Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
bd5a1e0e9d88d21651eaac1b6993eca3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bd5a1e0e9d88d21651eaac1b6993eca3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
bd5a1e0e9d88d21651eaac1b6993eca3_JaffaCakes118.html
-
Size
4KB
-
MD5
bd5a1e0e9d88d21651eaac1b6993eca3
-
SHA1
7579cec48f3e3a74221f05e58d59567c9e3f5edf
-
SHA256
c8aa3e807cfbf3dd797c60f44e78ac46a6679228a86beaac1a708962fd93737b
-
SHA512
e1ec5028f97f949d7d80f9b5b272945a5cc7ae8f53cdae970b7924e72b21aef0f8e36d62d9125f01b85a3c7fef8d5095dbee2cad0243011666a7776094b65375
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8otdHed:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7009f8e068c2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b415d382a8dd14a82a359a62af636ae0000000002000000000010660000000100002000000099c8b6ef7bf053691df6b366ac467c23e11359f81b82ebc1407c1f7c70a92e08000000000e8000000002000020000000cea4e53e908a825c60f85153ad3eaa2be112d327d980569d82bb35d3012612cd20000000ce6ce0b9a9ccdd5cbb6ee8a628745d3f976ddfb484b5f691389ca3e71e619a9c40000000ccf98e5a7d32acc2fb52b9746632ef4d3d5f2ef32cf09a8027564994fb928fc94a13dddf0e628f0890a79aa32352e2f256d264a33f593626c7ff8249e7f26670 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424977703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C7B0341-2E5C-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2656 2468 iexplore.exe 28 PID 2468 wrote to memory of 2656 2468 iexplore.exe 28 PID 2468 wrote to memory of 2656 2468 iexplore.exe 28 PID 2468 wrote to memory of 2656 2468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd5a1e0e9d88d21651eaac1b6993eca3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c13cb5549c6d45717c090e4b1e7e318
SHA1a1d7e129148108886bde756b7ff119d583f49f59
SHA256e2550ff5443a02da0ef9d7c44121e188b7c3bd08143964be8df0dc7830461a0b
SHA512831a2a1b5030a971c4279b215687eb02a5625045cf347228b256ecc348fe933a59d83bfab92ff35b7494dcac207ca7f733d9eabc4a385ff8e5e361912527291f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188812d20e11ff108f02a3e9cc73fbd8
SHA1949f9a0bb78fb68fc4f48958fe9238319ff9bd64
SHA256881848e02c33a15e44bc2472e28506242ae68b2b7f359aede60f638b9c0283b5
SHA51202f66cfa1b6418dd8f3931f71a878c5ad4b3dfc0ab71176a9ca628e3dc607a5fa6ec705e110b9d1ba5b143580c011e0acd2e84ec3f258831abfc9b335cbdcfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54499385f94ebb0c4fd3e84412c995300
SHA1de9a673a7e9247c64d708d35a2a30817d12649bf
SHA2563983462155dee47bd31340fc51a8bd01324a445700da7a9045586158369b5696
SHA5123eff5559d73f881c0b1e0fa6d470f247d8c9cf7ff6853ce58c742c6666b779d4c3ed87d569323f6f06d63d0adb0e7ee9ccae4abc3ea6c6397756cbcdcfc2ab96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e5861ee2457669335e028244e5ec54
SHA1276cbae812afba85866474ac123046a4573b93f3
SHA256f0f24f62b5cc74cb1e1d3adea51dd9dabc990c879e6529ea3940dd0d908ecfcc
SHA5126981534d427a0684975ee86de9179f79db5e27258cd3790c01cf6a02e3ca6a2fbcaf2bbf0a218947fe142f4b31b050e9ce70bda44b477ae31885f6cccd6467da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c7af61d75c79597cd5d2b42ebdd98e
SHA13ad16b5becd69803a1b85497b728e4df0fd94c03
SHA256fda695ca80791dfd18ef2f6ddafb31c3c00c9960d9f7aa5aa317ed30dafc1662
SHA51248e14b39df75f873864661889848aa0f3d899665625452dfe60396c931304f6bbf165eaa57d47b485c37ca67e0b5633485e639ef1da0cff87a753a7a47119eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55634fb78bc6bc914ebfd3d4a0445cf39
SHA135d32391d3772aa38dc61d4b6bc263d29213443f
SHA2560ddeeb6fa804ce22952216343e554ce3b5f93a0f4c2b33e7b8946abe65f3658d
SHA512db4bca608b6409ddd3776b78366dd14bcc79a22fe67e595092f8043b62f0771d705f8a4c996dfcfa36dde99ddd3eb0249523c904d4c8980a7b630cfecfdaa67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6390bad58c2caa0d5e13c1ed721707
SHA1b4ac83dd4807d54e471143e94c7dfbe2e5c7fb76
SHA2569f488f7692822d3bec3cf49efed5ec578eea01eb3fbc044ae465c0f542c51228
SHA51211ce646efeed933112183ad7eb2265b0847ad3d315ed252b26dbcc4f8088eb96bb418b2062a63613fde542340686e03a7952423f5708d6f8d89571399b795b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56469a80a0562499ae3c8954b9186acff
SHA103d181963a8344091db17de9b29c89f1104ba7d3
SHA2569a17bd6aaf72fbb94ea2981b4a102550d5fc67d64f1a026962cedc2057ef4a37
SHA512d5d49fede55dbcf7db36d051063ef74a534cc778c2ca5d404437ef6af3de56b9f36964e5d2ca6380d0768a3a104970ef50eea46f002bcd1d4e769024a6f45192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c605e479c1d60bdf4fe888cd01a2af3
SHA11bdcefde067e5ae53293f7f93596143bf58122b3
SHA256ab9e9c50cbc2e7b3dc14031dc0545636ccbb3a6391c9f50dac3e57c166cf0cf2
SHA512ee22db1adb452ede408e2f6d618c66b07932077edfa2ecf80bc9bccb0d60206a38d2f68f20f4589276294e6559e92286304eff280c016ee17b9baccaf010675d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495c99945d14874e0db4dd8e64039c08
SHA181a0b45576d6e84d9f45d94285944ef2bb4471f9
SHA256667b74d1063e5f3e316502beb7ecfd83ee9a68ce7abebd22991f19aba36f77be
SHA5128d11478ab007593462dee1b800f46ac616bb88f9817b24b90405b28d809efd338c1f7ee0caefc96893de82824149651e7c47dc5c67191699654b13cad202da5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7aefcefabfb29e169a8b1f6ec8118d
SHA17c8519759ebdedc6170ff7b3d9dbfe855569d135
SHA256023feef7222a51a8c3ed57897b5eb90d748dcddc6a1c3e2a4a886a40830927de
SHA5126d8b8bfdc83659d19818d095f2b06ddc5a943d283269bcbc1c8eea2ab8abb7ea63d713c166ae20ccde5d4fb82a423b013e0e51d9306a56cd4b94635a701765f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3cf47a86d4e05017d4cfe2b1808015
SHA15b3abeeb36616ff6bd7e2dff8ced8ace58742f58
SHA256d0a36fa665b8167c77676d80165420e749f8325f8bf88f97d5302fb588a5f6fd
SHA512f1db6f53a97d0f9830660d79513853ea88c7caa950d55af33cc2a4a8753dbd74fac2cc84e349328dc7ff5684a5ee63afa7f5bc2cbb14c1df626c65b2c9c7f089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951afe55e171c4d212bf487575a7744a
SHA15de4add4b6bf5f2fafebbaa2f52b0f0531be3957
SHA256f1f1a540f5f9532e5486bac0b178d802e4c0771fa1b360b976b28843d84a8d92
SHA5125cdf310cf56610551e206a2bc1e18d6fb51bf50750a94c1d2d32d7361417fcefb2b47790f6fbaec48ab0105defb5dcea3302810a5fffd772cef67bbe8a72346c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21c6beb892fd1390c3a29f0e461f9a9
SHA113475f68058ad654f0347a5a65e85ba757417068
SHA2563d1f63694701880a870285e662b885e57508eb6fdd044aa5b881027b02b8abb9
SHA51281ebb3340ac41441fd09e1143e27a8f17f484910399bd913621085356e879f084e51a16dfbe4b89378464847b661866f8eb0678303ce60ff2345f439f255bf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd04bc837f6f0c7f06e221d49c5d1de
SHA1f1257f93cceefc784eb6f15fa070d06075f9a724
SHA2568de713fdce7dcdd52c0591ef45cbac608e341bba0f9c1e406266c1dcf72cc4f2
SHA512fe770599d63e6fb5ff12a90b3e23719dd5917f4ef605b4be8289e7f40a446f2037dc832525195f172a0661c8418f3891e4ccfc5a89cf1161f80e1dd2639dfff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7791d40a71eff9750691468facbd116
SHA112942a8d48ea18a4a8f4c5e3042aa38e11124039
SHA256cf60cf5e6f4facc7e9ab59b179bbcf20a1710c7dd5027574d2d3ce92348ef849
SHA512f984ab966322c7c716032bb26e1946d946a6d7499ce3f94ccb777956cd33dae5dbaaa96c07880db58e0975a1721d3c4b9fbb9412d23e7d2ca30b51c5aa9c59cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4b533dabc7e481f11cdf9418e44547
SHA1240b6332cd216691f06c575654af23de6002aeb3
SHA256b8fb69dbe3b07019bd708063810874ab0da38321e652c6c20c3326e9a9b4640b
SHA512fc16c83471f58bdbba8c3d034039df52e987b00d703f1d16517bcec4bf4cd47862f0bc95b56a004c1740ba7f34169ca8bcbcfb48d344e00bca502d172674c8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adb31be565326f5688495d493f9713e
SHA145e837cfd1b62c95a22248737f8443a0f888d3fd
SHA25645ae2dd8c898e243c56a1da8932ab9e8aad4617e159c1ededa684d994d30d64e
SHA512fff0ebe4a42fb66fa40dfd176e7936c21b44e0eeeb8af6fb39fe0c4ed3fd4b2d1c3010ab40876d3dbd13e3533e116625df6cd4372ead82861d93de866832c06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df61a4d4aa5b9b292240a637f1973e0a
SHA18dd3278117fdd818266ebdee25cf318336c410e6
SHA2568226ede5429e083dbdf6c1d79bebd1cce1eb05ba30459247acaa48500e128b99
SHA5127be4b2e675d8ce11e7bb0d7f9cd13ad0165dcc434f00ffcba2864eb2a3f4662977e6e1dadfaa42331c6bae491cb1f603d520d42ae9f4fdfa22ef2d106267ef2d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b