Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
8ba32f85105467dacf361dc3ba5b02c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ba32f85105467dacf361dc3ba5b02c0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8ba32f85105467dacf361dc3ba5b02c0_JaffaCakes118.html
-
Size
69KB
-
MD5
8ba32f85105467dacf361dc3ba5b02c0
-
SHA1
b5a5feddc2c9a1161be3581da5ef359b9827b2dd
-
SHA256
6f277a56617ce56ae1afb2c8c19ca7ecf9fe6d593d3da822b2998290a9dc1ae2
-
SHA512
99d2aaf995ce8b7f4a19ff9d0bea25b5f258ac5cd64f859dbe7670cc207d937189992e97696698b9f59059cc4eeaf458c1d64c34431bac58833d77b1748d020c
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sl6aJ5ooTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3VTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{374916F1-2053-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e7fafb795261bc46af92ed860210e06000000000020000000000106600000001000020000000c14a9aa1d43f3725ecdfed70912380b4be453914abd1d1c2dda580ff732f8488000000000e80000000020000200000005b36f9ccb888f4ac72743e8541aecf2f1bc0c2a324b7f6aa62a00aedff82bf25200000004e08abd8ad6d5f93a8065855d7765ac1695baf75d455c76f057395b841b65cd240000000d0f37cccfe4fe686fd6bc6bccf16c1e6aa8825b0762ee751ea9070ede92c3f92de3fa2f70289b443398d518486cec63615a809e6725a8804a93ced36f2428d0b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108d150c60b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423434593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3008 2012 iexplore.exe 28 PID 2012 wrote to memory of 3008 2012 iexplore.exe 28 PID 2012 wrote to memory of 3008 2012 iexplore.exe 28 PID 2012 wrote to memory of 3008 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ba32f85105467dacf361dc3ba5b02c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a25206ac8c102c721c3aebf94ca0c05
SHA19989e56a5564a9cd51302063153f30ea66696037
SHA256baa4fdaabf72049f6efe42ff264c82d327039e2b589215f74ca809bc72779afd
SHA5125dc6aeef15d9f8299ec68729f40f19f45112fbe869eeb82002f3ec6a3b7c182e38483368a3c8d09e68f16b2a379f34ae29958f62995c370a04103275648875ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399e16f921d41eac7c0f78406c41e446
SHA1f1247c54a1b9715cc487e7db55b6014790948e35
SHA256a447cbdbbe74868552020420742da9b1607b264df1b6db558e47e6b0d9b02264
SHA512fa7ae14c5c31c13174cbd7b4d9ab96830dd2b15101f9b776611ad88b3a5184aa6b632e08527722c872eb665098ef81f613cf32f3f033b6be1e9642fad58af711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adcb0377e26fcc7b1c3b46464e850a12
SHA1097079a6499f1bffc6797b7872c13c948791ceda
SHA256f6e27154a233c9bd185b691063bbe62e6d335db4ebc6c81336ae9c06f50c2071
SHA512bce5ad77267bcac54abaeac52875904ae2fc9eef3437589a661f362e16063d53184cba6cbbc41ee4a116d37fbf507a1069f436043af7856e1edf4c1a3d832308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02c6e209ad77b301ab4695d66a08725
SHA15bc4470a4415fc8ad829f07dc681b7e101c480c0
SHA2565ca53d8699e8b0a698be294e864dfd368e3867c507ea3f6fd3f21292f1ddadc3
SHA5123054aa0d2988782831a13505f1ed5ce2f5bfa68b5bf9e9a8bca59f3e6fe1e3b476d5fa34ae5e2ee902469eb0d44c26263bae246d1e06ef20518b1c78305c76f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aaccc2427cb078b5ee8973943419533
SHA152c756196b54ce0ef89ee3d925379003a407df87
SHA2564933f530e552921e2d0187ebbbc282b9d1dbc21a26875b7688abc945ce8ae957
SHA5122f1a1983fcc5031009bffbef0f0ae56c600a5973a837178ac394399eb375cec3ccdb155773df9ec99c1279aae19deb181bebb266c9810555c1620f0b59701643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b9456e5c08b37e4631c5d3722d45d6
SHA1fbad53903ec1927a1ca8d38c3ecc4ec0f016d856
SHA256f16fb14d891f34e63f8e57f938dcf431f8512623f58e003128a86ecf20e9bf51
SHA512398164693762a45e2c4b7baffd58c0284e77b7eec1772db835581c9ea323ba7ce09d20dd27bc0af56133d119d59242e27cd594f7bf75d8dccfcd2c7e96988f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff24432197357e21e3bf0b9412abdd4c
SHA136e3653180c5ced9260c3c2f0ed48c62fdca187c
SHA2569b642fdceef48662b8612f8e32b650a3a864bfa28740612b5a8703742b3fb6f8
SHA512734e8cc17909e30752fb9062cf935657009dde056d30ca89184dda19929e86cabe1753b6420dbf91e3259c5d9763bd613a9aab694857ee051431d3ece22b9b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e95926f133543aa0a0d7ec6b45292d5
SHA1483f5018d1ba0c2786532f5ec7fbaa5cae3e44f8
SHA25689a9d0771567c2de88eab87b434b8e761355dd4430c6201293ffbfd1699c3f43
SHA5124b2197b137d6bcc60cff88327b894d83a2d77e47c9bb015499a99eb55c415b3f73ed18e540b15f7335b21737338b0795d4daa2a06a5ecf2c5e59af02e8112da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567dbf1b2685e4d01d2cad4b3c903bdc5
SHA1757f48569f939970d093a61ff8cab430c681991a
SHA25637ae7a8f3f281e36b60cb30b3cb038ddeb77eddcd8805dbd19b181c429c885c0
SHA512de5b2bd0e600b99b0528e66575799a9e9e6722e927065984b4ae600eaf24385b17afe4d4813c655a6b6b7862e64489119dbaaf2ae5895d3bc7ac659af3397235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02678487e841460c8e33869f78b0d28
SHA18a3571952e4a028237577ba1441952f96f1ac67a
SHA256261c72f307700bccbf316e169f8d09f94be4bb4240b96a73055b6768e59f3ca7
SHA5122827c79e8baa7d69ad84d6eda446df7af55b5b8990f68e7018aa4618f8182131e5097d9d4618f727c263f9688609fd79f985d4a262ae0f2f529b116014eb6449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741d8fd696fe589637a41d561f655d1c
SHA16b76af9d3a4ef6b4b5c53fb2df860dcd55d8081d
SHA256d452cdce35ad5e4df5ff8045635c167e258c56aeb5da01458684332cf72c7964
SHA5128d2eb6e55e8a48d125995fd4963ce15a2bdb8eea38a4ac4911adecb243ecfff30115f9b7a0963cb530f74ce1dbbab8f7827cf16f5af1f7f0601ba5952b3e9992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36f6f7f041cc2cef081feb322170b70
SHA1b7ddaacfeb5bd8cef9f8e4f92a10b15772010f79
SHA256001d6612bb21b2d4e21ffaad0b91eacc76ef8c90e637b5257d8f655249bbcdd6
SHA5126898775f0689ae70e594c9e94f272732ea7b64aeb6ae44a23da490f4b75cb9c3755bd8681215b8935b362460607128e0131a002a67672a38f07dbde76c9fc068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16dbcc95ea792361d1890735d1c5acc
SHA1994ce8a83dd647500ef252283ffe3317c82d9e5f
SHA256160344b0c0cb67251b5a990fb0fc0b6f75f55cfdfcca26aa45010c1c1184b60f
SHA512e0a8a3f6775971bd528a32dd6d9c29668d20a49b65c4341e20cbc76101935b3af0726b62caaf4aaac2110d8143d3d8f53bf14cc3b3300851636fb90c6c38158d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3e6c8443d8630a7f8fe0b7c9b6971f
SHA1f51343f4ecda60c43f4d84700cc93859a520b546
SHA2563e5a7ef3df1f074b3382e5cf828c0edd9bcd6564eb4724b69e32739ca632dee9
SHA51251780149b1e941c8f848988a9ee45251304ccc1e60a55d99f296eddf197e6bf8e0e40014530c168144dff2218647ae6d00f66de740260c14bd71f62789a9ef3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31e28defcfbb802be07d264c1942ed7
SHA1d257b9d06dbdb5fbae86642a5dea915af1bd7a18
SHA25693770419b504a5d36037305468d08c1df8f4abdf0a0bb033f805f7e6b15c85e7
SHA512da22f66a3b060d1111dd1258b1134a53815dadd9306e3703a3b7c888b8b59b2b0799675ccd2937ce6a54f165552cc31e414509a1f4b2ac1ea938465587cd382a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3988de9a3da0b3155005e3fc37c527
SHA17287a130535a3f7e271eec71332ac052093f549f
SHA2567fcebe585004ab05c0ea7b64a68232436af0052225b5d7e8032d6e7a8de46beb
SHA51258cb6247a82b1d03c5e8a698abebe93aa1c7e7bfc1d60c7ff5af291c8727821703c2e744e94810b1b0ad69dda9c2fa1b3dbb50b3c218f4b09ed62f732a4a26ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf93579873c0927e2c9b9211633ed298
SHA192536ee990bc9b1f69c411bf44348d0554b7eb9b
SHA256a0dc623b395980e70945bc76437796f13008d4f15eabd1bba528e68def73647a
SHA5126005d4ace29a9c9096d3417397d8611607f74aafcd0c3973a22c7f6dce5c2ad7cb5ef16057b3d48234a0eb590a38b53a04480348895a00750af4bd7baa0c6f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e615f70bafebafac097d14d20d7487a4
SHA1a5ee5baccfd851ddf4ab51e87a3274c5d3e3d497
SHA256e24de4375d86e071e989f795c53f791b16e57f3329c3cb1ff9ffc5c8c56c2d03
SHA5122009fd3e0bef260b73d3a900a258e578467476eefe5e6616e86dc89a5012250809c434e9346b65dd60f9c4335c57c450ac65192b2e6b93bab1a4272de513cc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc93f48ef34e3c68732d77ea76106597
SHA14a6a18111317991cd9f27b6e5fcaa661df47a146
SHA256352736231d3cf2455a01aa025f848c0251c26331ec8ca8147608ec0f6c05059e
SHA512784bd3382fceba2c38d58920ce6674b29c147fc1a28cbc06f905d08aeee902818b7845adbd5291ed75561fb800e4af24bc8abd2d0bbf928475ce21cf90410e4d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b