Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
8585345c9ed5488042d0b3d4f3927a5e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8585345c9ed5488042d0b3d4f3927a5e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8585345c9ed5488042d0b3d4f3927a5e_JaffaCakes118.html
-
Size
91KB
-
MD5
8585345c9ed5488042d0b3d4f3927a5e
-
SHA1
d88adb00b738920194603c525e966aac9ce48195
-
SHA256
f7fd65d325f76c20caec1f03844b51ba2409df9eafac05b7a822acd3ed39160f
-
SHA512
ed7c11a49d8edd9f5f2e30cc7ce7092682b6cb06e5716dc1ae27d730feeeb38dda5feaedd839905367bc1ef455f508e66313391b2a298c58f32f44e8edb04f6d
-
SSDEEP
768:STmWZs5nfzEBk3MjmhTappyW42ickcOAm8i9iy:STmWqZfzEBk3McTaaW42yfAm8i9iy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423279332" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B74E4521-1EE9-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000cc44ca5891ffd067a713b2b15868348a46e74b6d74173f4221b2361316bb763d000000000e800000000200002000000056a272f55a683564336457e7d872f9d1069fe8f8ce216f5dbf67cf1af499aa792000000059b696df8109ef8575f9fc6e16ee9d5178857eb8838d0e5e0ca630931f66044d40000000b539adc8abf2a2039a302dba4915ddc6fa2ed5a3c5213a3bdb260d21de2d67436d4a9896b700be819326236665dab75c96509d630a255a2d92f9df6b4b1efc3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c2cbbcf6b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2700 2056 iexplore.exe 28 PID 2056 wrote to memory of 2700 2056 iexplore.exe 28 PID 2056 wrote to memory of 2700 2056 iexplore.exe 28 PID 2056 wrote to memory of 2700 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8585345c9ed5488042d0b3d4f3927a5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c7749cda7b478fa569271cda7bb47a
SHA12f1e50b25cd02cee59d1098f7fdf4a1597b83ba7
SHA256c28d5f494ed83a6b5f3fb7252e7ce6e4c8a3f3ee1d631c676aa70ae6af89cad4
SHA512376dfec19184d8b3b0153a318bb45b8ab41ba9bdaebb387f5ef03b6d77238a2dd6b6544bf0a7628bec6c2ec9e56ac89bf66deb35640bc52e53f9b227ec2eea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540cddfb1d91854a10f36142717b65bcb
SHA1f980d333e2a82adcdbc7347b9bf982979ecabc5e
SHA2568c4b44dc461192d9189d300978ff2533ae11d8f825e41327a597c5d58290c4bd
SHA51280dcd6f7249838aab941a38b0af6211b27d60d3c1610ecc466ea159b7400805c565dc17c6054425ba9c8018a179e0bbf8b556944387ecf5df32f1451e45ab8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c963c8edd2575f4d3ede3b980787d902
SHA1a9c2826e5fbc93d1f75cd1aed84bf3aa5efafcc8
SHA256eb7071deadf9e88988ccf2e837de68f9c80ea4103e6cfa2c2e1a67bfbb0c362b
SHA512a166b7974526abe5820287d793b92852033a3647ee189316e5ada311036e8f95511dc8cb79925dfbfa33e308dcfe12f4a7e165f3dd8169048c666c1d6ce9437a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51931621ab49ceeda9792f15aa74c5b26
SHA117c2e8f59d084cc7c52319cf36f36b2975f17274
SHA2567dc05f328e4409df9b5f9fbc0de46ca9b89efda438c9ce3331db369afe855486
SHA5126bb9aa19d941977edc3231ddb869e35f882db4c47ec000d0a1f15efc15eb0b9b86d59fe057c1061362066628f05e84c8db19f88958bf3be76c21100f127f7cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e25b4464ef190bb28a6e4650d6da3f6
SHA15e7f8ec2b11fa554b88a7ce55c160bbc4dcb7ea2
SHA256195798652e728171065418881f5a170c95114e2fec03e7af5ee3e42ba0873050
SHA512f6cbe21d9701e6b84c10836235028e72178e6276bda4ced743ea926a9bd458861c985ecd605aef680cd1b72bfc375c1ec2c2d9f6df196bd77ff652df6c39403e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7d60f22fcc3a13879c1430803b22a3
SHA17dbc03c8f2fd2ff3e9ac7ddb6b9e89a32b8f8f12
SHA256003bd53919097a2420ce4c7ed5b567a20fa8dd0fbf10eabed2f02817847a4681
SHA5125017519e250cbe84486e73bd6dc89de185493a5e11f384d309f77ac63c44e249671ea5b0bb0df09c67fbbc0953a7a838890a4a91d636748afa22735faad0fdfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f144f28e13aa31dc9f37fe1ab57df5ee
SHA1f3266fe822b240ce1aa459ab858f296810c54e1f
SHA2569a1112c649f2663fbf8e9f3022c0b7e6bddaaa58bed3194be8352366f9dc7f82
SHA51262b89baf4eddad0f9df2342569a554358c04dcea01b4c2b76a98915f40f215ee7b45379164b732669355d12bff7084d8df79f8d4e4d51365a7d6dfaab1b662dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607caee82ddc48c712114a36488eaeb7
SHA17dc38cf148e7d30f8dda6a9d206245cab912c552
SHA256938eb5448ded304a624eff0dbeaca9d55a996fadc8895ff7d70cc79a4a67c176
SHA512a53df7182d5642f2d449a8405d8131b92bef77a471af72bc8757e9022102a4740bc317a732310e17d3140efb6bfe50447673d827d3f2e3466bbba479a9ce1fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718228eab43abdd0b769cf3e5385325a
SHA18dd4f71f2fce1640366ef62c582c35d8869e45ad
SHA256fe7c4c578f30446dc2ef74ba02e893b4db422640f510239cd5f7db3f88a6aae6
SHA51205a6c3b65dca971c62829355a5fbc7ef254550aa1ae23afc7ef5e255d792f1a7e829ed30cc0403a6782bf29ba238da865da0cb27533fe50b2cb1428131962588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589ed31ac5dd6ea6f63c7f94719e354c
SHA11bee5d5df4c2e74f209b29cbea14f4cadb39b242
SHA256207f04e3cf9a343348d2e0ab3290f76c1f3c04b9011beb53a9f06701b91d9408
SHA512b2cadc596275ddd34fe2353b1fed44eff0d59b228a6dc4f2ac0020d3abbb31a6e72d101d0ec1820452cbcebb0dcbf7a7b6a80d4c5279988044f81e2522a50052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbfe8e3389718a607bf78bda8f4afd3
SHA10d32d0a3a0db655906158dfedda0d90d55d7d117
SHA256b36970ec8dbc480f3b088d50edaec6d73e2bac51402824063f5cf004f392a6f2
SHA512444435bf84f97b1786b4aa2cf74147ba93f1184905c7651bae91974183947b566c7637f73f7b8f566cb273a0c069f5c8caad5f17a4c22899c9e41679c580b0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37386fbbd65ad6a6464a6832eaa2268
SHA14fb851c878a251bb4cb97a6d47aedfa92101cca8
SHA2560656ccd5c2fadd80c83851f3c193989714e162ae3450f3e76f971723a6e2ca48
SHA512166489db2e8a47a8dcaa8c13989461ab7edf7eece2b5bac7215ff3b8ef20a7ae5612c0a08117b43e237489d3bd12f79f59494fa18322ba47be28db78e2ed177c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbb5f1f8ca0f45df208561caffd52fe
SHA125d9365b33c8373c665e84721f421c9c210edf8e
SHA2568e27665f89ee1bd4efaf0824795ee1e2dc7732b5d4284c4384487bd9af6d1fbb
SHA512194f566cda7e3268ab552b05b071f671c963864786bae64239c5b5053b81dbae74ce477fc94511e3939b9c673818956c89f769aad518f34f882556aaa8c32bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba0c293aed2549c9864c54192e9b822
SHA1dee0b0ed96833ef10113022d1c714ece739a0fdc
SHA2561a42f0fa7de2e3b7cb5c6bb2c9bad0dfadae2e199c9d44719436aa677a421ea8
SHA5121cf2f33e6b0769c9dd8ecbbe2effdba8ac90cf5c98be23d0221efbc16a675edde6259db4f7ebd64e42e70b104947829da79ebf9d6be6cfb0eccad8df6aa06842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51893fbd8f88b45f15f8f9b16d7951d85
SHA1b31d0e8e197b322d808e37dfa344e4459f4e4e33
SHA2562ffe19280d599b58aa60fe19d9946a5db954dc79d929c5132ec475518ed79df6
SHA512ff5057e33f7aad939a26772a470f5bafee6c5b79349357ea81900851c35748983b927f864ab5b58c8878c1cd6e5de8bade06582b8a007e9001cfc95ac71e8d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca25839ef44a5e0ce701019be6f7ff6a
SHA111e15c841bc47bf42d01ea812ed0e8bc77bab273
SHA25659349c5b92d2f834bf1d90376e4003b53ac1c8a9626da7f5ea12ce36c5b12df9
SHA512467c518e5984e9deb3d12c7e2de6499a508ecef4d22735cd7adb8bfa2bc42cf35e78b48436619573208666be890946969f5595902b92d619209a24e22698a001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d3eee338014abe7b9b4af1a36239e9
SHA1fdf07421a6876b8283ce80fc43233828fee28959
SHA256a5e20b4fda7a9e64e51a328be216c8dc89af817ccd2e056dc50ff7d915d31b58
SHA5127acf9ff65767b272dea79d82ee0ef51ee24805ef16429d193f92f17cba00708fc29e36a8e1139a967a742a239ec1355b580fa17ad9c39b1220d32886d6527a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a741354650a178cfa04980ddc0c8e730
SHA16b9827a8060be152884fadb578bf25275cd81270
SHA2560e3229e79f1aa78cfe8df113e2187ee8c31b105b2f8d1d05ff186cfc27203a8b
SHA512e3f5e0cd57f93aa4671e3399e9110ad9a21d27715645122c5d99843bbcbd39073081031a875d830d9411c01c295b29b96b34bab55f2e6d5bd3e2d5a4e6664e76
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\lg[1].gif
Filesize43B
MD5b4491705564909da7f9eaf749dbbfbb1
SHA1279315d507855c6a4351e1e2c2f39dd9cd2fccd8
SHA2564e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
SHA512b8d82d64ec656c63570b82215564929adad167e61643fd72283b94f3e448ef8ab0ad42202f3537a0da89960bbdc69498608fc6ec89502c6c338b6226c8bf5e14
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b