Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
e8beadb60a7475cf6660667dee68021d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8beadb60a7475cf6660667dee68021d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e8beadb60a7475cf6660667dee68021d_JaffaCakes118.html
-
Size
14KB
-
MD5
e8beadb60a7475cf6660667dee68021d
-
SHA1
99c07a40ba8d4a7527260283ef153c7267cc5430
-
SHA256
2c1931c2c7eb8771ba2aafc04c73afb968fbaa0f7a5b2a438dfac5b7d0220959
-
SHA512
89860b729f624f90e9eef69819c5b5a5fe089bb48ea183214059a8feb8e7327cd780fcde83983545d4bc64b139fa6b90b28d66bd38b7b2107e8dc70d3ed4b729
-
SSDEEP
192:+yEioELD/ZmXg8oWllefMJkZQ3wf1vSmlKt6DvE:aioWD/ZmXg8SZQfmlXrE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a873f8108ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22EDFBE1-F604-11EE-A119-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418782681" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af60000000002000000000010660000000100002000000062b2b5970256bc00db5288f7aff689129679fc16878806a79283de7b3c8024a3000000000e8000000002000020000000759b50ec25205cc67e1225fa0ba0b5f5907d19f553226cf886888c327a7bd34c200000000ff3550922fe088f8da31986757c09f275fcaaa73880c6f8f00e40d9e8b1b9d240000000649509140bece0b83fd1172fb53bab818b1ace5245e0a0548f042381ef6a8b81180994bbaa3b61e6792b67a566d1e104652e2fd32655839b4cbc72dc670c4aab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3012 2512 iexplore.exe 28 PID 2512 wrote to memory of 3012 2512 iexplore.exe 28 PID 2512 wrote to memory of 3012 2512 iexplore.exe 28 PID 2512 wrote to memory of 3012 2512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e8beadb60a7475cf6660667dee68021d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b967a6ac8e704a2239b9b6997b23e7d
SHA15ac5bc0a464d76f1d98bc1d795fcd7c8d8119ee9
SHA256d9a1b63c91443ad0f04d1bf03594bdbb75f83207915502052c60695c540c0159
SHA5125a446e0468f128c89d9f93a338cb02a95fde4a0eb34f6a83d1696969963790f6dc89af2ad0df4b33a523b2663845e77fc62b5d155fde7567aaf0748e8e7827b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2ddf635bcb6bc30151e4d3ec83a1bf3
SHA1b4293d8ee2646c6a7e222b83740bb5d2376a5e24
SHA2560410d66de9b72144f482af6aa2dcc0a9a3e16ff74b88efb005cdd3296a9b7544
SHA512059ebb2f38e230dc1456871dafcb81dd4f234e36090acf0fbbf61f45b3366333c1ee23e8c700deacce062b7777e28dc839dd354726831571fc9564a14e688e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa956c2cc70616ab0683f46d18260a5
SHA128ca5dc2d24ad15b5005249efbf5702784fed2f7
SHA256dc2487c08adbddf4534474baef7e1d2d113f51ac28eaf56eb203903a237c8605
SHA5121c6c7e20a041a60a2825945113e8445a0e9a6600ce5f357b83db9cb733dcf5b09a9fb5da604eaae8b25f657554f132dfbe54ecbe01bf9cb737d03a571e17654e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74468a70c3016a6d1cfce2cf5af33e5
SHA1b4b774900b052bf15058f58e66d40e67091d888c
SHA25603dda674a9d233029151c9b60983266ec84c68cba9a98080149d9994dd8c4403
SHA512b06f37f5d2dd2ca85c6f16e2f8ea6662604cd1e0ee4e22c1852dfdd555e8d8ff05e39444062ce1fa03cf518251aadafab354711b8f9c57ae5f7bd975656bf861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b254b1eee6bd0b3541497289c7aa76d
SHA1163f40ea95c5784972ec3acc60a15fd964460adc
SHA256ff65f8f67de614cec0e4817f151fd22eb47bc8136705a5fb038c1a8b7ca9ff5b
SHA5121cefb7adbb8358b4a0d42a1d2a26392269a5d64ddae624b13725bf928201ae4531bc160091460af1e1cfef34482adf17642c22120f48cb91405aa26893ef33c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337efb03eb0e297cad3d8e21cb439afa
SHA117b29042305a8f7646a95d1a48ba4406e9dda25e
SHA2563587c14b6dd80ae9aed57e368d8422913f14f2bb830646f40f252f3b4c0e0a8d
SHA512d74339ccb46fb8ae1b1ff8a8e8e3f4a72a93f914dca24c96d8a700725ac1da73b9fd340f702a20a6de7940358cb88553f5bd631c09f816fc57bde491c13b172b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ba3e05cf97197c8f245d49f0ab8296a
SHA110ab2f5676597482088fe93e8e41f4ab3a55a9d1
SHA256c343b32a7b36b7a66721f39ba8942362f2c63937636311dac9a9dfd76458ffd2
SHA512d914c5d0cc9ee24f6ae8e14d1099f6658898c721a378a93d94f31008c1415720396c9582463c4f88dded4859a9fb2471cb7e392323af03ae36875d70ea2bcf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505205f284a3fb5e7ca985dc55f9329db
SHA17b24a7e73588d8443bc3195c7d2d937e6eab36c8
SHA256eef1131df4f87d8ed5602318a141e46d4803b2d179721e30895b6df1ab8893bb
SHA512d2dd670f1f8de01e7386a1bf54b3ec4fdffae818d5d1bd0ae5d9bb07c9322f54318dc1108f3e5759957f2a62c20193d321251262630bcdf6f843e6c6eb581272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2df1bbca6bd29df2bccbcba512e281
SHA1bd14a9648993239832e750a4502cb5e9c9f5dac0
SHA25687eecf77c98daa2565f96bed9247fb1c2f941d2991a94ec635ba8382c7452632
SHA512a4e3562ac7c7767426015e6af27a95844d5bc7bee6502e33dc8edd2d77e4ae084ee585e2c49557aa3beaa12745b56f9c5569c5d6eb6cb04bd64deaec3b6e1881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aea92d5749506aae866da315a4cab8a
SHA104fbb2e332863c7a1cded57fe7613d62433102dd
SHA256cd56001cc98f7adef8f292671e66e2e655130d9aa92abde90a5d0017be4e9841
SHA5123ed0eec8bc500042e64a9fb94c4e7837719a88bfc2252a61a96b22b554527f4a5df92f3c259949ce8517ddf03136bca2ee2f9aaa337a2e8f91b57ac682904de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03c878d860a747830a28f19d578bab9
SHA1bb0895447c57c4348fff705173ec9e2f8f72ee34
SHA25623c9021a1df0a51bbd89d077bf73cf61775c4cbd95c289390beca9b05b6dfc1c
SHA5128ef0ba65ec297f1ff88a4622772f31e9adbab8a401b517e39cd8db09dadc719fdbd2022a27d21abfacaaf4afbd02202704edd12141019a6a66bad1adab0c3c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7180e581c6129e87c73449b7694bc1
SHA1a4a9a6754f7cee3ee1bfc7010540f4332af3ddf5
SHA2563f72880bfcd4da22f9fdd18eefd88faaadd4cc5e126204c387932ea3006ae9bc
SHA5129345e1d9806ab83891bdc66c1bb845e22a96c2f2ae25c3ea0e692533c48d5071eaf9f98c4e13611c13c79cafe271fa9ca5e80ee698530e2b9a503ffe5661a8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878b53460ddc3b82f36ed10c9cb4166b
SHA1ffc2f69a2bff02443c80e7a90a85b9d0f9cf7562
SHA256b33872c6d661d466d75e93fb00233ef2e5cea457d9b2cc77118566ae664b2afa
SHA512aef5e30c7442c2b2cec7afb99b477c90304145d9ca4a114d73a4981f04c5b73aeff23c3010b1bf6af9ac2d513f6e907408c05bd074b0471bddd8c4d0e7366466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de137384252408165e0139c22cb9d783
SHA1c849eb424ff1fc561a0374e0846b1d8bccf83a17
SHA2560f2b652777c310b3d681f27ecfc9d134d9b43e00a0d6a05f32282c6c63c4e337
SHA51257c47d4656dfcdfe52cf79f63922c5ad8a5c2630b3296d74742ca66886d6cd2894f6e2b54bd8d377b6f5b57fa433bcc9b6d7c94313b631e4bddbda855d4971d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e14a1a8e1f04467c06c2a21309bb8c
SHA121542cc79c669609f8347687cf3a9df3944e891f
SHA256c4d0e7054f9564075f6fd5b9e15ec3060f669124e9bc39a496e4f540023e3267
SHA512133846184511401f537e487bc17abd5c2942398f80bda1a34e5e77f5cd830f8234f62ebab35ebeb87c4c7d1a3eb758fc0479f3395bda766fc8d00dd4a92eea5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504c750968929794812b89997bb418947
SHA1402d483be0a4c76f0c91663b9fc3ddee49698f1f
SHA256f7f42d87efebfe75a1d8e90301b3b0bbf3677b19313d5adc3f2676f795b2b210
SHA512180c59c554a35773560626e1caa20be4920169e7300c0ffef5ce7de7e86c3c9eecb5921d84700e2a6f29513e27cdc602da41ef2526f05468fb8423f518b18dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8324592ef857a0010b6f76bb5466d06
SHA138658e6714a8db275bf590f82ff58763c191f415
SHA25648194c3843400b8c448af02e9d530688fe3348901d5fb3fd4cfffbfd213c88bd
SHA512d1356d193a0ec1d56fa3484c3aff84aa4e7b6ac6e3c2420accd8318f6bb2e3d964cefc44e6e172f32d3c4b4d3c5be891eb11884a279df7ce60596abc371cf165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0ec73f02f4223b94828f7f32bfd770f
SHA139bcb012fca30a5bb3b688cf03d76cf23608b332
SHA25665eabb24b503ba6c4fb39c89c5d7f01c596a54c90b97b9294728dd50aacf0204
SHA512724af414e0a50ccde4b67806beef21b46b5962e13a1fa643c33c4ebcf176d6908ad44a4fc411c3b8cf2c3e2298db6772cf5c56e94b891f5e9ca6d3d2e3644bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd57e672ca6966c1124c7bdecce493b7
SHA17b6aaaaeb9165ea0289d781ae0558cabb37ce475
SHA256b4a1b196c00ad280bf92c18f6c0ee18a262863502689a22eb29abbc3b58407ea
SHA5129a4e1bd9acedf57a42b2e4e2e75f31af0344552eb3f187abdb05c3db72ef95dd031918daa1bf0741c7ffe3b5eb914cd75114f972e02fdabcdc6a1c46e7c4a731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ecb1aab4c5d8fa93a1b81f412dd22ee
SHA169e85fdd5670b95e3285cef503f2129be3ee2ba3
SHA256717a6a2f8cb22b32fd4db3e2f051195f7c95e7c2b9b32c7fb32fed0a96660689
SHA512b05d27ad460101a4de6f2173e42f6cc95e4ce102eccf8e4902ab2a42b12e89648c6561bcf716e479a9828698ea5636379521556b23a3d1a002a9f8dd142d3ece
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a