Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
8af0f1cc893abf5ee91921cac1f29f85_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8af0f1cc893abf5ee91921cac1f29f85_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8af0f1cc893abf5ee91921cac1f29f85_JaffaCakes118.html
-
Size
2KB
-
MD5
8af0f1cc893abf5ee91921cac1f29f85
-
SHA1
6101fb9e2abab1f5989ac27d80c032d03c9028d7
-
SHA256
942f7cd669052098f80399adadf1c8509965b9bcc02126619e031abbb7a8a60d
-
SHA512
1a4c7468c5bbff9b318ca873a34f52b3f92c29f24344b49c81376fe5cb4d7475619cf262b319c4e0fc4aa15c3bc6f341a64221768c25f8e652bbd10dc593099b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000beece920d020da669c660e6f303b9ecb0cbc752a367630ad91da29cf7c394a64000000000e8000000002000020000000fc8c993a0a9fbe5178c31309c6a0c220ccb107450c1fe8755ceec2747c15f7fb200000001a7eea01b694d50b65c57da3a00b8f91e33d4a622fd7a150bd0023b406968cda40000000fcb13ee6209fd2949cf8b66ff63750620b3e1b973b2cc538ad0f66cbb62cacd958f390cf0d49aee536cceca0094ef423d42f5be91d0b90577572e95f62a539d6 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423418618" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{056F3F81-202E-11EF-B2FB-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a2c8dc3ab4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 856 2172 iexplore.exe 28 PID 2172 wrote to memory of 856 2172 iexplore.exe 28 PID 2172 wrote to memory of 856 2172 iexplore.exe 28 PID 2172 wrote to memory of 856 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8af0f1cc893abf5ee91921cac1f29f85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a508fc7fb41e7d29ec0a1d624a3309
SHA12af9f58e877ddcd8eae05f4d7895e12267234b2a
SHA2565c35ac07ded9ee7bbd2ad6bb9a933626742af313eae70ba877f837a450bbbd8c
SHA5128ea7dd1e44be04433f29b77409d64cb2d9bb0f39c2e9109a780a0079b59d8506d718d954434b959803d00e4d82ed82d8582d790a904345bc012d485a63a4c21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50100196f980791740defbabd869985cc
SHA134716a5da48cb26122383efc4410cc25c7970893
SHA2565d358c530458e952bf4664b06728074aab9f472d2fef30ceb8e07974d452e2c2
SHA512233737312b671a67183596eca33472335181c60e51ccbe531474bd94fd9ecb157214085b9e4eb9c26aa32781d45374a8b8905c50f703405bf66c967f93cef95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558668afa20283130e77892f7e31d4b7f
SHA1ae3c874efc3bb3d70b9635cb709cce19fdd2366d
SHA256e3dd161a35fd937d87783914cc407826a04e7343dc8d2ed2e697f6558c5ab7bc
SHA5121346da71a2aa2c672c315185a52c3fbefbc71188a7513808a5e4710f34283dc4ca841c28664bfc4c3fd799d4ce5033ed40cf8e0b89533cf332409adf448db8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8a63edeb195c83d673adc633c42798
SHA1de2aa9fb0a9869e1d5c58017c378049551fe48ee
SHA25637bf48d6158d56ba4efa3cd7b6020a9a8d956c38b83cfa1a651620c9385d0333
SHA512ea05ca8babf8669dfa3667bb5b64fd3d515c2814a06ffb55c28dcd71d4819c2a21eb5b981a07296a24d1083aa583be693092c9b478bfa340d66bf6fb1b8780d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4bb109423497f96db184e57f668221b
SHA11f2029e632afbf5dc5e92cbea09515b769e633f8
SHA256dffe511d574e309a2913f1668b2377aa6886e8d10ae14f647a04b3fcde2788c5
SHA512ffc96eb0b1d624d2abf75a254d8d8c590409b7d3a4ae0cc863f7c65698230c7fd94ebe9256e822da3e50996bb99a29ad5615fc9f4f3980dfa79f5d892beb8a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b9caab9b989842aeacb6d0987c5c43
SHA1279b417bd4e2454988df9321ff70df7590837b15
SHA256bf1972e3daf5142f20496268d66a5894443435c9183856d60d260c4636532251
SHA5120c8bdef3260c50f98321acca2a6765f304ee761ccb766bdf76e2b4b0a718e04b3a7d6836c997d8565884a38777f6f3b4334af9a40bedc9e4483a6f4a8c37eeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ff5ef647c5dd99aaf9e25d8dead8fa
SHA1ed603e6c5846c630249455fac07bb7d058bac924
SHA256ea01d86acc78e720c4d5e1a2fc610050e6d4fdc530a57260ed7f1ef11b331231
SHA5122a31e9012393c1976ef6801c2d9310711d770837ae7cce3eb0944eb27c9c90777fb81908c45d9e7b9f8f54496b6d8f2fa0e026e71d9f5fdfd492ed36a47706a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500ec2682862ac790d6c286de4b28f76
SHA1bb7c938da561e9b2c0a52992b3a341ed88629707
SHA2569af0b9b14b9197f3985f410d0edde5505e75715363ac7f065472a23d958311c5
SHA5125df77d8d34e5b68f2ddfb9b70ba81d856425a0a6fa769d05fcf9eb936cdf103a80e129b82a5111fbcf357849e8dffb5a8bc8ea61be659c3739a04aa0e51adbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffabe0ab4d5072682defd7ff8053cbf
SHA1a5bbd7444027f819dce12d4f67753f057101ddc8
SHA256288f3ad9292c15dcf790e1443ecfeba7c8c1cf07fe1b51ad500f47e6b55346a1
SHA512aa935a24866bf6da83816e33f0b140109639c2dcb52d36c7d22bfe87dae17e1bd6f6eca45455c7ec316ecaa1ee5b04c9df1be2e1eb27589c218f6a623b7ab82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523970a562c94df031106a81a88c6d575
SHA193312b40d7cc1f70feb1941af0f04a281ececdc6
SHA256a9e6d6dad1e6d15f15c64e39cc1438fe337a5025f445e7ef7497957f3771997a
SHA512f80345fdadee9e8eac317bd1db867a7a4cc2a20fac5ad934d037d36f2c53e7f53490965a86771710c653798a05e901ce6426f1f41ba08179d3b1e5dc4e2b4d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7dc26ed25870deb3275c54be27b531
SHA180869fc803e1708e1f1af8aae15865ee22248404
SHA2564af1b1bb45f8f5fec24395555769aa1027e2dd080d6c5e289c5e72d01444ed6a
SHA512a6c15df2641db0c35b38384276cd75a46f793d1a49433e52f52c0a0d973ac91ec844f4c671188030eba7c6aede52770006760e637a04c3db876151bd4a8f70b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f35d8bb9179564a15f7325477052936
SHA19f8187913ddcd113f326e53852b76c459ff57984
SHA256d806d2d8b2d9c29da7ba6f191292ec488d95a1e51a654306eb92b656c017e5a4
SHA512f35da13da817db3e496aa74981d60c16c592ae7d24c4081ea283a30ae4293e2153d40292e59d5a0bf9dfa7e5a036eddb4b6f05e1e5f78f2e5a812a55d6aeeda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816faf81838e343c1cada3e604f16b32
SHA1fe3b1410e74e683ec6863b1c1e854e2f672512d0
SHA256f82aae73837c54a994a59741d86c92e330bebd6d50c2c6e683dd17e797ec34ac
SHA512ec6af632fac701ee20d1d69dd7229599069d705012ea1a2f33b7dd081df2b9b5e41a1138cdfe5210e530d16aec30ac33ff2e22d55a19194616025477048ffb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa254bec73801618f852f27d33ce9d9a
SHA13012fe8693c03739f5bb9e8ae3a6a21a87105159
SHA256fefb49fb3e7ecfa5c487f705809567e9af7a15fcc8a00eee2c3a6bbc33fd127f
SHA512a5caec16c34e5ad09519d8cd6bc24a99bc66a9fdacc885d051d2383a21c9beb27f287d8f397e0be0e6a7158c8a0f89e3b1f771dfb00d80a960ab5c062ae46955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2d57497f432f73b83aae96b3508b7a
SHA1682ba764dbcf7bf8c47007869ad1f0c3989e87c4
SHA25653b64ac00eada85cd7b39fa140a47725aff3da44ea4b7c28d5d7e4bda78b5acb
SHA512e774d44ab32b96554149b6a86357459a00ce51c6a45d22e071ba49a50bf2de9eadfa86e9cf416a8868efc73526e332a34e0637b9a5373b24c215394a6f01fd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554cc4d58b25e9aaa7a748e1b89fb8fe1
SHA184d3616a614c7acc836d233b518d0818aee26e77
SHA256cfe8f7c0983ca1ae7c9ec0da7d701975b04a0d2a7d29f309d73a39d197c1c789
SHA51282ed9f4bc287a521fd5d380f9e7145cb1dc437d54570fccdf85a62a1e34c135694898e859e080b2195e85af86e5075c6b3a4d25ea964a65661c3667ea3a3139c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca15721edd1fe52b1ff8a0e0f8aa9957
SHA1ab0e9eed7bc81cd33bc1af61c5e9bb14d0d57d82
SHA256aa3b2131e3255daf6de60a356e1350eb0cca15cf839e91c6cae6cc1c4d524b30
SHA5121d71df0d25592c1c88c0541641ecab6cd3698ebf1613bb02e50bf4fb8d481bb08f9d79ca028fc49a094c1d5dbc403a27420928f097ec0e2bbdc9d79f5a56ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffce41dae338b013bab0d267d7650faf
SHA1b923ff40a64e982f05249bda9ec3bf6bff1e963a
SHA256e3d58fe54d663a54b82b056fde746bc36e8f23a0161d502a4f01dbc0066c7a6e
SHA5126792c6ab061e6069224bed4bf7f52a5c2723082535463fc57a7d6fab3e8b180523b7118d7971851d3fd2821cf73a3e8ab5fc3e7e8237c36a0ea331cafc35aacf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b