Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
8a5877f7f9dc6e6df338e6d1773319b9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8a5877f7f9dc6e6df338e6d1773319b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8a5877f7f9dc6e6df338e6d1773319b9_JaffaCakes118.html
-
Size
28KB
-
MD5
8a5877f7f9dc6e6df338e6d1773319b9
-
SHA1
a670b5ca3ecf9da21bbae0e9ebdc3035086ff09a
-
SHA256
ef2e37c74b010c16c204634fd3d3e726e467d310134d682f04506737a67fc49a
-
SHA512
40afe691facb73d50d9ea62e1f3807083893b96165df7baabe295a063e8694eaa7886cd0d145584fea2df7d60167e1e21570ccbc1863e1185476044d56209eab
-
SSDEEP
768:ZhppSSNzE+PioioZj3GZdXGKPP5CACl89xUv55nc8zreGk7AscoCAo:ZhppSuz3PioioZj3GZdXGKn57CloxUvB
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f8a1bc17b4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423403532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008989360eb0344743a43b674e7110383e00000000020000000000106600000001000020000000429df1b1ed3df68abdeead661e9152d92fd606ec88512549331450fa36f7486e000000000e8000000002000020000000cfe1c5c5c29bbbe8f909e09019120d3fedf53cba4bdd5064c44dab75266a4eb020000000bcfb8be4eb35a92a2c50976c18b317cdcc2cc7a33b020850766a58f2fb0f2eb5400000002891fdad8b4da7b9b89bbe6bfeb55400bb738a33dfda7a1a3588b4553108477e874c24bd773fa13fb6027c6f9fb94e6bac733e1322cae3e34dc581fa48c32e9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5868981-200A-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2316 2260 iexplore.exe 28 PID 2260 wrote to memory of 2316 2260 iexplore.exe 28 PID 2260 wrote to memory of 2316 2260 iexplore.exe 28 PID 2260 wrote to memory of 2316 2260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a5877f7f9dc6e6df338e6d1773319b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c0eed2e076ad4480ef15bf72913760
SHA1441aba2d4d076689ef7d41fc620c8e9743bb318f
SHA256bbe7e1baea964231c6e35c66fd879a15c4050b8181e383ee707a55f60bb15b2a
SHA5127c8464201d3d79a90800f6b80937328b20f31ec3ed34c445bcec5e3556ddc5349429091466d6effd525937993c5a5e1e42ffc3957fd1547cf0f6cfcb8da231bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417f248331282b573bce4a79c20dd4a0
SHA105fa7dac63ab4325cb085de6251548e002fb661f
SHA256bf7a0ca2b01c8996c2c53bd64dcf8a8433ecd1ebc67869ba6e5bfe16450627e5
SHA512b5ddcfabed843d7626a0fabfdf6823a56cfe083b848f0b89a844768945a5db50b68cedcf6476ea86aac7e24dac7492a7314fa8fb1e0e62463ebb69b1f1770cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21ab0a04417b0e5414a1a52047c2e45
SHA1b92c930d977503e56c09102f8dbaf28617fb4617
SHA25636f775ccd92395dbc842257f1c40811b9f7a5c368f654de3c8e5a50dc214cad7
SHA51286b5717a2a00f2a3abeeaef3107030b729e7f62458ef72ab92b0fe479a7ecca921e8b0f57b527586960803c71aa04ca1f7bccc1cea96080ee5a458e9991efb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240b2cab5ccdb22e1b771078514c541c
SHA1fe0610b905b689898ea7cebf5c6651b80e67eb0c
SHA256c3d326c87f557a74dacee8cb8dfa86ae8303d56bd9e430d6fe6143d7d95a8442
SHA5120627c8629a003b8ab723b53cebb61cb8ef7a69d10f43a17876978cd03637700cb00a64e8851e797dafdd6431bac35fec74db6103fbf6c28f75072c7a8b18caa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed5bcf9aa8618ccd96ec09174716435
SHA1bb2b9aea0dafbde43bbf9d2036cdb75dda595095
SHA256e637791ca6ceea1260bdb000d7ce2e4e28d5affb479bf89cb713f978ed7565cf
SHA5126a7f642b7e0eb28a646da4939d79e4a82f3e272ecb00e2b3c45d15283e94ff53e2c1024001d33986af6445abf1d9213f0369abc829023dee61ac293bb3bca9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516caa13db39f7ac4244ac8e5631727bf
SHA17d59672e367806ffa2b2b0da52f3dc5f01d12dd9
SHA256dc35aa0e00a8b12473e9718abeefd6e18044e6765d772a5981bf89fd51393001
SHA5126f6be4bd6ad59ccaf9e9897a273f3fc508c3cd15aae6af5408acd6438d978f7e953706e611d2aa247495e0a21c7c94858a5aeb67dc6b4fa0db2938ebc8bbfc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a5e38474f39ce68aad285daba4aa28b
SHA1c5b9bf138d4671f75431dae7a511e9d6dd77c074
SHA25656d0faf92466a1684bd679c2bee4ba37d140a4db4ec1094c64c2a5383429ac3d
SHA512b3a312925ee12ba58bdd3069e5eb9c238904e694e946d4e6505092b20515026c287e0dc3adf35f97511e9b45ebe93c5d3fd1d4e84b79ca452241f254b9c5283d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d74931b0f32538685b67085d1ab141f
SHA1ef2aa2362a982d0dd4a8384a23d7cfc95bc5197f
SHA2567fbe603bbc3f8b7ce144ed26102728a05a577ebd842b7ddc0433ecb1fdc86602
SHA512f5595125a8333ce6b5885610579f6af83659ecb76c8b42264e47f531c11bf9019d1845b650eeb29dc5d9110830837585ae05b7309b3858dd706e18861081f9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0468050722895a89999fc3fda4c5359
SHA1fb3a60aedcddada9b7237fd6c76e93cee2e43c61
SHA2561249b12a76f6dabb709357ecb0c95fcf812a4f0b06bfd892b71554dabf56ab1b
SHA512f5b9aef580f4dfd0273eaf7a8859f6a234f0d823d47ba3e13d1fce8e99bc639be8e1e424b7029f3dbac47722d49a68afd57507df5b7acdd7783e4c7818fa5ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ddcb702d4b25c36f0c83f59b29c66d
SHA117c474d799985f8a74d88585fb1a88b1cb06b3c5
SHA256662b0c38c80f6b91e64489e1ab317fde27ae19bc78a26a492c13b8df8ad3bd2c
SHA512055c3f1a07fc55fca7bae248e6912166c81c740840753315e895737dc4301b9cfb9f60a45b1f3364249ce928c6351b57050eb47436954d2c3343fe9f75106896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262288900f04c3862cd199db3a6b445a
SHA1e550f05cf9c732a74308bc528671cfd654b77767
SHA256c66d448f2fa9a4d41c34851bac11aff75bf4fc69710cd82b76041a90c20e4f36
SHA5128e709e6e83dfa6304517ec21114b55de4a8e1b8cbafdcad95b50b9a10df73318882577c9d547e59c40e7ce911465f08522b8ab16740c0a688302ffcd6e6b171b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d72e1bb15d362b12c53880fe1a4490
SHA1371b031d21f5be35c59b70cc37eb5b30e75c0edb
SHA256406cff8561cd29085fb4fd2b6eb6b26c5cdbae2c45211164061c451b0d464ed4
SHA5129549907094adf19edcc6a3ab43695ba5fb5b62a222554f94a5d84f6619f52cbab469ef3434c932735d026a670314c2f73cdf4fae9a8ca5cb65f3ec3e43296f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379fe8bb0b210280b68f057d3dc76b35
SHA1bc7d30101798ad269eb6bc5bd91a41a05436a8f3
SHA256a0d1fd905395cda6c2afa7ad23fb5c8c58c01fe18fb53f4240ba41e2b936827a
SHA5129389d89c8db7007bb4d6ec1436a5bff51c5bf82a2be58493d01d8cceadc02dba9c0ad8b205fe67b4c5c10d9ab3fd2860dac7d656d5d3cca2bcd09a1bf8309a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd4023a4c98ff210ce53850052761cb
SHA146862f4cea21fac555afcb449a164dc61d057c72
SHA2564718c7e6195061fefcd60fe6e612b674300fde7001ca1fefe47adcb38acdad6b
SHA51278d1e03af418119bbb195a4428912b5feef3ebdef78a7a41427ccdd6a4b57067b4248f6154e68f514003e1924c0fe451a107418a782501c0cf1893db0ab6ff34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a98ed4bbc150b5ac399c482e7420146
SHA160efcce92dd5b46cc0358ab08155f1acd84e3cd6
SHA256cde28374164d81f4078a78892f4299c4302b6cd5e4a6ec820c1dd79cf2fa1b90
SHA512b4ec25ee4e1721796e296b63d5b7ddeb3961729e2d25fd5b0aa4140f7f96d1775f0a806b15a4a818b4b90438db3f35e3b96ca18591298c8dff65e6be6d1f9abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce5f662ffae16f04868fb65fc7d69c7
SHA1ab69b49a1296673605e148d09f0d44c26f1a95b4
SHA256bacb166f9b01fea3970ca212162d5948c777ea2fb80b6729e9fe8a9dd59c742c
SHA5120966ce8732f77aed265efb7404cfe5b79decdb9eb676275a0c4857a3c42e74a62389a3216c3192c9e310cd289ae785a46b7e41d02e0006019d9555d1c8d8b7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ea7fdadbfb4a33310fb4d3a3a7b703
SHA1e417a69108399c0d89abfc49944572ec431bb817
SHA2562bb8e18e159a7de08a9405f1fa870d218ba6b14fa5429cfd67979b935a0cb546
SHA512ed735db812041431c40bae9afb55989a4d9b21d5f5e74ff2431e7b62a55afe8d1491582f650e0895838c6764ec4241dca56d2e2839cce7c4e481bbbde17d371f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50575b0dcfcf865b0ce7c644636aba0cd
SHA19d14ced25f44b2e99ea23a46bc09bbdba255acd1
SHA256c78dc600047665a2a419b73b3c139ef7714474cdc510380882831945a057e9ec
SHA51239be448eff0dd7efd44878d1f09391d7085f63bbe4eda02ec51f726978e8b52bb531636a414e2c2edaea3685ca484289e1e44351bcd075d7e37c202cbd2313cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50795a982770e46f15c7c60c92a4d4c0f
SHA18aaaf03c40250abdd946d475093abe944435b00e
SHA256d1ff6128fc02081464074e34fbf5fc3e7740351e54188e50b324a9d838bf4681
SHA512a2f029bad861c6d2aa8d24bd292d45a44b61dd0b127844f7c675bad0db26f77fb4b0deda5d7e51eb50929ab8f0bed3116207b9aea71cbde71b9e4ff9d673d4e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b