Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
8a09adafea2664f256ed123fa6ff7750_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8a09adafea2664f256ed123fa6ff7750_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a09adafea2664f256ed123fa6ff7750_JaffaCakes118.html
-
Size
3KB
-
MD5
8a09adafea2664f256ed123fa6ff7750
-
SHA1
437206a5c0e965647fada8882903a85829a686fa
-
SHA256
e35bb1f51fdff257fe8e469f4daa6d73b9abb8bf4a2d1939845b87b32973daba
-
SHA512
96d3ea3a93ac209e686a570594c858d75bf8cb457ac5e003b8930c7e422d4571bbb654341a9d2960d45775fc3954111b7d0ef2103cc1f50d9fe8ec8c154e9ab4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eede1d40f1f35f4798205a18778b2357000000000200000000001066000000010000200000007e4d2ff6840bc569cef9667dd706a2b14fa64af05d85f3b8fa44aa488c6a977c000000000e80000000020000200000002b489d75236fe5b55b7e7feb28ebde52a560479219fbff7cadde2afd583d57ea200000008a880a30905ceb4f7e6a75297bbee11bafdfb78c14c772c7c8960e37bdf5dd6a4000000057404e18081015d81ce238cfabafd55ba4b2b66d7bc5f05c19cd309b54f2a67b5ba7aeacbf0c979b5eb0722567beea2cd04d0bdf080d0aff7ad2c6c9896f2f8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CF42411-1FF9-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423395921" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b4ac0106b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2216 1740 iexplore.exe 28 PID 1740 wrote to memory of 2216 1740 iexplore.exe 28 PID 1740 wrote to memory of 2216 1740 iexplore.exe 28 PID 1740 wrote to memory of 2216 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a09adafea2664f256ed123fa6ff7750_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f2e00e70e3296d3c4af75977bee46c
SHA199b58326ae2861af041fa605b648303ae3b4995f
SHA256f39f42afd4e7bbcc01b233aa5ef69a22c28c2e9f2accb0add42a78e12793d539
SHA512f9a40e525fa569797ef7251a2afc44fd8f2a674d474b0d085e866b3aa9d563beed3a5d6f43b3de07eb5a20eacdfca28f59f2513799e4cb541711cc2a02c5c93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8deb1e240cd2bc8c6467c771015c0c
SHA1491a15b13d9e991eb30890ba5289edb15873ae41
SHA25647a869a800ac1bde60881ae6bc6a80ad473a6e62199887c832c2a2323cef5343
SHA5126f9a9658f929b7734ab53563a592324d784eb54a488fb2b0653fa707e2dd14e20e353fc3aee36f02310de75d1a3148264225fbae1c4c3e59625629d1bd00cf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547338ef4b87c27fd4653cca47140e3b1
SHA15b7d2da527c5d60c33d9112dcbcd3aabd0c3d4b1
SHA256a91734537482827afc2b27d02e0391e3a2b00dbfc4d177d42dcbef8dd9e4e45e
SHA5124bd38699e8974ce26053dd42aa1cac00fab466298b4db8325b27a12c19a04cb908ba145af6d8f5bd4145344f544a6a41521f39002da8aef45d9bcca3d081deb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae790e6936299c369eebc095ac47fcf3
SHA1584fbbe09bef8d3cdcceaadd87c6a87a6b2f8a3a
SHA25634cc98dba90eff04cce5b8148537fe14184c24d0a7fb59d2c5edc6ddf44ed7da
SHA512fb9305e7b8a7a112d2e58aa004ceb9e5856f7d9f15e55ceb3a33fcb97137be6270ca8b90f4a14213dc4a28528d4ab7e1701732f20fef1271c4c73e8130f7a66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6173f9b40305f44e2d5593c656ab9a
SHA1bcaf9cf14c70bc8f29504d0e41bec92202d3d18a
SHA256a2bc85a40550f675066421714902af3c92ed37c7f9527f2cff1b25da9731e228
SHA51284ac3be9c87f622e2f63ff361f6f43726615c958701b318874c2ed5d26454fb240b2a0485a9c0e1e01046e9b0d5c30b550e064b1c2ab329552bf913cbb24c0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a8d57aa6a8e98973f1aaf829df1223
SHA1d5876a6767c36f632f09b3cfad25eaa8148ec4ed
SHA2567ff513471068ccd9b7d1d9d16945bb4b0c05054e5d37c73b639e265cc8ff5a79
SHA51294025382d066c2646e1a690ea039a55eb54827e137c89b9f358d8c3872a9628d2f1ae94b43fc50b9d1e2fb6212b27b868ab60f9b6f7bb18e5d6f169b475b80cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebfea78f8f9d75032a971d802aa0447
SHA1dad571dd8116013ca72f1de421c6c4f6162890b6
SHA256cf97f112a08ab4cc6af7b81b1a340d5da7613fc3c12b9e862b2a5202fd35f21b
SHA512147f4f077c632663182d58d87ff46bc083a9e4db09be9750f0210e0ddfad2abf5ed90547738752554d754e93f404b3c2a7be31c1e54d229295853692a76c66fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b1b51e00da32fdbcf0d4ff2e345c7a
SHA166a31eb02ca2968ab49e84f4d52d84b01487a40e
SHA2561ecc841412b2959eba43c1408eb7b9beabfb5bd5d5d2e865c0e069893cf96471
SHA5124d993cef0c0e3849f3b0c461821688e2e35357f998ea804d3219a590221580b3b19a601fec5e03ddfa13e4d714b57448b942d12818e81c6c6ec380648106efa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f446940bf2ca2c005f17a1b7facd3d36
SHA12b8e9a6449b9a9c5a2615425a42fa62fa33fc4d4
SHA2566441459e4498b862b3893c92dfdf572ee4b9c052bc3c7bdfe8ecadb9e2d642d5
SHA512c6441e6e42bd8d315e33866c5aa1154ebb6049416e58b4a85ce15c43ee338ba87440d900acbac439c2297cff42a67b7b4d41fa93998e1dbb87368135ec3ea671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534aa1afb14832d626b8472eaf6c6e483
SHA191bb031b20009ab07e0ec21776c36d8a15e08b6e
SHA256e4116dff6951a1fd3bf29a459b829383e7aed4157309581f5e3ad2a9d4ee213a
SHA512579642634a69f9ec7dd963882d9ea667931eca51c91ab284f497cf8716e7880bbc19760651aee38414c0797952259b945b90ec38b8e41d41f16e47f5eed72e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea62d576e3477a9d98aa8870aa23829f
SHA1f915013fe25ef94847ac0a89b2a4b94560060127
SHA2564d9a9327f298d0419680ac31e231fa81db5af4a53f2dae482fe93d812c10f760
SHA512f9fc6856ea9601ae7115c314d8255b81e796f93fae0ab4b48faf7328628da848000d61b2f70f746958a366c24d7aa1dcdfcf1d931e2ce4fcfb8c6a9e29e908ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c677d305ddbc90f78dd8b6bbd5b3636c
SHA1b1190c7d82beddd4862880ef4efe2ebfcaf51b5e
SHA256f87665616c17584fe43a14e3e1ea422cd8f7775ab72b302cd6e0ac084646b222
SHA512f5b4f9cacc17e9a7a2f159317b80af11d1d95713cf9cdfcdd2d9dc1e83cb07be06eeb6b3411331a9215e630bfbb06e8f3f25713a8700e9876a0c4b23d046be68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b118d511cd8b1748ac3e7052848815d
SHA1e580209fb8cb7b7f5431f7ce0c022034373e4733
SHA25655f7b28717a9f63427a2d9063d2f0cb44eb0d7466b1e8f1485c38be0c6c9ab1f
SHA512e0069f021c6084c07cda93a556d189944f2c91ce29774d8e6f70e12440a7b64a17456f32db1e6f7c02b67e38652d69cf093305ca0a1b48a55a82f9795b8a6ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24d3f681e77ae93bba31a971f0b2823
SHA110ff6fa50e948dadd798ac9ebab486eef812f4ae
SHA256ba214c7553fbe4e488bf39ccf513a1121c36327da011dc0d10f40878ab253628
SHA512e988946f6a03e981f5e6c587df29965692ef25c846d43720e6ccaa50bcf0132f129995811b1ea9293ad6063907d95c8fc99c67c77ddd5aa870beee8a3e76aaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52226b9a9e5104414f9c19d5e1cc5a588
SHA1ea2513475340b100d017e91bd4c571acabfa776e
SHA256cb58dd66662cca00327202582cbc47dfe940c3e263873abdd417902d235f1101
SHA51236c79d09eafa32edbfe7e15590b415eccb7a0542069f62c1e2d0791f76a7e10a8932228f7c570f7048a1ef6ac31002d8320d9e85711404c68bfb6e754b183016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c044b6b1b8d9671cdf23163805a60f72
SHA1f257986cfdf3670c7c55126a8e90ff9c223393a3
SHA256107909186a1b98f0330fa12bc4612c76d1459150cc916309b60239c07b612989
SHA51281b4d9d1467b1f135948d1e5e4b72965749fd889fc8c158bd47218862cffbfd1baf9498717780b94c043f677f17ff74b4c769d9e30e39c85099cfb477c83098f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551981b3c4d6f7d71d2cde5287ea54afe
SHA14c91002f05fce90428a30055b3de0393bfc7cdfc
SHA256fd7abce25dd8da1113ffcf05c1c5239f4c140bcc9331ab2138875cd808250847
SHA51249d70b34bb8fc3446568457a8122ee24b122796c28872774139862f9d69912f49d5875cb51073afe52bae49ed643e731b67d2e6064b736c75d1ced3e08603e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaeda36ca615b5e5060790682895e77
SHA10192c7210fa988dbc492832931e49a5ea7150b15
SHA2562053e9348b57b0bfd6e4360ec97d064ab57ef46b7a3740fb9c1bbfb266a71bc9
SHA51203139d5b6bd22a9a9922ac895a9a730db21fcee6ba955174f127b1b10a6eb77856240255035292843dce272eebf93314c01018e6c1902787f1e8aac138481d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547320b938460c9e58a240339574ebd4
SHA182268d8b7e2d48128e0a96e6d5ffe22eec49bbd0
SHA256f6abfe5dc7571c2dadd55344653e74aba632dad3798414f62e42cfe72392a586
SHA51242a87b15c18565e9b59d8671763c534d0a98bc5b2483bd84396c2a88b610de2fb54f1fae8d855056116e99095e0bc1115062c2783df34779c875f57f523cbf1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b