Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html
-
Size
45KB
-
MD5
8b75e303aa30fddce4d9edf923cd2ee0
-
SHA1
431d8ef6d8a0626f4839e6ce6625659e2012a93f
-
SHA256
b86243e662c5e2e0522c9d5df93f78ccd09fe733ef7c9916feb2aa2c55232b07
-
SHA512
5a720c44f43c70c4e9630cf5a5bd2a59485b14cf7761317db7fd0e5f2b78dd03a1a77b768bdc8d4eac254f0e1d38562b8fce1285e0e5ffe34c68ca95da3986b0
-
SSDEEP
768:CvxUf5kBqkD2dpjoPAxIT0rsrjM7rorxbD2LPA:CvxUBk8y2wT0rsrjM7rorxv2L4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423430624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7C6A191-2049-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a73d59fb29edb4f90f7903d8d0a791e00000000020000000000106600000001000020000000ef3f34f26bcbf4df6e4ad686da8c4f22e60a08424f118015f3c5081afde0d4f9000000000e8000000002000020000000820f8c891e3a1e577b719fbb1178e838a541c08dfeb30014d2d9dada638836d420000000c185545be65ea08c9345995d381a7ce16e3c1ce0121467263be40b98e90f63114000000010dc73a31d17dc5fec4ec070a942c8bf32973a6189b080bdec3bc8ea61ece09108e45cfe2c5a4e0806b87caf171235dc64f0e7df79f87983f69a6933f93c4c7a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03374ce56b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2944 2864 iexplore.exe 28 PID 2864 wrote to memory of 2944 2864 iexplore.exe 28 PID 2864 wrote to memory of 2944 2864 iexplore.exe 28 PID 2864 wrote to memory of 2944 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b75e303aa30fddce4d9edf923cd2ee0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD519f48499afdb45d1bac582d1faea7f4c
SHA1e9d2dbb83bfd905efb26a6ef2e47cf88bce61611
SHA256345aa2eb6e32f901f27d564cec1b8e968047f226f1a0a2049e0dcb59e1cf009a
SHA51215069d6291019aa53b682d9ce5815f04874c95cd3445d36d17b73b83ca40a060e75f3259d068b52b9c0eae6c76e4162653467b40ea305c671a11ace2c2adce41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde8b6625dde0a916fe22cae4963d331
SHA1eae6de2482a19f9b57aeef4e1e48563038c30827
SHA256f1f1bf214119660d4dcc875160abb12e16ee2b559e4066a87a1a38829df2c0f6
SHA5125cc7a5e670a52bcff68fe56e93daf4c38acfd6a66b1f32f78093e4bff00fc060f769ae659cbc283aae58ed27460f2fcc1200a3b9207e3d5315ed83e12898493e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b9fa34e12e9b8d0b478c90c10ccd5d
SHA19f6c9d25ff98d540cb715c9b63699e71e2b2c203
SHA256198ce02fb3f94eef0883da0fedd70d6928e5bee057bacf9f09a28908f4455bf0
SHA51218905921a834e85279d274dfca305bf80075fbc5fefc07d23380b225eaf4dfd55861aea2ee9ba479df67b8c7357667b12e02dbf8f6b4108843ba7cb15582cd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3d65d95491c660536dbac0b33f98e5
SHA14c0896eb09e1be785a5affc97b10025207c3b13d
SHA256d96fcdb631a5f94a05d67bb960c4f2d2a9294cb2e8814bad9c88276c24044fee
SHA512cc2137ff739a056c1813c94dfebb4e3900e3ee00c59ab9dabef9d998adf63116cc58f0bc49c54492dc1f2ea329007b7a8bbcec448572fbbcb767eb060bca4246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58691a9d536276c9e33841cca989491e9
SHA1f8cf5493b479a5ac43a367820204ffe7cb694c86
SHA256e005d2efc6a88dc0a1f00959bb9c02c3a375792a45f966f6a9691c86e55c6590
SHA512012f07b24ff3bda53eea1f8e831fb3c2da7df9962eb7701f85690a29b6db839f4b33a08ae5c7c29b6b0f3eb7a6488a23a7b82d9a856b8ce6474e16ee23496b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e62a5afc4817358ea623958096c00f
SHA16babf2a028d6512dd3936827539fbcd77f37ffff
SHA2563b47010c5ea935731c194bd9f678d142bb0a3c2acfc3cd325f33cabe7d3eae25
SHA512ee6290fcd26a12a19eb13097b9da3085ac3bedd5458441a25c1d81fcd5fa5ca3d8157742b866070fdf8054a8a65632bdb73234005cc7b0dc8c84af734a329a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acbb553a898defcfa095b772a277eca
SHA140f81275487e7997703ad76311375cd2a2c21b98
SHA256d01c2594856e1e978f3e80e260de0e7a37c0561cab66083d3afd4a21201f560a
SHA512693a3002685922c4aa1c0892cc4fa43e2acc1952d1c59a8f395d1a08517127767f979cae7b341df672fe86d2a2ea487b69c6076779026fdf0d37e3cb6bdb8cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50219ff33d1312ffe46e63015f51e0e45
SHA18f25734e8d7acd2162f9d1dc3f13c617f8b37eaa
SHA2563f1003e56c94192e6b7d31f55d7059539df9e5b9727483dce4a4b62a557b63aa
SHA512201fce78257b063489d0888ddc9b8ed840d376f86e5ed0b4b92612a1eba25b05530a7b6c867a3a44bb17fa327417c7219ce9322cd216c9eb0ab8a0eab54eee0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b18cbfbc2e0ddc49f71d5d49b6d4b74
SHA1e51ee71cf534dc0cf0f89a21464588921a5e852f
SHA2565ae55c7cf7d33fa6d1671be11b4d2119addca302a601f4c6199fbc05140c97ad
SHA51286802199f12379095dd12b42cb018b7993ca5b9f550ae128d8dc968e4b639778aa374d414fa82cd14c5d34e37de8252080ead32bb16f09ab7a9a2c071ef4dbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d615c5ea183f81c6bf7ab60140b671
SHA19e94ed7c7449ceb87da104e5d4eaf75ce5d3e545
SHA256fdfb4bfc96bde579685055e83448662846f52199f71139d4692f30e3513b80df
SHA512a7ed3e38a366b3ecd11a518edc7163f94a85b7b8e40397a1aea4ec7242f6135dce12da537049f6722442d102bec8162ccb614b11a47f85e1cc3b2259e574c7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde59fe534e6a493f4980a23ed6b54c8
SHA1335f3fec89389a681b429047843a7cdc15a1a0de
SHA25617b56af57f65ac6350834bbf5a683e1f02105f23eaf9893aa25a14f99670059e
SHA512d86f00bcb29d2b432c9d08b68726547d469b907cc40a998133593eb4da5fc4f1fc627848ee55c554a0d8ac45f768e3dd809d4707660ac5e2eda47408e5ec797e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819e96315326b42f7166c65fa36132eb
SHA1588f8897c08169a688da57d891ec35e983f5a827
SHA2563ebc63cae37f201dbbd9de064134a745ced73f22d7dbb7a3dedf989baa019e23
SHA512dd2dfd87a5d1843c6f7aebea8253ffbaa1d7e95890f5d3ae7eb5f5392936f9651f6c55334525702524b734cf95c6b8bacf6052d530495193e8f53d2e593ee512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bff5e52f2ca2135bda5fe649c1e9fd55
SHA1c7e983db40e2bab98466d9bed1ed0c4038e9a83d
SHA256a09e815813d0475b8d717a91ef36241b74518056e541105bc537cdeb02078815
SHA51244ac08a6782024ed3f11105e7d5c331ed9b94053cb8c407262911eaf57190d90681f37216378ec9d684a0f78344e9ce7281e28f886839d93b8e8e6f1b5317d37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b