Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
2ddf6ae7c6857679c4c0beaa69d9b1d3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ddf6ae7c6857679c4c0beaa69d9b1d3_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ddf6ae7c6857679c4c0beaa69d9b1d3_JaffaCakes118.html
-
Size
6KB
-
MD5
2ddf6ae7c6857679c4c0beaa69d9b1d3
-
SHA1
500aefb37a14a3890a1d44250197066559506758
-
SHA256
1a6421434c99f4c50643804fb4a3ca5af32dddd44712c7e8574473d26a5c68b3
-
SHA512
929fdf6df15ffada6ecb2e33884801f5a0c50c3e17e9eeb7a3785a4e7da35fadb0cb3ad4ba521c3360c7bbb0d647e345806fa176fe71d6eec11ef33d1f8570a2
-
SSDEEP
96:uzVs+ux7xHLLY1k9o84d12ef7CSTUSZcEZ7ru7f:csz7xHAYS/Rb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b0000000002000000000010660000000100002000000004f47c4c2b94d6ea402de1f94f97d1f899722b4830a7edcc4d17b8029683b45e000000000e8000000002000020000000e24e954319fc21705ebc92f260433999a469a297d0cd53557a854e84016c62b0200000001ae699c5cd2370d2864bdba9eac2c0459935480cec01e0c9531dbb6d960424cc400000003de855c9632e1190c620dfaf4e2369f67b2359f43d105aa24a5c80c96a2a144cc8d738a80c0221c80278b8a82ddb8c96e58cb66479e00be9887821c79e6377ea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c070d685b5d1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426659888" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0E3E4A1-3DA8-11EF-9337-EA452A02DA21} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2788 3048 iexplore.exe 30 PID 3048 wrote to memory of 2788 3048 iexplore.exe 30 PID 3048 wrote to memory of 2788 3048 iexplore.exe 30 PID 3048 wrote to memory of 2788 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ddf6ae7c6857679c4c0beaa69d9b1d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4dd0e03aabaab076b753380de8306a
SHA19c7e088cd97851944eb81b9c9c1dea07492f9c74
SHA25606c388407e0213b88fa03310032dce43e77fc0635d0cd3e7dcfa31daa3294c16
SHA5123653fd1f4084fbefda619c1d7f4645608026feb1f4d4efc74316844236b086e58019b8f664013da85901991380768cba166aaf6d2576455f5d95746c0dd55d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2becc3b6566459aa79cd65c74aa601
SHA1f73363771f50f0aeb9740bff2c29466a24cbd903
SHA256f11956221a708e01bcea0625cbb3d25a638c1519bc58a096634a3baadea1ba7d
SHA5122b298be1dff4837f85bc6de733c630a1c94d81bcdef97c95480a98b4263bf606e6abc5f5f85c72ddb854048d4ed6bdc75203c7e3f2f18e202acc1f07f9999cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d57758113269cf3854b0b8555efb94e
SHA1519172c52ceebf933c6e032e9042a564bfeea075
SHA256dde188a40c65df63282b827899cfc5748d2e969640f06ab9cb2efe79f28dcabc
SHA5122ca32bda3cd8f672ffb2387539137c70416038c9ac80edf3a6796fa822acbfd46db06329a08a07b23bf66dc7758d51f69e69c27ce100863ff93e71d1bb819a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552525921beea72a6f455840bd7fc2d57
SHA1c3f8d8c196affbfb1dd71e385c8fb6277a3e5328
SHA256c063a3226d9f4702eb94d3f0153726d5ab3183bf05cf04bed4ef761c52bcfcb4
SHA512100966763737ff6a8af9bf72bdcdf7729072732f4ad3aec86eaca93b3e79d8561f4e407b180b8da25e5a9ff662030e33be64daf0eaea2c4ba93a69ebdd65fc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50650e00418bf93ed41626255d3667e73
SHA112e4e2c146d9c091e9a0f174fff82d717a9276c9
SHA256aa325573cb69e567c6290f7f210e64e06f429a4d190e4a98f8e76ae9d77d134f
SHA512dae0606d682fecba5fbb0bec8697bf382feaacbdfb6058dcd6253489c5cde9e05a8776655fc5d2e6d001a20348e526d8bfd709fd9a9aed69acb32820927fc6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f55989658f382e5f60874c0e36b8ed
SHA1365a17bfe8d7b57f8dce242c96cc7ce4785ab059
SHA256ef4394a5c69686e8ae2491b24cd14da6356fe1683e81325e35e49112dc3ba0a0
SHA5126b3b11f534ca4923f5894d24d0c4e317b932f8e8d974bbe4b158781aff71fff381367e0f8d0906303751f16b5bbe8aa543b6f4140f120a9b0daf8887ca049b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd325b225d600f7575325c946a2bc29
SHA15b996239a5eeaa331889e86180b868d8f8c68fd3
SHA25601b87a427513e91f559cc9689df6ee3cb640e5d4fd46f4b528d7d896a41d4012
SHA51288d53b12d9f805bec20c6df0d0786dca3a6b12b892cb7384b8082c57ab8ff94fb4e1e160a1e081beb062c37f7ce56b968abfbbd7c43a3cc8f1cc88268de00806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbab2d4adfdee1a767e5317a9b10b76
SHA12a658e445ca159ebfe004ea423869bb524b1425d
SHA25670e984abceb7d2a5016d8e4581840b27116220a14cb20f93c371ef85f5b37072
SHA512acf5863690ba40850bad239a1ac5b4638d41c8e439d0bcea418014a462c7c480c7dd4bc6b83ee6973fb05634ada06518b0920ae44725bac1476691f8b886d524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5fde2474a27cc08bab96e70ced796f
SHA1d9f206071bae2900e4ffe76f522f94f98da5e94c
SHA256a8314a78fd7bc494e7bc9063b77b84dfe140a63932dfb494378ee4aa346b4297
SHA512999e2a480bf26e4722ea7c8a91f2e76d70cb4b5e08e543b3af09f7302e0e7f544e55a9436d31f3b95873a23e26e64ac53135c5f418ede7cf6721ee3d64d4ea61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971e15cc470a4372f09a6e48ca7ab97f
SHA1faf97c24443b225c0acf1b91c2fb37482dde3f9f
SHA256be05c137186e0a38218ee2188aaa29d31bd36713cfdcb86514fd9c7b4f273155
SHA512cf813a1b78f7dc069b76dcd80c718d723328456a72435c33d5f1c7ce44e21d47a698314fd91c9169e5bd1cf89c043d765c23b63a85c4ff10bbadb6ad1eb34b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc0b9678a1802a0ed579dd44c54e94e
SHA146f657c98a3d4a25d5bcb4da829d10cedf5f24bd
SHA256b20f672a181b46a609b8ecfdc637fc7d751079bbc9480bfc0845b5e93dd0139f
SHA51241539b5f9153ea042ccc7d8a150c67f3809dc897846e5348838c40b568ce852cd5a7b1861ed628993144880d44a26c9975c4725f116e0a69b11b055d9be06f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa93369b46d63a8da4fe1f25225be3e8
SHA154ea58b34003a7dd3bc306f2cf37e4889e88d9cc
SHA2568a8af97e1d4ee521bcb889e0d018fdd72226277bbe0903fc7c83d978e3282df0
SHA512ebfecedb108d88ed83d8a661bd068e88c5169b8aa3ee27fd860bb0e9be03242632e2be45a5b42030f5455e4d38a40fa17ff61010cb2562104a97042f312106ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783e6df493f8032207319c36d851c4a2
SHA1f8b1637aa57d66506afa210ab01c14b3c7ddbeec
SHA2569463bcdda7ecbe7aa6e87ac73db69e93209666ca9b5554d851b27840a43dadc7
SHA5121e6ba810d2430689809fcb9ca20f0313742acadfa0a207cb8870938c2d57ccf4d0d26befe58238b7e0bc5e46a113856ef29918dc8587001da97eca53425ccef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58551f062e2d9de173ee8212082e8bec7
SHA18280081858415c7d5bf91e529e19fee398dc0a3c
SHA256f2fa28d38a875e2a292f25eff409697c1aa3778cf0fe02ab460e5f39ebce38cf
SHA51242d618b14f37e766aabeb1c306f429803a5531963137915f74057c3ce0ff4befa8d9806441be5c43ea57c7618651751b3a74f58f2b91ec7987d38709d89d5a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53423d785024725ba30bcfe0b0048e64c
SHA1103534bd8afec2b82b3b4256a4aec2e9d1245c1a
SHA256b5583b2485b6451f698744b01f95e8918078c550452a89f36ac3ff4c7bfd3422
SHA512856a80414e3a44e1d5fece471618566af828823c992b6601f8f819e7ebd4c114d39d07727ad5097943ffb0c3aeeb2ed8e5fc0215e4563494ade996adf0340014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adbbe17ab6b5e8dc8cdf6b534662608
SHA14b987267a7bf320d1fc87d3502b6284fa063f66e
SHA2565a0d71a94a2043eeae24f23013054ec7d2e2c2e868a27ceb5a6766c0d5c06500
SHA512e8821107dae26773f00435024bd83df170b1e25d00c5317d20f0c98d91f0a393eb5bd5b0425be1c47f64f05d67b01b9543d3e81052de8c30abfd29072eba7b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814a0b3f1d34bd64451fcdff805e04ea
SHA102ab5fe7ecc6283a361b3dd3174c7836bfb09d07
SHA256d2b3a44eefff2786dd4bad295710f890c2d9ff0a22e98cab0e0f55b25908c789
SHA51298dffd43f7f2a8da019b5601441c7df37921f0fd0bd5b7312cc145e2e92e8fc9cb77f97658a986168e339a0cbce8b1e51213a79048ab464380adf5315ede5bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6d8fc23245c4daee15c4d31ab6fe5e
SHA14b9026363bb3fe2d205d45307097a11fa60f29ce
SHA2564252ee0d8d0fac6b3f80c9d7c6b4b45cb384bb18b403d54f67660e02149a1ccf
SHA512df0e06094a19d3840aed86c704cc85db97efbaad6dfa9312d4372c4d6f09ad98bc502c2ca7ef99468ea9705ea94cc4512579345fd77d00e3a04a8dfb8f67d09c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b