Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
8fbb8de7831094909315f5ae2d0791f8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8fbb8de7831094909315f5ae2d0791f8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8fbb8de7831094909315f5ae2d0791f8_JaffaCakes118.html
-
Size
49KB
-
MD5
8fbb8de7831094909315f5ae2d0791f8
-
SHA1
2f3b9bcdffa47fc775d1ad84aafa271c24957b7e
-
SHA256
0404d72bfc85bb1574da3cf9037220fcfd61e2e20dff6d6744755a95a03c8bd1
-
SHA512
c6796ce200b24381b4c37c296333fb9c20f0f66288b9a0a9e31010bb02af19d384a1a19d3df03d0c7702361b33634f424457ff0ef63bfb9d89b2f01ca41fae2a
-
SSDEEP
1536:wk939pVeZRP+ZJ0IY/q7I5Rlv7oDsBaLacf9myIK8Ppnactq89NM9XoT9AP5GyJW:htceFbXaJtyL5xub8VS95tIgbBpuZhQN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7D960A1-2133-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000048454e4c40f25a264bcff31255f9c933475a45a846ab62f70b223b9698275a78000000000e8000000002000020000000acc5c22d569fdd9744ef806644b7df3c82247905bdf347ad409e8bdb064dfd7720000000cac488876db68f39e21bd9b00fe58098a7f128d2f06464413b1ff38979c88609400000007f0a2a19e7e5b38c7cff4fb16c7e8180f91c01e166221393141b9cb29b9e6d06707e24ec35d2d1af66347ec868af0215345acac8c1a991a32f03e918d9b77635 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c5528c40b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423531016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1316 2928 iexplore.exe 28 PID 2928 wrote to memory of 1316 2928 iexplore.exe 28 PID 2928 wrote to memory of 1316 2928 iexplore.exe 28 PID 2928 wrote to memory of 1316 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fbb8de7831094909315f5ae2d0791f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521994ebce4a621c4510964671f483c87
SHA1ce53c2ad3993f6732df0e8355ad55c41efbe4e60
SHA256f67cbe2f6603e8cc48eb7f9ffe38e7a56a462b0cb59c0060f4c82914fea14adf
SHA51291d0072b5a6f8e30938901f9ce335d63d4cb5ff725a1cdf5d2345c322aaf5d232ff70628b86a67b3eac0290f38844de0d16643dac22deda6018f65bd0f26205d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ec92e1d666b5f404a58e6bb69ad794
SHA1f8304aa8c21866b9ebe103032f400e5320b86636
SHA2569517bf73b157d07f5c6be575d8f1a698cd5b11bf93261e17b29be2563e880cb8
SHA512eb89880f54cc31161fe0017e8a6d0641b4b669798602935a0d53b8c92b4562a0746ce03d554b0dc4d69977c4b9f371d2b8a9b81c0f6b53616504d18758f0a18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0dec4d87e80c98ffedddabc8654aa8
SHA1dde4f2d5d7597d78e32ec61ae5413d58eadb1659
SHA256ff24b4adb4ff260833b918b735ca63e959d81c36081743c1c8a54b1ada3bb094
SHA512ef403db64b456f61a12b3661703b1204846d7358abbbaa88ee9e1ff8ad25ccb18ad5a296d8cc08341dcc6553ccaea56b445c8e5d51fe4f2e270775c9e4938660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52035c1c4395fda6150ea1a5787c22df4
SHA186149590f69c9f0e2ef22c2331a85426ae8f1581
SHA25658c38afaca63afc50d97dea52ba90bcf2d950d19f91ee60ca1af09f036adc09c
SHA512e068fb294dd9bb7ec9d617816761531a7e94df1445c0e877daa50b12d67b52d7175c3bc87943634723b6c32183dc87cf48091f8948d05c1245b8d039160a7ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9620ed8a162e84fa3629fcbb4aaeee
SHA18b3cc12f0922046d901b34dc590e188baa11ca72
SHA2560574daa6375bba4ae471cfad2c937fec8ef9e67d998c2981c1b0620c83d0c99b
SHA5122e8d644b7e93320ece5c961eb81dd6300f3d78319b3f0bdd2a14356fc77094b2945fa11cd79f10552a80bac173d42f82035a7383a1abfc9a946f042a99fea8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a4afba5880696d36d2560a4687ff57
SHA13aa7a94e27176e663e913758b09f1257da1c7e76
SHA2561722eccda786896cef9ba104cc297300a4cc437f6fe6528a28a31bc43009d486
SHA51238ed743f82f5c49f0004e87498c1d1f5282624b3101ccff308f04508983161921c83b92603fd264ef0757e218af1ce8fb3fdb00b741b6bc9fd356aa6427f4ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9cf868067a10a2d6c8224e6653e4a4
SHA1ce623d7979d27658e5706baf6857359778ee49c8
SHA2569df67a8a8e306c333b1539b3f100bc881c2fef1db432d2e1a92daca5a0a4d1c6
SHA5129c1ca7b28bae69436d1b1cb2d677e96e6eb68080b089b5911894f4bb3803edc916fc949afae74c934fb587f31704431cb0739f410b8e043ed025e2d1e835596a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235f6cda91c5954b3411aebae6feb47b
SHA19269e665f5b662e0710cd3825a6c5df54151dee7
SHA256edc29d2b3e4481cb564bb276e2592f0214da289ca7f40be302070a5693109048
SHA512b306217b140b757c0348bc58d0a388f2c24c0cd661aca079da9a36d6470c8db54d1d030a5d0ba9cbbaced167056d42373a97105c047abe9a1195e9af506db3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f104ff97eeeddc2c68b18e0aa15e89
SHA1ba07152b2e12702ead1c41cbe9ac024156aef28c
SHA2560eadca1dfb7ed49f324dae2d7ea77a26b831a1806597eeefe244c5dbacb3bcb3
SHA5120a6031f2f62009980dcf3d33d347bcfe7cf58eeb6954d87dcb20bbb4b29f3da1eed9bdff823be6b2b527d07df541689f3dc7e4f16511f6db33984ce95fe0fb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c9b880090b1db42bdc8f6c7524a27b
SHA11ac307fa74d43a196ec76d24dd9511f836e658cb
SHA2562b0f47eb785e575073645f35e7b44077cb23d0ce183a39427b11f4645915ca2d
SHA512e91b3a29172ffece77ef6e8f76f7c51b57cd4e1898d16c4f6a1e59ea14975342169f3f716bbd4db08d0458e80185cfeb2eaa5a02cb3041972dc9e1e56c4df2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bcc1cdd63d83a0a50419e6478e339b
SHA1d095690d3b0eabb44368fa38dcd6913a082797af
SHA256e5aad1317bba869d3ec4112cd87b935220b1894150150a6c5926079feb4648a1
SHA5120b322c58f20cbc06c029fbaf0fd66281386f434160a2aa16a1929a81463acf3df26fc7755be25ae1b513873ca0601db05c3a2013a4ad1e8f50d8942b42570b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f644e4e4b304c5b24adcdf159a080a8
SHA12495afb740f48156abb691cf3bb8e3b0f9f9a969
SHA2564ae58c4f4fd27f320bf6e29280a9a912a356fc7d6132fb7a33d2954c6615b4c4
SHA512dfbbb0d936731428e44154b0f3135f1a2eeb0880e082318a5c62e061f25bfdcdbfefde906dfd68857466f45aff0d9aaeea990afec5c0240353e3c476d735c8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538111384b724731d8a6734150397c91c
SHA127b99c1a9ff4cdb2f783cf7c645fef82d2d59a5f
SHA25634e54d9699824100e2ae4d5078c0cc473d0d07c270622e43698254f18200ec6f
SHA5123350caca90bcf290f22a68d747dc42cdcb33dbf4676c4c9959668d8a9585a897d0daa9312b4f36ca80749c3ad1e9e667431abdab0ba17d7a9209f4a271063a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca4ad507282e3581eb56b1729154b9d
SHA1fe896077b9d325c85994340acefd75fbdeb0ae1e
SHA256db2a48537e7cdf45581f2e15a2b4f0ecc854a9af882d36d3e3a7d03ae0be2d6a
SHA512bfdee1c4d25c0947989ca05c1a7817fd0811e9b18b0f55ae76c92feb911bbecf13aa17bdd3d9f7a8e8b7ebea863e5748f09196796146e5e5cfb16b198c0db0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa94b8da0e56553aaf155807615b80df
SHA1b6443343a4f4aa9b152f9c110f0fc1f011261d37
SHA256a5320f6ed91d39ec25456a0296307d58e6ea586a38e4a2da6f33faca0437c955
SHA5129e954cd65b8248660c3a45b27e8f9173fb56772677375a78ee9f86a1ccb40025bd7b1bcfffa117ebc914edc6ba47579fce2d8b039bd74fae24df23e83365259f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c854cc55f970d612d375590fd0c3f3
SHA1e51799d339b23d1691e6179d3b22fbac5806b4e5
SHA2564554901596d148250461b06b9ed339c1677d5499e69bd12b0b644d5dc0b611ed
SHA512d17af2d8d42d88cde53523aa2161f168fa6efb1f07ec18c18c03ff1e09769c0a781b22e3e4d121b4cd730819971db76313d579bbbb0c1b7389d2aa4de91ab33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c3f01fa32c7abb6060ca0be2815a22
SHA1a6becc4babf76193129951818c0c04a36f151368
SHA256c39587668e202de91ad845002f47b7272a9fce0599927df6233afa9b6325f8f9
SHA512930443f20436b3d1ebc8a409a6dd0a1e6a1c5d504d18344194bc79b0e80414885a15742b962bdec5d4ede65b053fbb353bfab7d7572bc4c542dfcd4c96f5f048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a6a6ea676f52a0f9ea8cd86f3e827d
SHA1ef75ed24faf442a0311f5e04b7f10d3820875a18
SHA256279042860fc3aae6dd3262b7d6c85d18023cf5c0db6922230f8c373148b57502
SHA512542ac787216082cf520f99e03d793cb47561377636eb8076dc89093fa9e5688793592c1ae47b646bd29cab868be301799c38c6231e993d09c9b771bff6ea8e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e261e730376805bbeb551a21977fb6
SHA1ce67565079a5ea678d5be9b5ff6924a94c6ef4e5
SHA25634ebde35b7ec1e63156bcc83516311121373d23344b8b722061ec241b6da292b
SHA5128b25d8aad2ec981914ee86461f96f0feab28576d8f69507a59bfc666e39154dceb84da826ecc3a97995ede4955d2b49ae68d7a6261a62cd6a66b9fdf8e6c96d2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b