Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
8af85a4e31299a813cbef25f38e38738_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8af85a4e31299a813cbef25f38e38738_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8af85a4e31299a813cbef25f38e38738_JaffaCakes118.html
-
Size
4KB
-
MD5
8af85a4e31299a813cbef25f38e38738
-
SHA1
82bfb80208bda138ed2ddd2a894ed23ff195b375
-
SHA256
cff6a7412dc6390331fb6dd8823dcd27c10f9651ea9e36250ac8406557742c97
-
SHA512
76a3e21084017fdc2a3aac84d56aa3329e50a10e2b97a0c263942d7503174919f6ab829bd71dae5a3560675e0209d26a550ed3bfc7305dd4654238d5795cbfbf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMnp/cid:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c739c0f9800a966179f83123b18051a0e8e124925586c6b906817f203ba02c9c000000000e8000000002000020000000ce82f6433d15e6bbc0d62376196c2f276b470546a8c9130b21680ada9ce370a820000000f49f3088f98c16b3e21de03fa8687642f37708e1251cddd86c6f4b3e761e758a40000000ed216f72aeabb75451c1229a82d0f24a9a04eb08821e93105bf2ff0b5e8e6ff236c2537e94022857b6d60008ca849ffb57321278c4453e794cf4f7f08889e1ac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423419362" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3046f9953cb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C178EC71-202F-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2752 2928 iexplore.exe 28 PID 2928 wrote to memory of 2752 2928 iexplore.exe 28 PID 2928 wrote to memory of 2752 2928 iexplore.exe 28 PID 2928 wrote to memory of 2752 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8af85a4e31299a813cbef25f38e38738_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d25fb922690bcc69d9e47a14639f813
SHA1b7c71ee54876f3b3368b03633836ea2364eb9613
SHA2566e213574b7b3a9212e1ce26cc253f6efc1aad93952fe93a7596cbe69952b122f
SHA512e91324bb8cdf96b8deaef78411ccd7854332c040ce1dbff1e232c1eb9ff557252494619930938c67e604007b913d870fd6c77b37e55db44b8396ee667fa5f9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9e5c43293566f00f3909c415dbb9c6
SHA19ec51b17ca7aa1ee896fe7a7fb50956d6b185b8a
SHA256aaac7e380218438707eddb231de00c8243f8e741b2c7d8e201e0237276aaf7c5
SHA512f411ed0216e87a3ff780e2fa185b205c55fe18a6ca20aa17611c5a95ae74e5e45817aed8e65f00f14bf2ea5920735f2bc0baee43075481027bd052b80f22d98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac1cb2c49a72756b8da47696e1e1fd3
SHA186600015d0cbc63c564307c903f5bbe7521553f3
SHA25633129abd689565a58b9cff4bd2f98042a96497c1d1377a0fbad5569bb7dd7413
SHA512907de1c1984f6b3f3eb761ccfd74b5f4e04c8e9635d80d328696431773e87024abad5b1bb6c25d0ab11960f9e6416dd6854264da381a55bf5a245808814cd2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f305c77685779e53e7bee232d88c5006
SHA1531a95b5c3724f705f7aa6223ba1ba930acd3fc4
SHA25692fbfbead213acfcc52731bb7d4cbbfbce82590a1d156d28c9a276bafcdcb479
SHA512a6ea950c096f925cbaa4481f0d842aba5d2b670d633a38f234c8574e5877582c56ee0548ad5eec0ab14102fd0212ca53cfe0699cb5112ebac9c8a7c7dc27af0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef2b083c2b1dee2215b62c812abd7d6
SHA1e60e1b7db593a041a6f4765300f95e5f42e56449
SHA2561ece63180cf24ce994763541972a4770368b147559d9a20bd23926d27d566067
SHA5120d5e92c151007a5be15e8f1a26badad1ede060a32d931500c375ea0e04d806ec59817e2bd9f3876e9eb2bf707b8f7daffa62a6173f9f93d6c5cb73802214555b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6753a9341f30b687b6b9b2b6042cb3
SHA1cb1e33b74302620367cb551a15e34b218f78930c
SHA256e123dd4efa22015f34d5c2eaa7b7798b462934dc433cacc8ee9148237d2e0f0c
SHA512a7e21abcd8a85cbf97eb9037850853548112de6f562687f6372465fe905393c23f629ea696617f257d59758cbd2d47210e1301560c3d0f156db0576212ab3ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9d3daf97c9432359a7383af59dd12a
SHA177398833237e8c0207b02a9c31864468bba41d30
SHA256f237fbbe243f6997889a970fbe3598788a8ffa5e32c92f46a8e15b9275a59293
SHA512649194789c7990d05c71dd9175f75b4f7421e99fdb5d0119e3c9794a49fbd846e9be61b41c44e5330869fd0b9b405e2e34b88892b99babbc4ef4a48a35ca6f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb01e48006a94f8264a2ac0020ea714
SHA1549db227fdd0a12b9e35897b774162889b9cd614
SHA25600130b10a76fa40cd2dae5d8ba72ddb832925862602d24dabc8670c18e6d8a75
SHA5122b2c3cd4a6ef3fd06f79684e7c0aeafcbfde77cafd6b732d3de1dfa2d03b4e50145d18e12e845f10b3114cc334329599ba3a94728810b75df7e978dbeb55a9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0e91fb363faa62c8c813a6c02953f5
SHA145409a498bbc8e02b58b7751d9bc5e7d40b328f3
SHA25653c69ab153f3b54f60e4b85accbd00d14bfc42ec282115809bb6bfb7d08e8674
SHA512917924d0943460ccf0b9b8c39878abb2aaa5c5d19baf64effa8726fbc5f1c6fb69049eac99bdd3fae21b20b6d59a45ff64508cbe2a4453df89d55a4dbbd4df6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6f2d32cd313568400e982e1893d164
SHA12dff26e1c98dcb21ed4571cc6bc591b42ddd05be
SHA2564ffa53e6e04f62ca6534801e8bfc5653dcf2aa39be4a5acc331b4870214471b9
SHA512d30e0ef8f8b4a7b4307685bbfd48536c396e4a10832835c279881dc2926108d748388cb884702cda406325064ef65e48d1639c88f967b4189b2788cf25d79e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2020f385e0dfeffc470b02eb867e51
SHA1a763c8768c9c46ebc7da2fd772079f626f86390f
SHA256d23d07c33fb4bf8a301701961896f281034f48adb0e05c0fd2bf3de26be12e4a
SHA51296667450e13d3b4691e0682313b4a40662e2305ebc9eab600456f854f9ac3b1eb118ade74c15d2722d20a83090f30e7e53f721a030daa5c546623d7204b0a87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbe0e9d452e96a921631f8d547583e2
SHA15b6f2909bc4de26f9674788a3ec84801801ab996
SHA256af606dac78d4e0fe77ddfe91f67089356adfc31ea8947eafd57af099f1cf8ea1
SHA512db42f53ccce188456a8c1b86e4b65b88d3542a28d0d1268aa51cf70f035950f36d122992afb2f9df413042eb416b558f9fd4cb351e52f8c1a9b106bab966e8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59286ec3c96ed0087e429568a82788523
SHA1f051aa15649954da643ae172807911f79a94d0c6
SHA2564513d97d472f160fd79c2097491fb804dbc6b0b4e44dde2dedd7d36e2328ad8d
SHA512ef309e362b32dc8bc0d829023558be26298d992fc65ab383408bbd73916cd7f4242c1296be35904888120476a795f662b926e609dc6ec4ac22e62c948fbe6b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36bf08ddfabae8e2bf5e63256de3f8c
SHA1d2f09f188c327cf8f2f66684fd1f05217643d3bd
SHA2561194c6f9ae39da9fd47885fd5205840ba7c878e90edf8dd3f9a6221565007aa6
SHA5128dd6cb74e5dc27a3a2949c8fdb2aa05cf7487736a6aa8014593ab3b099bad8402fcb02e01519d7579eed1621a72dbc7c86de45f90c3c9b06301d21f5a613e3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edabd62863adb473e64a42fb22f8641d
SHA1ea4cf107486e04f198b623cae8fadb12e9850379
SHA256ddfd413963fb087a85b7a61e23a3f95eed08287a8db198fa36c875925d4f6312
SHA512799c149c59a3a175c0b5a93e9f2536aae29cd205c2e46b5623b8194b7d8f93225cad353f64ea1c65033f625dcde663dfcb64f14daced5bdd0cc1baa2fefb6d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0375fce9e8348b9190326fd2cc67bb
SHA1e17efa9151251b4b844b5f91ee933eaf3a7e74ee
SHA256ae8975dc4485aa27a08a36d3f393f7194b8f0d0193829a5a005fa3fba057ceb3
SHA512429ae362d666259694b0ac83041bf903a0876a3fed729cfdca9ed226d25ead626983b66357b38db27b4c880131e332e1cd66db4cafaa1f71e8afeb87ee441c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7672640ec566e2588565c1d04b6428
SHA12b58fc84e9aae167b1b1ff2a88291ea7a0ac9648
SHA2564ea912b4b011b36f984d4fdff8cb4c50e33f2fb015cc5d4a603ce0733716fa02
SHA51269952dc89f6181fbb5cacf906237efbb4b72e8d6ff738ae2f5144d00bb87231b0123651aeb4a093564913741690006dcec36d34aa431cd93477e7dd6af9f6167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9041d9edefea9e2a084910137fc1d7
SHA138be4ed7356682b5ee6797caca34291df3d8d23c
SHA25637aa310e653afd7acc864c98b05b35d81852fece664d6dfabd96a027b4612a90
SHA5123bd6385da44b04f9f21fb0b146f14a6c57b5b45709f44b584f20cd0cea4ae197a5e4eeeaadbce870fecc869d7cb0a449c5b981234ba39f428180a7d8cc306854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47c475bcf86c34f69eb1b9455916ee0
SHA1e1e29b03c1057d24429d2ac80d1cfdb8f0c39009
SHA256c30cd7b0a0679f9107d2c421cb25bbaebc9536e45721d5e4faed9f0bf1aa55b0
SHA5128e3655c9aabb9e110269a1995c467a7d151479ff4e79cac4c25adc85dd597a36a0c9cf96e62c556bbbfdc6ef5d00073fbac76124500d895747d0923e98632314
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b