Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
8bbd6721c5e4101e7e75c4ee60f26693_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8bbd6721c5e4101e7e75c4ee60f26693_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8bbd6721c5e4101e7e75c4ee60f26693_JaffaCakes118.html
-
Size
39KB
-
MD5
8bbd6721c5e4101e7e75c4ee60f26693
-
SHA1
1fde7226885cb27b7a2448fe3cb6deec04e22561
-
SHA256
bfe8a3bbade5950e294066a526cf93d24011306c189c3a14f8df5651dbfaec9d
-
SHA512
81182c3a060e61791088896e8f336166b563febd4b8aa1b60fed2d5d91390689425bd9ff081d1605cd6a4778b7d00fd1f0dd187c37381ee63497ebb05f2e057a
-
SSDEEP
768:qCksUh9aWDz4F+xa1ymPSPfRD8ZCKY+0/WtxSy+nhi8H9:qz9aeY+kRKP6GWTWn7
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000687979bdfecc824788a2334c056dde9d000000000200000000001066000000010000200000003973ce82eaf12c32468d61cc1a545f3dacfaba3541a408087ced17ca91f4a4db000000000e800000000200002000000011f478831f20e2e20f1d5cc5392882be25e454b837465bf2c417c3cf48602350200000003b544d53dcdded2450548537dfb7349bcbd7cffedec0573a2888da22c3f5e69240000000f3861136bcb07a5cbf6e36d87c00374aad2ee80a3d7c44ff81d12eee759db362301e2c7eec9c3e8679730e0956ed281b3315ef25eb92fc4af12a1ec36367de6c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423436908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BAD75F1-2058-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05c557065b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bbd6721c5e4101e7e75c4ee60f26693_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ede5faa9d4d9e37208d847281f40b2b
SHA14588017e7f2df232997ecd38d5dfc874c158f5bf
SHA25671e1c69b43110e5c6432ebd591e990c422c38d61bd9a0f68760c9a85d7d059df
SHA51247b802ee24dd58535f69212a94fa6c7b2eca65d4ed2b51ba41aae660456c58660f9a6395f6a81a0371351073d22d36de65a9abc6075c9412f3bac04b59e7c0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3396ec59f7673ecaebd327ac82f6443
SHA1227b0ce8007bc340d7381079dce4adc811e89d51
SHA25637659122e770b6f40a10087a0e998016a2747d74ae4c5048521856ebf3964188
SHA512414290745bd8a99b669cd67e650eddbcb39b70c297feb1e13c270e49bb2214a27992bcb08a979fe0a152f0d5695efb04dd85a316dc9839eeac473cc3baf4dc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef4a0bd5df33f820fb148ce647694f7
SHA160060a47391a49dff3f7e373b959a63abbf35fab
SHA256eaef95f64072e9ab0670535aec1a805891a538c1508da0fca4e8fd87e36b4f74
SHA51290dbf295b2f045698662ef1dee4537b9c0fc678b6efa75f63cad2e135c596f15776fda85419dbad8d9b3c5622443a4f8c2153903ea0daca101a1c18b6b6c1be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84ba0b16f93ddcdccebf26483aa3cbb
SHA1eb34401b5fdf0ce699f1b8461bbfcbdf17dadb1f
SHA256aa99b2f077131089f60733d97b1c034d5ba616c2dcaab4797568fd05d17e652d
SHA512828b6f8b15c6a4848f07bf9ee33f27f03c2377cc4a0d66416e0c57dbb326f56cd220ad6928ac4780c8b7909b5f140d364fd28bdf8be42e067bbaffdd61bf7cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53a343b1266e34e5f20522f1d61d1ef
SHA1726cbdffeec17b6201bd59cb9e7a95f2ac5e966d
SHA256dd75cccc358bb1882be0c715722d80f9a0ba0c2f00ac8f2d07c466133443499b
SHA5125c0be75d2f2676be42404f90a479e9ace772626746d3b3d3da90ba8e2326ae15c5f5aa7ab022c4568492397c8673612ae6fce1e432e507dce976470c4d8f52f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43910a3c5c71ca6030c0ffb929bbcf6
SHA1e7055da605f08c0a3bba01d248c696278feebca0
SHA256b23c207731fef470a9b8e578180ccdf4847d07e2aaa2001b67e1aeaaa1bd799c
SHA512fec82fbff6edfdadcca262865caa34dba2ac16b7643d3c203d07d23e569ceda1b1f55dbe35ab11a15f9f34c3895228698330b004d61d0f1fb04dd8bdcf29b561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9b39c82e35ca6f1899d6091f274de9
SHA10ccdafe6c446314d01b855dbe8ca707dc73349c8
SHA256006becb243cf96485d2486ad3c32a1fb32bec6b1a6d2f72cc74acb116ed67a05
SHA512c02639f9faff0747254037e05d50ba9cc93276c090d08e1678fd308014688569fd3629bc0cc9212838f2807bca35414be77590cfb5d888ccc6218ac32a6a2dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166b01f23933ac1544871af85cc9a154
SHA14a613e4be53e1f04d1c1bbba3705dea515a969bf
SHA256971ca400410a9a55d1c1b8b7cca5e8cf4500e5ca1c4deab5a0aab24b06bfb449
SHA51231e7e97dd789ea00e88834e9c70716abdc6d5aac3c4995ac9b14542978c8e25fc897d5853aad470412d61b8874c5deb5338961e7e21d126640b207a182587d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826308148ecafb155a537649518db36d
SHA1172555f614ac49ac7909f78f53364d0926fb8f91
SHA25603a1d2adf8770dfd25b0ee3ffcc6bdd7b8da8c4e69c465c952df66f64c5f3ccf
SHA5123c466b5cad042623a683681c39cad7f7591a22ba794b508a0ac485cefce3b28ebcfd832e09abe7ce4bf9e8971d429edf27257bdfe89609082121f06861ddd4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0355bd5e942700aa27784d3788480a7
SHA1d0f6e8b33cb6de766df368c68da509adae4e89f9
SHA25658f15b1dd6c64b00e4ce9df9179c4d4011d9ef6cf346f6e455fb2ce09bf547f2
SHA5121b328a28639cb13c89d5312d37b8d3161a41a8560f31df04f89a8c0a6e8ef063909a4478656c74c31953d2d09c744600d15975face210318f4927b89e0fbf5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9ff601f5f45e0c3c80fdd1c2222967
SHA1720625d0e19175fb764a6e2b323a319b330393f4
SHA256fea6ec48df10052ad1ef07dde7ded76aa79d2f67432d61f3b7876177d3a018a2
SHA512d0f3e4279b557a67883b3c33aa027ec47617562856969309c6e0999b9bc3fdd6f464f55bfdea167135433b05489ddb9130177bdbd7c019480744b57e0b187f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b9b9c4a230ae4d708fe8f97c7ccde3
SHA19327b3ed9a01cdbaa58f9e263d5d2c15ce6af1e0
SHA2565ed0924b4a789ad4745b6254d8fb51a714181c3db326b4401a0d3fc9690c1fad
SHA5126bd20098d6c52e8a9fabb03b539fcff51ece90f2f8178668680e4a509894aaad5f3c8a1161510ff4d2777f9d46112068ff1581c489dc39bf7986add4a76f05b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d95f8863961915e8a42e0c59b7b9e6
SHA1a1a802fc513b6e8453bf66fcf09fad6f4bf3e82f
SHA256d908be303f108ad5f7d89b3e16e9de0eb917a42ad42a8eef388706434617bd69
SHA51249e6d6b4c1f71e531a387affcf3d63fa86a11b10206576612e40fa1481bbd4f1bef390b0ab44ca71be6bf0f3ec166c70b14b52c17e4dfa1f7ad8a8abf17fc5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623d879be67bb6960b34e6a731a45750
SHA1fd8925cb6b0638d3e77dda9f927e684ff2acf802
SHA25646074f1e1a8335f8efbe9edaccd5b923cdc2b367962c4b06712469937e6d98a9
SHA5122c6580665a54ba29ef2619966d633ab6c30aae567177534b735797e4b5b528f2f093a33f4ce30ae441dada0dd167406ca9013cdd1a8cca5f575c6645f4d8f925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8a7f8ce15b3926e0828ad60ceeb47c
SHA161d8b3b8a9e67ae4455269ab8b0c01635a6974be
SHA256934afd841f9785ef04c1a0db3b329e04ccf6cde2ea4a4419a83bc253dba57bee
SHA512fbbb0ebb4fb81c8eff116b478a56fa49b9b8c91a317e67c9109f00a9a4242794949bec3599078c630cfb1207cf504cead5fb162f3632cd10c1baf7953712dc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58747edf46afcceb3a235ac37eafb3f67
SHA1f4e7ba408cf1ccb4976b3af59133c843e34ea8de
SHA256af0260992c46abe7be3ec3c5119a00ae40a764ecb85d050967556f559ab9b6c0
SHA512561c194db88bbee2c197cb9ed2306cf5a1da4db98b1d2565790db534a3fcf1eacacca59d4c6166442b28b4e475c487faa024f3d49d8776347f08021c80cf6dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63260080767df139166d92b0e8176b8
SHA10da6280911affbba225e2a87eb43a7f57d9f161e
SHA2560a0b1a54b17432554233b23ba70209326854b9db9db51e37605f3c782c477c14
SHA512303c0001b1fcfa66256f44fd4f3c70172d04f84ed8d7196a9c4924723f27a5f0fc96588b232ceccffbac7f2861c4d0423d68cf66cf6cdb7b2babc096157f255f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553afd79c62cb2c9075914619c76becaf
SHA13e504953affed3515c788091fb94322e6ec8d52b
SHA256e321e7e650e6725588882f5a95a47fd80e2dfb0f949099ae48684c7f835a0d5e
SHA5121db4327dfacf154c44027c446cc45d9e7f6850e7e14a8eb2b8d8b273c8c1e5dbf1b7c0703d9f6e684eb4e780e39db20a03f37f3cf13912b483f4edb06cd8be91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57797f4257d9d12448bdc95c54d2a7aaf
SHA172dc876d5350d0bd90b1104fc2a0620a37ee5aba
SHA256cdae34c7dc40c3aea39536b5f30e5f24bcca93b09775c11e2211ee7a4aa65b72
SHA5120972e33d450e400fe5cc89fe0712c209f6cc585bc44b6f47d41c44cd2c52136694a577f1059b606d237461ba7fa01785822a58445055df4c062f0e895698741a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b