Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
375fe8ccbeaa6f69111bb0df22eaf88c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
375fe8ccbeaa6f69111bb0df22eaf88c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
375fe8ccbeaa6f69111bb0df22eaf88c_JaffaCakes118.html
-
Size
58KB
-
MD5
375fe8ccbeaa6f69111bb0df22eaf88c
-
SHA1
6aeb1508f0db1b080694e7aebded38ac0b62d9b1
-
SHA256
cc55e3898ff85ec5695e8960168dccc0d9a20fd7420cacbdf79ca78516d8a462
-
SHA512
a032f1e69c42a8a2a1083b9e733a0721f0636bbd42ec3981ca2bedfcaf11527b252d91f8306a097106bcc02838f0da69cbe4427cdb3379f737a4846638319d57
-
SSDEEP
1536:gQZBCCOdlJgoxwWe5dZhbIhupoUhSzdh1j0IxCgcTF2OhqTqJXfR14ArCF8mfsfN:gk2x0Ix/0Yx+OyhOXY0nBD4LJjBEE4D8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8573E01-3F2D-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e70b1d64e7e1d342e81d51601a4765d24da5bb7e9777de650922a73ea4e8a1cf000000000e8000000002000020000000e36a0161d88e14e0c90f65addb361b6ac8f4e6e98a2702ce84b24f13d89c016820000000a19c0a5fc47b76bd257cad776a59705ae5c6a463c7e7913390a955209c4df4ed40000000fc26349465c1bac890105db097e4ed0d94ad3bfc89a13dc8cb2aa8d1b4dbf8446dff19878d92d81e4c89c9178a5907e1e60f5373b9f32e42734675f3096d1ab6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426827082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e069b0cf3ad3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\375fe8ccbeaa6f69111bb0df22eaf88c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbed9cd7f5d4ae311843f22cdfa9c99
SHA16a50227902a2787771131c5e398bcb239a971e27
SHA256a58edf3869093f00e3da9acef56f4a1947b77d30cacba9725dcf4982ecffe200
SHA5128610b35b8d99c7cec40114ddcaf7724090dd0e515085de18e1f23b917863d77bd2b49501ac41388f26acc596daa544e532e1bb7d7f676b41fc19afed8d94877a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b13ab7bb5b2d76304cb285c3e639977
SHA181af31c741291ce7e5eff571bfc791ac948828b7
SHA2562b32ee348446fa66e4b0915f4ad5e0103fd54829b44cda194294b0f2b74edeae
SHA51274f56aced4415d2a6d8c263b663cb1840b491b9199fa4855409929948d1f109623c3e89f62ae74a86d183186847faa9925fd99cf77dd76ee3a8db4001ba11616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa9faa19b0659d5c600caaa79f00c05
SHA1eb903f86edc747335a19d4179948def3fdaee448
SHA256ce3c6791bf2c5686cfa409d2bb81e3cbc451a6fbc8d8b54b6571d9cdae7527f5
SHA51221f1a8293e754fa80a3d6c9e4e40551cda61bb40936fe15e07eddb0861d1a49ae5ec72bad2864cfa653079e022675750b2c41f84f896d937a5f35080fc6447cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c32b691136eab64d8553c23decaf0b
SHA1266bc06998ec1227fb32cf5956ac45dd00cf9d3a
SHA25645d340d9946e12228fc2c30da02a21b75470bdbd817c7c72de9200225b16a89f
SHA512dbb5323f00461b3141d1d005ad2e9d3bb07e8d5568f27b10d248c03774cba92f73c3025fa295acf00c33d1a0b6031da79b4b5e3c6949ce81e146e53454c74abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f41a70968febac103188c36c17ffeb5
SHA1bfc9f12aa1455c86cd044c8335f81d9d659e4bd5
SHA256834ce98310117bdfaca432e053d935f2bf87c97b8aa2403cfe1a4b3d2791b354
SHA512885926b83b16e9f7860ff4d1d5c8a62e8e56d6a87b5213188e8f8d1177e8e458e9921591984897b9470ebcbc722bb83206d0ebd002729d85c01d694da1156a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ebb35213b0234347026a09cea66611
SHA16c40c4042f7ca40717a5ab21759b0dba5bd64686
SHA2569f399d4876be89db7183ce5ccc00c81d803ac07baeb85e15fddabbe3abf19c11
SHA51205efb06e47f98707de46b6a43f8897e955163ae0520292809312b8812f98c8799cff9e62cf22baa2f05ba8a8d6621e8587d7b7707b7fc344d40936bf3c6bc1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7dcfa77e8809de69a3a98736884be8
SHA1d8e8094edbedb8063e5dd1c75caf210b01264c75
SHA2569e82573df4d335372f339298649d306cb92d86d02afa8ba69a5e05011f9174f8
SHA51229d3e30f1500a30293512cfe924c41f68a309951d76811368b94496d9bd9452383018192abaf5e50a25ea6d7f7b6db784fa99c91b6a881507879f8138f5644dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba58c57823b2fe4287e30d23e71ad0f2
SHA1aea4839038ac37b35c0f54901b6cb7c62ab877bd
SHA256a122ba4762faefdba45a276ddccf1e5472d432c667ab9c901a0e9caa66534237
SHA5122c1bbf6451d0ab00572119c2a137dcd55ef6865c4df7bb33a8e0b28501af04dfd4fe4a9c13c249dd61fcca0632994ea26cc041e001a30940b33f0fcb8cdfebf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d418fa68c56d9dee5f7ac43841e14dbf
SHA1205bf6faae96ca570d3055b84e22f28c1c134cc2
SHA2565f2eee4e2a988b1bb13e3c162cdf827e258452cbee056de076ae7fbe81ac488c
SHA512ed8da08b205b5c9877af642048533b7dc0e467a22b20eac2328798555b3ac1c6a519c4a4590b74b91cfacc50f114c03bed6869efbf4811a1666d0913498282ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5caf2f1642bd474acf64c1d3e8fd06
SHA1d7f953d40934f697efc5e763ca58c66f3a12f1e4
SHA2565c4a497f7d1999c7a01188d6ccccb57689f6ae81d3eaf7af3a0c805b4a244e18
SHA5124a08f22623ef7511e47f52edc8ac2bf023b71208c9635c88fbd9dc7153d6c1e75ab2d9312ef4ffa413751b8bc610bd11e8fd10e358fe3d28da73221949752ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e9497fe9127069d64a8583f6b44538
SHA1c6bca1e11b3031456af3ff34448722ed0a1d6ecf
SHA256e7d2c0146c75c578881cd06255b5b50c16b4e7657cc991e90ccae9cb6d3f92cd
SHA5129b5e2b5056f44473a797a081a43cf08131301a829caa928918a9f7f07fd72fc2252584ad27e502a42ee9c492b8421ca427e645486eb3236caad9f2cae0e0f534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e374a65e15fe8ed4d5288eaa907d2aa
SHA1b2d1e97c6b2e13d51961eba07cb0315da6b76a7e
SHA25621820fe6fb57b83ec3257eb417fc9ad8775e1fd5ee3650f6e91f1d26836c352d
SHA512707c5b66ffd8084647ebe29b9df8320af04c408924076114e8cc222d2073bda794f66fdb56144601a3368534b874c8ddbe2cba33b4db00598cc3a32c078c7248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39b4d5b70f2a06286fc3d48b05392fe
SHA19a1441577ff45ed4002baf9cd56b17eee3125885
SHA256e40f41d4446987ebc93b3365af57cd57a0c9c3d128144274315c8711c4a5af43
SHA5127b1ce743d8bd285247aebb815c70c31e103c45ca5b2e48c956a505232ddee521202a663adc886e1588ca766bc6be0e4543967bcd1d03c1007a60e4486bfbaf25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffcd47312754e67d922669b159bf3c9
SHA1b19d7dd41b00eb5280900c24dd18f8dd7ccb97f3
SHA25666ffb503432f1da20830c6ea7ce5d99e9731902f256a9747250082d58f4fc1d3
SHA512529872901dfb855f999573ad5648d7e7302e175b06a0436c23dd5b07013ec3809eb3a2496c5169ab2435d793c3612785160e898013868e9c706b55acfd1d04c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c93cec27e4a8b483cfb7c0a255c87f9
SHA18fff615c14c4fc6d32467f3e8d739a597bd89e09
SHA256d6a45fd3a2da71162c6788b4904395a845fc9c614871ed673fb66142512ba8b3
SHA512eadc140d52ac4dc8c4d85254178416bd6a1b861b6bbf3d19479047a9ea612325ea1e6f87c3cd1a2ce6f8de8b5b93659a1b71ca02fa909ceb02940fc402a53994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba0616d040257dbdeff8376b8414ec6
SHA1c3646f7cb46aa33312762c398b6c3edeba4a31b5
SHA25635524de53e4f6061758d6fbdc2f36d2f19ed6f6b3407eca8cf77aafcd16764bd
SHA51276cfbf2c7849dd49a0193656c596567ef9af8f90187947ef33dfff86a616e0a7a6bb545e28eeb42ce3c02cc52707acc819bee123e0d73bb9b02b6c050b0cd6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916b8c34efc38c01817466fe371b80dd
SHA18047ad6b189268023a92b315ca40255f2f0ca9ae
SHA2566b12b22a90ffe78c620643761d1fdc17559a81846265bfaa23cdf4d7efde355a
SHA512e8309044849c9ea86bca389292932399fd5647835e81d80da05c1a33550501f0859cebc0dd6efd16b831432dbd667a4d4b63528a16bf45ef6f1c23f224458c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142d62b91d674a6f9758bff83a253227
SHA17dc54efa11aa08d6f09f18875cf5e85e70404da1
SHA2562da2608599edd4324abc916c4ff2c9d3ed3157b4f6a73cb19cc2176bba6cc694
SHA512a0235a04f7b4d5e39c3bae04c32ed34960aed76e62c536f9200d3115fdeeb2f64cfb563807b45506380e768fc4d9a5db48b97e926478691ccf6a79b1ae45d26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7052c6f03f28680ee0454098f2b627
SHA1f280dd69e673f823349cc324cd4dfb0c87e13c2f
SHA2561270674259e4b0fc355f7d88f77e78447e917a08d534774f068f0e27eaa988e3
SHA512f825fa95aee609596c8836a618eb0ec2a795c8b1b31ebc966a69671a885e155efed46706ef3b06b26c7aaafe226a399474f16e0d7d6a2d726ffa58afee8b20e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b