Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
8897f8bf1469be85968ed593e096ae66_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8897f8bf1469be85968ed593e096ae66_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8897f8bf1469be85968ed593e096ae66_JaffaCakes118.html
-
Size
2KB
-
MD5
8897f8bf1469be85968ed593e096ae66
-
SHA1
3b11eae6bbab7120d5b2ed250b19b8f3574cee0d
-
SHA256
d03bf30e9073d0cea3b454b0c12ed8438a76eafe7ca96cc0011d70d99de6def8
-
SHA512
d746575482a6d3cf86b5c14e4eaac1292b54f6ef75bacdd14260768bc12c8d4dac2bc1d7a26ac74e9ce480f81226859418d8fdd95383be8b0b453126912e5f85
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0555321abb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005912324a31f4541b4acf1dd69a3fd120000000002000000000010660000000100002000000026c7c80689b94ed72133f15b3c45b3465dfdca23234a49d8ed6562e29c1f2da9000000000e8000000002000020000000f126f0c95a2a1643bfe6a09e88af67790f8aa685b7cd0d13a00404978b59c3a320000000a6a0c229112c9b26177aaa8f50ef29e1027291531e06a7cef5c5d951cae6578f40000000d9e555bb425394adcac958d44d37f182a15c92b026ed4c6b22873043ab15a572ebdf9415b32adef0cb7c245d22da8a6003d97ee91d8efbc356d54fb28b2e7448 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423356890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CB88671-1F9E-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2264 2156 iexplore.exe 28 PID 2156 wrote to memory of 2264 2156 iexplore.exe 28 PID 2156 wrote to memory of 2264 2156 iexplore.exe 28 PID 2156 wrote to memory of 2264 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8897f8bf1469be85968ed593e096ae66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703ef1e53c1181fa275dc370b16714b6
SHA1682f9ee412aae76bfc6fe910dd61764a78f544f6
SHA256cf49023f6a05a9bc834815fe0bde11af4f8242d6d5c9d9cbbd5e054d84b78782
SHA5123a09583f9bcccf4bae22111c1b974acd086d4b2263ae8f105178dc34216389ecd7fa943ef8cb091336ba7172aac6e8b78e4b72733cf9b5d3f1b6b69d5aad547d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6c7e0b3d70322d7780d817066980e3
SHA16fe04cf988922c1dee2945e663bf6bb1d0dd4159
SHA2561cc8a66911cc200be07730785c484f56a995804cffd24d44d7e202cf65488934
SHA5127703c176dbc9f620c110710c1d834420f07e27805adfc86b52de7a50733697faf57fbf25a67f923916ac025fcd3581be879d0889403da1830779ad44fd66ec53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fd68886ca72b850d3fa080877ad358
SHA1dfaa1e6cb7b8aaa02fc73514b0338ddbe5e84be9
SHA2567dadd22b46b4e90179c2f9952c77feaaad5a9412f7d7d5e8f5b3d08cafc571b8
SHA5120bbf9164bef9034aad1f700aecf9174a0f8ad47b3afd77c1383cf39a14028086d1ae502c0f49bc4e3f01b626dce455666ded3f75d5918bef9ccce11cb93a3957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc47168d06772681fb586e19751ce05
SHA13ffe55e1d210cce054c3b3663261c0957cfdec7a
SHA256a507d3031899520e899928c50da3176c7aa3b68da07fc3c951f4f581d0783830
SHA5126195c7f68b9d7a9a84f0e6659820e1c41f134cce8146726e9470570c4972afe93768094bca15629361667df80f8a2e724878cc333aa956c148cc76769cafe4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f24eb0378f67684c180d377f2b5d34
SHA1a821f27e6959c54e72e9e3b921d9e21b23ec6a63
SHA25630e1863b2ee73b7efa21c431c7ee26286317a712ad750e3e74b93f0119ef145f
SHA512fe2dc3f69c66dfe9a954b4ae5c835a4d75df5af4a445e285d6fff79dbe9f34bebcc01972fa2c73756821fb07db47b08dd38d5dadee9b6944d5bc4fdbd352225d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d74f810eda135b60892fe7faa0053e
SHA1cb1223e14fd54a5ec4c2b0596cd663d1fca20f45
SHA256caea6bc63efb02914e39352267d2094930960908dd41119ece86942a5d7a2165
SHA5122174144b57d4fd2f377777fa54bb54d69e5db48803189f6bffb9e5abf5cc4d0bb8d445db7700f42e514a4171595a3c37ca7b210f0f17e0ca2e6dabbe311be07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d77d766b2040f36675e02c0c5f9ef9
SHA1e1dc7917d4a5592adf00808d1668f8c818fddea6
SHA2567939f1553e35cc93fa13fa1813a7b9bdb4a2e703415b6841cf6e3707c56ac67a
SHA512b0ea41595c25076d4f2847b7c6de5f660069d19a2e98486b5af2bdabc6f32e223c1749908bd2cd394ffb78be6f7ff16a2f59e4f8c4aeec9288a85e22109cfaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e288ebf8e6b0c4a26e8468703cf39ba6
SHA17dc9f5c83fdb613328e33c7443bcdfdfd6f95f19
SHA256d3cfa6275e1868fd09646733f1e33a326b8521f9e97b00d7292f4b0328adce6b
SHA51262c404bc6f5707efac9cc98e217859d15663af35f1ad67a9f909a5f8c0eb6d2f9c00f18730420313cbf2938928b7da118bcdab5ecb0cef6a20d2c7e21c5144ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b26209362fe2ba092212bc0681a3ea
SHA1cc31f1dc849e57e876a4c9f4eb075ec7aeb91e6c
SHA25693dcc07dc641b8fc20cd243df75e4e28c6a02028c0736fea33248f66b43e5135
SHA5126e4c39f3f866d7243e3287e4a92918a4b2788af255ee8147d854ef0e967d6cbb74c15eb0ba8d5e88601f93c4f749e5e0dc350f40989f3f5c6514ad73808192b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d834fdc193d70d29deb606f64c119184
SHA111dc3e014d86d53b37febcbba0c16c86064d4287
SHA25638e6f2c15f2f7c4626b05ab6a46f2f83f4cfd445fd1bc4cb63cdd9cedf43732b
SHA512b61984c8508f24e23ac1ec60bec7299d2a789aca967eb8d0d2bdb322c7e195330488356e60e38988cf56e8ea4cae4fae312444ff1c01fafef9bb74d21a9bd205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96ea5e971614c6957a1992a9da19c93
SHA1a2159194ff963e5e123ae5a13e19ec19378d53c5
SHA256ba710f7fc9084aae3bc2d268350e4f98ee05ebbfcabce609d94c3eef79b29221
SHA5120f1fbd60959fc13e5a3c57e9d8c72e020c67dec05f22debdc151e5bb5e4a20ae0c9d1f9ca7843763138d4e6b73d0dfeb0d19a4b003f33554171bf2c64cf0286d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ea38c08640400cf80e6f8cc8652fbe
SHA1242e189db431436081a083afea5f113b6dc1bf9d
SHA256a873d6ac079e27fbb3080db35b54c852bcf60ceac066011eed262147415026d5
SHA512bed7dd07b2cd315ecd79233fd6acf66160417ced58bbabcc0af760fef40372343672361b3deba2de0ee6aa4b7bbfabb9ce9cb5db48644abd1413cf25050c00d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae2fdb930a47438ee3960abae134bf9
SHA17977241fa6c2bfc2d809adf955dd76d3b5056ffb
SHA25688710b76cae04099eed4547af5ac549149628470492e4e1ff30167e1fe802d0e
SHA512702b1c24dbe37fb31bd111444b69361de7794df074798cf6eacdd08b67164722c621948e7e5beeefd0b6d2a2dd14867b819834585ea7bbdd297569ae2fa752c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d55388fabd25d96edfbb214e2921ff4
SHA127b3d3a9eec7c2ea28f4bf42268190c5deb6c84c
SHA256c464429fabef590e84ad2322d64811fd81ac6b9a280040cbb422a42b989f984e
SHA5127b8b93b0ede277972c76ecfef66b9ff3bd6583b73631eef1e2e9596c790f88ef14812f33b4c6093cb4733f26bb347416af8caf009b061495c09644e05d1836f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e882be2e6b6e7fc62d9a9087af62b9ed
SHA1810fa37630ec67e7ede6534bb65593f509c36807
SHA2567412099487b16111b20f06dd95666206f3432a8fb169a34665784c8ae01a7227
SHA5123b9aae9bb8124e7dffee2f70a283ece74d68730b79b34d07d76da67eeaf90cb63c984345789ea2936e63f42888f707a57e2de5d46b8a15ad7f9c8b0e90acbfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586310b4ab0b43ae50201f5cbc783f9d7
SHA17e91908b6806442a10d80b2445dadb0ca6e91720
SHA256889bf89f93fb42e30cb63e71449becab7bdd846a332dcf036264c5dd45dfb410
SHA512fb08420b5b72a97b23da13c9d2018777a4675aa4561f5fd86f3283420b3e6f1b564162fe7f134fa0cf7b532615df37ce56e9c46a52454dab735ec3d30bf6d59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f1a68bfa7754f4072999f925aa40d7
SHA1b9302b937af6e8fdea11aaffa7b49c8ad4d41f89
SHA256c73087f76f0fed98bcf70079825b9e110c56d5484a03a2f0f1cc63e9cba1ae43
SHA512460d6ca4c5b31c55ba1225e58170689562eda7b87bada552ae5c3be74ea1afb46b8611b0948a472f3c5a82fbe7dbd489fc273bcbcb4d82ac7b3b02939219d1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadd068fe74e23d194dae99a062b02cd
SHA16db3ad451b8e1344ae46e8b17abea29cea6c71c3
SHA256abcbbf846f629995fc3c4981654c39650346eb0e525b1570cadacb395e265c53
SHA512b9c4384666ed9a7bbfe7c2a287c6192d89b9f02c016e098fb175b9ce503f520327bc2f5ab63b486605cc260c8f9fec3e363ec667ac5ac02eec387b4ce602a455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163b8f217ab9a83fa66e65c01a0338cf
SHA1c4361da63536eaa0dcc891e7bddfbbc371b8bf7f
SHA256d3be3e614d3bfd30538a968fac5bc88cc7ca1722a279a4aa3089638e055a05aa
SHA512caa32bf3feae1388beae578516ee73fbb43a7ea8309bdb5b2bdffd6e1758ba4558825990addfb1644877b2e4a09fb759a7661441ecbbbe785be4589529ffa472
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b