Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
8455bbd00358aa07193a1007fe709a36_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8455bbd00358aa07193a1007fe709a36_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8455bbd00358aa07193a1007fe709a36_JaffaCakes118.html
-
Size
182KB
-
MD5
8455bbd00358aa07193a1007fe709a36
-
SHA1
9bd494b5dafad5338783a96344d77736665bbf84
-
SHA256
8c1aed2131b747fef1836d515db9c751f825cbca49cc54c75e19064d237dae15
-
SHA512
59009b85d63f5d86294eef6ddc74316d13c5f5d867cd692ab794e13dc3cdc658d9b320413ae5108939cf58d1e251629a0390949dfb3a14cc4d15cd20feae8258
-
SSDEEP
3072:S/tIjyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SWGsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423238027" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007a83ca25e5cbbfcdfcc02019437677fa6e439ac05367bdd08cf3880692e7965e000000000e800000000200002000000054de3feebcbd2b3e8adecf32448001b8efa43e71e0205685440696e93c20aa6720000000f24dda8c5c21ef38e3a2d9d4272253347fcbfa2c8c6f4116501442f8a388fbe54000000003f1e95848631e693eb322f644293c971d6f0698c4fafc1e3309f61ed7248d8737a3f011c3f4d05c079598a722e9462bf6b9d627e71ebf0f5624a8890e88f836 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30305a6196b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CCCC6B1-1E89-11EF-A346-76B743CBA6BC} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2016 2028 iexplore.exe 28 PID 2028 wrote to memory of 2016 2028 iexplore.exe 28 PID 2028 wrote to memory of 2016 2028 iexplore.exe 28 PID 2028 wrote to memory of 2016 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8455bbd00358aa07193a1007fe709a36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc814d8b6563bf01546518e02e288bc7
SHA1845d8e0906004ac20c248c6d86d10505131fa435
SHA2566579ee3aa3ad11c7fe6cafcea57a85c80db2c572401a2844d52b38b62f373879
SHA51256fac3d7fc06cbfac82eb809f4a60c097ee1dcf635e2232fa73cdcaf00d16332a977cf710c7c344c6634bfdd2ea3add3eda4462c661bbfb3b881daeb7686c97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff379f988d74554e399e9a4700426f6
SHA1df4890ca390542d525548083546637121efad742
SHA256090019901fb0c2deb58ebe4d35f683c3ffc3ef9dfaca8fe98553a9f196d1e4c5
SHA512fd3bb14cff5e28c428d5637e43522a9db048d554478cc7539b04392b4f7b2c84a18fbe4ac1cdbd59d9b044a146d09fa6e12097095e0fd228655a589ae0222073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6a00318a2ce9e248e9f2fa84090330
SHA16997a3afc7f067ef90e19b01f3c6dae9ef01dc13
SHA2565d4f7fe4ed49849b7d3543a579debfc939b062d78ca7a4e133daa49edfed664e
SHA512f1fd91cba98a55a231b88e1ffe30e8b791492ee8afe362d40494e610107a533a64cd8f9f33d039e3d7d3b7b459aebf02c6d340bd06978b657fd3c66fb1d5bc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254e6b41791bb09e0945756bdcf43fd8
SHA11e1c8712a040779dc559aae424a8801c37eb3553
SHA256638cc24131d28163431dcd90921610bedd5a0d30564ee6eafd32229dad954e20
SHA512c09afbb6598b6162d5e5fb8f480aa95b9325516a2079f8cc816df059af888cc428b23e77e579a8a62b96db43c9be107ac0b46f31880406eaf2b14b78b09728be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a9c57d615ed86f731f1991368a7795
SHA1f38d70f1fdce16b2cd8c3eda97b45d3044903702
SHA25664e63f5573aedc570fd18da5a64fd205c3a2797ac6cef63b39e78cf0cca3ec13
SHA512c2585f2630aa0dbe4eddf5497eb0c71d9307b2b75ec602f8b0eeb9166d286d5af89b8cc560ec45b7a3f507443f8743f461505eacf4862d363e60846f3bef5ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a09b46409c17173891f0df0e75e3a48
SHA1f52b547b0740a9fe391538ec131a6c369114d769
SHA256fdd40d46bdd90c8f9d7f83ef72805313c82239178e79d081ee206f2666a0a7f1
SHA5125f91a0b8eb1eb47048eabd1637cdd487d8aeed03471d15f2e835e3bcad13388c7ae47aabe16ddb3f441123428d3498cb65a6f73154d1e7ae5c7ac58955857e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfecce21f761576afc64326d7ca7427
SHA18cf0c71645c3206f58ef039b90c9c9f690a271eb
SHA256b76aaa5a5e931729c5d9c537b47b4ecfc9da07872dda99491dd3bd2bee5cc40b
SHA51295f6758ca9575e7f6a50f0494888efcd1faa3b7f7bb45d1a547bffc8a5b48c6309fc818bb3b3283d0c7b799e9dc74a36130f7a7bac0f035c99b04bdc59bc5766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4087f4a0347758c9de1d19fb200adc5
SHA123721c38b125b716e3c1fa19bc7f6ea646761d78
SHA25674519761a7ec5484bb70d00fbe6209885bdab5291002aa23d41b2cda49785a94
SHA512644e4b5e9e64120dd21ae46d6c54558e93c462960d3ebbf189949345f8d1c069b02ec20739ffb1913ac20812ddf72658318a740f7f32d7ac72e3449c08f6116e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa5b6e0ed200786498ad6ec65a8a89d
SHA12964a76b82a1efbf56a8666dc723682305fec28c
SHA256bbe6a99edb6ff0dfc3317c1fd4630ced06668360f78cb67b8114db1cf858317b
SHA5124ebe854203df6aedd7dc2b5b0c926010ea4ab5dd5132416ec94b0df867673b24916be96c4e8777331a9712a1d01e6516de2cabac46d38d84547c6deb28745354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428af69b10dd5e8d4031b9c1eeb9feb2
SHA132fc63660aedba7422c98251abf3df33e126c822
SHA25639fd60f970ccd09706dfd0432931c7e21b91d307f5b83e26249a1c2b8e7d48dc
SHA512a6ee2095610f59eae4b8de42b882261f0ce403b1ff198e768d6113c5f76042cabb5c86b8dfbf524243fd12043cedd1876c1ab3c04237283ad11736fbe92f459c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032ae46da8d849a0c26c5c06cec87dca
SHA1b9cf28d17012469ef8776f2aac2beb2e363dad02
SHA2562dabe1d9a093ef9883b436c5dd60bd0c3f038ab5b73218c0cf48a9cecefa8056
SHA51249517ca179f77faee08be6ec3dd8fa859a70c13bda0843eb5bd3a4f2939f727431864824511fc2db6eef555e48b2bcb0bfb33091280c542520d4027635530512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50421114e155e171d9b8875611b25769f
SHA1ae5f592a67388f0027d4bda369ae60791aad63f7
SHA256bfb0b156fa09f8d1b7c5e918613f231688f9bfa35d704f0bd564da6e8f330d64
SHA512ce72b2be2e2516fd01643453ed481d7d7738d7805ebc92c4d3c26d07204993d0b1fd17e69e8012efe86d523b145daf15d94c25e59df6d1241b4e6d4213260812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a4f5aa3281e83aa9d50f0810eec322
SHA1e3b1df37ea47624f0fa7919adeacb29fe4c48889
SHA25622664ede470a22683e456c51a344cc1c15b7b6a8382d88ab48e8597e08fdfdda
SHA512a13c5d49a741f902b3d4dfd935ac7d689be696437543180bef2d99f9434b7bee431bad59761aff1aae384c0eba6bce48eba4a25ee3a2cb59e7072682042ab68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0bef945a5317c2e3759bc68079be757
SHA1a8fe5725844fbb76eb397f07cf1455641a78db5c
SHA256e6f307867a0d85b824d6264711cb2f31494d7ca853b21f3ccda5091080131a71
SHA512a345e747ba2238a898035809e0297707b2fed00d16ebcfc32371d2e2750e658ce25cacea6ae1136ab528df248b1989b2e6e4abf7b491fec7c9a109da3cfa2c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62156319114963677a764616ae23ce1
SHA14e27a98691ea1492b8421de9f23230b108688879
SHA256bc230cbb7b70b2477214761107af91019483f8767c676e7531a9fdbb229c51d3
SHA5128607fbd79d2fc5122129894d1d0618ada2a15778e28bbc1caaff123de9ce31e3b665dfe4275ca734048ba050ef01a551eafb599d3cecad61c2df728044fd158e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f500ad4b88d6a3f402bd2e1d0fec35
SHA14d6005e82fdc92ebd9e219e5e5494c6a095477cd
SHA25673671f55a00768eb47dac9b2f9eea36e86a41e64e5bdd129821af9d449ecfe6a
SHA512a556710cc94634306993cf790a839dc0c30677e40e201be76b3757913af51365386f4c27b9ae7a17674feeb7275444465df7e62af443ccd16f0532c7230859c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3eb797d9334c72abe5dcf79a52bf6c
SHA1cc504f38c36a730c87238365047ab6bf9300f52c
SHA25675fefbb6c4914f530184da14e85277006b95fca2604e8393745d0771e5e1f2eb
SHA5121c9c51d824b09bf5d5e6b8643badb335cbf14c185eba47a928e931d9ca28268f327e66c9127c877a0d6640269423df07ef3c99ac59009acef396247e25c3a928
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b