Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
8be8c690d25e81bdc252a06d1a328ce3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8be8c690d25e81bdc252a06d1a328ce3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8be8c690d25e81bdc252a06d1a328ce3_JaffaCakes118.html
-
Size
460KB
-
MD5
8be8c690d25e81bdc252a06d1a328ce3
-
SHA1
2f5877f99463401049e334e9bf3aa26868a042a2
-
SHA256
807a184f8e96f09cfd32207f4325be25bbee954d4bf51f59e70ce20235d3c226
-
SHA512
19c42d26ad4c3162b64bc422de2aeed417a6dc72e29f61ab2fd833f0fa67c5e315f3b012829413c2fdf4bb208c9bf8ec537c4f15697ce1700cd7ef5e17edc617
-
SSDEEP
6144:SosMYod+X3oI+YYsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X3o5d+X3C5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5082b81b6eb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43336931-2061-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000007fa4c2bd8cb4c6064693ead671cfdeac87ae2d369b14c28190b1d68a122d0600000000000e8000000002000020000000144d0c96bc764791ed24620a5cfeb50c32c05d4483dc26161131bae8c71a6c6c20000000548022a9bb712b39ae3336b4fa945fa0fad3354207f6d82e38b2f37c382397c8400000009f76fcb306b47fbbe911cbfc41255f8b3a8c9958cac07851fd8e0482ab7a99fa0dc4a9b76f24f6751775c2aeee9b01c6d78147ea178db982a8439912d9faef62 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423440625" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2832 2232 iexplore.exe 28 PID 2232 wrote to memory of 2832 2232 iexplore.exe 28 PID 2232 wrote to memory of 2832 2232 iexplore.exe 28 PID 2232 wrote to memory of 2832 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8be8c690d25e81bdc252a06d1a328ce3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e791d829477e2a4530a4bf3ee7ab8ebe
SHA18b53eceff2e8b02fa0d93b0402d200d73db2e191
SHA256278b57e0957bade8ee96eecbede4413f0561fb8be30f57fd32c668081a2a21d7
SHA512d066f5f75e1240e6334a185e5c0731fc08ebcdaa5150a9688df03017eea5b2e8af2c107bc0dd71593dad81cbd84c3c47e5f431294c78ad5dc39d192d88cc34eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615566bc78b78f95b9c7d5747660a54c
SHA16367f69b033fbb6155b65d621603d3eb85654b00
SHA256e382c7b315ef5257196d8ed828f9639da96c4b8a40db9ccf88abcac990c53bd8
SHA512bd2d776be3a20dcc92a7fefbaaca789670b188af640c76ac1e5b66abf24d0601479299f1bef6dc38f1e22a0743ca77d77fe1799a85a3fa29909f1dd4556c79ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078f9bbca68b385243138e8cb6d25265
SHA1bb6c74c7c1d37699469fa2958b5563ff1fef766f
SHA2569f7da4b0d4e07ebcd985b452f7f90f55ed276cc2540581adab13cac6a6524058
SHA51215b1268e70491f9166ab1a6c4992e80ac745f80cedc0385d52f7de6085e967ac1f544d4c6086cf2e37fcb7d63949707a2d2ddedc50e0f2346fe5f87cb0774423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf35b07355d5e83c44c73ee1c0ffc95
SHA131d5009ea44b9abea70c29e4ca7e5500044b99e0
SHA256f6af30c4c652a3ef8802516443cbfbd2d8adae51838de627221b937e73639c4d
SHA51229bca0c0e10e35f2f9a9df0f6eb7ee85ad37eb6ae98c25a2f487a8ee6347e71e8f8af58f59abfd620f4cf82ef6587f38224bce30e4396314db203c5949123876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5065d978f9fe46aefa9633316e14b52
SHA17f1c6d9d3a73ae690cd83d9e9fbc95c0048bd57f
SHA2563219338209483dc3d0ea115ca0f499ff98b7ec2b7f582f217bfa95910a74b121
SHA512429ca0057f314fa39df93d41fbc7af21582f241d3477323b0a3adf449f192db64e3f62aaa3688ca517fbe30235e0be1ea2bffa3315083070287905214dfcd61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0688d520a3496f4ee7338488986216
SHA100af761fca93e1f25c1d3631e77f4bd117c79cab
SHA25626b7abe227ab22c169b386f1a6da24fe71c8163c7de7a9a63b28167f84b5427f
SHA5126697a695bd6c94b411a41ae355364341b58b1341af7ae1c122c3f9b430e71d548a1579c2a998401d8b88f79f10da150789dcaab29b300fee729ce2ec445d16a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05df4e3989f745360d249e13efb2c2a
SHA17195b5fddde6e68af410da7a3e8ee3fb2d8da6b9
SHA2564376e749ba3b79fbac673f8353e3e88532963f40366d2597242f8fe27984af1d
SHA512644f06090c9bef30bb981bd70818d3d14bab7b5b8096a25544835f553456a960e3054875bfcbdc662ded885417eab5506944e528654eae8c50dfeacbc9fe5007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb1f5d1be5796863a99e805ada693b1
SHA100d3eb05da760186ebfaceb0514592664c52808d
SHA25604288c31ee301ae2e3cc6dca961b9594619ebfeccff5b9cd0eaccbd4adcaf579
SHA5128733f787d671b99146afe537f0401a717757886901ae3e212ec5da01b59592ec47fbb5b2c3b2a3efe409544d1cfe412e7ec951689a03f8d61d01dcb55ea3051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addc532120ed0bc07b3c8e8405548014
SHA1f8dc78adeda8b76e9df6fdb829bafe346acf9578
SHA2563cf4fd3124fc90501d35c5a521c51405a661537242080693eb3ae7e6ee7701dc
SHA512816ec14ab1ffef6a185cab0b7cf20f5a1077af79f0ccc379caecd97072d1f6de6d0b52b748c5461146e718d71a7aa94cc4ca2f1a0d4fbe7a0eda0458494d526d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56badad9e44b899b69d356730366d3cdc
SHA1e99d69f3792db84561af298bf2eea86960381ea3
SHA2565266197948d8f4fe724dd5398ea9c6cfff8b2fe1c4cbff890eb944c1dbfa240b
SHA512dfcee8c1a64dc670c23a586b0f8703fde0994ac036398b7e3da504f3c94a4bba80485723bb47fbf4f80b41f32b8479791c09b9a2c8146c5c2d00b7579dbab53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fc506b9de0772e0613d22c8b2c89fa
SHA11c05393e884a59423957c741cab8631eacd70fcb
SHA256524ef1a0594623a7305469f1de39d04ff72c04d9074ddb175ae6f02d29c9bcf5
SHA512be0e6fe91e3ec0f6834fa70690ae320d673538ce002f8872a9596a07f9da00a78ea0dfed68edf64590bfa330fe6fdb2a245c923247788a70acdaf5765eebc44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a148b5876ca4e840321fb63b177dff
SHA14c675e2c7e08dcb21789ae9a558fe5d0b7e9f0c7
SHA2563d34000fbf7f0ac1f2f542da76f6816923db4682f9053b07d18f2ef317ff5ca1
SHA5129cbd013756b4382b9fd376b8359da012ed2a986fec4638df7ceb4af7dfc0243a7fe170c35177f4f53dfb254c8cbc87aabbdb26f57d0bac5c22c52c818b8063d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88f58682a739c46960a685c46414052
SHA1f641f85e286af3d88f6e635b49d378cae485381f
SHA256e4fdb1909fd9ba13c3d07d775ab292820a4f0dcce279a5388368903f5c016677
SHA512f406d654a050d087cecaf1a62d4020bd54fe8db67e9e7f04d662200e5ef5772fdb4fc74221447af5dcbdbed704f1f76f63f268a9aa35e4611886b1b7c70c8e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb9bc498822432cf23463de1f5d4015
SHA10f5a82a45d080ef29d130a635b5733f9fd56f35c
SHA2561a201e764f7f9fc89806868db38f0d3ee5ffa02c5c95d40d5c8200a1247068c4
SHA51271117268fcbdac736b6ff7a700e338fea8afb55ecd4208d8bcb1206d8f63e806bbfeb4c3dd6a389413ad2f3240902022575c95c2567897bf7cb121bd66b88643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56187e8800bd1b456a40008ee92f21b81
SHA17b5698e340f8a41f3b48ac91139ae1f398f469de
SHA2566b8004cd2eae24e8feeb92c7ba9295154c2931218b3750055d52e6e109251b2b
SHA5129b3ccacb7903a5dfbf9cab90cf6088033c42aec0a9452e1a3d8c21512bc8c7628142be5afc4b0586daf07a006b9f322ce7b1241c1f8469abf02b86dad1f4fa4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e278f16152d7d2cb632e5bdc67c4294
SHA1e8c8425989a5cc543591056fb2b9471390879f4c
SHA2566bb6ec5354f36d24defabca3ed5d5c0ada877b975d651cd8cb1f0a7f92538c0a
SHA51283c63dbb5d9119206defc72432ee63c1301b76edf70d55d700977a07616baf3632f4e6ab8063a6fe65d3cacd1076d15f0ebafec78e0a888831dd594def0be18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c6bebe5adfa7ea28dbd8d2b9569856
SHA1b3a5877a230b907b27006180bcb2b4f8c0a789e0
SHA2567494e09f4f25731d1d206ebe1d737e3a0eb5b214ae2c74c7c6a800635033fbd7
SHA5120cfe24c7a67c75c8f2d3ca3a836fb7e36998f816a94ee46d396db5d47507e932f4b8a32135a13f156dc2be0b38f306675e7990121fa3606fa683af0de03999c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b616ad2c3db55d3aaf707c70e74a7a3
SHA11be80c3abee21c3640b49a026b62ed4a2f120d58
SHA256317a5baa7969fbe3101414098b1bc6ff30e2bf7230d0e1b6d60cbc50b84440df
SHA51220fe32085a72ff5441d36e031e9879da88a8393bc597ac75d9b5c1c073d7ed58116d53d7ab6b210a404c6836ae886e7f9167d720b0614a03324649948ccf8f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b89cbf91c60f37fdd8bd8207ff988d
SHA1649f072a265ca22768093f65600119d0529d8b08
SHA25679cd207e6ef7c75c64262745bbc420da2d33e02792b6b396925c0cb0eeded0c9
SHA51253771e1a584e4260f390ecceaf483b0850394401a7ef15b95df67a512cab8f537c4478ae88a52beeb952c3aa0ab1152b9092898d80bb440f1effc130dc361c96
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b