Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
8514b7eb9ecab83533a1acd4ae255c55_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8514b7eb9ecab83533a1acd4ae255c55_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8514b7eb9ecab83533a1acd4ae255c55_JaffaCakes118.html
-
Size
8KB
-
MD5
8514b7eb9ecab83533a1acd4ae255c55
-
SHA1
c4331faf5036c0c0af6a4b68887152961ad274ce
-
SHA256
794d9d31cc7b958676a430d57be29475d3bd915d908a4e6c0b51e502ad3e4c27
-
SHA512
b9962d82313a3c0b13a08f7cf332ca8cabf1d9c4af2786b2f8435bc6c1a529638228be61b4c8870d1948b926b131746ad872b5871f390c85381726f6de264bbd
-
SSDEEP
192:bYAByD4aLs7AuBzBAVG2cTnTlNxcswxkIbUp2sn87dsCXlFV+g4nFjuH:M0a4Y82cXbEHCF87dVXlFYg4U
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd0a3f76c778084285237051c8312bc300000000020000000000106600000001000020000000645ccfa81589ee7a3ff890470e4e06d247453eff2022ad0946d8b23e7fdb3f95000000000e8000000002000020000000e477de83fdf74330207fd9fb02283794684c58849dda75ddfc1ee14b7c20455720000000953952ded6849e36417223e248cf9e82550df2eaf88d4acd58300efb998b666f400000002268326fc05557e1a04e477791c423cee74e377a4f2312aa34a36b89b3f9c3b211b48f08690baa1b10be0e3651f7d1ff7de3a17a9ae345d36a9501273dfc89d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a065b3bfdeb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D20E1881-1ED1-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423269067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8514b7eb9ecab83533a1acd4ae255c55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517489ba96892d3a3898f8298804e602f
SHA155ab0dd1ea67b0534faddd46054cde4d38b5de6a
SHA256ebf3742c45deba9627bb9c491d0cba8da4dcc80c798b6ab7f746a10d27457ede
SHA5127a5af85ad406b30c779327df7a47c99ca6f108c93395d8f5f4e9205a53f08844c804e0eeb709cfd24759c43ccadc50493121652572e62f9bf2ab5554f0a857fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51211999e74ce3346df96ef1433829527
SHA1d7615495ee852e41265973f488c5780ca45e5cbe
SHA256b91fd873c118a30386e867d691511ba19b9686ad4a7ef6a8ff66814509777592
SHA512538f144eb179bd1f2a2700226276faae52d228ace9c58d0696f418c45768e2e65db8b58ee7d60933119776c3aef744b47f7014d96b7ae83a253b8da0fefb6084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54633d83284eebc7b27625c0725ff0169
SHA1489283ce00e1abc5367e9a507878668aca28ec3b
SHA256d766d32e8a0bc9ca303a540dfc7a85466cb8113916e7f678f5c713f81bc49cee
SHA512445e0b1f4dc1e571e11c82079d3d181de9b8bba12061911ee50c218948280f7c402bf844b2dbf3e607cb39db285d6f9406bcf31473bdfb1cef4bbfd3c5d93b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b34f753fd4f14a930582e132827a02b
SHA1ad06bcd0c9b05f1ae4c71124abfddaac7f12293b
SHA25675fc5e4f51d4174bdc54098503f49987e46b1b2ef74edbfb1f373b86514a8e38
SHA51266b4d9cb78196f12fef7fa69beb3b60be098953253b45d543f16c1cfcd459f659020c81c7c75c44ac99ed86918f22a4d1228bcd01beafb311591c493dc80f230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402d84056fc21fda0d25e27744c3e16b
SHA1f628e242dc13d913787b0c03efc42639427dffe0
SHA2562d80e61d7f019ba39514dc35d72c380b81b9b7aee7885320e76a5b390f45df50
SHA512e8aabb382a3790a6d9f1c7dcb7baa4f037309ef646140fbab4913a712223a422d6c188a4c918df8e0e31a2ca2732ad20bb7541531697e74046d5e5852f31630c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97d5586b3d0f95c697665ffaf78319a
SHA1f8ccae22fc4832052403cdeea7b633d969da45b1
SHA2564782f6a3141c8bf9fc22ebe248fd9319d9ee1cd51225ee87a8449cb10a6076d5
SHA512c12c23bdd1aae9e8f18d9c027de7a1ee0f39120ab12927521c9e4af02ff8f9c63c83c0e4b4414a5e94e2c2d94344d55871925132c5f7a70a6f3082b246b11017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537099829b2349eb3e942e33d59108a1d
SHA15c70ea9eb9049649d1d81c712cc5a0b4d9800052
SHA2566546e5c0d426622047e92e951c519265f0f4b99ac37c6a4cac4e0f4337203e84
SHA5120444422f5c16d697af40b3823b2695a26af06d2524932823ba44b436fadad49960f833e7b80addd282a1a0399a72ac84d589b95163fdb3cdbad513c610df1b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9b6be2872d9a8a0ea0f79ed006a5de
SHA1f35ed1425ed27f67008cbaca0a1a3e2c6dba458c
SHA256c86ca94da8a059f734b78af7c8f29d2a1b839b1bd4da19c045d72cd304c71d2e
SHA5128fb09df08e7e505e671a71474b35a16c3dfd0dbb690c8491c774db46e6d399c05031cf9f470d086f62c0355e4b9b007a865083ca6ba0fab165e93b0362b2e1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dce1450ad192b664d5fff1d478ad9ad
SHA10e9eccf953aac72e5f74651678683fce2ef155e6
SHA256f7c920aa3b297cb6e4b2c685f4e532fdb5b3de82692b9bdac35b37f75732ac54
SHA512bc6dd85bf54e7fdf60a47cfc1c11554595f527a0e402c14ff2ad5a924b86fbd38dcdf4ae899aa7f5356e330fe21b7170e283b35508f2f2fcf5d95525592010e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e02dba38429c8003fd4b8950d2c7f4
SHA1a35fa25c7f0202f1657f4ee7a4112ba198376e77
SHA25689221bd9636c8859abd181410ff29fbdf11043778b9f888cfae75543256e59a8
SHA512919edde7c66ee8bfb3cbba0580b2635cd7e2e04524d7dc62314a3dd5d42902ff5aab6003b0fd27208fe2c13c750adea47007391f478c5b7307ec60c2cd44be5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9b2e1e132bcb4aeecab8d12f2444de
SHA155b0ee77fe399ddb712834f3fc370dc82a377beb
SHA2565e8e552658d692ec5f3bdadacdfb5aaf72412a2740b3746d17688b017eb2d218
SHA51277300876bea0c5f13736f188be3c519b2b587bb4bd33eda47704ff9c0fe510a98bc5b34b0747bcdebfce0547d32e5d5561a69e5486eadee084739af4752dd918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4f7ab9e92bb6950d6551538e69e0a9
SHA1cf8921e9a2ab4f6a6a5e230c8dfa1ffe4c66f725
SHA2565e6a4c2b98840566535b97f09a28bb985ea569588c239b2e322e0098acee7032
SHA512a72157be9e6c1a013d0ba90c158b76a66e93bf74b8b5c6bc318ee32411ebf5e740a24c74bf3fdf80a4238157a7449d56a5596c184fc0a0ab933c1ddf68559bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c872024b3aad720ca24b68d3b9184ec3
SHA1a48b6cd4c00a41d81727b4fbe17e92674cc932ce
SHA2565096cb7c02dde171d2e2e8eed1c080b5a18a744ff640ad02a0f9fd7e24aabd46
SHA51254961bf74319eb06db2e3cb6907e30962535d13d3cf1294834617576a3a731536f78d2ee36c59b8c690dfc3dc7dff79546a91fdeac45657c31e307347b6e4346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571688c5b222cfaf5f489f2c454e82c29
SHA1b5cb697c26b1c15b775cbac1a897299eb080ff42
SHA2560dddc0aa6535b2c178c071e7e5168e20ab4d48ae8cd441cfcb8c913467816d9a
SHA512f8c0268e3bafff6edf89739e9d19a5c57d4860491dd19d2676ceb6f787740fa423ffc033badd1558d39bcd4f43b7c3d4b16c28b3a5356cccb62093d4d26c9bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c6446ac430e86ee08e6fa115a653e3
SHA1db34af7b23e9884b5c6aea929236918916cc1114
SHA2563f0869a2bdc4a60ddb6fed1623b8766c6032845ca8df0f51b16b6461bd3ea5ca
SHA51220df64a67a9e59ec3610df256ac3447cecd163534bd1840fbfa17af78fec8da6d61b97dc3beb1428f96ff6a9ef7d4f8896e20751266e95ab394c39b470e0bba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9f7fefbf464b01e62a78f3b8773a1b
SHA19f465cecee37a7b34d190faaa719a1f71ec8be7e
SHA256176c2c75018bdb351906f72264c6093f12cd36bcf7916cff9d3842637a912adb
SHA512c189a97ab06ebd7b355c82398b2a0dd4a3e5adce5077ab202f6a8704d6fa88aea95a4210bcc8329c896eab6ced37317d36547d0eef7be98821a8c41d94920abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b3c112ba628e0284a456d03338edaa
SHA170541f7aaa6dfd5a65e324bdb17578d31fbbd4b2
SHA256d831c1275dd3fdfa5d7af66741b5bdfd306925f7e644730d05d0a4860630e169
SHA512c2dee3a9b28da305d4f61dd56edf999448498dd08196e97be7e20a96bfd1b008a0f2e2d3de983a346cc9779a16b02908efdf9edc94c278d4529b1c44cde6a51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567508f33105cc0f82ca7d0f40d6ce7d9
SHA12165b1d0b6895e2ed6f90fd59e080ee7fd11383f
SHA2568caee9064dd297125edc0b7dd5b0462a8c31f5d9f673b69fd4606457cba2fc62
SHA51254853c10d9f9e635d7cb238da2176a8d1abcef02122421f178887b10aac5adaa741adde9515751aaa1bddfb1294688dfa717a030c6d7f19676dabeec5fb8047a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b