Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
8faa8f3bdf88bce14f8f4098940a20f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8faa8f3bdf88bce14f8f4098940a20f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8faa8f3bdf88bce14f8f4098940a20f5_JaffaCakes118.html
-
Size
4KB
-
MD5
8faa8f3bdf88bce14f8f4098940a20f5
-
SHA1
a3d281caee1b8436859529fe4980d7dd2fc99326
-
SHA256
405e015fac6311104d7bd25bc81533c061461bb538cf6caac8ca2ba86ce2fbf1
-
SHA512
7c13e2560ee10372b157a514d4b26e359f24c50c72ac630e96ebe3c535313edcb25e07f81f6ffcabe31e165d97e5d4d467d64ed24b622c675a8ea53259e57c8d
-
SSDEEP
96:ziE5zyCmV4MSEPBDvV0n47ej/hgOKiljTR1QnynePhjyr+l9I:ziUydV4GD8/h/KiZ7Qn/P0r+l9I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11D548C1-2130-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423529449" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000bfec8f0e764a2b9b34bbbf92c0ac9dc8f8d899fe7e45bd63cc6015029583a121000000000e80000000020000200000006b4d6feb9f74b06371bc84ac7e0f9a3a6923097a594894010dfcb713284cc4ca20000000c9fac18413f3224c9c35912bbb16f752eec48dbaba2b7da3b8a307de8537102a40000000e0201a8c6ccf8669ed50bc64f086d2ee275547348747b8f2c0792975036f5074d8c3b3bf03bf06e21b604b6b695ab717f807e673dc4e918daba4105a3d9d3e4d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10cea1d43cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2108 1792 iexplore.exe 28 PID 1792 wrote to memory of 2108 1792 iexplore.exe 28 PID 1792 wrote to memory of 2108 1792 iexplore.exe 28 PID 1792 wrote to memory of 2108 1792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8faa8f3bdf88bce14f8f4098940a20f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bd4c14f237eb198f2d0d984c2af1a6
SHA1ca627cd8dd3328ecf191f9e03cab6cb3244a1421
SHA2561d87be3a7fbe76bb07fab5c13d5a5474b3064ffa8407aa7057068eb73d7f8de3
SHA5129ecf2cc9aa6f896fc63a4046029a079901607d672b646c57068429042292c4ef99e5a804f198caea151842dc069bbd95c978805b9ee1e40c37786710b867be02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72db8b2bdd369da87712aee36d4ea12
SHA119d4b00083bdedee27bd2796c9d1f1ce2d7dcbdd
SHA256151509b437057da79389119b1ec18b9e40a713a636b045d03f49b2f3b5a17a46
SHA512d176160dd2db0c61976153803ad645b8ea58bb554b5c3f0a0ec14553c1e95a035b236872383cccc6d512ca630c41f9733202d853699d73df440b5c5736edfe49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563af3b4e1d77110a54b88333a0cacd71
SHA11409384d74e73b65455bb05b4908330cb6752d02
SHA256224b215e05ea9227255681a93c58ac497e688352e4a06d5aa61f068199045afc
SHA5124db3ef3f0163fe5f954c8295edbed7d91a7a932903de25c1a934d6c30eb39169a0e3b4ce27d628a27a710b1d87da3b01c0ecdaef156abe97a068ffb5830f3dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d88840dc21ea0fa4df419a151afdef
SHA1fa65892facaaa93a221c57b9888d9044757d3989
SHA256285091cfa53d273bec5bc0e9b22abf8e591c793a8b78afc59f6de425315efb3c
SHA5128328ef08bc2c61e660fc7718a2ee0b35521b8dfab191f09310c8d8a093366433c97093243daee5b673a8417ad0332800d670e8c77f4af12bde7372612b847f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558967840ea35b07c58d2a54eb49489e3
SHA10bda14598b2d21487b28b02e69f317524e26c538
SHA256d004306516f18258a73fa47b115879500e7d9d443deede89dd4215e395751994
SHA5121f81908fc7f5a88afa349c492210077c21fc70c0fc3cd4c94c7f9e0592037f3bf0343920c8891e78ce2ad434eda2c5834485cb74daedfb3ec5b5e19ae9d7fb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0f906be35c5ea64891069f3ce17d1b
SHA19b58e686d49ef1d43e0c0c4b5b3bb10b5d302c92
SHA2562a08ba150b15749c3601b38e937c06e6896047f6e63baaad686ac6bf207b2043
SHA512dd0ea46e728d73849dc3c494e6e75656e3abbc3ab20aeb904935898e7eaae1a9f375feb9d468e000d6a3d5399944ea721e11e7820badaeb43b021dead30db813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4573e91f941441b4a0927e0a45c02ee
SHA1425c39314e075850adf2789d29519f2763d9778e
SHA2564a356979f911c9a4f0213e3e861e7782f76567b4997a7fdb37876eca0d164486
SHA512f830c1d605e0473b666e1a66232f2290c4061e1f6f30f4f78c65724f23a75469fd83bdbb5ddb8825b717b713d82266d609b1a95ce73aced458a2e2d71ccc17db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52770d09975da077a6ffb6272eaef07fa
SHA16152a6b01cdc7ac5e0cfeb336917c7cd46b12abf
SHA2565a3028123264a6f2b81568f1a3b6725c16d73036ddc37ae1f3ff73f69094cf0a
SHA512c512c182ab351d5d6baf050dd87bceda678e677611f83d9e6a64bfc82c11df5ddd273cff0442937527e7fcf4cf813e77e60a9bd41a55eef242dc998ee38be6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51364dc9544a4f147a8a440010e696797
SHA132e1a8703fb7ef6ddc16016c5d0de7e6eb871fa9
SHA256d8fc319550e46ed63e30e3f144eaa8f2415caa6cd0ed746d76c709a4dc7e42d4
SHA5120d98ecc639fb9968799bcca0487208243afa6cc4c5b911769b57c2da2d06de2119863e7b029d5bf8026b6e4fcd56ba3535c9054b28d761849a362923142be002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d267e4cf97d25e3bb6aa8068602d79
SHA1ebe55cab4e5f3438a0d00230c131d86d4dd6e8c4
SHA256343d6a9b07a8a5d5d4ca2515aa586d6c54c7a494a9cff46cb57ad2e4b7567466
SHA512a23c8f38149bc835a37330d779ec858843b66c948e3d0b4b75c40fee6c015c3b0df3faf64faf19ac88035b48a36b7e00224830bb01c232b06c9357a9c8098d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486b7cd77c522cd8a370a9a14affd1a5
SHA1d5ff0f1fa6bf947df90dd5ad41feb4fa5257eca4
SHA256209aabb94944463be6b424db1303251a0f3e699c289535b6b102d9b302668a18
SHA51230f8dbdf03655376808020fc40961bb8b94216d5be154e3add636b3dcf8b669c2c51b1f8ed66f2c58ffd62a565c3060c9439ae99f75036b7655b1ece2705ee68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695060d725c87849f51ad4b2372238e7
SHA1b68fffa0ba0f0200567ba76bd4ff951438678a26
SHA2566fd2ee2eb87eb5a6891c3ab96f833f38aa7d3730d6370f59aa1aeb7e94a557c5
SHA51210b6b50e5db22520873e07b3baf973d0d97cf83baf288200e2677ea254a36ec91e8b6b4d503bff5fdfac7270fee22fd049d93300d6d3240f1ab2de0d53a2bada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029d468cfe72f261faccf098dd0472bd
SHA12da0a4730d4d80b81b53de9b421ca6c6ef71d879
SHA256549bac75a6a8ae3db9eb7332d88166c0a007f7f83417170dfaf81042710b9e34
SHA512bbe34ff8d7ff66870edf19f0506eee0e308b03443003981004d8bfac297f315567187b74c1e351a971c5518aa1162f4cd989c61828e1eb3b50971bc6d9bbb752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c5192eb3c6de7257f0d61b4dc023a3
SHA1d06a8375cd9c33295f37c1497c97c46876536c39
SHA25669aa73911bb03cc9227034051f48915e2272be6cbd09b0abc44e1ee5ce2540f9
SHA5128e8129f7336512aa4dab879fbdf62c732f5c48929b70f45110bc0a5788a2bbe4b77e3ddff6d59f70b176e07e897f9eb3268d87ddf95cf23afb0a0e9304076755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e29a4defb0100983616066cfeeec2d
SHA1d3c0930615a458fd8051a0386de3327839a846ef
SHA256ce9455e8b73f5a178966898bf11f19c4ed3e2967d149310cb82fd511a0f1d07c
SHA5129a31871b4f19bcfb02652e713bf15fe467cce5d92f5c2cd70e19e74570321e1cc11eb24b6df5548a73f70e76fff02a80d8f04eb698dbdee621f9f9992bc0f9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726f697366db7fb587bcad19e633c469
SHA19d52db7b3b1e25571feba57cb5a60583d1b863f5
SHA2562b9559e7fc58e4c74a933d50266b52f32a47b486b04cfb264f1579c805615e44
SHA512d99e4765ddd822cdff842cd82935cced9a5915daac578b99c8de648037a62d8be7f992bdc0dada9749c8b3cdb75d95e2540edc80629555629f68187d256959d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213ee212d8095114dce7c646c3920ddf
SHA1ad982dd1b87fc03747771b0aa716947731827820
SHA256105d51577f0cadbfcfdedff3fbdc61bc0ef79fcebee16c4a0954def615addad6
SHA512f2f7750ff264f041e7eb355ecb67021e9a0106dcea8254a302574d079a315b162d0a7af1ffb786f866df967188196925793cba536ce4306a81609f0518bfdb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cafee908967f5be04901e14265a2a7b
SHA139d9e152d173c8f91accc30f296f8d32dce9db85
SHA2569cdbaa54ed438e11f6f4cb20fd7c18def4012101d6ad337113a844d46c80eca5
SHA5121e8f21e0e141dc0d2e3704224b878b6e5ddea99ec7db3a1b442edf51c0bb843ea7202fa2cf66485f97baed106f9d927a8f1eab87c36088060ac6ee7dcbd5f3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedcb8243618e092c146d9fc5f5332b9
SHA121dd911066dbeb8d864fe99ac9c63e18c6a9cab6
SHA256d107aea60b62b0aa78960fd6255d56409f281e969a4ad90da7e9c8cce5c39f42
SHA512e708727770753670b54bd7f3f361cd851362d60c44d3c0af11b768087d2b2d335cee148919e473f9be71931e697af28161741c533037a78b0836d07b53aac845
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b