Analysis
-
max time kernel
89s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
44de71d40c62e75344d8aaaaf44ff7e8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44de71d40c62e75344d8aaaaf44ff7e8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44de71d40c62e75344d8aaaaf44ff7e8_JaffaCakes118.html
-
Size
53KB
-
MD5
44de71d40c62e75344d8aaaaf44ff7e8
-
SHA1
d1922876fe4476fcfbc8a42a8bb509efbdfc54c0
-
SHA256
1a82fbfee3cf07200120e7265c1064184a4c9bfcff67c5978f0647be2fe9b494
-
SHA512
482bdf39b3db29251eb3b12054b5eb14a988746aa95719577a353e55e185b89f43138366a76c4cbd7afcf999ed5be610bbe4d8a28e6879e274893f1017de940d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUHrunlYV63Nj+q5VyvR0w2AzTICbbTom/t9M/dNwIUTDmDU:CkgUiIakTqGivi+PyUHrunlYV63Nj+q8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADF1C5B1-41B2-11EF-9143-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427103989" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007a749d8a87f1ec9c66f00326b789229ada278d0289f5e809912f3601388da859000000000e80000000020000200000006d29cb9314e843314c810dc39f7d7d030245aeea1caabb4dd8823092fc39bbfd200000000971b64dd697eb248b3ed4fb790e260fa0103c3e6503fa5a62bc177bcbd98e18400000009ed7466403a54bd33baeae48c7c1b51ce7a4a5a20bd885ac6c77cf9becf21521b7da681cd629b43c0e9492be1b7e238fc0eb3d54c9d20279ceab670cb19756fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d41091bfd5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2328 2120 iexplore.exe 29 PID 2120 wrote to memory of 2328 2120 iexplore.exe 29 PID 2120 wrote to memory of 2328 2120 iexplore.exe 29 PID 2120 wrote to memory of 2328 2120 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44de71d40c62e75344d8aaaaf44ff7e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d434c2250e737ce74627efbe80dbd6
SHA1d4272cdc5ee5c927197cd87203cd3521be3acbea
SHA25645848b6ea46ec7c8527f4330a70d0cd07182258ccdee43f604e4d5e056d85a78
SHA512345b3d20ac8f17373e5d1265653846a59028f4ea9cf5b68782873de5d34072658a537ef27c58128d31214bf92bdbb6cf60233304431a96d58775472fbef26615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1878f0fd288ba8ba0e5ecf68de92102
SHA1ce33d1d084258839f5c14ab90891f66c355e10ac
SHA256d94ab516a2b52ba2087fd87b253296516034b2868ca5297db5afda88f3577efd
SHA512d59a14c95bea886470dea2795485a02bbd9373b3f5a7ba3e8cf723da17dc49113aae7857ed4e03350b6d3ec40b54363dfb0e9b65f6339e5454163643827fcec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1f34d8a2f6cf96fdb94ff2497aa932
SHA1786ebc1402a93eddf8c5beba94f4b881ad59c20a
SHA256eb5ee80a88fb3e550c07017bcb78f1354240d9071f7cf0b01f7d0982b2d1b9a6
SHA51232b048c5477e4fc210367564dbab54df7976337557a9f4cbc616a81914e11793fb48fa51832634876d8243e4964cfcd5f10b424d1ec0ac742e4d59e15e2a09e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200beb2c0ebec141eb1807361eb6a935
SHA1b3ff18682cbf4cd3df5493a920b021d3f5b4a82c
SHA256ba3c86bd866624f6497dcb071e520cac2b5c155d1e9835de90545276ab523fd8
SHA512498e615b3cc068a7006dfb4b6b702a5975c4cd4fed57c5cfacd83bc3e2053dbdbac9e375fd6f217fe38fdc15bf183f9954f9b5503c14e22c17cc42fd20dc936c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347daa80e6f96265db1da5c622942a5f
SHA14daea521e206ad4c8f8c341c58e71c2c3aa8908a
SHA256c6b06029c6b3e8773eab0d24b4caa8c27b881f562843dcb452152776b83fbbdf
SHA512eb56ddad5663b80ce776a5715e73b29b24d520f9968c9057539c81e62d6faea70c995362f439200df0306d51d1ec266b851f9ab48d6b1d89d83a07c15f4c4d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99794e935309d7afe4855fa7f6c6aa9
SHA1c811da2ba738aa197c365a0e0a3c5735a7b62da0
SHA2561d98c3d274f8ab9b7aec60bf471fd63f8453e861d54a0f3e2baab66c9a089712
SHA512c25f7e984bffeee7ff15ccb87b19a494d4c35da65fd1f547166992ecbd68086582629afe4b93ccad10f47435b300ef2317572c91e57e5530e716538629bfb5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a763e4fb4fb3d86ff4adcb6265fa78
SHA12e7a3150fbc61cafd0999c66d8cb2600fc7fa87b
SHA256e5dafe291f2b954cf99bc645d1b57f989ed29d02e004b8e75a28b13697a2253f
SHA512c646be5aacfd884b66fc7874a6a005fbc33f777eba7c5b32eed4b2ce2300895c8ba04979eaf0537c1ab4dc891845222e0169c338139a989992b450c02a1c7de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522706fcdac7e97f67c2c62ad1d9e88d8
SHA1d64288b32e343eb3e299528833320c7f7c2d7752
SHA256bc0ca5cd6e36120689183351d67830ce76243888a360350e89ec6ae9ba42d92b
SHA512e61a7b916d87b573f920dd8ca350fa30eb176b252456159b2e540fd26aa157763100068ab1f354cb039d3cb09bbbe8283479081731a5a90bb5da8bb3b783e12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2f2e12baf2deec2165889c10d5a402
SHA16c0bd416bbcff4264c9a6873fd2da9e56db0b536
SHA2567b17bba65320222d0470d8c832be4a8e5adf87d117b269eb317861055db2ae17
SHA5124a3841acccd40621b0c4662d951049e97bb86bfe560768994c77f7a21669769c2b0f8a038bdf8e4ea7e5c54c7914740d7da5a28392088c2fddab853655e54daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7310cc25ada8028e910c4c48b2c9d93
SHA13a0521baf4da00e4602eb16b559a5c36140b4c6d
SHA256d7c41363f798d8903e33ab4fbcc10591ee26a8b7b19306b214528057d6a45389
SHA512ab4e50f512d9e9c0a66cd6dfa99fc92340b409139cc273218aff9c55074a0d873e00ddd7c7b6bcd63e606e80eaa3dacf6d74969c1b370912643cf29b19870398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b411f55150fcfd08aea9031f76a8d1d
SHA13f07573ab26bfa6fde756e3ebf32df80bfaa3e22
SHA2569c74be9e15b27b89e21fe9863004d7501bea2ee1f82f64258ee46806081f420e
SHA51289206d3803204d3b372d05822e795781c828af4f4f233ea7100c57f693fe7117819219743e41062317cfc8f0a9a841a9d566dff7778ee8d743d841c16d6f0bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac1f661a20af393072d8ceb83e5a056
SHA17f9a77d7dddaf6cc83d7b125f14da647912d4394
SHA256a231ec6bae2e235b77180966bd15639f73ae70805f7c39cb58706c8b9dcb37f8
SHA5122fc2f5779c1d23a9f77f7c508daa8df5d9183861864608506a11b0abb8db70b3efe5bc7835cd40d814495ddb602e2ef21b2823da1547f1f56b63a2686d4905db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006267b29347f603349074579fabe4a6
SHA13932eadd01209f8331b9129ddd9e5a26a158f28b
SHA25602b0b57a4cbbd4ea2fd1138edbfbf4ce989aa3befb3d2e746baf1d29ddcf0404
SHA512a9e5ce8c67203383c2beafb48a45beba3b983c7b57b99a5382f88974943eccb46ce1e43dd284457e7c335482b07496e59c81012bc647b99b3fd81305b2a22967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54686cc2afb360a9c9379546abc239c68
SHA1e0aefe9aa9802beabb203156d230fbc2bb3c0703
SHA25686b7cd9a2ca78310ae44f56177631e0869fc9175e622859852c5d3d031247c70
SHA512d6f788de8064df8e30cf794104aa86a6d0fa05dae1e9879e9c114040e956ca9fed0d8ffff472654e2cbbb22e88eb6c8fa4d8a15fae1881f94ed89a1b232ce60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6f2d68e25fb332a97e267d9bea056e
SHA1d90ae1460bba0c41de32ce7de2d3cc56ab5b32c3
SHA2565edc1d8cfcb3e31db292f6710e26e92b6bf6d60381152cd83ad708bea0fee326
SHA512b9291892d663986ebb53898ab6b5c23fda5a8a9ef9c43d224757b521ab027f2154b67f18a16ef8fc7bec1b177520921a6be25777b9cafa4da8e336e9fcc79aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654a0fe59ccd302d342c688816f9900b
SHA1289a1d2b6f15cef771f4a9abd77fab5b5a1ad536
SHA25608eb70d0fe7f75f9ffd95278add92941e5551ff71a4ed1588634bd03752a8aa8
SHA512bd13a7c4f3949a207c709410095d56fc567fe342282acab99f5bcf8e361784f2761f6ef80144d6ec597c0c6f936e8456625d34a1619231a458e9d9b2a3b7aded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8240b87030d120d0fe178885b7073be
SHA1a9a55b73d41630313507fb58e081d8c114634a10
SHA2565252af0261a07e8431dfc5e9ef2ac78ca59e0d50bc5a6316310d23646390e120
SHA512dd9c7c49d72d113934ee279da35b654a41ca57109c271118270e9bb42dd8789d87018d3af1c781cbdff2a162970da4283ccc79a0b1e5ffbdf6a44efd1573d016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d102bc47ef93192449209ba8282cbc
SHA13e429ff94b5e79a1897730cd37f3289e4f9aa109
SHA25606a500e9a67e2b5e1c37e80a3fdd71e005fa3ea237bba5e49895f38639569493
SHA5128106c6bcc894f73abbb454546e3b797a8133650e1201993d5f9229d8c4d1449e2a9aba9bcfacee640dafcef4a1ceee2755bebead01d9a490307870645175d000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2dbe151723482bf78e858ef5d1ec34
SHA13acf0c7a7be3fe024ea28fbee5d492bc6961a972
SHA2560fcc105b7c5d16bfa739c48ec71c98e55a03eebcc494d8ad3de766211d001aa0
SHA5122348c4bf625f34ed299ef6a06b4bbf5adfda9c51b0bdf447834678f7034ff20dda5374f8581b1a5740cf2dc4c449b096aa56949b3304956d0b27554c3b568ec1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b