Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
4aa8262d3f1fafaa13b2ac3f0837be24_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aa8262d3f1fafaa13b2ac3f0837be24_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4aa8262d3f1fafaa13b2ac3f0837be24_JaffaCakes118.html
-
Size
1KB
-
MD5
4aa8262d3f1fafaa13b2ac3f0837be24
-
SHA1
03550ab4dacda0cd888638f422db26413d400d37
-
SHA256
27b250e91524308ff8131e231ad9e09419d553856d30864fd9292556dea72428
-
SHA512
c71ba5eee40ddccdd5bcc476d27da7ca2c749258f68bffe2ffdff271330d4191ac5c239a6fb4d22180e26c550a0a77c8d24dad57e9ef6776d14a26f144cdeaf9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427225992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C256D731-42CE-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000008496f3b224e0fa2d945fb014ee7e41f9a74abe183e35e71fef67eb78a555ade5000000000e800000000200002000000093cabe79e0f2f17997beb5d47dbce68a911869d94604f47d47b2d0f5d6b2db8220000000ba9387c3cdcf5e620c83bf315935a746ce2eaf75b8991fdef96991b47ac947804000000081ad569785a1c977b3ebc6b9fd227ab331fe0c948c5bdbdfb217b418f1d4980782d28ee4e2952f33fe802217444d6f8177731d454b07759a888be9013dc80635 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d5d898dbd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2108 2120 iexplore.exe 30 PID 2120 wrote to memory of 2108 2120 iexplore.exe 30 PID 2120 wrote to memory of 2108 2120 iexplore.exe 30 PID 2120 wrote to memory of 2108 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4aa8262d3f1fafaa13b2ac3f0837be24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d07243cce11e6cc4b855658122f9e74
SHA1dc7b402660b4d71b8a8088cd81441d51e9ab5cb5
SHA256a537ae5cdfee33d9be92e7ba5bcecfb0a410102f76e9a9b0bf2009fa276fe49e
SHA5123ab1c8f346d95d80b6c2e99021e7accaf4399de07e732beb417208f89aaa4a2ab4b6dbfd0da2c50f367bd323524417c035c45759983b029fa59e5a3039d4428e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a82a21f8f3dd699d75b566c3ddaeff4
SHA132e38274542c344a8213cb5cd643ffea559d72cb
SHA25681c32e071acc3dfc5b4cff6327735eb7c0b73a9a8452b31912dfb64eca55c6ec
SHA5128c02916934fdc5f2d9edafcf5e0c71186a3f1f990b9e4e2c180180d5e35da477e4c34e5b13e5bf7c31bb4e8cc91608b081f4b165ade89d1d7758ba86dd707e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526582e2085c259c0df42693f0ea569fe
SHA1fd94b977ab85e71be245fe4dd9d757e5aa6467f6
SHA256e7d288c09b5b31fc6f3dd951319ff9d8b4fbc2f8779ce2b0aecb908268af2064
SHA512ec12251426d9096415f0bfaee9e71ac2cba6738519527e4fad87c88df5d38d14b6c151e24d5deb6fb678c7f4fb2100b82f5144f46cdf165dd68c027a6f227e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11f053f08ddddfa25e596d594039f04
SHA11c86ade5bf37b47d9c62fbd9165cc5d8b7d09d73
SHA2564b995b8d1e988ba4b1cca4a3b4816ed57879961d060ade9008a45e177bb33082
SHA51228656466865c0ab4d54b31a6279a843183d925d4d29e83c6e67de47d1b0300a08a8b9a7cd89f062e18a2aeb9e0110e83a2a0d6a85d80b7e7b93c085c77573e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5244614ead5e3ac65759b54dd533a1b
SHA1da6b83aac92880cce563565eda97800ffc2cc95c
SHA2564648cd43840b5d9d4a2454cc95b0a5340ae1fc41fe53da0fba397ced2f43b1f8
SHA5126e7c781ba4f9946bf2cf91961e107cadde6860bcae136b41792b853b1845fafcd1002c634df40792e093405c7cc7c25cc652d3e8c1e628a792d0350ef506752e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6642a20d2787ff31f762acfd29a4fed
SHA18727547873d7c65f2ee65a2b84959d30c832239a
SHA256ee49278dc9f12790fa8cad5c32e55fe5cba79bb01f6a511e71e002bc4434ce9f
SHA51233c64beb677a1ccba2efefa43d5e6f0969f260d1f33837758924eede255712d4ddffb4a26bba7cae946e6ea2e1d55c6147187b248739dd075e400d379dcd68f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66edc19624102b449d3c3a58dd1fed1
SHA11b387ace26b170a37937de17aa34cffabd8d8309
SHA256d3485b42349eb9637c7fe337aed4bcea33b4389dac0d1596539bfedcbde8e9ba
SHA5120534af7377688e38336a0fa40672ca428480a1465215d21e4b28990d152a2008a23eee33f64cfe6c3ad0b64ef46f587bcf66cda6c11316da07a319ca290a0d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db29b9fa61b84e1ec5c1e33de8375e78
SHA190fdee1fc9527d989b9266050071f30c0971be40
SHA256a80ef9892daafffa3a7f0c3f88848bcbfcac2f65f517d7e13139c02001bc6c45
SHA5126f5314ffc93d1053fc8448f8b7591dd77fe3cf8d6e963f918ddf2e030491b5ca25d3559f9fd89326cf56dbd12cdd9070ac1e1b759901967de752fa70fef385bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b107c8e4014927342f28edef04713277
SHA18cbf9034d9bc3d57dd54acfed2732bb49dca86c3
SHA256577da08f7722242255783515e8700558918848ec75d60269d594425ae11e7b16
SHA512664b4e5ecd55492c2eb6b0c131ebcdaa9ca9ffdb849e4385c479dfc67225557112825f71485f7dd82c3a32189105f695b352d94e86fc3d621201e388f320196d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b