Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
8b25636f849089f21cb29c3dfdb30c18_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b25636f849089f21cb29c3dfdb30c18_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b25636f849089f21cb29c3dfdb30c18_JaffaCakes118.html
-
Size
3KB
-
MD5
8b25636f849089f21cb29c3dfdb30c18
-
SHA1
05dc8629be2157c8f19ae05942c427656b95d2cf
-
SHA256
b90115e6a0b1e17f50c3831068d49b91cb649d65d47f99c7112e9636652cbcb5
-
SHA512
1d95589c060908feec6285694c47288f72a8d8f1e0e92a03a8a5a53fd0cca5b9139b86bfd99dc4784086831e917d5c914d9a5a416ab8fb29622bb25b38371d9d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fb56416243d4fb4a937e218a803404bf00000000020000000000106600000001000020000000c067a60094d19714a95b7d81df2b30d68de1d4b94dc8583f135b017cb868f496000000000e800000000200002000000045269d95f9aa545dfffb3a092c9d495bd69c649eaa03b55c755544f1ef7f0ee4200000005725ea4e07f21f97c8d3d9d6d68f4d518bbff8e3c2d92c56ffd594490c6dccaa40000000603d86f7bb71556ac38bf44ac8ae42059545bf859c61bb3b9a81858eda0a2e9e4c5ba4ca57aa20bde15eeb537dd98f3aa3c3e82e2913002c8420e4f62bee3adf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4449A321-2039-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06df71846b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423423448" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2740 2868 iexplore.exe 28 PID 2868 wrote to memory of 2740 2868 iexplore.exe 28 PID 2868 wrote to memory of 2740 2868 iexplore.exe 28 PID 2868 wrote to memory of 2740 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b25636f849089f21cb29c3dfdb30c18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edff6434e3f69eabeaaa8e9a86bec0f2
SHA15bc8c8101f932be02f3f93ae3388375feaae533c
SHA256c9dbab112b88d121011f8c7f0cd94721e7ee28fa9b9d2c9e44ac7719a5b9e857
SHA51252aca7e8800bbade5afee755677907e0200f6a1e4b5be26631f60d76492e16cd63c661f42cf5854060584d0a901a960c56072262ae83b0ea296833faee592bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed61b906f6e20063b6c576f979fc90b
SHA1a987195e5d8067ab9e71a1daf05ad3062fec95d5
SHA256bc69042936becf2e7c0a8bcbbc3b68cef9cbaf606cf4c9a14e220f9917f4aaf1
SHA512a144a24dd75636a90fa4a25428bac8e903991afd771fd3749fab8a2ac7e5af6b9f7372399b3b8037ef277df3752489e056b1dc51f3050281960d3cb57063981f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14d8cfa4fd1f6aa5b63e019abadb30f
SHA1f7809e513e57059c1bd4f3323cd9527201e74e75
SHA2567be76b10abcff11005fff2e4ffa5e0bc46dd3664eb209354e7fbba8fd430c4b3
SHA512556cd5f77e0fe2927a45a047002d2ff9593d9e9d00ab6f8c89aa6c0780e71faac4f4d49a67c9775d688a3e540bb0432b56121b96addc37e45f81268b49724724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15578c4a1b83309d674ecf36bcb430e
SHA14034e626a12b8282f0e31eb0da2257eb29768a66
SHA256be61962d5d5b42b3e40215ea09779c86fecd4532e5da50269509d95e55358549
SHA5120c309129eb15c9e796ea78d7d5b66260563a0c94093aaccbd7817143562ed39f0aca7efc0b9dbf7abb9a33c68faa6c8696f1cabd4caa5fbc0e1687e571ca5e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a469818c1af9eb13cd7f58d2295174f
SHA1fc3f8ec0e34d037550c6a9afa17e96ff90d2d454
SHA2563814a98422c5f3d04a7f7cf4bb5d1cc410b0586f8a419539b932f95ed76d1e10
SHA512bbff07cce06e2f86844ac52661b9388d18332e2d9d87924b591081d60c1fcbf8c0b8afe7df98d8ed08b06a119b0d5fdd99b6c490345bf2abc22a23a69c535384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a297b756281ea2f19bc715d2ad09a905
SHA1cabbb768ccfd4295aa20f5dda9eeee2876354a74
SHA256603dbc6affb594be2992e800b2e4d7e1a90592d9a6f98e6ea63fa344c6651aaa
SHA51227023afefd734ab16e6b4df37cfb478719cdffeea99322ead300e6522df488d55534f3545a44f839528dff6b38fb5dd8b061806d0c25c64347b91fe66a456720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13759d6ecf85ba54344d8c325533535
SHA1932fbed49855367543fc4f40be5223513de68da6
SHA25609e10149ad08d65942200872648e4c5dde12527075cb9a03709ed7b1b5aada5a
SHA512c348cfb3989771d2602499cd07fe18cd9bdb01a13c8169387cf3a2d66f709b587b6252209fd535902effdc809cc40bc8d5d5560973798329f9f8f154e41fbde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e640503a0c4771f9ef4d6abcbfddf3
SHA1af7eb9f55d1abfe363d4e3488580a2aabc4f56bc
SHA2563423477a44537cd12e8306d0859f54df0307fc9d56fbdd1ad02b81a799f568e9
SHA512170d6043f28cacab526051118f34e063a1a4ec61207f8d8e1cea02b72c996bc188310e2e61841b751c8cc286f50af8f5c06834efd5dfc686e3bf45b638a6492e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54ee6df5bc98732087444b73de4d286
SHA1c6ca99dc244ffbacc580095c7ae95658e7e321d4
SHA256e2038947d93568d6372e7bd3d35c940e4415c4d01adffd7a59f4753b9130a037
SHA512bdec98ee74eb8eed9505c81474c78695aa3d2be1ee30a62169fd3d87dc193c7bb91a7770fb68bd48bb8f82698e881e819002b1ecd0f401d79320e26050f8aa9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58658f142dc8563eec02ecb0064404496
SHA1cffafba742d23699439c1b70de62def6b6943c35
SHA256fc3110b072ce3d076dfc19150f051b6186854b3e1f79146263a13f2ee2b27ba3
SHA512f17db35622d80c92d475fd2211f0afbbd65b22e832c07398a1708c1941e5a4ded4e43ca67d264b46c22072205ab2e30d4a3a87621275aaf11a3305bb569d6739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae7846b89e0440a5f9e3ba8d24fba80
SHA1d0a6ecd23a27091b2f8eb5205db836f707f682ac
SHA25654f5438cb30d7d1b4f318686e08ed824d9e8837c719f4c53d666007901a77b3f
SHA512575b39da521cfcf0d9358768e29fdcca1ef0bd5a692a866043765bb65b7226e3e334a1acfc192d7b2c97537d6799f279b05d4b44f4d671b48caa70176ab39a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a8d260a8ef0f0028344da607fb9eae
SHA1b88d125c673d2c25d24a3187f12a46697e44a673
SHA2565ba7e9f7fd4b858bbcee45184847c46a9f93580c926880def095cd89e0162c78
SHA51210afbb3ff8756dbc899dfa1ad98654901d09d268f2e67e49ec62b373f58a6851d5790241ac33f632b3e6b7b5966911232b74850f719860aaf973c344ebdf56a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e131d5aa941a1e60978fdf62c87ae0f3
SHA1ba53b35b1486979ba03391749ee11db870fe1f93
SHA256d8c75caf1491852b6ab7333623d541cd174d14b3a35805030a6698ade8d3f3a7
SHA512dc66c02c7595f3401c06a4be9601c5c6793f729709c2060b4ee01ad801c884af1a7b813b762ec5f1331818314890e67fc2ee55a14eba0cff9f64a99a08a77cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a184847fa0d53d8ea888bb22c87be5
SHA11555f5e069eeb47732af33db355b81c80f28aa1c
SHA256180dab3d2db7a30699230de3dac14b28aa9284c81df710742989b077113f69a0
SHA512075cda645761870886f9d47d1150d4913ccd347a5a801f52ede8d254da0e5bf476993d006a37d50c8562b25c3204f483bc7411b40476b4f70481e72c0ab02440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4bed412314184b36b384acc56c4ebe
SHA1b945522dd1c0605081d24faf81e47e86c23b7f34
SHA256169d012efd2ba23b4e910c840bc00eebbb8e772222f96596d857f4b96fc9f097
SHA512193bc926481645f1b07d1a5389515cf6fc8f2bb64b174feceb3f6e4778835bf996b041f27cc9f34e4ca031b79c62584ac0b4392f56f46eca9f8fadc79130ee80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2adfe80cad2920bc4d68407d961f79b
SHA1e9d4174d98ec9f72ff61b615cc6fcb573b03e6f8
SHA256e22aa94c9ba23f4e0308f95962269f8b9a504dd7c9abc16261270027a8959548
SHA51211c9ee032f37970a20ba12a2cacd3a9efe5d7b79ecb8b3fdbc97755bacc9d4bffc694f0f12e8218184984ba9765c93a565039503fc516b8b8f8130b1e8249d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e745d297b73ee609ae7be350d645c164
SHA12ab3cabff39908d25fad16a84d52d7006ff5b23f
SHA256ce57313e2734f37a345613d23f412e33698c7bbf0cc3ed638de6323b3379569a
SHA512bb206b72a67bbb9c606e0ece99326e8da7215438e3b8b709aad4021b05a09050136585d2808d52211c03a9244482af1710d65cbb824b7e01fe4ca4e3c5a8f385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a710b84ce48db5b5fd9ff6a320271f90
SHA11faad9470a0ae8c08aea797056630a259281cd1a
SHA256853d1cbb078cab4d52732b93c8f2a02bd047a5e6e0663c1303cc7c5a681e5145
SHA5125d874bb402ec1572bbd10a12efed8e30c076abd55cc06f4fa96a792144c2eb3b2ab43c082738e9be10ed95d5de0fc923ffe8609d5fad3a23bbaf7af78e97200d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2799e75581af6689eeb2ded528d7fc
SHA1a8b0ac5e2de87031258c0866bbeaf888895ec394
SHA256e4db6dd3a12feb8bb9dbea85ad6ffb1b65c89114c98a8c94818a78bbd5070cac
SHA512403b78fbb6545a539b26bec789f40a43d165014a079a7ca5f7888a5faa63cf234aa514bfb271a4a4ced1354284e7981a0e4143b97e5e78dda1b3fb01e7238607
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b