Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
8be64d22a33b5d2553b1e8065ffcbaa5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8be64d22a33b5d2553b1e8065ffcbaa5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8be64d22a33b5d2553b1e8065ffcbaa5_JaffaCakes118.html
-
Size
347B
-
MD5
8be64d22a33b5d2553b1e8065ffcbaa5
-
SHA1
c1f48445df562f2cc04c2d0c5440e9764114df41
-
SHA256
30f05cdd3ae0439b396e8b134173a25276014634fa47eb36e81345348446d1a3
-
SHA512
7b07910e2a2afaf684c012c5888acc021afa6db2753e38f9e6bc2185bbf2a11d402fa2a793fb1535c1b73726910981dc3d8044b077d894f9f347257dffca321a
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a54d92a993e5474a884fb82c3141979e00000000020000000000106600000001000020000000fd8b6768f773afd1c918159f061eeb3c4c57a3ed29cdc0b3339b3d57bc180fbd000000000e8000000002000020000000ced63bd1838afc0798f5b128da3acb170e28187d62a0afcd9871d601c890174820000000ff13edaa443bfbd781593c6a248f81b8a4257106f0f9c23a8872df5c3ccbfcc5400000004f2d27e7ebf045425022c1700ed4dfaa270653115d87016fe7b8fe49eef249c5e709ce7ba8608fde6c6bcd3e26ae028ce77f1b321060ef21cc0d10ced9eef92a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908c19856db4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423440380" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFD82CC1-2060-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8be64d22a33b5d2553b1e8065ffcbaa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc60abe5392959dd423af1f78b4eb1d
SHA178c9011cdac7c6ce29f71476dee7ceb0f850f2d1
SHA256b266034558fb55f5feb3967ab9fa4c003d62e1fec23646fecbc22ec9c1c8903d
SHA512fa657402376b1fbdd8d39680f54c3e1265606cf81a6c23ee35f209f1f630fc580934eb4911ed8a5e7a9ed3a465118f5676c6d1448bb0607d229ff3d441febda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3f60a8f4a71c297769032da05d411a
SHA16c22ce5143142f7716c4163aa006bf30dbfd4957
SHA25635cdf8533362ae04e7a16093ab105e4960faed7b2308bed8f586f9a12324a84d
SHA51295739fa04baab0d57413c23f579c1863450eb468f0bf6d2e4d788b03543dae09e30aa0709da7e98f11b75a2f8d77b8c098962f3b3fa3395eac1092424c7793d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a9c8b872105d211bb1778b0a2220b9
SHA14d6b505b334e9714ce4788b6e537f2fb0509ed2c
SHA2560fbfb1c96124c2a69c7a5ee50b9dbe7cd63494efc3e9929c2eec110e2fa2faba
SHA512d2c6855794b95eab5b7ec92a05327f8c6bc333aef894451a2524f1604dd9bf5fac2f14e1c119e258ffaae4e36de32af85f1d49828431cd2d6b1c1a3f9e7a8bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54755b4586cdb97b35c8501277aab4da8
SHA1b9db8b9cf56718b8361029a4217347a2289c9edd
SHA25698eae8a5bc3355a44f3e4d5f68a7721daffe03db100b3fc1ef4ef51ac9b7e371
SHA512393b4a124c542081ffda45e472ba37d2fe979559776e5b23a18a4c9ece810f48b2ec69040331129b96fc7519c773629ead347fcee7d6843940e4ecf7172fd9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0411efa253752dbeaa3fb6d8dddecf
SHA1f1226254d176fa3a5d75de655fd5cb9a67f1bdc9
SHA2566cdac5610568ed07ca0f4e7a51144e272547f59ed7a999cba3aab3213b2214ea
SHA512f99a675c3c2ef8af8127fb4d498002c9f82b717392fe4519f8397d7827f115f942c2cfd2d1ba3fe4e113b70b4c2003f16d1106e421b57fcac63bfff33b72a2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f31ac31e81c5f7461b53938d3fa102b
SHA17bba22517d070517d91e258a3e126e84ec483066
SHA25635e95d5cde674d8568d6360bfd3c289a52c2f4257a8ba161a2d1574645aa6e7e
SHA512e28446e5c15ba94aadbf9638a041817aba2899a16d73058e4b6664011b9be3c07ff7b5795318cdba934b61e2f2521fea0a0cc65f6b5d640ab1cfb2d96856b226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6277f2b00c7bf0540ff46e4ef5535a5
SHA12c20a4e177beb492d0ac68c1992cc53355ee6b3d
SHA25693cf0f3a03052c63aa74fe603ebde2c54ec62eda8d23c1efe68c7bbf27909c45
SHA51201ff6dfe1de907a99adbf6f29258ccd707f9d0a646b4e0b54e67a874ca1441830a833284a6a6206e1d1f6acef78c18ac5d07f3403a5a087cfec98588bb60690b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53909597750f19e9cdc67ed452cf9bbdd
SHA1ee20f5fd2c96654ff7ffc524fa09332288cc546c
SHA2567136e292671bc02a4c10aad305764f638e8ff486bb512846e3b9084bc0507947
SHA512221ae5fba704db01e236ecdcca89c407252497b57b51c9628cafb9acc4c99e9dab5c2ae06b1f283b72cbcd4b156f61cb58c52b66ef35c31a1f83fdf9ce30aabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bba912b37d2339f742025f2ab3df7b
SHA1d728c62d3b6a2da0d3e4a12d70534d8c8c22a8bd
SHA2569401cb795d0c5cee96f6a9a68dadabc49f80ffd6e5f1f0b558e2d7013ae59539
SHA512b093bdd52731526f9f5792579d739fe3b2a1ed6b119ef6b304275ef5b7a8964f96036496f275d9824fe9bb5bebaa97f70b4b618cc7f27a93b6426eeb2c5e9605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f323a7d030c8e7bfd561b9a8352a00a7
SHA162cc5938056c8a00b2f3033e848edf3ea37012fa
SHA2568c436f5d539f2147aed3f937571c7e4d713d61dde6e2258b54c88a024d1b893e
SHA5124d02ed2eae7e6e564d2ad6233796c5072ed4fa730adba58c6684ffef3a8e037e9ec37c856bbf6314f279fc1b52ec6e7bf05179027623f00a2a67852cee99a57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb144fe7122e64c4208c82a772343ad4
SHA188ded0c3e0a46495a35273acdf1fb85abe3b4928
SHA2560de040659776f266fab40cad80353ae1d462978ab80f7800bfd3c2e158a33161
SHA512acf37931d9cf1e7aef955ce827a2e8b481258fec495e1ed9b0778fefad46948084d5427f7d800ce70186401f7a8415c17a5bc41414f149f9310019de9d5f8b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3c273cb1c3e8f6e66efe06d642b68e
SHA125d7e3e2a3bff1adf776a9cd90f740c744abf368
SHA256c996d09ca027b6fb7f622b3864f4a4b610ca87e7e1c140ca212c99539f45e460
SHA512e2eccb714af207e662aceeb911d3e37814b4c728a81ba4657b89a1733bf763ed6516b6959b747d09c5f02ce3a0e16f5ab5c702bd891a50e450648017c2bf083f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86a5d57b617acd246578fedea076f9d
SHA166a79ff3b51a0cba3e1a950da2d0740a5eb1f90d
SHA2566341cec0f664b11829609407b4d8d8d58a810bf26fe828a68d41dac67b07088e
SHA512e4f7d55f3d7aefa3239d802f8be3bd55ac2099c203a61624cd922fea81a0e42f34086b407113f5384080ad9d27a48dbd32b875bb1328f139c8a1a52c8c77cacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91eaf3673c9c9de1a1038d70723742b
SHA19ef8af7c153df6c8dd6c4caec16ebf9073a16d92
SHA256ed29af551df6779888b248e9259836c12032df43fa9bb45b2e20b490c4d49217
SHA512287cce087a087339fcd974a6fca724849b148d091e9cead65d377bfdf40673847d1ec13060b6ba5a5b3db4dc15614628dd4603d1c91e862c7cd468062a82f19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f8cd414bec6ba0966b13c8dac2392b
SHA11347f23ce05fde2d7c5ef1374e3b67125268e143
SHA256405cb5ce5d53940efc64f77425ee7d45e6894dfe135a95bc232792ab3fa10cc6
SHA512e70f3012e7e9532a64699fab6a3bece782c5f9ed82e237e3131fe620ee6fd8a6c82cf9db6bf14959148e0073d4cb7481ba94166a1fe0b85e31f970734b440edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f52817157115d4e4255f637c81efbf
SHA1de58217a05a6be58b42a15d1c1399e8e89d0b258
SHA25674ac3c4fa8f71a8dc3af93e0afb8d24ddf3bcef7eb47e05ede6fc8bb39247163
SHA5129f2e4bbfb24953dead2bc75e89f68e8326bf0642436b2bc0e4297d985fc46de844dadecdfcde4782fee5d99ad84e1dc6f2cc2b513b4333970935aa202f95d540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541dbc428fa91f5e6e11de4091b5ad3fb
SHA18e53cfd8ecd8bf6c092685a854f6c1e4d3133fd4
SHA256b3df2b3da23f5dc2bb808fd5026849b666dd74ba33d39f702307165fc2fbd526
SHA51237e1993814c8d3318cc7f1f57b57b0e9de38332901ca8b6d34bcc9180a69ba9979945cae38eeaf146e1db2f3a8fe6c0cc90542c6f0b6277a761bd36b814803a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f120c4224edceb069cdf8f42264c2c9d
SHA1c5f095abb029258cfa4e9ae0336e9fdc61a61998
SHA256f67be93432b752b7c51e5d045cd5d21cdcbe7dd240e0136296186e68f59f7a33
SHA512508bc962dfc0a01a9298da2c6cd4ea8f89dae982992e23745f316d784dbc39f9f27e9c95c97031432c7dd403d169e4d433c1c7c30c689ffe882682b17f075a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a1ceea9208d61c35fa3199bff38428
SHA1b7f8b71ae8e7fcef6b6bb076584b3a50d5f35222
SHA256425bb4ece38c1af3b11f3e664424d12194f6670c6bf75df61daf0d6e1f55081f
SHA51212d1a1dc5c1dbf00e0ac16c6cff59f21e9cce9173b5f73689a7286db94b36250ca852a6e3e49e98bc4be952a0a0a9444c803e5dec23db3099b501f50e2b00318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d51d949ed6af075fd9a113459cf430a
SHA10732701d580949abeae7457bf72919d49c28b08a
SHA25611ab25a0ee3b9527203917983ebcb176f03e34b78bc94460299017ddfcbcb51e
SHA512a2828c9e597599c27eaa94b04f3a3db5394c762440851ba9c002446f1f4f03c4c799341482312c30b0e6c14a0ae22ba1f5e40109ef645f3de8566197e64c6839
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b