Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
8fd96a5c72953ca3912ee1d6c0101ac9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8fd96a5c72953ca3912ee1d6c0101ac9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8fd96a5c72953ca3912ee1d6c0101ac9_JaffaCakes118.html
-
Size
461KB
-
MD5
8fd96a5c72953ca3912ee1d6c0101ac9
-
SHA1
149606915947a196fdfbc1c92f1c00f04f9edc06
-
SHA256
a4060110f5a522b2f237c2ccbcdcc25d281651467359a2abadc1c4accd701d36
-
SHA512
48a2bf1b79459879631028932b736178d55aa52b20c433ed73e9979b28f0f65f5d82b2c31e4459f6ab40507976413edd9151857b70279b6aa750c37548606176
-
SSDEEP
6144:SLsMYod+X3oI+YrMsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3g5d+X3x5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503d73ea46b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423533743" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11E23581-213A-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000834dab81c293a8f384083003fa70f165800627dc6b39dc9bd6689f18c7b0c5e4000000000e800000000200002000000013cfeda9fd40850a8af3dad07efef46c0c9d9e727fbea4833f40a435f62d1c5f200000001a1aad10985e568ac118549c7927e207268a1b14e9a3385a4373e5a4cb02a64a40000000095cbc87f824b42667ef07d0fda92df58b1c616501ccb5ddb03614d1f4e8a5be6516ed509236117336fe0fbd8b971e990fa6f3de0ab77702c6296a7b6d96e5eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1272 3056 iexplore.exe 28 PID 3056 wrote to memory of 1272 3056 iexplore.exe 28 PID 3056 wrote to memory of 1272 3056 iexplore.exe 28 PID 3056 wrote to memory of 1272 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fd96a5c72953ca3912ee1d6c0101ac9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca0595fd863116bc9656269826b88d3
SHA1418ddc9a4286febd93974c143c99d6ce9e643b8f
SHA256368fb40646fded8e6efc3cecc020101c49c96f97cc89ce8a2b124451c888a6d1
SHA5120694f6220d90e893e27504c81121745b5b8df34a5741b2ca11f8c4e295880e62563a594b2a5443742f3f0065052f3f699a9467722bf1b09f8ee86d19c50f5b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6f472b0e815d4edf124935a7bf1600
SHA131e7159fd38bde8b056964fdeffd1437ca7e90d2
SHA256959a844e3cb735f76b0ef26d3a2c2c51f25c46624605763addc7716430bd67f8
SHA51274f757e402494acc57c03349c91a22449a278dcd2f2cf87695f379ac8f90660d0903f782723ceaad3c444077235ca92a1ce92bbe3d83ebfa8055bc81faf4d7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc891d55518498db05eccd93c64e441a
SHA1eba393c6feecfd0bf8277e679f6696e057256493
SHA25622a530dfd16eccf82b82297c43d6fcf7c830fb65b4e9fa505391426e0bfca2c5
SHA51223167bc37ea834a37b78cac0ae0929a25ef21fb30e6441bfb31494466a2c777c68e4d66b77d01d70037ce8dade90228dadaa555b3270f7beab73b56b3d733dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d327cc314431796fb60d0d0bebddc1b4
SHA1861cfb3c7317ef776b52d57164eada8a1fac3e1e
SHA256c322f3fb440cf1b3c2b29f8106779253b816527d9c60c0e27ff5d7412aeae79e
SHA5127a715e3990054afbc32dc44f8cf13af4ce6731cac4b4a86bcc33546c6cd989442b5e50b06ea6df28df766068a347df3e5c0e08b7db546e3032008890c03b04ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7c3650c0928b014e3869e9c65a89f0
SHA1ce373f3caa0b66e936902343a054f95b8ad5a34c
SHA256f02f66b11b4273718c070c879f6ec710f03f9ec411b3e1189a5d88f1447f72e7
SHA512b3af966a8e574b5f9559c8cc414bf4ac0eccb132821afe0e724549f459766ad258c561704234da0267fcf1d2401a8985e53a8ae2e5d0ebfb260e6d3f90b26e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1c2002088b9eec50d5dc7b7b1434de
SHA19823bf9f0efab93742101d8c4df83487fa709279
SHA256ede0db3f45ce1b516e0ea64a9092487f1369d147eb34ae0f8e201b1f7009c629
SHA512fa14f5863bf6c05e0e37b1d0806aadac900de59c91eff7b7ae4f58a41dad039bd8415a0a87118989db91a71583975383abb186ced22ca0bc5fcfeaa92e42bd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc317dfc09f9c3909cdab0239d6be2c3
SHA1fba4979e6d1774ba936895ed0294e5c85e197319
SHA256f8bda0fa790b6a277c958e26e8e34d00bcfa173353aa4f8fa418ddb859bcce46
SHA51213a355e19414160d2a986d1eb07ce477532e25df663147be9df4b7286e706b01ed263968b68d45a3330911b04d0d41ffbc3a32a5e8d580f85ca53fa01f9a69bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03aaa5f8fe52a6daadaf973bf84f058
SHA1d3c474bb959be827feb2512c7a6d62894bf9291e
SHA256fcefd3a3297a95565bae639173411e129cdf459ac7581b10a9c02e4fa67a5ae6
SHA51207982ed4012ddc5411bd0c4171abc58232e0ab6b7d78df7d152d4f0d76669eabc6cd9498c7feb557e12d13e3127ce2ca334f04061ffbf9924b8f8c82eedbb062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507363619e1ededc2c2cea231bd16788b
SHA1778115e923b24fcf5574512c0254cac069b326c4
SHA256fdb51d92ceb9fca7823d809715213ca0daec8a01f736d106f80b2ad4726e44a7
SHA512c3689f22f656cb86ce3f2b40df058570d2947fe562ec35c4989e36f9ace63120e7edf0a006705dbbe4aaf89bbcbde0661abb5a57a3ca91da47c68944eea63d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7b2a1414924f3a5530007a61509056
SHA1ed3e2847adff03a77c6b69c91d32b09bcb81d319
SHA256ce37d7a382dffe3b9dcc46b911b7ef2cfa0d4bf115c42400fde4ecce433010d2
SHA512cb1e853ad17d0eb595ec2d995d41cd2d9df2f61f00706835bd8f14881330174df22f53ad658c72da8d19b067fd971a8c382b6f2b855ac9a94843191579c85453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6c09199695cc7021a4286e80f1c6e0
SHA1cb30402a8b3d7b110a5ce84c6ede7d63bfd92df8
SHA2564e14cc9a20eb31564769c8d2af024c05cb54538fbd6ec54a2ccd9414cdfc5eaf
SHA512d37108bf99efdbadbe262256d76c05d60a3ffcd833a888b5c83fb98332d8f13f991385fd3fa3a025bb8d6dd505def054eccfdbca4e3be3fa9df95aa91bcf8c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6160744c41e8b46e73ea17349d3d1f9
SHA18ce85de7a141e50d6a566fa00bee986030df1e90
SHA2560d55d3b5625a0ab23b20cc4c2476070038c01023bcb6f8e4390c2cde0497cc59
SHA5129606ac8499407e4e2254ee9fc96899e8d102eb93abd3a6d3d068aedbeaa6d5c9a2e35d3d341ab4038badae784b1487901ad34ecb5088ef21b1a7c9a93a5cfba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515114521c7d06bcc3a2e37bbba5c416e
SHA1f2d4ec9c57556efc54d2dd76c63b0b62f9783033
SHA256723c19dd87a8ae9156123f8db67ab9a7c3656b925d0e863792a42a29186fe352
SHA512bec5abf29d02a108e2c0e3dbd0b3e6491f932965afbe8f55162b70af22d2bd7978d9491356d7c1a3f3122afc697a274d72b738a0c9e376fbc07fa098151f646a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678d49e0fae383c61ce84d2ce8263cf2
SHA1c345e56e1e72a47ed330c711aa8c7ab23d357f4c
SHA256ba55a2e3719d8f9428311f4c3a4744a3037c070d5458f501fdd02bd9bcaac057
SHA512963b3669d99fd52797a7be86456e1e495bb4cb4e7113c8c4eb0484cb072b4761f513f680be3feca4fa3d15fe45afe4069a153471d6b0cc3545c5873842b717b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e9d2c8ee5fe61300c5163515f99666
SHA1757fbb588323716c8d4f4faf0749282fcbdf5aa6
SHA256afbc400fadf143e1f1ad1b8120a92f84a335d511f08a1af22a0571dc5ceecbbf
SHA5124514acd52318095e68353a4f101304fafeadee0c6896172bc62c40ba373d793f99f4ad8ab91d14d54e8e6c2489e86905ec9add6e53f27f186e6697e8bdbfd157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537fbfc90815f372572e9709d11764662
SHA1b0b2f46eaa2528e8ac6a4544cac9797c186ff757
SHA256f3d7c90f6ace1db252a619a13695e303752c3e17df2cb500336fb2647cc5a60d
SHA5124e43e630c97b3b2226aecf383d0b91d746025214c56c762d9963bc774390a07c34d76516a82db5b913069461cb4877ffa14268a78fcace281ae36a1dcf56b164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58658343ed4afec4d0d9950527a22afc5
SHA177d53dc41a99bd18812f29b5fbbb21fff47a59e7
SHA2565f165381495c1e11dca02e45edd187e02f86ea1749aae414a0d448a8f48567be
SHA512b992a4c2bc1ed7de9c7ff10c9a53f188d1c64b755f87d9623b4b2251ac1ec1d48bc83d9904df5daae4593630d2a82cb902da29e8eed499335ae9b7788c699f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77f3dbb8514c870370c1b4a22dd79d4
SHA1970d190843361698af10d0fc84dad47d0178d89d
SHA25678cbf6ec5860f23b762a336c561eb7a4e0b9d147dec2589b32978119424d4009
SHA5122cfe6d78fafae0f47c8d4d256c4505dbcf44407cbb4bb8dd84a28c65d99ce1ccb7fbc1437540c42c3db8cc6d4854bcd38b07f64723e537e0a1ffeab58a405874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c2649eaabf9993212a323387481eba
SHA1e1962bd0382a8281cb7368c2e7172235e8b6878a
SHA2567c159ef29d06a9991d94a42feea7d73d90d1f10c4b452b4d771e994eb1ff42d0
SHA512f199d2dca58fe37ec55ce8eb4f9bf0f8912de3909b744ea89e11cc20880f0ef1f35b28ae7cf020b8109651b120c523e98f2adee8d172538de10173f32f6775c1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b