Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
f8f90383124616507eb35c5ae4988b91_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f8f90383124616507eb35c5ae4988b91_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f8f90383124616507eb35c5ae4988b91_JaffaCakes118.html
-
Size
13KB
-
MD5
f8f90383124616507eb35c5ae4988b91
-
SHA1
504b74808194d6bcef1a6fc4b6fcd3f34a825815
-
SHA256
f7ac33ab82e044144b740fd0f6f4cfc0a09ac240fc787446f7d0972e537d2aab
-
SHA512
ffa0f00085875658344e5d28eb62dbd2eb835e42f8b6b963e46e1f3f43a2b044a7836cd586fab348c7ba4ceb474a91b70f518206f91e72071b0e8240dce3455e
-
SSDEEP
192:p8bwhQhmpAg2m1PZn4kE3gioM68ZGOD2hrhobIO9PcheFxFaHcnIw:gTmz4FQfIZp2Rxkn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bcd2d3e691da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDCAD0D1-FDD9-11EE-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007b82838588c3d21ed953ab311e46070b35e9f0e71cdf71d067710c52c8d2da18000000000e80000000020000200000005349ba4a7d0f7511798f583abf66f53bf584f305734ec053041e0021e418f35f20000000bcb38a00260b9214d1f208094a465508654a29f2558334dcf98d2377acf84cca40000000a7a20e48e8c101d556b9fb80a05f6292ddf57ab2a030c805dfc5e75b301a7aaa76d51f2be77f793171f0a7b6462e629670a588b5cd9879b4349dbb2eac0971d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419644188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f8f90383124616507eb35c5ae4988b91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD592e92f356c58918718c95cbfbe4382a5
SHA1c5e59c7ed4adab9954a65dfcbc2f3c4d60607626
SHA256bc58732f190913717cd3d6fadec27f6fa9c9347d0307f8fac9c5c290d02d4c38
SHA512766ff77e36e6ad55694c1f26bffc9de427893d3fb1257dd0c20e95c131722306a6c73747cabf4f854337e5159f1771805322792c042ba6fe76afc1558f17a8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccbb8560430aee4dbb3c5965137235f2
SHA1320a69b62405794d4068affb06f90083c199d4c5
SHA25617dc61ce612a0ceee64ec882c593909440eef5d3ecaef7b63bb70282ea5d7296
SHA512e7b6b2fc81ce6ffd0d6b9bf0ff77b3ba7de9768bb255a4bae855d501c6faf434b4b7d82f63cc10e892065f81b885a210b8fb14ede387625c00bb4959d5b512dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f77b604a2deba0a2565781a5057aae1
SHA1e19b46c8d778dbc148404b7392eae3f115d23ec0
SHA256c6b285ff3a9fd099a7c77617955d4e2e568b1f056083a586de2381e843ecb1cd
SHA512ef3a2636d295b3e2d25865a9734a06d8cf61a1ff57d6c5f713f9ce77c3c8d29d51097a1034617e989805e8069f3ba4aa81aeb0f8e484d4ef12c25041fbc1e02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500002cf6a5c16af0eacccc964e3d1d88
SHA1125e577c293089f2b9320eba54311b23a0e68264
SHA256c6553e06dd917583d02771c290a95f51e9a73ac935213b0445c85e353ed860ae
SHA51214ef110996a31b65c640360293092fadf9bf865d9c77e680c46fd62c5ed269abeeb2d1ee1edb7570d36aa3e198056dfe1609f23cc9679a9bb006a50a611b2e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539f929933d749e32323d82c7a169f0f5
SHA16a41c8d33916def416311ed3e0988603dbefe1da
SHA256ff0b7e4e2b5d7143063843e113195b3cf45b6029003798b53bfd3d323aa6380d
SHA5129f21a56e453af464fe8e7fdc825bb06a49295fe5b7a1185a5535afe5cf208054bf0c602a43f79a65477ba7e5025f7c3864db1d5df0e1b33aa4c95fdef19b273f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598dcd4bd6ff5f453148f061a8de6e789
SHA1fb5a0de55c90785f3fc256741c060be0a1b59dbd
SHA2569ab448a19b39eb5eda6f6fdd71227f138eb31b0292baa10954f0e42cd4b27404
SHA51250db1e545293205be74ee4c8e531acf5988a71ff45385c9219853bb0d45b73ae759223912a8156636c245d1b817d68d539ac0f3cde4ba907849469c7e83f4b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560d387f913c6b8f34d3045a98ddcbd3e
SHA11a74e21ff91150629a43f42fa4243cbdce83bcaf
SHA2568634dd16edd02e57caa756b80c4a18aea1b2d08575068bbdcc44dd246e993b06
SHA512abd93a2eadeeaa21202ee0135509f222281126512f107e96d1959fc3a66f3d4a79142ad427bf390de5e6f0f74ed3bb7c9a85686143d0978931ecedc231eb7edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be522c285c2e8040af3b8b80427153a1
SHA13e4adc8fe602aab7f75b7f08063556796aca077d
SHA25600f689071bc3785d07a5d040234c5875e2dc2fe6a697f2f233a7926b34f5f6f0
SHA5122c6760e96877da99d491ffd02989e0093038447f5338f5d5d459a398debcd3bde30acfa999092e5c7f3ea07048392833053fe537fd4e7874f4f22ed295881d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50139846e2eb26605501bd9c8eb4e03e4
SHA166419524d9907d41df893f8381aa5f0f19fcdf78
SHA25602c1d24d6ed8ce57224cac258471683ac4ee8cafc5019d9e6bb59df63f9729d0
SHA5124b1e3bd65f4739672c11da4d381b49f927fdc7a6de9c4daba67db6fd0e6dafd3ccd8f0027cc9175ba4d1fbffd626f7baf08d7b5c5e578369f21ccdbea4cfd8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d540f74a713860bffa5c5b4816a6d2fd
SHA1133628f6a8e5559e6c0c15d2bba2c342ef5cb0f7
SHA256b2e8f4c20abb515afc0e29105dd96c1cb17124801e340c066003e1d455348595
SHA5127ef40ea23c24f0ac06292dd6c180580bb05da48c6f7c8fb284aa2a5b31a5bed3ff09858fc3ca96ec0dbbfbe427bd6b3cecd8662752e1331a85f4d2d0a95d1e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bde069cc684b35baf47cf5d126514e7
SHA1c5a87aa9c5f08aecbcc20d309b9100bbe05fe6bb
SHA256a6bf9eb58bf4797bcab505261333d5c85fb6347c9043c3b04c3d5aeaf1e54be9
SHA51227c91a6354b30c080fb64f1914dfbed851135074750ecd944862a1d286fa1a435bcb812010456dc9b79758b13eab237aa8e8f77f9a020978ab37e45ee967a4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56605e11f42457889cf90e0809adaee7d
SHA1e55db9fb420fad3b5bbb6c77f20989191f72540e
SHA256997bacbaa1c1703105364d96c8df68afa68615307512ef2815b67d1443b00f03
SHA5124ff7584765b6b72f6da12946cf930841cba9bb305fc148a82936638e3ae3504d63f95e7318a2482ea193e0b4ee83667d661b39f3feb0abd779bb2b4cee5943d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adec72b57c085f611f4e3e7e3fa8f3e1
SHA148c100d4ad5fbb2984c326aa4d9d94cb8be3a92b
SHA25671d3cf0ad66f657ebe21f197b73663a1a37cee17f2cf2a2223c5170e248e499b
SHA512735ed3b4740863266bfff22240e8effd76132bd46a34ffd1288af72c74075954b1bf4582f5aa2655fd2f33543c8d6f26027b773357691f1dd79e7e7c8e97de46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59846c9b39f7bc7ef67167dd2eb0bce
SHA1d6735279028fe66976f695eb144ca69f1a230ba4
SHA256452a49dc5dae461cf31d961aec8300f19989f403e4082fb7314b56178f8fb1cd
SHA512d71513813eb6fe3a23052df39dd497bfcb99df321435f4970b8bcf0660b0ffea22860513c9b64d2a4a838820411c82573a032accb8bd82111b055908326859e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25d3fb3414eb62de154ef5062c85347
SHA10cc9133b7249a6756f2b5da045d3c7aa51e3db2b
SHA256b318beccc73c258bc57d4d13962aaad6004b5132442278d92633ac578093828c
SHA512d64d7f752cdc48025308741e6447d5ce855bd9be6631ebffb4d584f83d68f8739e5d122bdf058b24bc73e28630fceeaef54a7ad2f44655a91b72299a1428d30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d634fa2883167a10c3b4268c650d9aa9
SHA1b10da30774fef7bcd57ff57d26a4371f122e3dfc
SHA256f9499803f9a0bd0b5fb1ed2346188c46ba6780f92b15668634b7b54886cc0049
SHA51242c11e950dede43818ebf862433e57f9f7e62b6ac2be6170b1b9096781f308408b1196d9d0f1dc294e1e2ed44f9bd4f8294862adb6d35c89d774b80e87d02066
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\LKY582GZ.htm
Filesize2KB
MD5b718dce98e083351e3da4dfaeb80cfab
SHA1d780e532ff0f45b64b7ef4b288d7932c7d89d138
SHA25617bf776457b8c1e748773d199231b23fbd1428e12ae14ea83856dafb119885e9
SHA512bfd8f97f7b1888dfd43b52f3b0bcc1c89e0a2841f173abafd110cf02c9becff0afe0b2330ab11cb95596504abf301e9a8a355e270a9dde54f2b6b54de1186419
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a