93fb229e9e488b345a174bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a111eb4e3cd9b844407f345b9fc0bb0
SHA1a9dcbdd5b1223dcc815c9db63d872815c1c786b3
SHA256392da9e025fa3fd46115b00c0364194018169cc8ce65b3721d33dcd008df64fb
SHA51286aae9af4257c61b323cb47ccdb05092f9ef4c3e9a1ecf34190d9f49b83296a469d981b17acaae5919a1c4fd0028a48cb5665d62d7e64df813708f8c0db2b90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb86a76e304b0705137f3d92b61aeea7
SHA118121223e520fda85b44b093a99bdf143c884646
SHA2566f70693570795419e61b2c8173daff6b2ae48a762ce68cf9c40a04a39bef4391
SHA512dac49d3b33bfea5d682880993809194443b5fd4ecec41b36b042690d4d7f281ba5b7b7bd6355e45b01949ea984fe1546c2527404059f0ff105d31f5c094609ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accc148ff309ba3b63fd9ea9e8cc5e92
SHA1cdd67b79effb66640e0fff938acca308ddda5dbb
SHA256d6eedbb691c9a9863978d25a089a5783d0beaf386a7b8ede94d5c96ef927bd3e
SHA512886de208843bd4c213c2955ea2de01ecbe20eb1bcf4b961e65c98b47041bfffdabe0100c2e2dd4c3d3ca7ea94fa301d4f7d77ebb3a933c7df23734333bf83dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a67b76775a65ac7743cad629b2e403a
SHA14595fd9067124b8b976ad2f5d7ee1d628d489da2
SHA256feee70b179876a29e4003a532f2274c92dd094b9efbeb433021d67587950bd65
SHA5128dcb969e4d9a038a96e178a12b3e10e136231514c59fc85cfda7d8ee7c04385c2048d0e6c35e1ab0ea032b4e4f6ac3078a2d929874071cbdaadc2e9cafd99770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99f280b7b1cb24ad5228807fd8d39f6
SHA105c1622b1f707a395c829f45977a5e1dd0cff3b9
SHA256701b5c93961d8af766e61962ff7dab42be0a066ee723989af3df33250491d14b
SHA5126a6342004b16ffa23a3283b17b208c54ebc2b0c2817a2b7b4529aa84e4e75d2b2824a719712a91884dce53755dc7aa78e25ad8bb5cf4767c2db1b7c6b9e782f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b771372b098dbbd06426737a2b45297
SHA17f01e476cbb94decdfe998ddbdf92f37e1a21942
SHA25696a8619c0ac41be9e0689c49c9242cbf2353ae4afd899b77d3fdcfeed53e9337
SHA512b8ae66bf63bf5933e2915e98cb685d614a8b854f7a71c167cd27e619c3c9307bef6c62f6ddd2c84ef5a3ded093502a75ddb67f38896c14d6bcec850046c226a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ae811ae34ac70e16bdfc7502020ece
SHA1b15009f598d7c64f7e60727e4484f4dc5d9276fb
SHA2564c6f9892af6cbdcd5b16b9a491c070c08aa7beee78f85f5199408091f5c598c8
SHA512d824f323cfaa0ea18d1853f991234d1c2404ed044ff284ac5b5ac072a3bca3a5e15982717c39bf47b95d70d246831c839471f3f8760558b36ae5ebe19dd73c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee45ae78a22314f2a6f2e3d8fa0bdc5
SHA170bfc88e2d580766cd4533a491f7c45ab641d3fb
SHA256be7ed128abec67f72cb74ae2f0c898e9a4fe689e1727a8c83c357882041cbc1c
SHA512c1efb4c825491c5095714bcace6a4ba71c9f6c29f3b76209953b856471ad78311b3c37320c9d93d9522669440fde4046ab60b7bdadfb0d341a5bd1564a7242f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879bf7c4a8658feaa9275e6acf865bf1
SHA10fe68d5c6ea25347f550091614698c7dd2e6f7bb
SHA25629617f5b98b5273ff779101dc4b237970726346bee6e45fd50ceec0616928d9d
SHA512f6274f94e6c8815708a834f19d03ec2a81788114c563a7b212cd725e5c2299591dc9e1ced9f5ef7bb865b68b5400665faf3d04dbc21d9cd8d2453c6d6ba8beb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24855bef84acc5894ede5c4894c1d2d
SHA1852001113fbe1afd8c0629c6dd0f855cf45217b1
SHA256bf400dba49267429bf51d6bac300e6f5f2ac76fc580f15cf5b00da968c4c7cf5
SHA512c5aaf50f803881f2cc276d2c1e207442dc7f4cef0464d62f5f976bf89a7f115212dfe0093c465297c059a01acc97cb64946a5292ed360df1adb274a2f2f980a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58befb1c028d0b41edaffcf3746d5a967
SHA1041eeaa28d1d227380472b62727e39eeba606397
SHA25694ed014f48597eef1d710c7ef54dabdc8f527a4da5f4ce06308e0fbded704c0d
SHA512c106bad3c99b29e613987723798d4c1c9f760f5ad658dfcf7fb9df93af668ce1c3513c61e1a56e6fa73e86091fe01600403a8d7de3cadf2af5c1a2147d9f1f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a58bccb778d2c1f7af3a4fa64364aff
SHA1b8ead7f761c38e8b1a3293db12afd0a93e0e9dc3
SHA2568d021eb9341780a37c8ac7acd2c439288648158e6b6d16ff0752719a5deb570f
SHA5123d9986d28f11da9755d550d5b96e784be81f519a51d88fea2e22c2598ef865dd607524bb8b2b343fbeba4ef4c7cb2d131c3a7bbdcba79fcb7ec8bb5c510e3674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251fa8f81a625f155ab7c4407def896e
SHA10572677a4a8021883a96c58c9a58f2fe6f4b6422
SHA256287c60b48adcd3cf0db630968415bbca6982968e065991461aeb69532a40836d
SHA512ffdb60c99c09187e207cb8a8f298b34f93f92e88a99dd470bede80e247360ae5976ae744bae3f92b128fc721973117f7b3f22b36ce0721cef6f5a6241c3abb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2c891042a93dba2deab4e4580b5653
SHA16b575e079bcdd690ffea306a9a6d949b365f9bc6
SHA256581cc433441d34cc05d3095f7e67270bf8311614837030ff1511fd97653d91f6
SHA5124ad243211d13a6be3f21f27ebb4d7e7680e9eeb3ef1202349998e46dab91d5473d3472c1621903bfba954ed1d924d1e5a24cec6d15f33ede0d31d1f31ce4222b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e846587542b0ff552bc0fb0b75aba47a
SHA1466c504a4b89bd81d27bfeb6db3a11ef9af4900c
SHA256139cde3b3a43c8458ac44effe9a29cbb5c13058a91118079a35b27a20b255e08
SHA512d5ef53a2952b07574fa1410bde22fb3ee0fb7190d093f1cf3a8e147f09c60a42b7696f6d22b2dd5ec903fcf8ac4dff964782489c4ae73f09a51f17d4c24b133d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c6765096f0c7903eb16a7dd71bca08
SHA1d20575fbb8c64cfa4f70232848906bcdceff404a
SHA25668302427b1225c1e9edddf352d6abe2940269afd74c56ca4d0c488697e978e30
SHA5123f9943c47c11817ac4e6a905f06105ca964a70d117bb4bb06ac3aca45b566b5213d5ed3afbc751a706da4efe22141a9c6d2dc570eaeddd64882f0c3bd397147f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592443f7bc729e42922509887622d139c
SHA182cbaafb8832c9532137767f785354a2e9e40651
SHA256159515e5ac10499624e618061aafc4dc95cf441a377105f44160d6f5cd6988ed
SHA512fae4dfd207d76b294e59fd0a042567d6598b347fa58576d66a80a998fd14843bec8f18cdd885e66436e79522b976ebd5021baa1017015926521bf39814412f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8dac275ecaec638836d196a1b1b40a
SHA1250effe2587cc3d1d8dc35883498a66728ab5eea
SHA256a96aebadfbfc386a840bfd69d56ae0aae03a1aad6e3cc3bdd709b700493466cf
SHA5121b14c652a4cd4ce52255c92a55d0cc4338294ffd7ecd876f9b03f2346650114dbb6df8c02bf8f32ef3f1e99d70260341d4e47ffe90bad7e3c3a1ee55e64b3edb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b