Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
8b8d8dc161290763e914d1b6a9022797_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8b8d8dc161290763e914d1b6a9022797_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8b8d8dc161290763e914d1b6a9022797_JaffaCakes118.html
-
Size
460KB
-
MD5
8b8d8dc161290763e914d1b6a9022797
-
SHA1
86fa87e4085d849bae4c346ca037dc1668afdd07
-
SHA256
d2fda4b9c092b5661b0d081cbcddf0de8c7f05dd6170f897b3768a014b2c8264
-
SHA512
0510b059d8aa1dfcb441e93ef86fe388a7c280c45282e748865957b0aae78715a2aa0fedd792ea7c1e0a39ddc8357b9b19fb312f5d410723f6ab4bddae2cb3ae
-
SSDEEP
6144:SdsMYod+X3oI+YhsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X375d+X3j5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DBAC9C1-204F-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423432859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000214fe0803c007949a7803d01da82de6600000000020000000000106600000001000020000000228aec20211663fc8a4b4b6b89496611248ba54d2c571ac6ca61e924b9540fbb000000000e80000000020000200000001c5859d6ecd8479209af33600f9493fae024afbd8fc5838659a83cfa05f32d9a200000006c9f7126065aa46a58f5c79e12219e3534f2090b8765d6a6a6c6bf5f8b9f0dcc400000004e134332a3c2958b3258e2ab6aaf1e31c3eb7bfab35df6b59eda4ba10b43847c7cc6053d7ec47d8639b70150ef145141c97d3260340d85f9717944c38d9a3302 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902368065cb4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b8d8dc161290763e914d1b6a9022797_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58221be32d0bb85644c438bc5870c585c
SHA1e62b15c9053d6fb038571028624eeecae9d76dd7
SHA256a4f49c522a3db366cdc6a8c92e6716c46fa63fb1216c9d89b36ca51a88390192
SHA512713314e5f6958edd132dd9e9b2c6a6fa4768755bfb334f96a193308391927bc442cd7803c8ec51a199ed8221ddd11e81eb09f164d20560c48201885382b82cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc372281f1493957854c7f6e56592a1
SHA16c600d7a671b06baf636ccc44e36b8b28a0d6086
SHA2565c31b8ab2b39497c713257400c796db5293517eee1565ab1f0914f7e0c390525
SHA5126701dee57ad5ef0bc332aca368f61c2417dc480f1ae7e4a2b9514b336a15b83039019dff7b079767b0548199e5cad425bb1b6a61a7f17a5b6f20a30001a9e7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fbe2e7c2ab8f990876a20ed7952c9b
SHA13e79a7ca2c05f7ea4db7bc29bb4c8c7153fd5d19
SHA256d148e950c629e41c15eafccb7340679bde965cf8e120c9b27a12d3ad150d4138
SHA5120d3b25d914118640278e1d13b65cc6e30351a6b7d4030fc1191267f9ad17895dfa378c2b383472bf333838538acc3826b6654868349dfb6bf231e4455abe36b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e15c4d18a4de4429fdfe204da5105c
SHA14c50fa3725d810bd1f65a6fac85f0f62546b4846
SHA2562b8b93f541df0c3384dcef93ade4db9f5a7d050394a1f581099706752a51d07c
SHA51201dc52ad2a384d9be0983de62a6089ed908e2129bdb201ea5037664763da318d7650259e3aa31dcebc525aa166f7e1436d809421d775d70a474acb31e3e26c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc93a1c652ec10f61f67ce9d620c8202
SHA117cdbbf85a1c88d6719484c941ee44709b959b0d
SHA25656afbc6094ca0e54d17f40b4e1eaa8db63da7142dd61be4e94aa9dcaa1a2d8ff
SHA512a35e8b5650ab0aaff07596c13e2faebdd061893aeaaf8f375cfd0f5136a5dfa190ae0950751c9635f003aa2eba0ff65ae5538399e473ef5f82a88dc6d948fa85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580889585538b0a24619ad3bb8feb9e68
SHA1a9830804e96e26c63c265179cd49714a4ea8d1e8
SHA256a709d4d4c1b9f5a8cfc59b5ab7ed6d50ee4f8b07611e002813754ed001b64015
SHA5129761f71c1a6a2f398bddae118e1d3834af6bd530b8aefaa850add006849d6d68cb391a8fe6a178bbc5f5f80df32c862e4f69f0c93ddb572b7a5d63286a048133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8c7b787e27faf8bbd3ff6fe0936606
SHA1c2db5437af37def85154f69c4674d2b07f3989a7
SHA25601d7ef9b7ef0ef6fbfb76f29bf4d98edc04be963ef236d4e465e47da23338ef4
SHA5129a22eb02df4e4289b16fbad7e8907e700d81a2893586ce33af82347d1d7ee8c8c6e6ce683513e41543b2508e082476b2b11c1096d201cbdaf7363406a19aefe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b4e8a069cf4d7170c1fd0f194b16c2
SHA1453df34c25f4da1c45add7c23663999c0b4c3682
SHA2566a1665becdf0454ebd7580a6357e08dd4689608c9cda52230107677c258df77a
SHA51250ab4febad772129d03d4efc2185ed8c2745287354a2bbce6ab1d9d4a42d8a31e1d355a0a0418306ce32a977906dae0dedca7178f8340f6af6c5b0009ad9e327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291f8411bd6bbedc6a47eb00623213c7
SHA1ddd1f17dd1caa8a4be203f0b6ffb745196b5376f
SHA256e0154530cba6639df031477369d75a6e4a696db3c3510d6f634bf0bb2ff1377b
SHA512fa3ccdfa96798a3b27274be02a4c0adc91e8576c54c770a6bf9caff560d80aff5eef7e54c73ab48c24f2309176dc57eb73b394fb7f587d2f877640c682345898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e541f1d325cca05d93eb0de0cfbf21
SHA1d313f1096e7b1104e5800c25edef28955b23845f
SHA2565e5910e5d47eb45a6dc16e0142d2fd230f19e02e8e02a5060851a8505309ec11
SHA51211bd1d5651ded1089a145377873ca47832e99484e8c22cc1b95eb25cb9add07f6314e87d064f0b4133c10c1bb09c693bbb11a518d749e1c90376f9bc8e0637c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841c02761aa845ac3264a9c85b7e2536
SHA19701acc6a788ebbbb91c2d7fa1f057e145400705
SHA25680ad4d274204828c600dee331f09222b0977df2290ba43ec549597a8f667a090
SHA5121b02912425c48ed0d74652896d1dcc0d86db967e4428b668554b2ac1c4dfb17d31019fca8f076d8ba3995714c300a61bfad4bf9e4a0a9acef84609a878649a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e27db666ca56cbaeb5cb755a8d3ca5a
SHA1536f54417123475723d829c68313d60470934551
SHA25681c2cc677bfc90502dc07090cce67501732be8c0703b1e487f081b0a6a2d96e6
SHA512a4567e675f0d15dcc5411c784a1e8854d4c7d990fe373bb68f2d0418b3bff55a74bdcba1af713d666e72c86fb4bd1a0053c2783e33a92177984d99db6874c398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874786ec82944a62aeaffac8498d2dd6
SHA15ab3d5b54dcc24fda2c943ecfd0524166f1d3e05
SHA2563fd66ff5c3c2238c3bcd10c09b10d2e03c5a7035753f92c2af95094d4649ec5b
SHA512844c9b19ba63ad66b03ad6f645c1bd207300dec0a0c5cac1d6066675825e3d79de433c5e3be32adb35ef51afcd0931fb12483d9d16370a92575fda048735e594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750d807c97bc277fb1d985a9897201ab
SHA10969ca01da81ac9712868754178d78b3a354893e
SHA2561000d165f9f063db5071c3fa91237e1f476f7df4baa5b9760b444cbc819c6afd
SHA512888cbea94a5e03b91a0cfbe0b7607c35ff2cb48f3c4732c5be587f843300600f198a8d60e17ede08acf9da61da154b3020ec886602e49623a7cf668be3bb77c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57094ff0897e5bc3920f093dd78727c8a
SHA143c50b86e5b82752c64f8d7dec6b9c1f244366f5
SHA256d930b9ccc7961e4241d928a3df7a38b4f8f4fbcd6f748fde4f7387021fe96c3e
SHA512df67e8369f17469bf06283e627b79ec17fd13724065fae5dda1a0d5f19ec74a482d7c66ed4c17d437500b09b4df4008733a398a4612f997b63cde473dee87dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ace00c3310572a956da976478313e5d
SHA1daad4affd16ead2ec85ad573a19b9df26f29b6c6
SHA256e5bd53611e50bf6a6ad844f7a9bc063114726ac380d9bbe6739ec6da9ff435d0
SHA5124ceb981f11b9dad7d283312783929ef9fc26d591bc788a9ba0c8de0d4fa17d1ca4e33ab4643ebf015458dfe32f357cb5ede4d55660a37d9acec46f87b9e9a8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db655d87917a494f78b847b14adb8f5
SHA19c8d695b05859e0d415215c2e01eeab3b904f61e
SHA2563e6162cf70ec84d9f8321cdb3b421dd9ee1841a186647b9998c0829af0bae038
SHA5124c65f3fbf6b74ea6fa67717eb3e3e57b831f784ab46bd3f36031e06f850d3613fa5d9b6682af7e4cd4283e39d059679abd79d7944568bf3795896a13904fa9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6f3a072c31eac0d03681e577a3e86e
SHA14b4e8b497c6f6d7a03f99c168046a0f4193e22b4
SHA256a6fd88d5ff620c14b58f91fac2bb22c80122867104e6d3dfb8ea2f0ac39bc5c8
SHA5122a1a6bdd155b9d6ad3417538fcbbee365f9abbd8034f784c7b4ca15dc29f0a52e9bb24bc2c1e7a435ca32755be5dbfa6de81355dee8254a9a0de23f9dfa97517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee3791de6fb8362507d36aceb722b76
SHA1756f308f1c8548ba5017c30484adda74ba8048c2
SHA2569649bebac9f94b4bc89fc5ccec45a7eee8333b76250ca04b7e693bdb60b58d4e
SHA512e0b46d67e09ea4e541deeb25acc62e334526839fc317bbc754c20f16532c3228790cfd908d1c1de28a4ae2c8faeefb6ce4900bd2496b3ac4697a975c234411fe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b