Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
1a0dff51dfffaf2458d2f1cb310bf7fb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1a0dff51dfffaf2458d2f1cb310bf7fb_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1a0dff51dfffaf2458d2f1cb310bf7fb_JaffaCakes118.html
-
Size
6KB
-
MD5
1a0dff51dfffaf2458d2f1cb310bf7fb
-
SHA1
4c20f5eeb25388548202bd3fcf8bbe7f7c731ea1
-
SHA256
981207f2aa958ec37f7e67f484cd66e721d1ed3986a9a239706ed48ae2434fb9
-
SHA512
942b16b3cc948cd6e0c0fcf1b7dcd11d1c6fdf5c3c04da1bc1268ff8efb24f9773360540114d4b34840b767d60761171305ea61007ed60ef3018f34190a880d8
-
SSDEEP
96:uzVs+ux7rELLY1k9o84d12ef7CSTUp3cEZ7ru7f:csz7rEAYS/Ib76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503d3dc353c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425738290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE42D191-3546-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e7872fb23df12f1991cec5fffb8f9eae93fb54b891687f14cace78d0b313b7de000000000e80000000020000200000003e7f021e926d2572457cf17e96480788b4376867b87f2162fec54e086aaad3d3200000000a9c1f3319b6ea25e6d6226ec1e0d71c951197e64da92c2d00c829982ce496b140000000a80eeaad22f30d0aebb0949e21e927d773bdfc9cfa9062c67f0d088d3421a7605c18a00040d4aa0dbbab2f095f68416eb416d2c355d5621416de0db26279bc77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1a0dff51dfffaf2458d2f1cb310bf7fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530afe1a3c3cbe8032e1670a9940b20b1
SHA194c0cc6648743cd081f7bb964b53e9fd9181628e
SHA25639d1143c6fafcabec6120a381f7cde4b8b7608915742a9e3fef6979bea241066
SHA5120a8f9cf06d9124d2403c6ea0f5aae048c1d74130c941c6c9a24f95393f82bbf02347e7f7f600c63ccf33fe0b07ea9daea3eab87f0a8130518c54cea7e1768f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28a2e43e05a2cc66e83cee46a6f55af
SHA1dc9b103d210c843137c0d407c689691533baadac
SHA2565e6c7f322fc9a23b9968a1de9d4a52d0a4198cc050aeb887337dc69f3eff2c0a
SHA5121d89e1c08ae3cbf48fb4280efd821f4cb30c6712f299f7468566325e2ad793fbe71c5e9df7ea47b7706ab3dd1901e00400d5a20f8116fcdd7585235bcd846570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd1ab03cbdb6e2d71ef857cca5c70c1
SHA1a86447ba79c4925d2c090452d39bd93e565b6471
SHA2560269fe1a4f9e671cbab3b36947b3904d7f6b50a533e1014cd2f43aa48e1fa292
SHA51204ea9514eee97f77e1dc250dce3e753ac9e0a297c2e7f43ca5f2bc1fd259f3013c48db1f32c407bea3267825fc7b122b53897aed5f0681d047945d6ffaf352c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597e6ea804a2eb66a4ba1c649ef7365d
SHA138772cdc6da19966b15d290dbfa4e7296d3336c9
SHA2562628b7f684d667d04f21e2502997ed0e5da24d4496ad79bd6a30871bff03fde4
SHA5121c35c50e6f20dcf8ef2d7e498d4c424e247e8a8e74b5ceb7ddfee7efd18046fda541306b179016076f4e36ec315a2eedff1fd32b6610f8c72927e3174c6a7303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59075ffec0d5aa52f1f7f9ba0acb81f67
SHA15dd8a9eb961a37ea9fc122fe9498f5f5fa33fa48
SHA256631e9ff86e90defa412a86f5e89e16a9f88c800843638c83a676b4ee111f4790
SHA512ceaae2fe5e79a121c1e608c23a4261722e7a98c75a38e9cecdf20c4f2f404176d15aa810a5376daec218ebd2737f2cacd424ea8e05bc8865018f698235b57f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7e5c4bf93cae588622b726387dc7fa
SHA13a1a7411beadeb3a55e527064b9bf17c53cc25ec
SHA2568aaade30d3c730f1e998ef72ad84b4c15151dbf1c667ad5a448df08f8c9f2506
SHA5122a06c440c775cbf1bf52d4154ede1a9d286cdbdadfc81dee0641ca62e3ba9d07a95e25f897df0fade7dfb025a7a6727005abc1576c1e4982dd49bb95c01bf01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a61158fc56b2d07572df60621ac547
SHA1ca5ee739a860768558590eae7ccdd3455fcb8d0a
SHA25659949727990cf2d500554e53f7e00e733ff055492b809fdc0062e54f2b029759
SHA5123a46cacfb621ed0edacaf834b96082515b6ee3b3b8492dc10dfc430a8a1e947cfc7aec3f607b94b4396d83b1cd9c203635e861aa5a51c74b2c069f0d1492b4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f72c1e81e9de632aa7ffd1f5143751
SHA1712da7f08bb148ab0218239f7e10f3a43bf812d4
SHA256cdebb5c16520dc7a2c0fb364f705945e88089f889e8637eb78b542c897dae213
SHA51236e08dad200528511f596731f9e7dbcaca05e33b27bfe25fa265a824d73019db4c94545e2fa318817d15a1989087ac6f0bebc9fab88a13d8cc2aa0fa2ede51b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b27d4520a2e0d053f7e6e956462146
SHA14973c547991c9f3c639ed1bb8be6918e4b353e16
SHA2569517bcce164dd5da412db166417e9cf09d4640c6cf30113b5d63d49fc6d50de3
SHA5121401d24e22875f7c9fbcc9f73b8e171bcea487347b0511f77a1ab705fff78fed46aaab4f8a24798c51994b2d8579e53bc91640f894e996f9a77b11c88d045380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5ccf11ba3bb8ae4ce4aca4477f5417
SHA1a4baa0110a27ec86b32cd2b5299a579ebd88ef95
SHA25649181d5ec134846bdbbceeb3cd800e3b0f803ac136824d619f40bd60e6b14670
SHA5127344133e66e3548a3efc4d30b84e88e707bfc30c6e9e8efd55bcb8de24d8c4e7f898738f69fe5d9308ee2c0470288c5132e67ee86a6dceb713fc19189531fe59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06d762899b2c6670b00e952a0cec8a0
SHA10a423947a6f6756c7c039495333de4287225d0eb
SHA2565a58137d6751057cbc723ec41616de351a30b661916abeb065a13cdfaafea4e7
SHA51284a1aa357228cf4e52d681ab82ec5682d54ff761ba4ed79ed724fc0a4b5b40c9b49bd46ee88030c1d82f98f8085b6f7dfc010c30a78153b1e93354b88ea8439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ec31f06b7b66ae871c547d931edb87
SHA1ff56b7408f761fc9166baf8aff6490dea74d3c63
SHA25659b71d0b123f48ba1796f823f26eddfca509c6dc0905afd33d1c87c81d96759b
SHA5127e064413a2d3745261241f19ec2fda5160520cdfafeac0c3a701d727d37e43f4b8bd19b617364c5545a2733ece390fa7267fac9b1f2f576cee4ae2073a9ade48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0af3f13ed2818fa04d23ba7143acef0
SHA1f8dd592b42ce93b13f58f775d94611dc2a4a0fae
SHA25637a454ec73263a7edca75626dae0146d18890e4844f083fc4bf2a9d7fb494629
SHA51212a5d8f865caa5c801536c921a8463c851975d03f45594ed51e3ec0d72a10ca891b0ab0aff522e1386780dfff8ec9dfe0366603e51cd037de8e84a4d63fd7c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1530005429f4043c468b318af125eb
SHA14281a3e86fd5ced8470a47088741c81086025394
SHA25668cf81aafab4cd4f632b5948bee3706ff8f2ea9b74ed31d22b6838fe9f3d3948
SHA5122688c9dbe8183fbec71f0ce16e20ba733310e812cc54cf6a96c27e1bb850ef14f8256e82ba9ea67c97320595d804d8f84cc8bda500dc0adf754eeb2e5d77ff94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51245d82e4c33c7e89bac949d5191ffa1
SHA1ba64e7174a0da9ab02d38c0a97c0dd2c0130e14e
SHA2567b03061f39c054afb9056687f3b4456a2e2d50a0dd896a3e227b20141141fea1
SHA512eaae0c4d2f4fbf25550a8f129a58fa51b2533d851cda182043c745e5bf5a47730e8ca8c2f02c5d3587fe4bdb421a0eff1ba21f943b3c5aa33353e592af201d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109790a5e696dc02f3a2fc2be8cd626a
SHA1ad14490afc2de4319b3688cf63b0e40f8b0b25c7
SHA2561ea3ce709353bdaec7bb5b34d0b49fe6b861d92a5de9a2b11a547cb99ec9e9bd
SHA512840ac59238f3b91ee58b3b5b317f8c9d43b816e0b1e42a3e2c93980f28cc287df085c89a633ba09eb846b5e6a617d653ca7f8d3fc42827f73177f828111cf9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e094e178a63e0f94e2929bd8fa7418
SHA129aeca41ade7faadfc34d63fe352278a40c42a4e
SHA25653b55e426b5d19810c86ef8ba06509626d4652b01430f88b173fbccf919d2bfd
SHA512144e374df76ddc0d025efec46e1d6f27865af2e0db9ec95b231d856614b9d45e1b596905578c3daf2757aaf2331e4af5f246134ab3f4af163ac9dfb65e92d3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c39a7176db5e295a7979bb4e7a0453a
SHA16c8c0f32f73aedfe2b0ec0b1c68df8b95e1918e7
SHA2564bb629242655316a2cbedbecabbd79a549fa486dae0e8823eb82df8f5a9a4000
SHA512b7234573dd6ce0edab19805e38f530a60520a370fe010b8154e6cd823afd44b5ee65c4c7140b1b19c335af95dd92d56957ce2e21fab7adf817225a44fd7c279c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5fa39436da9f9e47e6df58a2808191
SHA1f6b20e839ecdc137d4ee4c04577d654ebc722c85
SHA256d90241e30e9b5198ec63108ef0e7d6072337cfc253ee2d70ffc4e22c1d1b002e
SHA512882d7bf4ebab6eb3912daa6c2f54eaa9ed75b9e19067d81311012cc03d88cb3b3d43dbef038333dc3be3e1a589b49dfb667aacbc3997bc485b67197460ed023e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b