Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
e8c5b2d5d2f1a45ee765ac27bc8aba04_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e8c5b2d5d2f1a45ee765ac27bc8aba04_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e8c5b2d5d2f1a45ee765ac27bc8aba04_JaffaCakes118.html
-
Size
44KB
-
MD5
e8c5b2d5d2f1a45ee765ac27bc8aba04
-
SHA1
4808b91d7f4425632a496e835dc9418bc9a33bc4
-
SHA256
4ba5715bdaf09621a0bab96f102885975e31bd86234b6784a3a6ab42fd782759
-
SHA512
aa5babb24f908cac8f74506f75f2ec1133265f541f9d7382407d84612d539b4c4d4a2b1761ebf8c62e82233c77ff103a87699a882164be55e99d6f1133faa33a
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2ojGelgM1+us1pri:mZJtlGelgMP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90B4E151-F606-11EE-B411-768C8F534424} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503b9a97138ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000da15df501831a3ed1371ea93e0f6086ee0836252651269850c8112210ee17de5000000000e8000000002000020000000d9859c0203f1e7d462d5d677bd4257c3b44bda09e3b7b558dfbc54649f62dc5f200000006e37f6c477e92246bfd8ff07a12cc842995f904acd35a9e6f9f621cb1b6b8291400000006075d0cbe64da3e8d73936e9244c68d7989d4657a9174018a6469f9393e5defc47b7b801b09686a22526a14d2fcc2d09a91a224260c25fb29ce80a1de19595d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418783723" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e8c5b2d5d2f1a45ee765ac27bc8aba04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f74804e9d5019daa7b844169274acf
SHA10174364fa577af7c98fa8c31eaca5bba94c44553
SHA25651e676214509a357f4538a3f781a6e54415d9b8a3b982cae6750685bbe96bdf7
SHA512cd6474317206a017828bbf52caccb121aec16fe022ee2d3ded757a45bfb20ad789fa337a3f994e3154e5bef1b22d37de2572ef09a6edacb94bd93fb06e9fb276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcdd31bf21b549756cb63d7e7580b510
SHA156e70d8aba9a8b954329a14b58c33a732b4f642e
SHA256724feb7c3bd52ad9dc9dc38811067cae8479470287e15a247c32893fdd607232
SHA512c24d0b95c486a14dfdfd0b3b96c6759803fe3c1d8cf2f5a83275b1d241cdc76c4297fa24613f2b35b1aa8905565dcf9fae8dcc590548d642fae6efed965811ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120f3423f020c55ae0efef55852033a1
SHA1e7eb3cc4177f10f3ab11dc12a548d4c67c93c9e1
SHA2560f31deb792ab84bf6d8f953aa1c703861f5fa1e804602670fb739fff1d77e921
SHA512596ab9a29b5579a0e0ce5e327a496d18d90fdd60f6d52c6503b6cf68f6ed8bb38757946c97fa7b132787c5fbb8bc74b8b87ec1440f42c621e563555a549f89ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543eec01c1e8997dcd99eb78b32f31be8
SHA115d0653f80d1e167d55cb945ef9951639687a779
SHA256d048559cf53f261edf302bf2101b05946dd36b2a4d81ec3a4421ec4ffbda4b8b
SHA512ea14301b20b9872360c0bb2020c369ea556d0714ce52e186ca26f8ac71b7f7e231f989f0b653257426e631b2f8008e66bd9eb5796b10d7e4d03cb279a4546087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ac92456e8b3acb121f1e99d638b324
SHA18b20b01344927eacf988957d4b8678e8297e3d33
SHA256f974c15d7dc6d0e3a6b9cd39e20cca6cc780fdaeab0020ab3f71973b02991844
SHA51242fea615103ccf127c511d7a75f62136ce11d6d8b1166395a8b60c1d02dec948a80b44176e9ba9908ba8059e573df7a7eeebd42834ecef01ded12e2e978066c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58324db46c7940d89b27665e613cb630a
SHA157344556fcb75e024ec5f10e7d545c111d9a0895
SHA256629267ad4b5ad9792d2848f02a5ed84f47ae08acbd8e1f272201519150cab28e
SHA51274de4ca454bd084c8f680efbc836596c443f87861832f63f931ace01faabb86f78f304dce2e23b7d91e3fa7195ba5b0ea987cf6737de36118fa00e0001e11d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f0a48ad37a8cab9304f85b862d546bc
SHA16db798a239c2e893800624241b479795f137cbca
SHA256650a505f01362a732d2cdf7c0900041e5ba601c2cf0d4f406e92a8d8ee529ee7
SHA512edc113c815021d64ef80e6ee0d4de02c9ba075c7a94c566453e2eeb0367ffcc8e0fb19809198ebcde5710ec85b9148202d10d34ac8526e4d1368575b28ecd8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c0567f87790b8348c6acedf3da9b60
SHA1afaa497f353b23612a03002f8b6725c76345e25e
SHA25613303e83577a6df34dfdaf12a5a5f1ad2f3b283ff1fd591f5d0593fad9fbc22d
SHA5120f685f5e30ff2b88a2c6f1e3c11dcbb015b2678cf6f4acd23ee0e55b9abdc194d52c83c2013d8b38cfbe8b112d99fe59bf7cfcfd7361a4db81b2b913adf9bc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec6997dc577351a7921261dd128834c
SHA1b721df01598eb55dec91e70749d709e0b7cc3f4f
SHA2564f950e8f92b2df583117880ffad033dab18bcaf138bd0c84f64376d0b741ebc3
SHA51204f6e75cb737e6f1c8626fc261d2793932236eb62d346e3f9bfed9c59121be978007fea9855adbbabd92dc526f6ba2d329bf8364adfca6fa4b41c85d30e9dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96f5b9553aa44ec2082032d71d7ec48
SHA16cc3455611494574e13fc61a4261f41fe99e7e60
SHA2565c4fe22c221d637b9d4a4d415e836af7e4b7977f2293565537adbfbe97859e64
SHA512438dc1e7981226db6528d817c565eafa732f9b66e515befd7a17bec9e3416fc4cbd432771042f3c132a8126cc1678a0d7c516d0d0518f0a8c8c7c467bf9bc7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b31829a31d05abc598d6ebd6b5dfa1
SHA1dedbf50447d0c0f09458f1943b48822a1f1fa366
SHA256d57a5841fca9f6173e9503b37300e22d4e43e715fb0413c7f93cbd94af827ccf
SHA512aadcbe3a8053b47cbaab5db9e814ac669efbcdab976f07900d5fb93fdc1d202b26ad939db9c50dbca2c84a4642a5b80b8f7676cb175c7c0f5b272de4a9d11664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f3e817a5be61424bcdac15e5be3c7de
SHA1cb73540a04991f988047f91f6b094ca6846d1a51
SHA256445cbf5a9e3a85ac99ffe7b89e61b4ee9d5876a4214b44e6987def12aac32514
SHA512796d67623cc545991caf5e025955cad4e943c94af2567255c05aa59f0a93f1fefce8b764057b89444c0fded2dbe9a0c9491adff8eaa42e8120d8aec7c7571e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba6e79b5268a6ba94f6a00f67501d0a
SHA19ac240437c36af2fa87667989e8c5950f1594269
SHA256d388b68b5a24f19ad81865f26c61da9d45ac178c9f2670660648a19ea72f28ee
SHA512c9015488ef2a9b2fc800caf6eb6d5c3bcd26ca5a4224f37f9736e3fe239439183571220a630eb5896c5df092a2cc6d60c899e4b11be22f65726d6d563ca9670a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5660bb09730793de4b69d85a970e9fc4e
SHA19ae6518025de131e8976290086227c408812526b
SHA256f437285662a6f08d35220acbcb6d371be255715afd7c04243885b559efcc659e
SHA512898cf0234cd1a6a91564882811fa96a5e80cc6a6e4c39183b5806c1f5ed2026df3160a4e3e78ab533afacc080c644d4d055e933977aab5b119e182fd6ddb7e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfed29d4a2cf1fc962c1b471734f225c
SHA12103761004a2eab8d8fc30024970a7f089b5cd1e
SHA256bb8e4b8669c309199b2ce5986573037ca2ce096e8c81797f6be2c3af031936a5
SHA5127a37ba68278c71083e080d158becbff8ad04898e814be4056a3958420c3895693717007d6de71bf13a26b30171c0cb61610177bc246f65273fcd12145f3f5c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d9c47894a6f9b0f0905f90f4ee2bbb
SHA18821f14a7aa17f6bf2341e15cda3f7db2d67056a
SHA256e07e450e2649cee9b35787277333674290dcedeb5cbfeac0e4ff0d3b1fc4c506
SHA512363a0eed2ab51fd4d42f4d52787d2b8232eb035f49228b9fa862171dd0e4e01be909087ed8969f400af817a1845fdeb79f1f6adcc131cea6d81018ebd12dd4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518acdd60ea5d24140af45b6fb7436f50
SHA19c34d279bb499b24b7a92f22e32288e1866fcc20
SHA2565bf444b6ddb11137f7b733370cda37531d14878d8775352df38e8ad4e9c9dc3c
SHA51298f8cbb4b1a51b25577196a9876371fe71ca651ada9b2fac0cf33adb763aeb43f77591086d3946554ff7bc5c066007a628d6183cc31e964f8955246204fe917b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5599af37755d76e54242917bfc414e903
SHA1f3127ead2d99adfc179ffbdc47caa872a686f6c5
SHA25620c25ca505bc03597a6319c426a9727604ee1e276cbe0f65636384affb288a8c
SHA512474d013a913d7263905fa930aa90263792d711d1a5e314d59b38b13c9cf620201797d6e923ba9ecd0bc1fe082cf0dbd9b3263685fa77d1bdaaa584b5404eb643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab08ee144f678ecb723f3cf5791a387
SHA1aa3f7b3d119d2d55106af7849e572fec36d1c9ee
SHA2563c877432f0a8e4409c309812c0c447ab71373e06663bd64e29f7530488ce8c93
SHA512ed5118c668e456ecaf11e86596c2f0d17c9747b038a8a01cd6f5afe2e4cf27a78827016fc4b67cf685fdea71624b48d94b8ca2d557f09311243a3c90f7d4f323
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a