Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
8f92939de590c2d8396372bf0e9ae56b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f92939de590c2d8396372bf0e9ae56b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8f92939de590c2d8396372bf0e9ae56b_JaffaCakes118.html
-
Size
461KB
-
MD5
8f92939de590c2d8396372bf0e9ae56b
-
SHA1
737a9cbed08d21bc5d82f540fbe8fd0877d5ecd3
-
SHA256
999cb1d4e77166a66e92b6d668384a409ba32040fc7eed0f2c645895dc5ccbfa
-
SHA512
f9a63f8428c0b6d822c50fdd6131d896ba8214105dbb36c2eb9a4791ff0c9d953f562d58b5fcade49755f4a34c44d860f2838ff5934eb31e83b78a583ab16620
-
SSDEEP
6144:SCsMYod+X3oI+YhsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3X5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F8734D1-212B-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d54e5c7aeb1c654abffb3d540684609d000000000200000000001066000000010000200000005bdef0ddbc749b1df9ceb7eb42c2c06aa4cee3037484c9292567d04be8df5104000000000e800000000200002000000094b3fc3ca269e501c425278fcc4c8b4029df4dd1403e614828e8fd69dd68de202000000018f1bc96ecd0050011968b06c178f7d257ba0a14044dd683a141c6de1468f75d40000000562eb5b82084cce925b115f9165e77f3ce30d06b99f20150c9afa75777255f5ccee7c3aa4a74efcc6f23b46b24b0796eed6522cca85204816be64662c3a360a5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8014652838b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423527405" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f92939de590c2d8396372bf0e9ae56b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52880f6db87ce98922aeb2a7b5bc5da41
SHA14a0ac8c4ddcc9f1b4cc393796bb2676d3c5f4f1a
SHA2567cd34ca73848276629c1e922186033fc00b8613e10eabb6f5e8aa1b8b5e14402
SHA5129830984d269a2018190a4d9354ff08bd65e17fe05dd23ead347d5126b2353e1b104242dab02e9bf619bba0f2b6fec22d366888fa3a47ffebd91f017805aff6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cc1678c4f19bf6ef28052f371cbfff
SHA19cf37a268ce57633c62e36ac5810e0ad3055eb11
SHA25616f28cf5a38743028efca741b1419bf5fb4231ae82601c50257b426eb6d33f4f
SHA512cda3b6c868a15072db32852a9f57c338ade8c675484d80b021da0db7dad7af77ca2c6e86e80afb20f297a83bc3520418cd73dda8907862a2d3f41efe57941341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521975ac2eee9ac8ca4498229af7905bb
SHA19f719afd776b7926787a41a81e6495de48ee99bf
SHA2560c0e4492003d75f2d56c7067be28be319b4a6d3e4a99af74591c00717b3e08bf
SHA51265c7a69dba3913da4cf660670c8f5cc50af2308bd2fbd5b90e04c0ab5d5210483042e00659c90e3772dd5ad70aceec387f69d5e9760770909bda716357725fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe1e7fdf4a7f271ab92295af0dacd7e
SHA16572867afbc0f9c73813684296e46a3b84e495bb
SHA256fac2a83cbf7692186ac6938960e679200bc60993cb5ce6c1b516a9f2321336aa
SHA512fc86ffd6faaa313a01211a4904b6d3d67dfdb709581c9c33fdb747d03a89ed12c934a060b166ef7ba0eb20fca2d9aa740334e2892958eec44b3141d92ca31d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ec5bdb1c57416e3ee71fcf4f4fe81e
SHA1713e1262bbdb0dad85c7ab024eef87c38909cbbf
SHA25630afa2bdb8505eb165f5d7a018cb68dae97efb599f6a8ddde8b8a4df665ec6b8
SHA5129ad0c96469b33c21de0e8a0e50905a480e10b6d2930e2d9ed8d8420067488a050b38186336f93ab223513aba06c032747a122272a4c7d2c84c156b7620937f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abb882482e926088f0356258d13f3af
SHA1b5081c641d096eae35fcd66c341ab65244dbc3e2
SHA25653ba8300258362364e852138cc5921d5daaf6a3ae435baa411be3d5e7cdd63ee
SHA5126560e76326410e6f149889bd86b0073466bfb6740f9f700321c070dc8f2b03d6ee25e429b99fe5111b7c1b514c4883b4b076f272732da476bb44e75190231cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0c1914197f7f8d8961647ab6b884e0
SHA1bd2d758c9d062a239f25e7d3368bbd634dedeef8
SHA256ee60e40642c1307799e49dd9efee0fd77571b44e7778a79e10e436e311767e2a
SHA51205ca6a0453876f3dd4145e4b5dbde7c8b938fd0f18e7946217ff4bad90b26ab4935acb54b95878964082a3a4e1cbc8a25acc43fcce0cf613f605826ec160c234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3017e79ca316ab530aea372ed6e5c1e
SHA10dc7be8e6617ce1c854424ada49a147cfec3d3af
SHA256ff10d468aadc50e41693a27eedb5c2bcf5aaec93b3dee31f3c2f11e1c547103e
SHA5126e299040c8cf037593214d5104da6a4a3fa0012e18c15d770edffcc8042f08c769efa9e441eb86b7fd55834f2fdf9ca6105efa5d526990ddcc27b7637e44ba83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9ad631178f9c31d929cd6ab3b8909c
SHA1ec0879c809a36d5deb9438092159eef6eb02d75d
SHA256bd3b8a9a54b05400b3debc54adc4e0fd0988eaa6f07ff57e85ae4d67ad2f8f85
SHA512955714d4c49212d4a6b2db8623856b4e09c3c271a59b93d7b16519984de3ea50c817bafbb6383da66a2f24ef28c88bb984f26617e26c6962f8cbeae998d6220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c11bf0c557b281c192ad30825dcc903
SHA1bc5492f9d46a08950579970c0da59f754e5eba61
SHA256f2e556eddc11f1ed68571ec4d48cb2cc14ab432df874b0a29fbd4c5ccdd23010
SHA512e19e827e3440a953cc679ffe512c1bf386c726b9e4d1e568737ed5110c17e5dc4f1538f22638be1edf9739c09ebe28415c1bc6ff7ba991e5b0dce5245e562fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141bf10eb9721159f678f937b898180d
SHA1b63b2977c89e43ea05e8fdb6b23b6d0e39a68150
SHA256825a7920f73c17c0aba3c42d562e8b0c32234f2e3949a81299561e5a66127375
SHA5121be7cdcbedd58e237d44b5effe070656f53e323d9cee19c6fab7678922066d414ddffddd53dc6fd73db818794c570adc630201530cec6a348350cf0b1824c247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cab191130754bc38e877f99ac1c006
SHA1760cfe8f2588d3c85a9383fc0778c66bb5dae9d8
SHA256327b52f815e0aa3f95740f3dfd0e53b0bc5430482b36e5370d3f9b40ff9bbeca
SHA512f4d765011b5f280d32b9022b5836662b75fbcc66aad7f284d603cae22abe8ff6bb1ad9780468b0364e4f6249b1a6180dca7fdaa7582a6c400bfb2b5583bd02d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcfc5b344484d1e7e93a9bcf71340de
SHA13c3b8fed5dd2aefb2ec8365a7eeb1ff2e7608871
SHA2563777ad9f8efc190549c922425e2a58cf092b12f93d58a88e4270cdb9f00a0376
SHA51294c842ca1372eaec4deb85d595be9b4d0fb40b123b1f383ee2f7466dad750469b8533caf049e10480a774525968e79ebabe676db5c71f6f9061a019105a1d3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eff9e355d88f24f72b70101f006784c
SHA1306c5fc08b7fedfceeef6ee7b5f5e8e66c0c4cb2
SHA2563a237f6b1ec576f97fc7a9acc4d39d5dabcbafeec8abdf6aa644cee54129d94a
SHA512b2fba1cd2c90f426391707a5d1a9f1dc91d7e7a971978fb69c1ecd04f280ec0e8ef398edfbe8b54f4af4b84509310a38f3328e206d0d110b62ba9ccc6ac57057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45bbca44682d00c71a1ae5d9957b898
SHA10286f2924299b8f6cde630c2f8ae2f149c8ee9c9
SHA256c8dfc33819d822b9d7bab48c93b15a28dc0541560133d5e9f309519c9849163c
SHA5121f9216c5aab7827802c9698281bf962ff394800b8a772476053ae1a2942ea4d7a95416d22a2fc713e39a7ad65a0e4fc62dffa9ee0f39f0cb02efd6d9809f8510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ce9fd984e5601828b84f9ce24f782e
SHA111306dddff5cf7b05efaf7effaf4f847b8bcf299
SHA2569488ef19b2208079560d185aa8af0e3c12dcd0296380ae3470de958811d1c002
SHA512f320a1f0b3636238afeb7d2babe1f2321cffa4c4bc1bf7803d7bd7e1a1c07c90721c8dee965894297c5f042efb0f6e300283e05844810da7fc80b20b0575fa9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b81aae776704b1e10e59aff4e10390
SHA113f3d139800471aaf56195fb1e885f168f8c8a98
SHA256856440c8fd177643fa07f91ef39130c0d7bdd1f35d57832e6e0eb86ec7df822b
SHA51239ba3354f376ec725ba5df8b8eafb273584be70bc3dfb77a5210c52ccf2582aa2da98da29c738a3b998059912e05caca2cb63874809aa025248063a9ba1a7dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b19821ea920cf6085df09640e3e104e
SHA19628973e3246c18283e432635110e63d41e631a5
SHA256f0e0082b34d98618026fa551d83b3b05fa7b9bb583d57e6703590ec12e0171ce
SHA512d77ec05de1c492b4f97c9140bdce1d8b7c5664e1d801769c8fe8624d00bb4d536564628e69d5e5a1e62895975e12ec476f6e8455bed490d57182be25aaab162e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49e2427ebf630e709c27cadeec0237a
SHA187bb70af15db684db3eff3adbe45160c19b5b3f4
SHA25664bc0305384d4d9bdae67955ca2753555df076c0bf57fefabc8153694e2ec475
SHA512f09d2d5524a45c648a3e9499ad3003460256fc513e8d06c6da09d10a73e8926a5f7847d1858258aae4d785d25f9f1910ee5b5d460e50bfd990856d548bf6d4bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b