Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
8bbab2fc5d98ad22d610cd2e4d4a2d64_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bbab2fc5d98ad22d610cd2e4d4a2d64_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8bbab2fc5d98ad22d610cd2e4d4a2d64_JaffaCakes118.html
-
Size
156KB
-
MD5
8bbab2fc5d98ad22d610cd2e4d4a2d64
-
SHA1
2d3d0914926f292e822ae378e6f67d5a11540e1f
-
SHA256
326e610d99952a453c05f6d0eab470550a61de429d3b34165705c94193611990
-
SHA512
4197f7fdf48172e509ab6b705d2050eba6a7b4d8ed8129103fd63ec2afc2132bb14e6db8a2deab30d6276e3698f2a3bcf81023489d1a94b49d6d8a68b96b8378
-
SSDEEP
3072:S26Uoc60yyfkMY+BES09JXAnyrZalI+YQ:S26dc603sMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423436652" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03183E11-2058-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504f6d1665b4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000766ca1ee1591230b84568584b78ddbe61850208c8084e974006278d183cf8f8e000000000e800000000200002000000062698394c0f714413903ea8cba75174aa76430566b7d23ecec5c68b7b1c9b89420000000c0d140bce81faec58a75588e52c269e0f1c1bd6968486d25cdba6773c33f715f40000000d28a12da02e40358d89a579c62be072c3e585f31b61c9f631dd329e9feba32e1e2454d5dc269dea255abe50498881736e73bb6b4932b2c29cbdcedbe28532c68 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bbab2fc5d98ad22d610cd2e4d4a2d64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ca07eeaab89c30410b47dec93831c5
SHA1d9efc058d83952def6e5bc22e9aa6adf7997b40d
SHA25643626e1d4c8ceec5064b0fcfe468b32fb8cf9efabecdc0c9803df3ec16a727bb
SHA51241e7a8b4e64e5a5ca68b38d6729c31f7e738a74f2a5be7eea431275a821aaf056fd2954bfb0e01d95d22426275ee452613637908145defe6eab8648cc4fd8a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54042741ae2f079dd9722613f91977bf5
SHA1ddbfb8329f4ff60f728bdf40b67c46e9206b5dbf
SHA256dac860147c745d1a9758b9558f66f389740034e948bf85a039c707dab8a85254
SHA512d8a0b4ebd6e397c30cc68c6dba1a3308ca5141015917bc40d5e7616a567a5f7bd879387cbbc05e47fc799026b1e7bbb1cc76982fac5aecce6dadc04583518310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4646c13a65b1e01bc3cbbc0ef76a433
SHA1925c4fd010aadcfb1e16905d08347a09938ea085
SHA25656c7f24bea678feed7fef65b6ea62337ec995230e076144eb92ad32adfa403d6
SHA5121b4cf34dc797c719a6d082a5658bc1323385ade2ed8659671eb40b1f5121a788aa81762a4e11658ed227aecff9516b8e0ccff018f3a7ea9a8937e04cbda3d932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa1c4cfb713fe67998d9867d151950b
SHA1a8d41748bb3089d7e2dccecfc9ada700342686b9
SHA256b86eb5e547bbafc68b05db21adfb0103de0d6fd6e174061fff1e6cf397ee563a
SHA512653a64933ae1505f134acc040fd8bed1657e7a29c357660c4f09409f0f5e4b79d3bf295661776b0e065768679a66071f0046af7188fb2db9752c503af692bddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a4374d78ac7a2ceae3cecc48f7bae4
SHA129c43037c9c0d1a77267803f05e4933f304bc38d
SHA256aa81f51842c74f15e3ede54fdc7b6120acd20dc40a3a4a4999217e4723d10e02
SHA512bc74415052185f61fc01f6162a1412e6b6e1a988d54cc445c92e36a31920067de8e7b4459808408b83be33c6340dbe4dd754f2cc8a5c23414f43796a91a36b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddd2b1d424fa3536330c9ff3c93120a
SHA1b49e614196a70da2494aa16276d61765c5bd97af
SHA25668017103b7f5658ded58e9060bac0fb1e4be1872d24ec1fbaeae4022f818d20c
SHA5129ec57da197f60922bb1b5c5d6beaaeda789b5b655e931499b0b447be8a295daefd88e9d65c2bc0844214ee9b3e87f925a331c05409e5e197e94faa6b8659120c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebcd9c54e5c202a0ebf80e63bcf0ebb
SHA1c3dcac4fca9d2123ef99eacfa5527374b96fd7ef
SHA2561f9e31e738849a42d196af7d90293ce18ab05ee296856b7c3066c33c305b6805
SHA512301ae52cab20b99fd5a040b1bffac0d70d72871860d4d45124cfa5615d41751ba3afcf512078a2756e2c1e6d5ca1fb0984b439075e0a23571de5fc5789aeb359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2397b0134fb1e9acb9d18334004c68
SHA1ee57fcd680a7711f76266d76ba0a408b10f270ff
SHA25652a4545e9ffe96efcd9198013e84be39fef8c8f2ab3a25e48b560cc8538b9bb9
SHA512c4444a2a3fc918979fff08acf905328bde3052089fca004515b8536692f3335111d6575364d78309de786023a53e7c0d83974530c93b109d6cf51ec12bf056c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634493c4589197195f311260d6326bc1
SHA1af6657c944ea59278580db98f4cd1cd8c747389a
SHA25692923b5eb495be88d72893a223cf03a4169947848c6266fdb044bd4d36623e2f
SHA5128d61e3916a443a4f896bb44a5eed26fc246e2eae6edd41304dc8dfdadecb928f9248ba7037f7ef966804c107dd88106081f2bf727acf0fe5a6718966345eae6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c05760dd75f1bc8009d7066fbbb5179e
SHA1166047a6881949fbc0bdcb502296f6ffd589aea9
SHA256bb64d0a386fbf479f59e2e75db0c7f240803916e916b1dd8fccac0d19b476c2d
SHA512659f575f88689185f863c7e183ce9f8f87e272afad89550a59ae63e75b8b613de404dea824ec725ebddde7228d04d4fd7dd2010b6173b88bf91cebac49d50290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e25656f1ef6c546d01c34cfe8e4fee5
SHA1a39eb5e8d211d40477274422f5418aad37eac86a
SHA256b117ba4bfd26182f6ee8b2f4fcd67dacb9f3d961478e37810aed598be520b730
SHA512d23e118419f9366d66a55e9548b4ab7f83f45c43de1d9d3c07d4b82f78153a9d77ebd95ce660e37159992833d392be82dba7fc435dd406f6fa437a168d7d938e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3b74355b01e10fee8eb84065b62b0d
SHA1fe3aec8c7eac8fc35adaf50ded7ad418e8a9b90e
SHA256a8d951aae3d32a1bab2ed526e94d6fc90c305999d591fea260dc6d4faba63f3d
SHA51278690da4802ed27d42f666cd1012a4cf3405bad27805733ed6f8af33486dee07401acbbb1b0945035ccaac37963e8a30577357a4f5e72485c7c44c47b4ef077b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55839c1055793efef0d1e2432b2d9980c
SHA1a691db3b50bfde5a1267bcfcdfccbb393c5d60d7
SHA2560d545f1a8c06f214082be3ac570cc15175901474af3dedf390361dfc68263177
SHA5121a70f2b6552c372823023b4e365086a31445ceea1fbf6d49a30404c3e1b9e44df76c494c881144773dd01d421e9c10c36ca54cac6050e2bfd9bf9b4e09e7ddd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568164842b11f3d961ccccac7d01170a
SHA11a02697af029299db5da6f5730a6f075a6ea72ca
SHA2567961b83763697346dacd23a74ec76ec005ef1c3be8b9df748ea571b444ef2dc2
SHA51248b4eb21b55e6791b4fe5a1a1b14771437f9ece6f6e381f2f988f7b716be7c84d16b586d92693b1eb7a38768238e8d88bd13ce5683f4790f07b48d8cc677431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7052a0587150d26d6277e33e3b27c5
SHA13b5efebfca76dc8d4c9dca7bce53a0b9b1b9f020
SHA2563ed44813b3793eec0d6d9e9130d73cb84311715d73407a6beccccc0d00cb1c8c
SHA512f73f32555b53e32906be65959e6e52a33fc8866dd25f64fa02fe5194f0860eec96552638b938dc42a7ad3b55e8dadc6b61d753cc8c8381a1da1c3a9aef5eeecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0439b6bc5b5f68c61747df0bb74573
SHA1779ee4ed6359b6c794bdd99e7e7ea4f886a45881
SHA256e006e1f816684ff13e7c808fb09b4a144d74e910b9ba91c301adf3dbd495d7d0
SHA51238791352ed7f676338de845aab13e37a4f94bfb20e2b5309695029dc47c2019548fcc7090e60fb06260ab9dcc5c8f54f3d772f1fc759975023786d036632e4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ee070faa58997b0e2dc21e4fcb1bfe
SHA1181373affca667d92936a22c0d040dca73785abe
SHA256b1685fc0017ffde1961f5d2f3bc97b5e65f0f96c9a24119322a28a1c0882135f
SHA5122a8eba16a7b4aeb6e01f953700daa033b624442c6e81cb630f88ac47118cca7215ea26e9338477a6a0dc12595f3dcb0c50f659b1eebef76c4b9289c1b189664e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450da962ebe6335ba35fe254e347c588
SHA1e53092cdef4bfea40e9684646e243218a6b231a6
SHA256d0add918ce05bcb4ea09f73a0c5af706b86f42b27f8f16640d6620946e90d378
SHA512b735afc924aa09bd17ffae218effd1a68bff95dec002798857ff5b23ea886fb314ebf2fbb8a19e165533a4dcf626d3379c3295fd8f197d6717810b21f0f7666a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b