Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html
-
Size
4KB
-
MD5
8667c4cf3cdeed23c7c80466032ee833
-
SHA1
b0ed30ab3385b45f47f289f457eb1055f3d3486e
-
SHA256
e1fbc71f7b58326e386ed3b3005bb7644c7fbc21549178a91749f2e5e83d96e4
-
SHA512
b9b64a5ceecc0d2f9bef07cae4c5ad534c9f1cb1ec28a2b1efae1b1d7a26be7870075d2c646d6834469fab688b782d48dee1a917439af13c2932eeb322f3f7c0
-
SSDEEP
96:Pk7hJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMd:Pk7hY1aEFHVKtF37sNjtXATIQFM93pDj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58A613F1-1F29-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000548aedab5911849b79fb6e4814ce13f00000000020000000000106600000001000020000000a2130a57749c81d7a630790f481bd89099f2f6b904f54d2a2311755e16bc87ee000000000e8000000002000020000000d312d39a13700e76c9c51da6c1654f6a3e7d5998966035379bd96eaa32afd1bf20000000d71aab92829b4845cb70cbb5dfbc034c467ebb38a57aa883ab71a25ee1f202db4000000016cf388a2d73038d04da5dc4d2cd8af896c855e46125a1099b7e2a2644e06a9e3f0d27b34dc0cdf1d2fce719efd6ce99b4a1b45d45f6c1763b65e685587d468c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423306659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f5392d36b3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2108 2356 iexplore.exe 28 PID 2356 wrote to memory of 2108 2356 iexplore.exe 28 PID 2356 wrote to memory of 2108 2356 iexplore.exe 28 PID 2356 wrote to memory of 2108 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8667c4cf3cdeed23c7c80466032ee833_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c82b764a2771773f90c148b7ebeec6d
SHA131f351ee3e073ee9c863bdc4c0fdac7cd24bf2fc
SHA256ed7c9d5258fe9a90be2147a472c5ffba180935872fffee9a2f5765afd3de77e8
SHA5120cfceb6fb208e25e5335d63681f5d286a69af025d239b71fe85ac4ddae1a3f5a3779460cd05ddc7e797fcc3d6f9a72f0aee465b6167108a6a9f6d3ad8a23243f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545820e164fc8fd2d992e9cd11055375
SHA14ca7e41ca51f8bc6245418a5f7df3c07e2e6e42a
SHA2566e29610e2f9cafdb9e14bbc01ca99a7d15dd12be41e35bad87cd9711f30164be
SHA512220ce2a628ccf7fea7b8f0c764a7c51258c4418d8ef63bfcdea19fafbfe28aa59cdd06329097794eb9140f8097836eeab8435a607aae59e7ae3375b71ecf8210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547baf717b074b069451775b411523300
SHA1729b3c70eeb65e5d1bdb578a43f5131095f08162
SHA2562ee435a0a3420818e7d80cbd6a398dd50c91c167ceca5f7820984997e7fae203
SHA5128b189f07bf016effb0708b96db4e53b956577c800339155d54000bd92ffe0fe767afdaf487e3ae5ea66ade5414289632583f9bbe86cf4a135b71db4145f34c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d138c6626d49cb192a92bf3c2f1cfb05
SHA1cbdf6ca43dab7856b8066f04c629fb1c9d773ac9
SHA256c9569021907fd78a866a39e28de8abef142f00c29589d8d15096cf6cf22bfb29
SHA51295b3d126e89e9a4fa4c4b42d450f9047ce9550b64f942c237c02644075cfc96fdd48069fca4ca44b5b2e93d3dcb0af8173e07e5f02a822ae9ec182477ffaa7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1a4232c99109a941c4d1b73397e4dd
SHA1f1a6593be5553e95da96f1f70d5fbc0d851c0d95
SHA2566b73ae89e4cde3febbf2abddd0f74e968a128308497efc4b681b9d564776f493
SHA512d18a9fe074e5f8ded2589e9b5cf78de7f7f7c1a683282f6cf6a4aeedf0b3cc6174bab137e87de2683a6641283e8a4882e9cf5e509cd83aa2d49fc190bbe2e92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571195504d368945926176f98394e332a
SHA1c5449da67bc9dd43e1b05fadb09aa8ecc02d4030
SHA2563646cbacded55f75c0fd1f7ecec0c2b03f8394f529291090307c2c0d1637b117
SHA512190c493a4b026d909068c7d9ba29af1bc818c2cdf0cee8ec71baa516c13ee6ddf58d000123eaf1e5cc0b88680e5f7a5d7f0e2cda1eae5b0c1512aee2d87ab4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae88808bc6eb0e952d98f54bbb8dfd4a
SHA10d8cab64a08b800d8a60b35bba91dd457e90032f
SHA256e7727766eb54c7f3657aa243f04b42bee80613805699a35fd7ab2d51af58d45f
SHA5126834cdf4da4fe57c5d7f8ff10eaff45ac956fc8328ef7d809220413aee246402d6324f7dd37320bf63ceb7c6e0b32ccf79ed91cb4ce26e28a593d5e8759e49c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c494c101e9b97a14230bec508a1134
SHA1a5d5733a4b2988bfb72b249cab88e59f0acd4800
SHA2566f4df6511acfb58af7de8eb9f9ad18110c53472748001e2ea40933bc21a42971
SHA512647de01d6b5733791774dcbb5c3bc2d39803bf0315f9ef7594855507e4e845b0b51859587f768aae9b2a49f59fe9339c7141917d1bfd3cb2dbb7c241484cba83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56588ab562ffb0f2a0559fc998b2e2f07
SHA1cdb8356c9e71f36b3dab5bb868302ac2b4e5f61e
SHA2564cd3b72134c2f95d544b348e38394fe570a21b78680dae84a8f9ce03425ba316
SHA512715e6ab8879441d7c8feb3186446ad0ac2053b5d9ccb44595b80ba90cf925045f6c0c97a9c9b1f37307bb530c40f799ec7bb5587eed5ed372f4fc86f2534f271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a6b8b0598a4fe1da028b740f3d5662
SHA1838f0136a9941dc11ad0b19730c973d886baf4e0
SHA256d5ae74105f7fb05099d4256ccf122ce65d6dc79f430dffd641cdbb6929830cde
SHA512372a804b6495a0b573077543d48702ddb827a98c5b6a0902ffaf3c0575540b69d962d87d329eefc373ba5df747396e956390dab9a3950764047c06dabb7774d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427431e90801e5d0f5ee71aaa4518954
SHA1acae85c8a5651fd57baf0270223bdef262dfb2cc
SHA256246ecf8e692685f4ddf5121feaf1adddbb1308d7806db721b85b4afe2856ecfd
SHA512830f6fba251e398575961c808826e4db8e5bb492bebcb3ab197b93e233fe0a86e8b0b6284ee36c734c871533e4acd99d7d2fbe93fdfc0712b99267b9e43a2647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3e8d61fd05d6fc150ec1d86a75ae76
SHA10611ea6e64e10f09f5edff4c94db64fbaba70b2c
SHA256cbafaed34883fbb0ff2f51d66da50924a5601bae22b16eb6dd878ed0c67abd96
SHA5126b38a909cab1b1a2d5de588b57dd439ab66e65724fa46acad1975cf713b9e35aea4efc09fbf3603bb285745aa99ed440e60fde77d475bc8b47d1cbac6056f2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edca3009f300df5e232312c0e42d79bc
SHA183217ccccd1b671236a5d0fcc8d56efefdcf1fa3
SHA256ab07e928f5fd89a46aef13a4be6fc2f2252a2301a89d0e3f36a98156c66fbe16
SHA51238b30bfee0b3ccab0f8d547c8fedf1400f0f75e8e7fee70eecbf1193bc4828acccc8207a31abcda5360bf46d9982ca466ff7478342f8baf4a2a9e45ec40cb190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ac728a6745bcd346ac9912b88a04c3
SHA1bf51f4f7de199641770c8339e3531ce652e7be1d
SHA256d44fee4de679731076399dbf33ebac9f39c3e9cc191f23ad6762d277fbbe5c67
SHA512352656eb4576e40640857e3d7f363fe2de4322c52c32e4a55a8fbabbce72f8fcea8b244da06a6fe62d1a67b3dfdc89a085e58b8a31d162e3c9076ccd48417161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb4473046e9c467a14c412433f6b61d
SHA1a1d3a2e95bfd919815dd6c71004838f9d9231bda
SHA25617a2b8f4a1643c1d0dc05301bebcf51f786af9b82e1463e98c547db6528b84d8
SHA512092f90c3576cb69e3a6cd86acca17e8abe27b84661e84778c463b82a1af185385a72ced0acdd74c11681418acd4e4d59a0a7b2b1c7cffc9c69b90aaa7af5a314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162c46076ee8f86f6196f37e4fc3f8b0
SHA16e9bd1b8b1c7b80c2b3e48ca37d7ea5c98450a17
SHA256600383877573018243a4eab7e4a3935c147bd20cfa4e15f72167434fbbe23354
SHA5121c757c4d8ca6379bc1f15e7769f6ec23688e58479629fd036999cffcbe8f6c2185b41aabc6c5b8be9a0a3ce3096c60bdff42f1aa37f12a54e7c54a8487f5c58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ccdec4adbbbe84eced6360f4dca05d
SHA156268d35ca8940cc3e868081557070b879d999ec
SHA256cf4d1bdefa6aabadf3427e63e85c7afac0e2bfc133e08b73c950546989a83ecf
SHA51265a5cbecf3607d7d29d5ce5ea6e8ddfc936a70223cc35ab8dff68e0d7680513eefb71f8e74e6b78a7e646ffdd1d17544dd93f50f435018176b7066afab2c4d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545aa75f4065427126b76f5c1d87e83e2
SHA1f7073ae11a66e2848e92ee1ff4e3b7f773f1df65
SHA256b71190c3ddf27acc391626485e4785084d7ab6d2b78535bb454adc0f03049af2
SHA512922638b50353a7770c15d904f9b51bf71d2eec044386f7d6c5259b4d659198b90a76f7c04bb0547f2c0a7b54d2fce46b2b334fbb53a2f30ac7d676f1c72ef49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8e63269622f7416555d620d551e7de
SHA18dc61ff89d2adffa2c5c366e44824db69c334ae1
SHA256d293fede01f783dfc04275836251ff14ecedf31e9bc29387458d015042d899d8
SHA51290f4db7e0b15b2d948853abf1b361afc5321f9ec6dda3daa6e15a349164aee964e336ec1d85aeccc82e662c31afa9033cae0e71c18fc87dd930f2a5f84756fc2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b