Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
e8aef7f5a8c8e490838de8d613beb864_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e8aef7f5a8c8e490838de8d613beb864_JaffaCakes118.html
Resource
win10v2004-20240319-en
General
-
Target
e8aef7f5a8c8e490838de8d613beb864_JaffaCakes118.html
-
Size
35KB
-
MD5
e8aef7f5a8c8e490838de8d613beb864
-
SHA1
f4ebe0f1a75e00538e9c59172ebc5a55ae85cd74
-
SHA256
d898a258b47cc857172eb137bd4f61765d4615d6de5a5a521f2ffb2a40b01207
-
SHA512
21f783ce26abd1c9cdad6104193d1b46a3c7c97564dca998c2a38ee266c08d0255a90c9763dc258cd58bbe59024e04249c623ea655bbd83967bd6eb6efa18479
-
SSDEEP
768:qwHeVln2MrXXlBquwFEXqPtbfCMPQtnH8JXFkEvvhkYun:qwHeVln2M7IFEXqhfBuH8JzvvhkYun
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b20000000002000000000010660000000100002000000027adc751b2907b4b63a974fd7362c00f1899d862fa1d7f699cbb4804825824d2000000000e8000000002000020000000bdf36e5ba022592a75b81793a589d5782a7e0e23de137104f062095c3bdb89b4200000004a0deea03940b02242a0e97115925fe1deaa01cac9225f4415da5030769fe4b6400000002bebb1d09be3bc681cd8302abfbf2c40ac4bab91eb27f7ee3e9800367388a3a01c3212ddb25e5532da0acee5dfe3638445cd1534235f278a32852ce542d244ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503ab96c0c8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97586BA1-F5FF-11EE-B682-DADCDAD51062} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418780729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2896 2084 iexplore.exe 28 PID 2084 wrote to memory of 2896 2084 iexplore.exe 28 PID 2084 wrote to memory of 2896 2084 iexplore.exe 28 PID 2084 wrote to memory of 2896 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e8aef7f5a8c8e490838de8d613beb864_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532df8d8f7efad58762e39609be5c147e
SHA1789e0685ce281a70b327d02285d3863edadf6c66
SHA256dc90fe30fdba66f4d6275c427767183fbf7af2965187dd25e018128746903a87
SHA512a0c73389467623ab57ce0c8723c1fbd0e2d4b57454d754d171f750bed58b4dc39eb77b767448508af19a09d1e95670a064297fcb1c6034f00e165aeb4c8fd19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ede0b2ef1de69920797030898593211
SHA18fc1c71be55bd39546a12de1d7cfad90bfd3187f
SHA256655331d6ca6851837b29b9bc3ffbc4b6c15b148569ac81ac88d17e24fe61c618
SHA512223d1901b3e157e5ed1f8426b3a5ccc05cabd8ddbe4f73b51e6dd22549bdfb8b9444a4b0e0384f5c6aa41ab2c73ca01fa825361a2e01a57d5a6cab831c286075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528711b8a695c339755856864145eab97
SHA195a4eb5a0ca693d364911d468da7d57bb7be0610
SHA256607521598570f0d5c8e8c2b3bfa6612c18e68576af9fb031262ee8b56f09212a
SHA512741df4515b6fb6bcf3fdff5a4d97794ce4692be5b9e1047073e565709d7225b57d29eef68f17a49627d5b969f7384c4047103c36463f2235202c2f0692b1724b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c51c9abf7764f9b354813e078c95f86c
SHA16e92dfd5c457083c34aa1c336ab24c8d0e3c9125
SHA256e8f32c05de526a74799a8a127c5b7b15d93c0f720fad4460329c298c6b4a9a66
SHA512cff1b046e851b8a71033bfe48fdf588e3725fbb5bcf66136ce49bfb0078b919fce538f8e76d9017213b7e615522faf466d5905ca0884d91ac563d18aed75566f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8f686182e5f90f035b441f69d86ae5
SHA18b8d5006e1e03ef7b5037f138374ae3f38d0100c
SHA256af235cf6a15a194ac7d2319e6f1378c1f6343133935723241842223543850ee4
SHA5125ffdd842724ff952a2c8cfdc7effe937138378603524c95a14e88fd98efaa0ddb6b17d88be0850c3df56d7ddf48bfd415e8b988a29d63e5015ed0172670e4cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5055656c1ca36cc902d9bf8a96dc99a24
SHA17340a802e4f817156e081d0d9930f2dc81f79c78
SHA25619dc2a3403423e20ebc964c9553e8171b312bf5a651ef57e635fb568045d84ed
SHA512e10d90f648a69acbd9f6c97ada8a635f86059c65511c6aacfb657cdaaab3b340f2f4261cc581ad8c13697a2c02fb0ffb21c21d175cd8fcff0224e182369ac461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be49a8ee4ab52f827e636f7c6da5e20
SHA16055c05c39dc7d8466b8985ef0a9e44ec9f0ea0f
SHA256adf09df2ac92ea86df9399fbab35a0bec23fd2d18eb7309968855763c8ac790a
SHA512e3700645db56399b8e4767d3d5a35526dcb49800ee85f0bf40f6fb8c5c5f26d6fb74e79216d15c5b49122c3d700435d3cf3a3b8be8cd3ef3f2b3915af535e287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890a2d1390dee177f97f16a325f17726
SHA1e631b9207f34c50ee615e3961be8eb49233783fa
SHA256875285a52fec94a0a4409dce38a8159e87ab15b8223e98510c3603531655b7b4
SHA512c1db1634e13801407fa6d231051b1a63fa9bedef425ccb0392437b708ed7c4b49823def689f8db0ee6cf1d0c694129fd2e6df93b2bb6ed8bc50eb26446ff45b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411578efac91b976544f9c9501ba0502
SHA18da803da22271851e22d4888419ed29ba9cf6a02
SHA2560cdb55e80882b2f091f322cf080a0a0e7bb02db2afe27464ee7fd5d42fc3c4ff
SHA512c4b41517445af04b69362366adc003527e698b20794ad9b08e9e433d8b02e2b3ddb2d90a8fbd14af65e7da7aeec35db45c726b3385699ae816f1624aa44895be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d553774a6c9aabd3af7d7eb255a610d
SHA14a0539fea0066100d57f820f536ea8e56748df03
SHA256ae6b5d73f6b91a4480a754462ebd6b5d3599dad48c356369eb487f11b4ed4434
SHA512cb19d688743226e88a6aec1dc202ec8a95ce998632beff5c129c931985db54e9e0ccfd20683cf25004ec85b24c02b33fc16bf01c809477f3a379c269f26e0202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c5327834d41eabc4ee1b28e7b9bad59
SHA1e748bb5d4ce2d489f8d86b6716850a9e5dcec61b
SHA256723fe22a7aacb4fce8daf0322f51ccafd3c441dd709784f26787d124fe64f7ca
SHA5125a8fe26090f5f8c4c364d179c20870048b115e17454c12b0094c633f10e454b298e167c87a1048e35f6279d1a0cc5e855ee06022b839b26551a019ca648bfe1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567655227b238937da23c6507163a4cd3
SHA13d045af31ba313219b845d40b912ec559e388ba0
SHA256ed84d93889d8a98b7fa5883229ad9d821691fbe3efb2acdbc67ed79cf92602bb
SHA5120e3a5a0010f8c07a68fa7d66931e793a9bddee002d743ec34a2acc189cd1a076f5d4c589e4971bb423e5e65445fbfbd968b5fa851fccb0184a4ef895872f182a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e71f6702e5eebf3951dbdb4a2019b85
SHA1ba71512103f00a29fdaba700f387d55d800b8016
SHA2561505f0ecdbc3cd43742e7075d53a0a4f726f6eb32f2676f1602a619ded2e17c0
SHA512e701a4cc0d95bd8340d9e066e45b68d926c3fcb6a8ed0f73f76a45d2c9e42c24407340c6f2b090fe1d2d2cddcd7e1ae9c199018e617914559c24abd7e1aa3238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e1e8ec2b76ec3f12b35ab9ecb2355e1
SHA1800dcf7566abb5ec2a0d77cfb7203de5c82882db
SHA256b4b367bf3b71b3333ada36261e8e18b68c4854506a296a2527c51645d96f014a
SHA5121b920efcf4b3954c497de5a9042764bc049fee08a787f6bc78bdac8fc5db3dccbf30e4c8ec1e18d037bfc70f288086c1a90a5ad952f40f14c97b647f53f5b9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf17355e5c21d5c0bffb1933a11101d
SHA1d489d7476ffd2bfd07976e600c2a94b919cabf16
SHA256433901de83ebcf688a0a1103c5accb51bfe32cf6f650cb9cba655ce0d6dd825e
SHA5124af67db1952f93078949fa9712ce4d4a348b03b85f309d3996939b01a5250263ce572e0904365ee50004fcc042ae161547fef38c716afc5ad17e841ce8d6f05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d8108470e4b08c50e742d0e8188c95
SHA1d0c6579ff09ec28eec3a70e0ae36ea993790fabd
SHA256143dbba06262f493ea9a8b1b314fbadc697f077514619ba1ee7b59cc1e8b635a
SHA512548c010d19ff23fc259648496446fcf6d1c6d04f11c1d542dcb320822b2959b0b1e29e18ea99b07bfbc1616842c338ac44f9f2b029b1dfecc5cb2271c4260900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19644c80309452bdd5803acc285cfb6
SHA1242e7b81cc80254c330608a47557bc30b65cdd95
SHA2569910d6123f5d66e4d65ae8ab698f7c59f2700e34ffd5e1dc53db75e213f5317a
SHA512964986d8e81ef09324940eb2bb4c88ace923040f0e2ccd4521e3c1551d1ef004fd375cb20ee0423394d8a8c13f35331c63de5e061a94a2df31044edcafca3f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f34e7f31bd8d0dda8e87fc92ad6d834
SHA1c7de35008b09eb55372a6d6c815caec31a3dadbd
SHA256a13b481b70d82c09275761145e20f626ef2c6c15b7d43a3ca6780aea34bf4f17
SHA51284142247f776c5ef26c67a9b9d7e5fb8c0b3752c945c7ed856ecffacabcdc4ec90222a32b3d6c25b814b9401dcdc41e71627b32fbbd475bb497dbfda931683d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ee4669665fb5651b0e15613e8133e4
SHA104bc10a9c49d612d51dada98785581e31fc06969
SHA256226727b70ec782abc34677b5485568aab52ff6ee19584b69203ee851c0efb103
SHA512fb313bffd959bad39a7affffe8f93f4bed2adf30346ed29b5f4be3d11598dd315765f0c1b6979d28302b680c57b7b56be0228251163a00bbef4adcd5f340866e
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a