Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
2614bf31fdf17b92fcaba24d1d5336f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2614bf31fdf17b92fcaba24d1d5336f6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2614bf31fdf17b92fcaba24d1d5336f6_JaffaCakes118.html
-
Size
21KB
-
MD5
2614bf31fdf17b92fcaba24d1d5336f6
-
SHA1
18e3090824d98f634f34c44c9b706c7ecc2c34e3
-
SHA256
41cb8df5747c45edaf1875fc9c759882e4cd5d28682ab79e9ebe144e2e8b7843
-
SHA512
2a48806b54e46a4448d23eabc77f6262287cf930279d9a433b123accf79a6f0758c72b70fa46b800cc6addc738e7fc521ef38f5e1f0600bc7f3115da8fb09939
-
SSDEEP
384:fzXZXwX9uOBsZKh58+J4JBJtnZVkYe3L6sHnJ+aXQyhyigFPHR:7XZ5OBsZKDinkT3ejaXfoH5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604005ea4cceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cd00307d8d1e5f4bbc62d5ca2bbdcdd200000000020000000000106600000001000020000000b4fed3c43bb850106e6c448f0e49a3cab7140a58d7db6a2c14319701eedfa0a4000000000e80000000020000200000000ed558e6b779bbbc5345aef0aed79ac4c215c0a20f80951ea70e3d56c108c4022000000089ec502983b61d345e084865a0a7b746002e65a0a365adf68b5f89a2867abfa440000000e9e03d6d9d5fc73cd2d2e849528b98d86783f6621e35b2119b866b0006fdf5e55a1c99ce3b4418732c619fe7193f29c892fd9d9d0821e315f98b542e40f87cd0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15644EE1-3A40-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426285107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2120 2500 iexplore.exe 28 PID 2500 wrote to memory of 2120 2500 iexplore.exe 28 PID 2500 wrote to memory of 2120 2500 iexplore.exe 28 PID 2500 wrote to memory of 2120 2500 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2614bf31fdf17b92fcaba24d1d5336f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67b23942b9df87839f1a1f7a2579932
SHA1f42c6e69e0e54af5336872fd2cec9c87975b757d
SHA256e9bbad259588e00f45e88a1477ac552b19eda259c0e3d421b1df18b2876c6987
SHA51267c75cd2daf0456eeed109c3d0cf7ac37f1dee6f7b791d24fc870afa8501700d9acd00f56faca38010b0e421921de96138cd8bb689bdff3b88836d52fcd41cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0a42b808dd2a031f7d6915851cafc7
SHA16de1c940ab1237fe3db8a4018b1e636bd33fb856
SHA2567bbdc91dcaef1f008cd3343a7e790f6daa900118287e85514f6842d2f10cb263
SHA5121345dd1c6d480f510ebedc7e67a64769aeac007287aa3b4b620aa89133b6cd57466d017b0c92da6add0634e438096fd40237f5478fbd89b405232bab541e5b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a6906197a44649a33ea85e66099b9d
SHA1883f3d6ae4ab3080cd2fa0d0b978c1b19966f793
SHA256f70caffcda2f7f8181a1bad3508cbdd6f87b284c5dcd262ecb9e1d54443d064d
SHA5121cc3b3b56d36dfbe0210ec7b3798ff1a1f7ae66feec4eaa7cd7388e617cc66840cf20da4d0e692d260209ab885e5846d45bf49a1cd5ebd8c8c8974d539a6169d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa4c3fdc4492ceadb34f8690c9b45a46
SHA1e105839573731ccc7feaa0461771ded8f0fe9681
SHA2561ffd773a488e4572ad46fc86b2e3f9300eb6f1396f922883846102753ea9af92
SHA5120fbc3fd418e43c8f8bfe89a81ef029fa0a4b642233caac57bcffd2f8d865802f98f18751295224083cd9e624f4f79e5245fe45621cb11885e24ad7a7c20d3f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedd3e01770156f30f3405f2076d9a14
SHA1c4cc50fd386982abb78b10a26d712b9cfbd7e750
SHA256746d12f7dcbefd030a85a652bb94379238594a9e54fac2eb3fb91e1acc8619b7
SHA51207e309f68bce800f75d0403bd90cb8b18c1b04b069834c1970e39319160d168ccca843ba8b0e2b1c5edca444bf05edd83c273c9e848742f3ad0cd28343f44ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a2cdd9ce1201251bedfa4108b09308
SHA16b516244abd0bfcda21a0820455b9825478783b0
SHA25669d70de9b9b3cc2f56ea7ce46abb40aefd370eeaa27cbd493375bf14021e1e7f
SHA512f81e2aa9cec81d84e02b2e9c282ddb33feecf19c2e49c1d459f6f8da323fd2caa25ac903a7fb1e278f6594e55c382920463083757ef07977adc3964ccbb6fbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55433072dfd7285d143e72c54b5918f7a
SHA16f3d8d753e3058a0ae3112d594c1883fa580bac5
SHA256fadff5381d91f6d6483561dae5d35637e80156b2b0f242c3d744f4f7dbd06eb9
SHA51233a18fc04fdeb4f4cb434c060e9c8379d325ea827d49c2a230c692d8ca8f77b357ee8d274a2ab25f07614502f19374bf8da3bd41bd4d7b8486dc039cd6531198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af16bba235c8d6145d05c10c5f84194
SHA13e0753f75fea856612548bc1b1884f91189b32e6
SHA25681742f0d670a4566ed2c44a98548d93436a68d0c1935ff0ae1033e818a7a6eaa
SHA512b0bd4be89b602ee93b3b94d05dbbfff0763733d3e0f68ba53c1e5496e02751d27854bfd732154eddce2689ca312b72d7aec0322fd64e12e4d11eb68fa0636b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45dae6f86cdb95da8acef2de1616cbc
SHA1b84aa848d308c576cb3d227da62641e1744e3064
SHA256610700f7da121789d157f3180342741886939d74618bb8a3293a2aa07bfec87d
SHA512c9ec42f1c04160e9bbb0e902784667517ff34baaac377071e816fbb45c36e0918d4c4ff6e25a1552cc6df90db9ac63518015b95479fd6031b33a7195326ffa34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539c45631f97ffb83d1f4790169cfe99
SHA1bafee636261716f1032560d4f99795b82c89cd06
SHA25637429136fecf6fa8d6d906606352f4100f08a72f063c0bec18c278bc5d5e0ab7
SHA512dbddd7b9552a376c390e8479ddb0cae15f7b7f9e9ade439b0e3c6cc94a91c969bd251df332faa15c427d9990ce24b5152e09cd7b9e2b40093e9e2c71c28de370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663c413183c8db7836aab5751f5f5eee
SHA1d9908bb4bbdd7e933ef1c9acb289d6836a2fe74a
SHA2560afd384988b7e4c0d28c551013b7474007c7ec0b0ff32134ffdd230f3402e6bb
SHA5128e55d0e96c48c21d289cf5b77f448ff2c93511318e7a86502e1257f473a37a84051366953517966c4629f508074191f05e1e3e033fa5964b217370425628f387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcb744ea6e1872d477e249b580d8574
SHA1dd82cade03c9644c141062aef8cfe27e9853dc4b
SHA2565ab748898246692172d19decd0c219ce7ef2c307c481bd4309e8284e50364ff6
SHA512339eff74da6cf6d91785499fa46bff920c6529f661bd51c0eb26ab68e2358545ea17ab09723b5a7c64d91233cef2bf0b23f4c49f2c93c593f4341a391f5f3ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560dbc78e8b07ec0b896b7c9cd34b55e
SHA15ed59a44ad99661930d0cd0e0e0837f3276cf181
SHA256adf502a9ec23e205c4fb6aa9a03f8a3c1b0572786b647a7a9dccf32e79a2db04
SHA5127739031110fd9e34ee00bcc3ab08bf61e2605f0a5122b2b66a3af65a276825f8b666de659cc33871308f245e920aa2a3ac0dceac0ddd5926d7b8cbac99bf4d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558018a43971c786874125ce2324be6ea
SHA14237823770a551b9799038d2c9114c185cdfa248
SHA2560d65553fb7833f54d5a0757115c399c92799815cc0bcb890ccd622888a0cdbd3
SHA5120f53e8519fd8c6314eb4a18f18858ead717ec9164ff0ec5faff5fbc4e4aebbd034782a7548b9fcc45ad70a53cb3782c6f5d9b69799d5ce440b524c2edab20aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3815a62d51555982357ef61320a1a7
SHA1216f5c9f2a56b9e163f98f48c2ab44a4d85b4c8c
SHA256ff2ec9a91ce0ff6df2920d375852c355b8786cdaefa1a2e1b9776f660cba4f6a
SHA5129e821cdf8e7de188fe0ce888e00900346f3499bcbea9177b20ed7b9d42e512e0ffae39091cbd36be480479bb3b77171093b34e7a1589af8b4d5a5cbf31f672b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57659ec1a96e22ddf5e73372718af52ca
SHA150dae9362e55ea1d64b92758cb3f2fc9cc17bdf0
SHA25632b2a50d9eb2837e4e1d441f9c83ffd6c4a2294464c6afbcbe3adcca27f8c19e
SHA51286f32c1e29ffa0443cc3354dcc2af04eccd3bac7d5e8771bf7abb35efe8b7aaf0da765f9bd8a71fe07f4ccb63c794919b71d073b307ab5c577c4cb05acf534a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526462490cf5a2cb910b0939aca12968a
SHA11e4d8ef3a73c62c4e64fa728b6e402653eaca650
SHA25679a5545db81aafbe9fac9dd3c2a4af39c9db74ac73bffee4cf5a42b286df41d5
SHA512000bde64a3081c9e56a644e8bd2348b1a1f2628a55de15a6c3f4fed1f07c5eabd46f23d4afc25368619821251a8877f0c3f7ae266bf37c1303beda584e236b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bc3f7f7fb8332253d2ff4a543b1a87
SHA1a40870c5127a2513b2ec89f00c59df395e58821e
SHA25630102def938482bfd8e4f371a00403fdd1eb33d12af21e9756bbe92f58c81b5a
SHA512d07b91203b8643afe0b0917f28c5dc6a9f33224ceb94551350c5fa43069010cedc2fb1f848624f7ff0e4e13f83d6ace3ec36cf0e30c712c23823f4852d1c5765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec714b10e694efb4cbf812297f87efd
SHA1766a7afa294446d3646ddd6f026c516f2e039adf
SHA25692b02b92fef82ec8f6935ed1192713b7d513991b5386d929e97342d2375bbbfc
SHA51274bdf10f03fbd7582a6bf8112e7c31807403da6134f550dafd6b62c0021796a3bef3008d9d7c2d522aa278c6add7125bbb3e2c13e5bc7f5f4ec7c8d6dcd155bb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b