Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
00b85b19f657d9fb8e19eaf3d62f190a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00b85b19f657d9fb8e19eaf3d62f190a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
00b85b19f657d9fb8e19eaf3d62f190a_JaffaCakes118.html
-
Size
6KB
-
MD5
00b85b19f657d9fb8e19eaf3d62f190a
-
SHA1
946daed909c5d68f624ecd9a3ab67a08555703c7
-
SHA256
48efdb96f624b7a64f39fed96e3f6277f66b6562bf96e32bc2bcfb44bfc70037
-
SHA512
b601f7f1d31969b6f6351ebe4a0b6afb09cd795a40e55fd8bfd02c799c7ef1f0e8c5f2f816740425990e2632d7657a1d740b88ecbf650a474b4ac00ad0fb3007
-
SSDEEP
96:uzVs+ux7BiLLY1k9o84d12ef7CSTUB6cEZ7ru7f:csz7BiAYS/jb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{642EC9D1-2E86-11EF-91AA-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d076b75193c2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424995889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001dbe7567792e977a2c0ae061071171c0d5062f2274d95f944cbd3cd6ed4460af000000000e8000000002000020000000f1c5a1324b176309e6d95cc2cf3a5fddec065a33a4c35f5458f50a853b1bfa4c2000000020aa315f9906d3937c1f247355bf2000dc0a6242cb1820f671f26acbb5b940d540000000fcaea753e26f2cc1c65c1b0b94a8030723cf7f8dced9cc015b5b5740a6858580fb497b0f58a8bd78433ecd9e6426ae660740564ec1e05fc4292627a31ccf5dde iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3064 3008 iexplore.exe 28 PID 3008 wrote to memory of 3064 3008 iexplore.exe 28 PID 3008 wrote to memory of 3064 3008 iexplore.exe 28 PID 3008 wrote to memory of 3064 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b85b19f657d9fb8e19eaf3d62f190a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5128265a81a5ddf2ac861f60d5633d20b
SHA19c61a04251bd1ff1e2176f7511895f1beaf6c24e
SHA25637be2f6a54760b5bdd660f1471491c4c7deb87e46465726756597183d3621e50
SHA5122bd8bf829581da15f04dd43d8e3d370c04a3e18b9678a2f325186b9fe385fd3fc9efbce51d4e22327ebb22da092ecf1d4ccf3bf8966b5f5709b877749e515adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ee98fae3965e25f48d8806f6d4dbc1
SHA17d6212efa7378f004e4b7c6a8c9619f06636bca2
SHA2568c186cdc7b2c9f3ae968b3aa8befbe647f405df86743ad4fb1876703e7a1a202
SHA512bfb9f56281ab0363d340a1709e9acfa3e8c8ea287bc73dd92d3d8a266a8036e5a7f241ddba498bd2641cb0ae8931f03e77803c0406036d816926e6f59168d196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed92bb4ebcdbad7098b9b15a01d26c3
SHA1fa06c031a70c4145aa8b08e1fdff68ece9b4e4d1
SHA2562f6c08fbb3a52f500611bc618f9776d565488a578bd278b782a93cfaba760b28
SHA512caa78182a8957dc9e88b25fc8b3d3c98b77ff57fff172b894489f916f39421fd592f804d85d97ec1ee30c1974369bf45567d6d113d8e630e1c851ca63fcb84e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc2939db2d557e6091c06347b923cde
SHA1f449f26ca1ed2cdd7ad4eee49ce920dec0b13808
SHA256eec1274a7cc8d171f71acd82db5dec6b07e65768086964db62b5f8f1850fd0a5
SHA512db0ce979bc2c2b114d24897c0b49bf6cab325ed5a0a5f69ad3819d9cb43eab2f680e52a05dfeb660da250262f0ddf6b69988bcf5d73a6ec5bae6decb43904994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07ec80e84e166304ed47c1278b02955
SHA118ce367b0d3144ca9b38ae86fd2a5e8e9a47bbf6
SHA256674d79d03885f993534409c7f6ac92522631b7cca064f230760d3e5959ba9059
SHA512cd982b877bbadd52637db8288c29267c8abca3e3de87abab4dae4768b00e84f8f3fda24a86c9fd49de4d4e2527860d0ca7bbae3231143427c74e92676f38dd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bc93b65a4ba3a45fd9ec4daa6e1512
SHA16a4c0a3a34af5f47d35f3aaf6f6c34ef4cce7d8c
SHA256483e3d08450f72a8317b49f53874ac312e1dc4de6184495b2f1af37cacbd7b3d
SHA512f5f62cbc46b7b14f0fc96a42e4c337d35965dd9d0e584e6a7624146bf44df2f6a62d45a641b6461e00f7397581c148be94b4d3250089f76df109e4cda0e9b5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5729c556f84a8f5f5b4fd2e91dfbec
SHA1b4e4535483ef4b539f8b018c22dc388e1fbc5d23
SHA25659b079a73cfad24e54d0aa663d8204f3c81aebeac57ec69474562dbffaccb149
SHA512e1273803065dbed220e0af450aadc564c8e95287e948b3f6da9d6712a23ab147dc8ba506a873d707e097138c9d329eb366e55a17d0aaa245c6a6dca3f0c9bef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50647a78a37fd7c95ccb3a7845db457e0
SHA174bbd9d2b78d621e6c2533c1bba94959cb78f178
SHA256b45f42d27ae73b7dff296fc5473b1449b8c7a6c3a7b6bae1419c1f4bdf796dd7
SHA51204618eabe77dc31fa6c560a387448feaabbaa532d1090f9b802cab48930047e6210c4df322f848022ccfae925afa7dc458ba69d32c8ef1c22ed544bf53dbbb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593177568015c068775f7fa49004ce08d
SHA1d7a64af668ca0267d37e0247ad2ede76ca51d679
SHA256237577ba92483a42b3d7e1a0bf919da86e1cb6874e27d140212231b79186c274
SHA512b07740b73969dfe5ebe0f04d03d1b134122882a35e5b3bda8c136b883a1243641bb3d5cc28ed88536d09c35cd24a3372998d5c650efd1eb41b23e511aedcd732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3d0c269152e6713ee979800d55f36a
SHA176c85182d1ced1c98780f5b6a7b3a18c3879bdf7
SHA256ba40b67f30bc6d7def0bb7caf36eeec6fc4a11a30e69522bf4a6b4b9cef1e537
SHA51297564ed9e483e27c6a566a86196e17635bcc9a0dc3bd78807d97c8d88b5ed173b32ffbd9ed5c16a3a378bc1ad22cff695f7aa1ca4259f25cc09e275f83e58ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c49d1793005171cb08b46cb5c18dc2d
SHA1df35a06e9d32448c62ea1f30da7bab18cca65a64
SHA256bcfd850ac2e13901cccdabf4472bc5ffee5a73afd84bd8b80b4195a868bc48da
SHA512cb29aa9fbc3ac63a1fbf4a1f3e37337aa7ceff4a8896001493869992ef6ea4080cc0d6a3dd83849102b2cf948597ba9e7114de94607d892ad15cced92aadbff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543abf12976bf91502a21a48b392be4e6
SHA12bef044550963cd48a0edc32e8a41bcda9984c6c
SHA2561a8a1dbc6e54e883e635784df7fb94013ccb7d2cadf0e2bb651a6da5ceb0c9e6
SHA512c455464e2d9228067730da7fe7c34ab5c9d4a5659a569e191e2451cece2202f0b1ea633e16f2b9053f878d263fc6174e3573b69ba33a0c4abd855fa8695a4197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef6ec0f81605ec3357409dec997aae4
SHA12f8e921559689756f69a81471541872f82fef4d4
SHA2568fec749653afea0b430b40a7ea1654be98066aceb2a0e1c819d7fc5ebcdc16ac
SHA5121db340bac8d7965cfb2f2ba04d4ec7d19a5a8d997bbd9700244098f67c2f3930cf5b75b95d60540223e7ef322ec0de99f8c57f74f62349365de6fc73bc28a9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffd1fb77a110d5a23954db4977ebd5c
SHA19bdf3513ac6a9a84beae0d1f7f4f0232c1bc21c9
SHA256ec61d3168e4e4512f917595fd7e92617fef2185c4043b26b42e1a7825cbcb914
SHA512c22895368eb4e4f85a2ab9dda45a9a072d8f88fd2287d1190aa0b03dd57e89afa588e27cf1818415e0d9b5331759b7456d88aa29da1eb442a5e46cdace020a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c325c2fdcf905e4be868ab1772493b
SHA12b5a02672e7270ff418dfbcc921bf5d1c8a849fc
SHA25632be9dc25efaaa864184246e1738b3a20bd73b09dbbcdb62234f961f7b95bf6e
SHA5125d63f8a86e6c4aae07b6f226a323fd68a5a6826a58d58623c727879fc581f35c0e9652a58468145372c3777207c1bc91986554129472790de8a80d5445615e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113945f9a58c259aac632a343087a3ae
SHA14ea7e10caa8887255974f0eb6a4f115b2e7d8261
SHA256f61755b05827c18b8e00315dc272654d8068422b6c6b2dbda707f1b680c3491d
SHA5120cb8634abb558b9c4af72709d5e19b83e015f6603a1e7aff1d85812af3d117e33ab5d7d2fda6a39c604a4cfcb1e1b784c05fd3459525bb8f6396e842ee1349bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3dc4f058e50d3610b3c732d2154cc1
SHA1dca738a650eaaa57ce5a5fc7aa606ba68495597e
SHA25695cdb8eadd1260d5a4bb43da29b343b86f2287e3b3eb94a4c3476493d825a703
SHA512f03979e5240b8f3b89f0eebc9848d5b7202cd683d9c4df3c027d98e9e3b0625fd33976a83585af6c6977b2e4ade48172cb46a53476d14d4a0ed893d4c07096e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b002ef7898e98bb16b53301b85b9e3d8
SHA1f26ab0b732d398ba9ebad4a65ee6e4cdae65f659
SHA25604717875ee6d038f1d97ea0928b585cffccff0005082dc1937765cd968884180
SHA5120ed6eb5d07365a83669b743e40ad6bc0edb3c79a5e399a90f3a07c95666b958bbb7f490113467e61b89d277c96282f93285a7c0590f5956b1e2b9249b92cc849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06faeff11de733c9c081cc287c2e97c
SHA1d7e1ed6d2eb093d6105e0a83975832cdcda92ff1
SHA256ca62769f5c60161978efe52682e0eddf4ae128725626b26dc10e11fa13a77cb4
SHA512832fc4041ba93d879de5d19338cc5011df8385d26d7ede0368c50b5b12a1bd75187fba05b829634c3acc11d3bec0af737a6a88c5c062ec349b60ebc9ee4a15f8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b