Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
b2b441e264eaad29baf5b7dff51c061c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2b441e264eaad29baf5b7dff51c061c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b2b441e264eaad29baf5b7dff51c061c_JaffaCakes118.html
-
Size
460KB
-
MD5
b2b441e264eaad29baf5b7dff51c061c
-
SHA1
ae7ddae658752cedd1ffaaa3f2b08cd2698b9d5c
-
SHA256
6282c8e50ac53b821bfc0add91d9df6239a047ef7773678c9693e0312e3925ea
-
SHA512
5c91dcfbb3acbf5bc39a3780c5214cbbefcc41d21f5a6b511cf8fa6bf6595f89afa60db1f9164dbc45f37934745255eeb5cbbbdb471b0fe9f8fe5863efc4ddac
-
SSDEEP
6144:SMsMYod+X3oI+YSsMYod+X3oI+YzTsMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3q5d+X3xn5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082db810be0e12c4bb7ba3829a47066aa00000000020000000000106600000001000020000000a23d48e05483e6bc59266fddf94866bf552d5fcebd1cda79f3c26faca9140f14000000000e80000000020000200000009b2b502be31e7f4e04282993342909635c62edd8696da0857a0adec02364688520000000e3aa4c3264e740fec01fc7618ccfa68ac702da77b13d5a80595c50f10c90a148400000003e3be85f485befdc15f68b90410cdb624d0968df68491d9859b38b45355c17af3d312644c8b69d063605183ba6919e50ad2e34b02a200424d74d73e03d976b9c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b192a1ccbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C907E361-2BBF-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424690686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2984 1740 iexplore.exe 28 PID 1740 wrote to memory of 2984 1740 iexplore.exe 28 PID 1740 wrote to memory of 2984 1740 iexplore.exe 28 PID 1740 wrote to memory of 2984 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2b441e264eaad29baf5b7dff51c061c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538296f8f16d677a0c107354331afd507
SHA1dbf90ddcd7762efa1e0f79421f87e087e6aa3611
SHA256e8987ece669f7b530d6e6cb3d89a2919a771e8eca28e831c222b30369dd6b3e7
SHA5120926d5467d79f8a3994db23de29f75ac0b5b825abe9b1255c7f883451616bb7692be6b769f0f6d15828e76b40e6ecb1dff738f1eca273d5297725491b9c87ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d260a67663942f0dc2f21c80086627d
SHA15887d5c1036469e677ef6fe6ac1bcdaf16eb9062
SHA256dacffed36d67b36f534f2752d18bb84734f6b4a11174eb27f7c00cac2a33c542
SHA512278428d7b4719e59cf957aad067c45326e09ee54470910ea9c44d968ba9ecac6d4ba77eb1143eadf74141a8726670bebadec11e218206c2127fb3ad12ba2e8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e729f261fc28b4a492020ab859511a
SHA127bf2519c6f65e971984abbaa552bade6fa68bf7
SHA25648c4d578105f75f3fafc24a47bb97c18b94743eecce2d5aacb17eff873a67667
SHA512e6af6c43e363dafc73451028fcbd1936bce454ac72029a4df0abba32480dc02287a569e8d9143c4a64aae581f0040f03ac6de8d2f7ee4b7c9c1a9a40b7ca8576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbf53b8798fb945074226488efa6868
SHA19e7f43560abc699e64901c12db769a2ec8f15eb5
SHA256b4eee94442c151fbfc1f7b187b9216ba5b9cc921b44934993abff68a7551aa6a
SHA512de03c340fa82562c3149a00f2f0f8c0bb5446b2cf61d31e54f001ffd092240e0d03432c7351ed614860edd9597d0ceb14bbb9ab1dd02c7f5e0631dfa827b9120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96f7c0f6189c3285f23a8632071bfe5
SHA1cc301d5a49fc7b4c61764aab2cd526738da502d9
SHA25680bf490a6d27395a5dadf5af0ca97faa7fc88ce44dd8b49d409e07fe996d5bf4
SHA512a9b31e6c5c0825d43c302d27d08fe8d2c3fe5a71fa1e71783421267b03626d79b2c5821f757647909b74ded190085ba437fff6daf8ae1279db7b53039c3c3852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ce4f132f8f6c00104dbaf0767d4aa6
SHA169a694b118983140cbeb71bfee47673e2d96c1e5
SHA2568d25b220879a4bdfff5500d2b6d9848baf8a4dc82fa0b63dae0f703a4cc627ef
SHA512997fde53d58efc92d9409707cff65e6aec104cf9e8cac4d9e6e1a7f2c416ad123195461f7e7a52768ff9a73e57492c24ab1a15d9a8e495e059a555e96be74c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1138198ecfd37dc3fe03c315874f28
SHA18319a7c0981fa19048c17b078511253f25d40183
SHA2569d8c31846b31464cf0e8a282fc827c27170b9d6ebdcd33a380137be8e4ad9e10
SHA512bd159e262327a11a8727a950107e7b2438dd7d7d2878d09ee0a74acb1afa2eab064be6b8c6b04ba645a1f742d6e1fb3a93b8a2f66ee018dae16e33f62db894bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f759fbe06fc912d604ba6bc182c5f16
SHA11bad68e65d523e396c622daf6dad5c17510cb5b3
SHA256cf7f27a26c758bcb7d820f24b2e6ad48d4d407cd615f04565877f0475c506d30
SHA512805fd8f201d7108b7a61a8d78db59a0c5d1484097754e1bd688a054b6202d7f344a3085b1fbd7a33bb6d8bf4cc326f572a1906e743b894ba066c981dc3a1acb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85c700b6082d0ccb045c78d78bc4cd1
SHA18c20d29be31842da9c49320fc400828e8ce63f00
SHA256267df19e67c7dcd848b91bb69fdcede97f6eff9ef9764372b0742587b74abb30
SHA51285468881793cb783c4b245d73e1cb52386975e3c8a99177a975a81e8acea1b5440746b530b549cdd6d4e6e3edcfdcc960e9ee193d8bd7f98b6739bb08465b423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514891c6b920027a7552d14a5d2f24c8a
SHA1fc938cd837269f103af2bdad0f179a29d9caf992
SHA256365277ef220d889560f147a2d219ce54abe3d0643387d98639816d8d6ed5fb43
SHA512c147a399ac630df360141dcb38145b96caa6b23622d3ac1c617e15d554ffc539ce5da5d9a7e77a521af687e0d4904c3c0f191cfe4abf7e46de34f461455f03f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51721530fc5fec205c4affbcd47ed882b
SHA117f30e6f91c4bb1b6cfd49c634e9811d9d687e38
SHA2564bfe435873d8d92d9886c0a1d51c43b87ef7cc777a7c6a5c1a311fe253ed524a
SHA5121aa02a2a1094f6f15da49fbfd13b42ce4070b74434dbb23a81331d630a86d9ede6e19dc59acbc0e05ab7b16f13321fa2e57d92c18af5e3e201c8009a2776766a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51498258eb7d11af7cc51e35b7e6caf8d
SHA18c15d6f89d652bcf12c8951209b3786f80e87fab
SHA25642ff9b3c7f7064891af3083332bb07a7e45ee877421052ee45b5ebd94435694f
SHA512d71a27f9173296efa6ed3594c11f57f0d11ed2230e973b7e4765e4718611ff1599a71d4d9d48d5e3fe6955b8e97095c33f5d7994aec1a02945eaa902435abe84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc4aafd089d53e8aa36b68be1ed7246
SHA16da6ccaa4ceedc9c8ee9996c19c916998b41b503
SHA25682eb976b2924604b0817243eaacc69059b0ec94d22203a23328f09204943f4f7
SHA512854464ca6bd567a3a4a7fad3f8affb865f20bb52ee2d0a72561b83d6356fdbe8314e1bd7182ec5ed1134b2385b720097f026009a72661c9fbf081cbbe8784509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b826b64e5f7156d8725f57791ee40d
SHA1188660221a20cf8c7378dddbc0f063f68dd88464
SHA25621e4a8eb729332576f66f04197493077302e2aa5b6b864817276a0d96db41937
SHA51260578624949d2aa1bf61774827ec6f12522d1b8e47d320ee5f37ba8700b692058933b1d417072cf3789d771d144483bb84192c5acd6a64778e638fea1c5d6e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe82d290d51bfe750fa304f75aa9a57
SHA147c6c8b639ae3fc36e9150475bbb81684d4c79cf
SHA2568da7eed3c43a2df64c2470cc8c2e416d262e9bbb6a4a61ac84b3ffbfd5ad4690
SHA5126aa5d60002c974df29502dcb924d34cbc20753d133e5edc663f2a73911c658c2a95e71c2ffe1b0cbdb64a07a3083aa7ce4cc27e0214978e655ffaf4a9ad692e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153ab4e96a039addefa39cda64453655
SHA1b7e566e87edca30e2121eeedef14c9597eda89d6
SHA256dd27ac908fa8913b352c255c19510aa578538c490706f7a8768e4e73e145d8ae
SHA51217d72140e5f36dcfb25b675154de97f0ed96d2b30b8184c67f65aba2ea4510eff1fb66023a744b36f2c27c2b29e427cb4901fc944d97b58b78311a23254c5a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ef80dec294cffe5436940b75a35a30
SHA1d3fc9270408f0959ce4c390409ecba9115d85c45
SHA2562fda4c2173577caed1d4e51b78d7b3d3269f9f30a774f2d4111feb632ee043d6
SHA5129f9befd89445c9d4545cff257ae768439c4f29c4c9668992df8b17a174051a263a796a55f3cda1027b5edb3a59debb934e038d6c5663cd0916e34bd6a1ae62a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedee956a7fbaa3d304a0bb84b6850e9
SHA1b290aaf3854eae4cdefc203d713085472be9a11e
SHA256dce023f70fff12440dbfaac8fb0b42a092101824c846911936ecddfa42a95986
SHA512f9ce3aaca289c4a8abdcfc24beb5ef858dae3b9ecf4b87a162ab2acdf8e7aec93a3363beafc075e756203f397d78e1413fff9cef88922516adfcb9bd8de4dce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c624ac0ec534b7edbe06576d216ccdd
SHA1b330b8772299c895cb17a394243f89796f7913e6
SHA2561e31ca98976113e8041c92ad1fd4dae142a949e5c00ebbef5fa43ebaadce8e78
SHA5124a011b84640a907b0450acd01f2a7bbd7520cf40bd2ab91610feaf3c2f8da2be2d206165d19c2008a74a205520c2a588177cf3c4aea91ad0461f52d0390b1610
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b