Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
8826ff75387215a4471316ee43d1474c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8826ff75387215a4471316ee43d1474c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8826ff75387215a4471316ee43d1474c_JaffaCakes118.html
-
Size
49KB
-
MD5
8826ff75387215a4471316ee43d1474c
-
SHA1
2a63251a5f178c58aff158d64da1b0f399498dd1
-
SHA256
7fa59e4892b447529f0a28f92dcf84ea1a36af8976e546f8c7c8114de8938969
-
SHA512
1c684fd020e36d1af68379fb3c49b6ddd8ce84084936cd5dd2b3ce131fe433556d90451950d86364af9734bb6755b3d115738416c398eb2a5c5e05410db544a4
-
SSDEEP
192:VCSp+RMzN7s6tbiDsFgMdwLJ9oBOUCv3RJMVFwqRlIAeu+Kypk4tYnSZPaSPAss0:VCSp+RM5sU2D243/ZOy1BQw63JK6pt4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c610957963a56489cf645706a0190f800000000020000000000106600000001000020000000acbc997252f7e2ca4a90e23120045ade721d04eebf1aed5d7940152db729c951000000000e8000000002000020000000807840234cf9ec8586e977c61596a0d290dde8a95fa56ae92c0c302b512b979620000000cc2bbd93a95d35f034aa5d81c0183a1bf0ccb55900f363b049abce45b30b72e340000000f3af8ba9590bfd8ff2a1f99ed7369949061394d97d3c667cd0ab54dabbd840a0b01b44cb1556a76b80eb6d2c1cd258c884a8a6f1fa993c0d3993ad252f182e5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DF07CA1-1F87-11EF-9DE9-520ACD40185F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3042814294b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423346963" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8826ff75387215a4471316ee43d1474c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513abff445313df88b7eebfbf14905682
SHA18f60afa11cd8cbcae7eaef26c32e76b99aa1f062
SHA25694ebc5f9b25c45ca3bea30ef8f6b215cf2547c655117e54405cda6a2dee6781a
SHA5127b4e3ffb5cd33ed2dfc0080c0be3685520c544e960f8dabd2bafbdbca666ac572269172c65e611fc08475985f24858554d284ff1912abbf642e13103556bff10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea6c28071781378432b32463c702b79
SHA1974d238afdb985dfdf82b3e27d7151901a664b94
SHA2567bbfbf0d9161d7c58f4bad228b6347ba3df25ab391aeb1c6b55b365e6db1aa2a
SHA5129025c9a1039b917e9c6ed7c0f58747558a0cbbf62b743ec60d219e9cb5cde77a7b20a05ea23ec349d3833a25d795fec604cc7484048ef336637d8685855a390f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d492cc829cf4d3d610d72a5a1bd186fc
SHA182e3df7d6d36500f80de2c94c1b1c848affd19d5
SHA2560e7a407f9f23485150f479e665774ab5f747fa22c5c977da8f4b494c918b67f3
SHA5120cdcd04f55f1dabf58f60827a784bab49d1dbb6ee3ad989b46a467aedb05eadc7809041b469e74178adf6f81c3811d3a7559409508b4adffbe283c5ccec47126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde99c538ddeaf84d33316b93aea1130
SHA1aca05eec547ce3ef35eb2888e79d0ab32c1c7e34
SHA256127fb2fc13dbdbd12499825853cf3bc2403fa5de8560c159bd8082fa6737348d
SHA51224ba4dc0bf63ab04a1b9160a8c14a124811775fad5057fb1207171399eda371a8a4776b4b38df22b1640723aeaa8b14832938eb8ba4921aae10a6ca829b905ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f466c2b98fdf02066bd3917e62d531
SHA156fe1b8e9402bae9483fb87602c465a1ed9c7742
SHA25632c701c5323bc165bda53b201ffbeb38a60b2ba3ab7c6b1fd8f371470116bc20
SHA512cbcd0da6744fe2347c2d0b0b8fe2db26cdc23666c87c5481f1bad376c5646e59932de0e44cf24282cd5b2b906dfffd339003159e7a90cffb1fa54c9199d473a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655c4fce8383613012c402dd1e916718
SHA120f4b01e6e53f90e6533aa726864c593cd57fb34
SHA256bf9492883dced2d8254c1972f973527af950c8ea2a9947edf8c4666b56f16b60
SHA512b8270fcb1c86ddc049d3d089016beb569d4eeea0379bb855b00fb4c5846b0b978559c3a5505c0ecf3b082553e8bbf3058a821fc304e31f47d2e0d0121d86380a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c074987f77480ff7ba4bc0761e01ae3
SHA1c2747e930946058f986b30b19274a3fb3ccec893
SHA25636c93eadb436559cf013c1a3a29f949f7125e04e28f6d7e1db1536cace8352ed
SHA51277f3e74da6c1589b8bbc3ff14ab1129c40a05c3dc206d47943c308a0f3d1af2b6e0952f4f95ff18fb721c3ddb0699d320195a177a5c89d9a34aa946e977959d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ab7fb67ea0607132b0c2babe5b6b8d
SHA1b411f7db537b10e2c95c3bcf6e648aa7aa6a6e86
SHA2562f1f156feb150a623486c102723397a441ab342875ece28f1137e710d66bb2d2
SHA512cacd1e494e6bb52f985e615df88381b2906104b38f35ee1d2f4d2ebb1ee134e178991df6cc4df87db4b5498fc1a531caf24416592e0ba607339b01676e4202a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe37bf2cdb69ed1c5d248de8f26c6f4f
SHA1d4c9699b5777f8d1e447b4badcbee2f8c0a0ea15
SHA2568d04305b2b9ee406bf3af3bd0687bbf935dbe2956dc68341bdccf697bd306ad3
SHA5127c7958c4883298bf836862c9adcf72a1144da6dabf389a1ddf7c66a026e0d4416ce4b15a28d6e770c53eed645f428818b8255a306d22b9566f7213babec893a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b4dde90804b973e00eb73e75683ec1
SHA15e2654065d71cdae46eaec456394b296a35a830b
SHA256c7d9076efaaa9e2721aa7f038038a2e73c17bf33286bb1c2551dc99fb5cb937a
SHA512e8ea201561f777ae264eee48ab058d6e3cf3f8eca854ef4b02321294dcbab1dd884ff77129f9c6dcdfff749336b3cf686f1f9187e5928c4251e0f50cc74fb195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c47c3e1ee5e447b7f962e2ee920f301
SHA10909c18f58cdd8fb4ea166217dd002052ff28fc2
SHA256b8a3977da914608529eb786ffb11e6ac364cc78852eb6d7c3f612e7868d76c77
SHA512c626a9c41007bbb907660e25699ef7340177f62488673729a4d54dcd30c418fda241e9e6df71e56909099bc2ce4ebc7010494a099d76c7103902e60195b9a705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55053faec959aa89cbbb823318886dd43
SHA13ba3cd518480d55668c2912b6fdb2d7ea31aa5dc
SHA256dbd8133594de15b6e4e98e9267044cf5355a85739b086fa85266f5da6fb2c673
SHA512a3209a3b02256aeaf6317de318d742c973ca101218c949ccc41e426aaa9c8d226afecc62b83f084b904c9c67119e8b0ea3dde0358fad81b8b1c44ef93be0a11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000d2ad8fbdfede0fe9a50ea3b4bff36
SHA18ac942bedb78a2cfe5fd916b30382f8e1f275697
SHA2569bef7e92ff5aaef1307fa8e6f6bae6a3acc560b1ce7bd042e3b017baacf06df9
SHA512552865be8589846d4497b4bb305437b5acc94878bdce9a60d6321faad360b633a625b8d59cff4bfe8e8adc27da7a1765430cbaa74a9dbf8a91f241993c4f6456
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b