Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
8c7b651d1932d8f9c0d05763d6c2051f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8c7b651d1932d8f9c0d05763d6c2051f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c7b651d1932d8f9c0d05763d6c2051f_JaffaCakes118.html
-
Size
9KB
-
MD5
8c7b651d1932d8f9c0d05763d6c2051f
-
SHA1
23340f4240365b9de6e9eb6b5cf5612aefc6a84c
-
SHA256
b56a9e41e2b92161e15a929616d0bfc14d974e738ff533cd5cfeeaddc72e60ff
-
SHA512
80a51732b1c675afb39e52e7a6217e9345fc17727dbce05a67219e981ca052b9bdb6fb03e4041a49ea130822439282289246dfd9e98d3112446573a4ba85c954
-
SSDEEP
192:zWhJITEu6u16dFhJITEu6u16RsFrtQ3mAcjB1qehAX43LxWzfkGB:zWhJITEu116FhJITEu11sUrmWAcjBQe6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101f51758db4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423454096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0316e2b0e87fa42a2804aca34986a7600000000020000000000106600000001000020000000d3132e25a700a9172cd97442c4fbd44967ad997b8d8ed3b8d660351c5c98f965000000000e8000000002000020000000618ea32d1e2e2258dfaf5a0596627cdffafdcdfe40b970b06b1f451a634a14d22000000072ba15f7a16b52fbde64f5902f77349b4fa1589a4279483126bb01666c0fe990400000002582c54174e9ea67c62ec7ddd5ebcbdfb8cfa8490cbdfb3efe1e5916b23c7f31df462c723236d85845c8e504c55e3fb984ddae49db86512037952c61183ec8cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0912C11-2080-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c7b651d1932d8f9c0d05763d6c2051f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704714dbe1543425430ddfec45a659bf
SHA1468ee9f1490325dd770c3fbdc73ead41cc1691bf
SHA2565c0e2c9bafa8d9244d56aa09326661f09a783b0e676974046ccc3ec90567ea67
SHA5122efb8219da8c3320ee2de055f6a4c33efa3a71cfc68aa5f9cb4a2f245cb1dfb8c2517a89722f0cbcb5fc071cde64dafdfb0009582f45ee01815866ef0e59edb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba12c3ac0cfd0f0743831058d0d0dc1
SHA1716869bfdbcffafd5af6b40e37d4ec363f2ea603
SHA25672437b88773d93dd582182a43e4eb3089395623d08459c0b55aedc215fee4ced
SHA512dc0ab62ea0a5056dce45a2d572b98e5dff7e9fd21409323421db209feeeb63a69493838132d7ce954da18c80c2a9ddc19598418fe536c4f60d6857b081fd37ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526947654356e21933a639e63e3411991
SHA1805f1a112c0ee53318f5762746ec729dd1f8ba80
SHA25605aac08a9f5252359d3fa4c687a5ef895204a47c2c8d270d8dd212670147a802
SHA512a88ec8e357350fc61a8f60dd6e9593cb541fd32a4a535e0966ba6f65eab8b3ad566eba8ac8639f0838c8e5e787031b8eb9b4a3f672c8792a8ae300b47f00dbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd304c48d2d5d6712d0c4331fd2c505
SHA1dc6ba0e69bf8d1f62766f0974f0f270b7bad6392
SHA256bb09103125384c4e6b4e714b9cc7b061632e2c1554962729c2724a2d63bf59bb
SHA512ee717112d60ef4b82e3985bc39c9b948c1751d72abc0801f44369b89ea4df74c27a5296580d5f41cdc96db5c8df625bd61185dca95d460e825eeec9440bebaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f198543a80387cc3a42618034b3e60
SHA1b5becdf995b0ece5ad7b6f22e0123dcbb9819e00
SHA2568f19fbc202723adf77ece4e267877ddec3887cb5241655c139054ee820767a4f
SHA5127328c2f2ff6a997819b83e89ec45566ee2a9c1197e838cd7f51a61bc03a26a252c291d5149d595ddf6af0b59dbe0818d503b89c85725afd142f3d3560627ed1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f021b84848bcc73b82ebd24d58bd7154
SHA1011a6972b2aa17e1e9b906a7a3552bd0fe5aa7b4
SHA256755165db09cdb986acc797df7db6a93bf1c8cc06cebbb0cf60a6520da1af533f
SHA512f2151af554b02be4daea584301d59eda9e069c42167048ac9b8670e7c26b8ecb01e7f13835f2cc3c6da5d504c9fe799c1152fec62eb6988fa0ba8e478c24b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b55eca69ca8eec09ccb5f5acd2ebf27
SHA1208723bb864be34fd1f70736904eebde2c2e5410
SHA2565b32a1e675e58f71b6ce9b5ced690a5bad1f8512e812e05e78502af60835e9be
SHA5121f8e03c504602b9b7b76262b3d40553587d2312758902ace01cce7eb128de44daf719932c7702c1648fef57d1c1aa7e68d7cb6c0a725425171c9d586c072ad38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b7d2e9d4ab8d035f95fa38d5a5d060
SHA143de6f8e1abe8a178ea66e0eee06f032fe58482f
SHA256f297e772bf7f6e28abbb665afd35a8db05435142c3f5f782442de674495c977e
SHA5127a0b49104c6bd1be326b3b8f94cd98dff9b95ba3567afcc25dc783df12ec5d6cd4c5942c6e74fca8318ee1ef970b532579e5061b12e516fb2e061cd17761c855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca977a79bb96505ea8809b67151a67a3
SHA10c8c13903fd26f5a304097fb25ec434bb49374eb
SHA25652afe3243f033f0665503c347ded2b9dd1206d6f6a7a7b08094621b5c4f54eb9
SHA5127f677b5c44c6445abdb76630fff30c082a8fb8ab9a05adc69e3e952ac3a52360323325d9cc4bef15ffb704f6f1b9673933a536c3d27716d4e9f50bbd21cb24c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57691d90e80e43d03ce0f006fb449cd82
SHA1ebe43731c05a56356f947c7af2a9aff0e69d9107
SHA2565455c052d60fc3b27cda9e30dae788b126513cc69b2294859ccceaf119621c7e
SHA512f27fa5d9d8800b53d5e2f4c3817ca1d45cf44165ed89b9e12af0e57257453d68994c5499b7866579566f4bbb320175385568ed5f7db1e901b6a729114b51c8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6017d193a1a97ca4ebca93848b9c8d8
SHA1d48c828c7415a9135f2e80af0a6f5c52ca495dbc
SHA25624779bce6e1708f0a8c6e77526dec867535c6966538862e1e7e9423ff002468c
SHA5120b0caee4d6d62599dcaa7d7006bb1aa59e74dbd827264a972bd109882bc31eda73b274eba58df319beec644e035fe96c87b6ba4828d9143e75b064ae968a959b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e822bcb9e36da29d5b8115ac82daf6
SHA19ebf92c42d77b6a890cb9c7b258472c0083df4a6
SHA2565da3a80182b55afbc506be0847c67cc9e0a7b9b4fd5df670fc2e4c90e17ae4f6
SHA512cfc686c13dc04029109f209790b2b4362a5a677c4fe347a8665c206750339bdf0030a64f871592fa40f7b33fe0f94968b28a6aca5098595915f46ab0d714ae88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6587ea4c66c1535ee291b74e1b86a3
SHA1eca1621babe784a786708707abf2d94279f2d00b
SHA256eb8620928fbdb3e6157edabefb80ca7efb3959d9f96709c6c481d4058e7fff44
SHA5120a7ce63d7bb02b3706fa77456ecd6c7b2485b7f60f281b35627ad2618e8fb0118c68a938fc51388788b921ca2f807588c3223fb61ffc7beb66490fc7283be8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeba9644db8a71090628f524b72a2bea
SHA123a1a4d6fdc980368226ef8635e9d18aeeae5dbe
SHA2562d76f400eff39324fc4da571d74cd86172ac7c78b8ceee12bda441cd94080dcc
SHA512c3456cb44c210c33a6208075685962533d071d947abb70bb97b82ce262e0d7fe6d4367faeaac65d6bb63c46be52d85434f5f73c32292b7f6d35c6674758d4598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52540b935b1da339f1ef77dee7b4ce5eb
SHA1ceafd3c55c0f2087b612edcb7c6b2ede120d6303
SHA25634126df92e9b5c81064fd0a3beda5a1fd37bff4b28b002db882af0fec5de62e1
SHA5127650ee919b599f89eebed4a6aa48cd61e4ca6fb05a8b526392b6c0d79853799f28816ab0405c98a05443d08f575ed137267d6289722092940d75d391385b83ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59252ab9482d782110d1728c2a2d47682
SHA19c4e309fd24c8cdfe7ae50cdac4349ad62a27ca2
SHA2562626eda1ec794368fe70309602b963235ff74d59a486a1f94aa4e12f0595cb91
SHA512ebb0c797b59982c90d0f77423d6b281f3ba890014e8fa9464aaff685b939da32e1880d461b86f8179e1c0908fdc84bbc53106bb4e72677ba182b5e308a76b086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534df38a14a80c4ab931271dc953cb451
SHA18d923f0a983143474d87deb02e3620a6789c839b
SHA2565580cb7b5dffa1f78a0bc0763940fe828060d1ee73d2e2b43d87178ff81d7c9e
SHA512c6e1693f35b51d14b12610395672777d0e87a72695388addc25475753e20e71037cd21ac3b2471bf45dfd8cf789b839b4016082a55e979e1f933df6d84e45f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51216154ebf902df61c1042ff9d719bc3
SHA12c629b64bbff908544af32e7e985b1edb67652de
SHA256caf908b86e342e5e7cb0cc079c269377f2ac2f910f801ef64fcca34b4300b7f5
SHA5120cc267349d3819118c0640ef8ebcb966cbec794170496a8ed9bbffe40769d1f887a68d754f9843b98ed186f236c7029bd3f5be0fb7866cf4fb510c63e94c82b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706f8b48130837de9ce2802a27ebe63f
SHA1fc22fc526d4ba70ee75d3bfaa6fde3f27dfb900d
SHA25671fc4083dbf28d5b97183fe2fb8b9c551d9e0e585280ccc4e2445a86c9643396
SHA512d5f67a6b9bbac6e7455a57b9cd25acd13e8de74c7a7e6fe82e3214952bf682d74d845f8c4e4082506df27dcc36beafc3241f41f0d6685652817aba7a00ccb794
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b