Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
8817d2899b1a8ca4df891e7f4dfad75c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8817d2899b1a8ca4df891e7f4dfad75c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8817d2899b1a8ca4df891e7f4dfad75c_JaffaCakes118.html
-
Size
3KB
-
MD5
8817d2899b1a8ca4df891e7f4dfad75c
-
SHA1
3c0d9a22e7d8d414884ae301553a167d4f43b312
-
SHA256
cfa4b4064a06f1117e4f02266df614c6d18946e197afa3e5040b121015c580d3
-
SHA512
508d4ac0cd4ef2828cbddcfbd0f8cc7c5dcbf5d5401d7a132735a5e63fd493946954331f3db1474df40f4538afa359c458d0ed8f1aca1dcc0ba039900afdb55e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423345532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235b21187e8992419b09441783fe0bd900000000020000000000106600000001000020000000e495a0bb1a40b047fb6c75be14789aeaab186f14393970978aa9c56884bb2218000000000e800000000200002000000020a3591dafc9bb00e76d4ac6022f4a3d367ce7073fb2968ba2148c370ae8ec9620000000e5a072276f0e627d56cecbb2e981071096749859684e1510cb4c903fba428c3b400000000e72892eb58a0cdc56dbb559eb461fa37a98d31abef756436c1b71bee1a8af0c6100b0cf280a440686e2751cdcefff3c10abaac77f63c343e58df27814c94c19 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235b21187e8992419b09441783fe0bd90000000002000000000010660000000100002000000007f955cfec6fb2da4e154d416f0bfed10c7372ca037cdcd783dac827ca39fcc5000000000e8000000002000020000000c07d7796ecaf10511d1b02d311527e4cebf4d54239339796fb90dd20bd4f6846900000005ab511dbe5dd3253cb692c0f45bbae7d59ba07580f5239046a00774e807526af75dc074555819d5bd763c492f46c960b112516409ca575d74ee0a587e3423d59979570d0588e4989aaac2dba26ab370a27c6d5f2020d0f6ceb9835b84812ce1d1d5483be6ac94d0247dbf258505f61ff54ea81dda9b7e8f854e4cf8a93af1991aa7baea221c0b9e2e43fea9bfeaabf68400000009bb3e09279044baab776929738d1fd38cf213afb67d21930d707d32c41c143ada0b46e89be8847b530b48732498f21f17d5c117eb8ba1b6a76cb3ed91843dedf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DABF4E11-1F83-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0df7caf90b3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8817d2899b1a8ca4df891e7f4dfad75c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c99a8b07b501573f59baf257df41b1
SHA1ffc4b3403cda3db6ed4ed3287153d4686c6b3276
SHA256abe5a206bb2b4b0c9983ff1c2ff240eeef92ece4fe3ca63a8d6d04d07d267bb4
SHA512584bee9c20cc301dbe8d498eb9b3174d40143a349af9a6fe3340084bdb4d9c3051b7fe96c55b812e36f2f53245e2b7b9b155c7bdd243bee36410157245b87395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ef3e5a9ede18f6539f9eebb891cd14
SHA13e1857e4d3db93752b5231904d952d0bf9921229
SHA2562c3a5cdaf515fc9fce1bcba2f6b49ac2284f9a3a5bec7232a87afedf623596bf
SHA5127767d73aaa26d82cbbf07a0153620686e1d176251c4e199cea429d1064932fe8c3277b2b5fa7501128e68b69c9b86593cc1987d57aa9f19e866aab1df9094c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c092f05e38aa893bb56f6f65677f77
SHA182a4234e612d6bbb6c8866a784cab49d48aca258
SHA256984c007723bfa8542f4749bbcc41123dc2905b2670141d2ea33e18bbaaf3bfb5
SHA5122ea1bd2b68b01af3e4ad00713068394b1efb2115b28688ee300c71f48004a9290b293a49bb545ecf537ee40bf834dc63e8e4476b9068d14094bb51cfd4fe8953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0cd2472ff1ff96a4aec1b575cc73da
SHA1ceb80352fd4d8e4a9eccb226b4db23fe063b1dbc
SHA2562785d96a9ec21dfc38318c17f1c08704a16bea6085112500c623cc0b3aa22a2c
SHA512b6f94ab57c0cd722cfe88f4ca88edb13cfb6e3ffef8c39c99f91a705c02cc2e35697473bc3c33b041ac90e651a4838a7b2d95a5e3bae3c3d1f500f0aa5db0189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81797f864f53dbc401b93f44a3d1368
SHA1c250e1d85e1fb585402c41be7434ab72d35bdacc
SHA2562c99a74bfeb7634e126b7fcb4098e3d360c378cf81a09ec67c5b99a52e8dcefc
SHA512d92b98759a52429f131dbc5915cc0f314a4b2be044cead4edb7b681546da5d440d20db79ba4a62b7fccbd1cdace17deb90889a4f994c135cacc0e7d0b421a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b09b18ddbef9c1dccfcb7c5ae9fbdd
SHA1d67fa207604ba6b6a0ab5afb3255552f7d3aeb69
SHA2561f7ba7343c74e0acaa0fd1f1697e6b3c3db7cf34e7f74a9260433bd97b5f6d97
SHA51219a3af69cb6c0c906ee65c20663a4dd103b227e0a57c18736ffbf492edd0bd34e3b11104bcc782039f90415dafd11fc5173b684510940d30936f32980afd0a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d88bd091bffd6d4d6c0c30792b8520b
SHA1f1e54d50b115fa1267ef0680785fb50f64a0732d
SHA2564719380b5cf7d95663befb2bad2d39cd68b10573ff4e5d48d063c809e42dbe9e
SHA512675ea139428ab745034825044641d028667103a6da2d270cfb30eb7b32e0f8f2f710088ba5a033e64ee787a0cbc11d655706d07232d37448a7d25dfa785fc523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca02f5f71c956b3305d687a5a4d296f
SHA174ef8db0358895f18f4fcd02089c8119360497c6
SHA256d8190e1f7ff8cf1c8daa77f3e7aa0dc232c9e97f473079791a016a13538b3b7a
SHA51292fc970e12ff4fd0e28efeb99242d604188084bc722dfaf1ff9679f0e034268c60a08bcdad5707f49090bd7d17e7a4f2ba028a13d4d769f6eb51b8cd10ec9884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51423cb73c0549742dcbe3e98a47ab226
SHA106795a6061037b84a0f5f25a3fd49e4901a134ec
SHA256144ed02a2beb4fa83db412fd09a7ad2d9ae816ce35702c910544cf7cc5ca8776
SHA512df6ca8a7484d96ea6fbc67fc0ce4763264f786384dac6fd39b81b169e2af013542f0e198bd0d21ae5e121249ee65aa05d04b13b445e1c035fbc8e1e227a4edc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c99298ea96e58ba06f320b6cbf257dc
SHA107006f02aca41f6fd5c4ce7ae0713dd4891415d5
SHA25668bbe160aed6fe78ae1006549284b56866f759ed6966d7a49ba04f7d84d94270
SHA5126eb2dc26af89b52888048c93a1fb4c73e8cc21b9233d043ad8f803d06d44df91a54b831dd2529b6ae37f4b8aa7319139d9fe17891db0523fff2b02dd79d067fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505403d6fcef6692d40145134a1f8c13d
SHA18be60675edfd9a0048f86d5add4464e775c94d12
SHA25646e9ac9efa485373c43be5697c565ba8a03bba759d9e963aeb4334543b7e4044
SHA5123ed3da332860d1efbb5663f836a81814c28ef22b6d6334c8132ef3e628d5ef0e19c32ecd9367a3422b35e3f4caf0b2ad25921f6d149048a8bd023b74e65f4e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61dce460e7eda5322d0c160682fef2b
SHA1efb5f96fd39c20433e8c23c01cab82fe3a51a43a
SHA2560314f56cfee5ffb9a06792d78ea10fd1c08fde6ccf70fb70e4340ade426bc25a
SHA5121330c4d31db306499637d424edca18d4107b6f587f2bddfd3c61b567705ecb15bd254eafc494b64b257eb05c7ad2db7ebd0c0d6bea64f2e0ac1843b93e169305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837e87ca604fc87d679e130f9e2d2ffc
SHA1f773aceb8866bf39012008260901da6d33f83da4
SHA256a9c1fedd5bec52ac60e9fed564416761696eb9dc305fbfd8e136a6adf3b1f980
SHA512344481ebe13bce7140f0800b40d4f0a083d2f019fa309336ccafa635ad32debd7b2be7b2691c03b77c4f2b9f78c69d63edc0ba01d1f9895c68d003f54197d01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d04be673daa839a6e0194c70cc76e4
SHA17ef699d4a4ab68c74e59d70cd1c75d7a48cde670
SHA25677b9a19231c4b64d905bec3b7583f958a01a3772a7fe314aff56a89751d58ea4
SHA512aed622280e9e4fe4a243d2e829dc4cfdc6bec7cda963c07d3af1abc98965d77edf25a1c4eab5ac5021cef1badb5ca4c9a0ccab526c7cca409d0330ceceb774be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b879189aa296e82dfed5238eba550a9
SHA1ca67edebcefacb71fa8785bf2feb052bc682541b
SHA256dc4b1274da2243edebcda3dbd3c48c5046f954171f7f5c55c5337e219dcac8a9
SHA512fead40568688ee7ffb1575346c446daf2a10ab2edb3985ef3447ce6e7d2f284f89abe47dd4c7aa10e996eebad09edfa97178418ddc484cb796f321ec15579019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7f89ef5568af9fd06311ae15ca47f5
SHA16613f51bc24210a422a74d707f036024d8213733
SHA25685b4526b896782eaccd74e49f460854d13071ed55b5633030037fec758710d16
SHA512a272543ea2e94252182eb2d4b4a93e253fcd9dbeef7526023bfd9d1e39496aa7a1eb1049a127e14bffd19451b6964c2373ab56c73d573daeef9e9d6494815789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674130d2275b6148de42e4a93f40aed9
SHA107e5ef36d35e58759306e53d9866ca30048d2d2c
SHA256a111619107c13d943e25e4e49f18cd7494ece1a67128656e58aed2e047987ae4
SHA512797c37954b0adfabf035c3ea00be9e130d87b82618f49fa41e51439b2a4b049f16f8753fc58cfc2bc60f7faaa2fc0bd596a6834d8a630226ea7c73cb68b1cfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e19fcedbc9a0aa067dff3e2510af89
SHA195a0ac72a6dabf389812a8e4e57cf639c088a40f
SHA256d9e6a02d758f81a7d6f31804f4352a8221c7deb63e3e8f4458e5a25e5bd8d6a8
SHA512c221b892759a4074b291e00b521d84df34f116e23aa40011b6fc6db4763f4e68ebd89ba4696945e2d318787c2fc29b0d1d66371325a087800ad0ea2c99361219
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b