Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
8268db83b56df36a8c4837ffb72c229c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8268db83b56df36a8c4837ffb72c229c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8268db83b56df36a8c4837ffb72c229c_JaffaCakes118.html
-
Size
461KB
-
MD5
8268db83b56df36a8c4837ffb72c229c
-
SHA1
e07161196d4197791b32d7b163ec311bbe5c9df3
-
SHA256
f3215d0867f7c2066452e7691b3c578e0bdcbf43a94fffa3ca9f46f059be5705
-
SHA512
25790e97609b44fefc976b0cc98945db4f0dd48284a3c17eeca7c27ce4eed3acc38a2d368f6dd48ff2009e1b8e4a900fde78fde3e30d4be120c94d819434fb65
-
SSDEEP
6144:S5sMYod+X3oI+YaQHQXsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X385d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADA7A671-1E16-11EF-BE4D-CE57F181EBEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005770a47d596680d175c863b41509693dbabdd1096cd8eb7f96fadc0c85224adb000000000e80000000020000200000005afdb669f17c1ecae8efba0e5447111e3341c1b9627470942c2493317170dce72000000072b99724549c43839d2d080e80d124aea364dd7e6b4542e8e1c96301f30d0b3c40000000dd5b985dd4e80a8117907c491e1119f73486252bc484814f3732ef7c9f962faac106903552654ed84eee3957907ea523b4617a5f14f03496b7dc88fb03e6b759 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423188690" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1069308623b2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2788 2108 iexplore.exe 28 PID 2108 wrote to memory of 2788 2108 iexplore.exe 28 PID 2108 wrote to memory of 2788 2108 iexplore.exe 28 PID 2108 wrote to memory of 2788 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8268db83b56df36a8c4837ffb72c229c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd7fb5bfae4f58a7776607bafdcce66
SHA142f4708a970e06e1835f1ba06d186a3c514af535
SHA256b41bb9c61eb81890cc37e5e7c34838851c86354fa476ecadbd152d060c0ab775
SHA512623532923ded6a61d6664a286b2951f492a8478b680c5029cacf3d15c36ae2733038e7272750fb4627ed8a62e85b52eac60b4efba3e9e23b10be2a3e873c23fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a9e2baad3b3ff613ca5e997cc867ce
SHA164e7aecb003022514df3f1d06ea6cb99e65697f1
SHA2567242a3ad80a6a93b728da05f0bae292bf1a4c92e0a24e8cfa85128089e71842c
SHA5124c4f743b7aa7229c7c2604bfb21cae387b34ba2eda26fda61e7581e3cff0d5f933b589152c8ece3ee2d5b52be870c362dbfa94167312714259ba3b87bf07b372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2ea6da265f11a4021f580316df4796
SHA1444f9fda7ed7ee2e3d7cba639c90ab5a5be81af8
SHA2562d84de0fe953fdad0565f5d0d9994256819e7324d1bfe5c1eb8bfcfa613a4903
SHA5128a9cb23823bdf604694f3c29ab84702da4512ec1260d3a3f34574e4833ba56dcac08606bbbf1cda5207f7bcb1c72512f39fd5f0db6a3673e7dd37166776ae09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c210a4908548b4809170799e936d8e2
SHA1db0b9c74a4bfe814085027826cda33dbeaf39ccc
SHA25687977dccfdb97c355d1e29934ede40a96d9bb210c1d5e47af8616b5045d78a59
SHA51206b716a68cc9b68943dadc9f172e0975d27d17719a097bbf55c1fc7f83e08d9fcb44c39c25bfae0bc924e7fcc56a64f28ee22baa57370713e778f97ef9adbd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcb0bc283d7f42d335c40dbf30dd659
SHA1baee75f953e541dac7d080958ddf6fda08b3b216
SHA25654db7e5e1a652637270097b68f0450343620cff31b9dbf2421e624901c25f36b
SHA51249c25f2ac21c4453b90ea7380f3004f145764d1fabca91e4aa0c9f7703de05d2a648f4467f57655951beb678b522270ebea2d6f4930a5d27e617ea37ee4cc8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503982e3aab9adae01cca34b5f9845c75
SHA1d716a56bc7830b6ec587cb1798fd42fd26ceb188
SHA256d60cbdc5abeb321c1d4d508f662d42fb5976704f83d82e8e099dd6b5d49c7837
SHA512498c6230221f4570e9e8c08b3839f351a315e2b04bedb9faf5181f543cb88104c5fc147d432427af6f137ea2840f0d43a93d38bbfc533d802196e7c9f43d1ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad1fb47b457551126549759f03e4a91
SHA1ddc4d6402b550d1f150296814d4c7dfa84d6f4da
SHA256c559d09dba563238bdf4da78d81194e58935d1f940ea47c02a0cf290b60ce927
SHA5123728dafcadcda2be1cadee1242284d4cdbe883d47a403ba57530e615330e92bfa907e0678d13ab2101d223cfb21778455c017d347def1b3c970885c2aa4ecd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a3dd1a62bd7ce98bd5f9ebbbf84c24
SHA1e21af2399f20d318fbdbb11537ff365af1c3d7f9
SHA2567b710d026a980c075c7cdbca447177124e8c4bcc0ada651a3627011eb3d62c0b
SHA51288cddc027827e7f451af48483157758486d4dfe955fc935537e1f78473c32e70c5d3765298b8f2d29493dc11c05dae484c5edd0c10c6b2c0dd7683807197a032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91ac3212690c2ba07e8b0c89a09bfc9
SHA13954c60d25c3ef7378aa26ca4104eaf21f5081e2
SHA25673be19b2f940c737a8ad41805869bcc4873e41b9aadcfa9796921fe3d15ac5f2
SHA512de9204a385645f30ec783246da5252605fe25423cdefd4849b2c0dc2d4e03adacfe25299a794ec483d083739f64314070fd12fe1d8d4578bb95e19f73127e664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babe583153709ae038732e46636ad9a2
SHA10757f1d8fdb25aa5692e6a3f0ce154a0ef07e887
SHA25693de1aa277a7fcabc0336f17e61eac9a5d58e97cae37175b467445afecc3fa1d
SHA5121859d5efb2211e39d7c1c76f19855a4ad1b229a961789d08697a70b7c0aab4bed6d309053c25627f27fc20041b29ab5186bf4ef43e4194d76b18fa91f094b0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d308bbc08ce0975d62bb1450db7920
SHA1acc28b90807b0a42e5a0cd20f62a3a85393b6bae
SHA256ca799bd566599d363a2033c09c443bf821d00e2f4432fb1ebb9956fb71ec0e3d
SHA512de56dd57d14417e3662e82ff465501425be2416f71e9c1230005fd157d8800c4b14b31312a5677b47ad79c6ff790a764c5080499004a29b045d338e6d7183d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d7d2f9304f8853fa00b3aa9ec8ce15
SHA1e2e86b2fc02f23743cfd361486a861af3e12ccfe
SHA256be09a5ce3a5650c191870c87f90b6cc405f006b2280c11b68d1773e15a7b83a0
SHA5123babd3f94e0d38dbdb36d68478bace02b28d19faad75300a6f6d4f076d0c21753dc2a1858279db7f764683621a5893ecd8e624069f0d5772d4c518f558a2adce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e452c1a36d7cbe3e73390b43de4dc1f
SHA1c0b7404be730cafb63420aa134301162535c1cfc
SHA2562941537d64361fd0cd4073b61ba091197bbf207cfc729a47a612c200f03b7871
SHA51240929106a4d649c9a33c1f205083cb46a75254358d66cc059e56fe69a20d10776228708ac2f825f400fa84028592e084294803f4730dc1c350e46b3e5d585629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abce0c574e603b68ff252ecd1567cc4a
SHA110a76815ed27aaf1dd30626161ed4c85b08842e6
SHA256b964831aa4c3026ab05524c136f1d442349c480b371bc6c6abb33310ef71d60c
SHA512647ddbe39f8fc891bc0a5e6d75e0184d853a4a38339b0c8fdc7fc47dd03d02a0be6f50134d434c37bfd30d8db06201a19b4f90c74bc3620647629f61e38edb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294a908fcd5fcab64e0aadfc8c1b1164
SHA101b8c176b6b6a305c47430c3af02aea0767348ab
SHA2568f5bce6f6c890af4d525170c449d9cbbd0cec89f2375dc30bc3a71fb0b99237e
SHA512b30c7eb93b20020f6a6bdbd105302f26c2c84bcafdc013bbb2ad403a89eee17a675bf41b53bec831fc6dbe579a80368699c0b32511ed985507858e556ef8b35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd7a0bbc823aa0d27fa2ce70e8dd0ad
SHA11692153703e00b4cdc91e19b309a33bf48c1240c
SHA2568e9e5e0d116d0db82cd5e300d7b9ae5fdf48c1960b2cf4d4e96eb3e2174633bc
SHA512d5f7d41a200edb9227aed0d7f0281c816879f66c820c5b34ffccbe0b74466e22872182fc19c40ea3713948e18823687164c5751154f693f4f6b0a39aca9ad97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ad407a4e8c52cfaafbf7c9cc7de92c
SHA1d4013b31d8f2e6f8ddbeea14553e1647d57cfc17
SHA2560016c503cd5c92cb89ef9225b64bdfcbb94cad2e585b3080b343e13a4d4a602d
SHA5129c4eb4acd3bf2339de77b9d0533a654b17f537d7331ee24f562c0dc55d44923e992fe7b94746b795401b4d7971bece0435eac2b0d7afb047ed8aa0670b5773df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573329cd85abe2d21480f6772832eeb8b
SHA1b131a420abc0595e86f6471ac1af54cfaddaa479
SHA2565cc734977eb3c6b9cffe95bfc2781895557ccbc1dcadf5c9f073c20e2da4416f
SHA5124dc8d725c205840bd3f1785ee2bb6730ce5a6cea03630d0bbb94b04664e3ac4042e79ade3abccb967fe1542ef6e427e8953f8d8e20e8b2847ad1be73290ab907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7eb6d904349dc10c5e50ed09a6c924
SHA1788fbfd8f3b6c23436d2b89de17f4e9032e0754b
SHA256798810212dff6983dee5e1a270886ac0211fde4cfdfdc0c5a8e8f9d6b6fcd21a
SHA512711750723653a2411fdbd6d29d9ca9c310ed305d1cf9fed142f30ea97afab3180b2cd1d26c2e770e0dc380a0ab99ccc5fa29df8481194e438d049cc0f2662859
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b