Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
8fc1ede4ebfbe96232bdb42ba36f439c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8fc1ede4ebfbe96232bdb42ba36f439c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8fc1ede4ebfbe96232bdb42ba36f439c_JaffaCakes118.html
-
Size
69KB
-
MD5
8fc1ede4ebfbe96232bdb42ba36f439c
-
SHA1
6cd654b315bcdb3df60990d31323ccd29b8d4349
-
SHA256
5f559062037ecd8a79ed59022262bcea0a92293a273c9205cc85df753848b1fe
-
SHA512
d8f2d4cdf55d0ea88bf813d83649047f646eadf428c017ddd858e8b41152ad8595b74e0ed10831675e7aaabedcded3131f8551172a18e0c47cd5d1c087b54165
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s86AC9V/oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3GTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30434d0c42b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423531659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37B02241-2135-11EF-A4F7-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e63288d005eae95504070e04a3a69e01797f440d544d7027225318d6b5dd082a000000000e8000000002000020000000be842c28e98a8a3c4df2210600b394f9e9d84ac60de7ed419a9c3c128e47eb73200000000b141225b9cb1c018f02f7cc390592a3de56be66e0e2fce0c9eb073561332766400000000db89611879e1e87af141f2df01e68f0e00082c58fa363e8b58cea7c4be211fdcee906f53f69ef2f6b46a0b2beb95e7e79b9453efd1a4416b3c8868ee5a541a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fc1ede4ebfbe96232bdb42ba36f439c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e266c55cd3dfd8590d80b9dabe22c11d
SHA178686f3e3af0915f6180e6b9f218dfe210b50d65
SHA25675cc241f020201fdad1b9de6c892f56478c9f4e6ba14ef5b21ce7737bc05c437
SHA512d89ab756e39fd3994bec73ebb3dc41fe3ac9606c464b6828c9154a3fa7b132b58da5c67fc077c1fadb1127f71928749f523247203de7bed506d01fe296dd2c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9f18895835ff8709a281f07ea3238a
SHA12362dd79d30bd23e2545655fa409a365cc54d447
SHA2562c310d5bcd5f41e82a4848995094e59c25986dc0d8d7f19d342d108caaed25b9
SHA5120824204847f1928604ec3c6420121714dd48182ae267cef6a9a38edbae8e0e6abb4515b4b4aa29d07a9bebc4348907395372e103aef4398d464c2a84a53a85c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7750d88d53a7b7320b9a1f7acf79d26
SHA19c51d537e7fccb2bece2bd2bb7e0713d53a5ba9e
SHA256cad737b44930f38cafc9af3a9b98ba838a1583c0320c0d1076df1f63ee515228
SHA51209cd915d80afed37e0339a521fa04097015025e0b107b5597d918a27743f1488eee5b5433ad70009ff49f56e7acb7fe59feaf62a8b83671ce2ba9c0537879be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d248cd67c219d084c289ebdc14db72
SHA13943a8e0347891e73b402405d1c303e939cbc9d4
SHA256b8a1682e03df5902666731f36c72ccaf0828bda9d8a492212200df86088b933c
SHA512224fc0730a854ee93ca50d20b532afb117fe948bcddff1d12addb41d346ad8a9032d69327853d6abff64d5812466ea6f2057f0f345932036d3eb812851cd9425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54826ac0e917ebfc662209e78d1a459d5
SHA1f2269304aab1cced29d79a505dd6941b859f31c8
SHA25648a9b94ad25d4ef239738258d376a533314d2defcf90d8c4bb5dd0a9d0ee7e67
SHA5128e96d6a7002dce97e6127f960d9ff87133764e2c86f0b66b588e2e736093ce1fccb73396de32b0c570a549edcf9e05dab7d93ebe269b5d1a3fd21724a0224594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db0b54ed40ef8fff64711322ab8429c
SHA15934b767712ef29de8f533310b7e8fb23cc281bf
SHA2568f8f8f45ab27c5eef388159ad3feda78aac45d2398fa4c50b7bf10f5211dfd1a
SHA512fefefa1cfcf69bafe125e66577ae56d5c926ed34a508e1221d96a31cc452543d397d77b947803f67194e0b84ca7f8b10a3b91fc21c50377bf910a6d7572adbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d42bec3c8d5d713f83daa91ffc3a3b
SHA19c7b74b237f739915214d784efb96f91e63fb767
SHA2560488a9844ca9309c7da8a9029b6fbc1cfd39e373763a2dff8e14e36882942a13
SHA51250d76a2753d0ff9f830125a9da7b09a10e0549bc2cad57e4686878e2ba116804e3936950dcdf84a255b912e2d027a558556900c0ae46447345acbe7209f89e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596be85e9fea690900b1d6762e0347c3
SHA1e60691343231c5029cb6a041eb813f2545122e21
SHA25622466515899c1a2265c51d6ad70cfc454523a1424b591bef8188891de122a410
SHA51214818ccb533ff324b5f2076aa2c09acb2f2fba65d3624b9391f9e6fbd69f8bfb54eb9700d41a92a45e03a5b72ac155472cb09f4a7d3e7bfb352fda2ab5469904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569013d16a07a626d1f36650f7f830aa3
SHA1691bce7299b318fc7b4b82a8fe3dcba010bc415f
SHA256634f9e37b81edffa4b562ba8ae094b3f8c4f18cd08c3719caa47e3efd8900846
SHA512c2d6188fea48a03ae375b7170a29c2ff0be224fca7860be462fe8df40a8bf1fa6c876d22e9d170facff1787dea7fb48818aa81466320e9f9ab045f79854f7fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5037b51c16b251074af91652499170f
SHA142413c8c3e720a99e5e577b7769acd8d58dcb606
SHA256874185c64846727265292f82c1cf44d83e4549ab953cab02af985a2cf2208dff
SHA51224c3e5a4160b82944259f5fffbc56d56df66b33a47b9af3382cfecec8f473cb97686f7796744ca3b1f74dbfed149c76f20f145f36475f783a85450ef0a4f23ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6b930d63970c661997396dd1813824
SHA1a5d0c0a54c6c149c619d26fcbf8bce4cb02fc624
SHA2564ff9e3df2362db3d71ccfdfa0db9bd7e1908a5822b037b0a73ea460bd9575ace
SHA5122ffa45d0adc5e3740c59c68c62f71ed613372bca1fc877723044e2fcab00e64b2398a2aa466fffa57278f4e899059a8f63a1b241a205080847b205ec5ad3e848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc1158013eb7650d3976bbdcee9f502
SHA1df84a38af2583b8f82b351573b3fa71a8352955e
SHA256fd14344a4cdc6e64b3434746dd200b86ed74c9bf094938e2285572d03c47069b
SHA5120258a935e1f9498fb28ff75bdfddd4fc05bd4279c7b88c5dd505b4c929878eab8a0281e0cc660f69159b7cf9e4b820480624a6cbe2a22d3fc57956350939a6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8530fc43543322e46710d982553f928
SHA17c735fd9fc4587e29580dac2c237ab84bc241c09
SHA256e30aa840ddfce571cdb6f0e096608e68ac3e2e482b4a84e7e0f85db3cef7ddb1
SHA5129f540659a5938494734e3cd31fc2677d359be774cc57484c651a45878eab20a1b60f214b9e026f0d218e8b716716b4307eb59fd76e8f3d89adbeb00ba4cfa700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ed3b69c54f6f5bc901028031e81342
SHA112175c23898efbe3a27dc398800c13aa2d4ffe51
SHA256c99e5abd87158879a12ac0c572d4e43d328a826557afef4bb5c1ebc64db209a8
SHA51268fc548ffb834b6648a40259da4115707bfa1b8663a056214bfc708325d1724578bf2004e5e332e7f2e35fa0f0360253fb756ab5b9de008fb1f337d128daf30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce209ff0440b217bb3588ca0780a811b
SHA1e04477b0811153a98c5e6a3dea68dad1da4d8f9a
SHA256375b56a0515d1afb63f04e1018917b77f5ed67b2806ae518b09b5d16dcd8666c
SHA512ef4ae1bb0bf585f90e6276d1bb0f3ba5ff3eb996b026469575e7bfb5864f26b9996024bffc213e97d9dd68cdb0123d8f245fc435edfa1df99602602c604b7336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04fca4b1f52289f07377ac234910e68
SHA1c8d186b583ba7d58a66320e0ace8acac453d0c65
SHA2563c2efedb209c630622b7f06b270ee118ae78c7162407c8d5567a229b2c63cc00
SHA512c161e595ec81777ec146ec2dfc0ac702e59e3e51d3105571dacced0e95d4ad7e4688f23b25a1305c619f84b38809a4d7bf3103b48bfe95d5b2541c817249e521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4301a55400ba8fe824c197b26fdf89f
SHA1c198fddf0a32a6c0318751dfd8e4818b35bd10a9
SHA256b18d47752ef749b2b7013c6bce0b1506a8437d45dac50bc0d3de339b297c197b
SHA51259102132bd0c9eb49706c92a70a45ec148062e17dbcd79bc7b2a84b0a36a5c740c33c2f187fa5eeff0c1d412eeaa5bb266cb2239b535f80e73292d6f0f9ec3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc827b1ca2a443b22833dbd9136974ef
SHA16fe7c2fdef4d4ab05aed137ac88e322a7273222a
SHA2569a6fb714d5dbe4c79fd996c301becd20028c1d1b07a269eaf3a43898bbd9e7db
SHA512eba0320a6f6ac3885201a41ad2a57c41cec8475fd8c265c2fbcec1d0ebccf28351845935b53650f47c33e999781b06b0d35bc606b3fcdfce565a98b46e2ed19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d4a3823070dc789b52f9b91fb96a6c
SHA1798516b8c4681a5bdcf832164bb8525399f4d2d0
SHA256c85d286054cae862f5234107940a77bf229e72a799793aa8e16fd29437f9f2a0
SHA51251692d56e8974f47d1af423c10ce5004e98780802488aab8d5106b49f25047fda4dd5e8002a8c52b1c3b2f34ebbe5d62912abd6eab0e4b511107384a2c3e4587
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b