Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
8c79e75e2693325a1af5d292f10954d3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8c79e75e2693325a1af5d292f10954d3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8c79e75e2693325a1af5d292f10954d3_JaffaCakes118.html
-
Size
460KB
-
MD5
8c79e75e2693325a1af5d292f10954d3
-
SHA1
82d635b2e388d2b24d089f75e60aa2e4d345dcfa
-
SHA256
2319b6e1b6f1b963f733ff99f1634b3b96dcd206459b12bf306dc93bf1c828c2
-
SHA512
f09830771282a0b034bc39604f2d6fa49ae0dc7ad20c07b34eba1cc6ec9f7f337d88105249245f22ced9d1d56aff5a3c0b34ee108851f18f3efbeab9752bf90b
-
SSDEEP
6144:SBsMYod+X3oI+Y9sMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3n5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b2d73f8db4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423454000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000214fe0803c007949a7803d01da82de66000000000200000000001066000000010000200000007f69734ce899944097d6cf5bfe5bdc465aef0d131d1032d81bc5720573bed686000000000e8000000002000020000000e750f2c5bf4e0e7d67353c8a5b7addcaf0f93d1001d49a9a7a4daaea281ef03420000000f0d1d568ea44e77eefc9a72dd63242657c45c2937b2671ac9caa232e57bd7d5e400000006d055c59a015f1c6756386531873aeb52053dcd89ac356ee90e1cf77b8ea0f5afb29dbbe0cae3f251ce83a73d4b4c24abbfe7d4af7daa6e85bd5df382e99139c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{674FD2D1-2080-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2800 2272 iexplore.exe 28 PID 2272 wrote to memory of 2800 2272 iexplore.exe 28 PID 2272 wrote to memory of 2800 2272 iexplore.exe 28 PID 2272 wrote to memory of 2800 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c79e75e2693325a1af5d292f10954d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f3dfd985065660fdb3cb0e84fddea6
SHA1277ed005fa29a4364c630189a1febfd92d88d220
SHA2565746cf92ab7e74e0c6a833aaf6fa6a6e66495b54b3dbb824046ce6369d878d71
SHA512ec79d5a1c3db48c20e7c40130929bed3bf03b25f46f25e32d47eaaacb821adafe9ab3bf029704cc16836a13a38682f68776b6b5fb3138a9a919e998d92bfcc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d12ae2e189abd12c6da4d0812799fb
SHA1217083c94a5dc5c284426fb55f3bc704da74e6ff
SHA256006a48800e6f26d2a2c13713992a65b26fb6f6d57408f997dfcd406b38704063
SHA51222caee696014390664f33dd4718b41522ee0a17fefa56fee6c4f76997b3defca4f4388dc4a6ae5e8fb7159c235b42cd28c0eabba5f6ab7dbc927d340fb117f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd03f6331032a34c5fd932cb97a5fc6
SHA13b4834cd5bfbff1bf42af816f744153f81a2518a
SHA2563aedd1cd432dd806af2942d953e3905659a31847064b5913923f6b452eb82eab
SHA512da9a8ff97749405891285ccd80ce1c671ea753e9b68733fb89a986e3b3df683e91d60f4b5caa7c4e41577754e3bdd43bfe2ac3d6c6c7312474b1b9c48b1f3591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352f506e8e7830fd4fe433abef6f6345
SHA1efff6e07c9f79aba11c28678fab61cf7e7cb4638
SHA2565623b9d9552c90aa5da6873a93be27f82466a1e418793c2c7490304b09b0b6f5
SHA512a76ddd2a32679c6f149808a07d1e98d038cb2adfa3d084cd1c57ba777683375ad4abaa85f0b89a7382028acfb85e8f761575ecc6eee9852054e1e8261e255667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396200bd888c483c9bf668857026adf7
SHA199b258d0bb24e481c36df158c351b64f70faf18c
SHA25614f8b5de1d03f4e01e2194a8cfad3984ef761600d2ef1d07a744f9ed0c27a30c
SHA512ba6f8b0b14a86f9bbf2d858d8b115215cc7036fc49d51d7db103e3ed1a1f522b74bd17a84251948b1c74865a0ec0b107e822bc0e4dca7e733a1775720a7bb8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8da58681f64f56bf2dbdcd07b2bd8e7
SHA1e89d5095251a5dba384c86480887f0b7219295d0
SHA256088fd52d96f1b470c3e5d6571d5762a674f98fca4362558bd3bc6b5c7a685e45
SHA5126684ecd61c4838174dce38fdb281d010fce748ea009a38da52b142cf520ad3bde381064f248e1a39372ade7d5893cb9bb3d3ae620a47836d5cda3c20d072ced8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f06e45b0aca37e6df728bf7a90d149
SHA1c79f3c7c95f4f65401f3d156aa8004a03a6dd47b
SHA256bb15d8c02dbaff94ce64f678716ebbe3b184e10659752af9d6bc6345052318f4
SHA512e2a287b8ca7acb246227267adae7b70c82cd0fa180bc3551969121aec4c355a6f5947ff545bf305351739b7e6b102822502cf4ae40c376a2f0048fc66aba7362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58210e9cd983a1fbf6fbf8d7b1cbaab57
SHA173f89502e6027c6feb2cae84dfa0702e30e4c091
SHA2560464596bc77b6fafbf039836196419aca8572380aa22e2acc3a594ba1d2c4ac0
SHA5120947b8eaa2caa85d2fa85ac2fe95eda0f2ecf45d262c923055fa86120c1157d240a17a9099ed6b07c12a7f8b3449d1babd0b19fd3e8780464bac6c59ecb3e559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc0e17a561d440537de8d0571096146
SHA18ae32dbf6f37c05568d95e79e96834e97ad4a829
SHA256170bc1099335d4cbf2de63ab836fe68f7bfb3e0aa720ec31deeed54e5e4b7c2c
SHA512d3f182ee98805d4d258bf66248f04c87de0da67af0d9cd3c17db6c9587d7804eb68f94dc0efc6ea1357a51af35c2983794cbbbbbd7093dab8837cfa657b1b7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f03b8ca2b5a386491cf25dad2cb4172
SHA10ffdd4686ee1174a3bd9f013a409cb88e3c38f0c
SHA256eb06a16fbe83128331ba9b05a30a721cb92bafd30fd505c1cedb69b3a9d51d29
SHA512d47ed710dddb7e3274b1e1274fa0546bddeaddcbdd76e46c52a7668f4bbf21e900a54f326134cc6ad2079ab0ae35cb9f7862851df6b6aa823c64671dccc670c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ee0dfa5e3f4182a89732f9b4df2841
SHA15848f09863b57fa5fe207ce3409439c64a4df95e
SHA256cde6bc5067c998925938910289eb27303963711031b35c0c145155760624d61f
SHA51214c064507658341c984f7053360822df59e49cf8deb8b5dd803e4b26737154974c40da71211e2c6a6ecb49f3ac3d827836cd32ec95d1543095d6ee880fa38ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b79a83e2ead21bf92f9b05b208725bc
SHA1120f5a36a69dca06b58a6eaf0c253e31b821631d
SHA2560898c7f6120bf361c1b2dbc368c4e39aa31b808d7b7c19a8e6fb12e288cd392c
SHA5129eeaf7265ef0b96d1284c430849306da1132ec2bf4b102bc9a781f603e9355bd04fb855699f1ea2c063e55e87c054f42e9174069d2766b82544edfeecf021613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509eb34b083977d64bdb2b6867ee3bad7
SHA10edcb02f8c79766c2cdd54f80f93b30787c6600e
SHA25612429bfc1cd57cfbf3fcbf2b8080a4fe4b8aabc1f2d432630c4c7eb1e9e3fa8f
SHA5123e7e2554a0b96bead24116de0de95da9a1b8c5a8ddcc11792f03f306738746a722e29d44a41720bcb9595a596ba0f413921622b4c760ee267ba3cda3bc982eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9780679366e40a902541019a1230732
SHA1268c647211e800c49ab4ce8ddb027845c9aeb157
SHA256dd90e4eade3e85ba8fc3698311da9cb3c546a13f3396fad402b00eaeb9b1b833
SHA512848d433c581bb10aa75ea523de866b62d7a60e64df9f8ebfce218e083d2c7eab29f5e8938180cd0835c61791e1218625c70b263809a717e4c792aa870283175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54836a84440990ae18eba39846322189d
SHA1ea603f273d38c6a15737b9733afea2e82f2af5fa
SHA256c8794e9606ff34a89161435283e2ea79a498f1c683dccea7b51cb5aaa57f89c7
SHA5122dd7ce2cb8a43a8df329a482e93436a01bc2183ed48bc67aaa1b8e33c37c91f0a46982fed99ad5f26ed1bd93b91f00f8440312d31a3c99d9ad5c2800b7e7f407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863a43d12276d1d3012524e39231e376
SHA1eb694616adc550a34924e4d393a011878dcb3f52
SHA256af94de807b07fe8b21d229bf9c0b91e6f9224ce638091d1ca7c58964b1ffa16b
SHA51246222a9f3af85852317bb45e44f57a0e48f3f7dba20d429afb9ec4619f87ca829ab40642473f858057c807d9187d0cb3ac3029488ad1e65fa2a5676bc9656f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9f9392b38b9eff7ea1b94d1ff0da79
SHA1842e10c5f4e17a8e3164fffcf93ef58fb8e46b53
SHA25622ba58c8320169a289f2677be6ba0ed25ab70ed2c191b9dce4e89ba401816d71
SHA51222279a6d55b9141a47d52d55b70659cd6b647afd7122f02c4b1ae5927c096c5fefe85fdd9c38e73008a2a6d3ce68e8e244ae3140d85c21b8e044f35415fe6e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248583319a21754693dad199ae09181e
SHA1fad15249ca89785d73f3128694157aa396a2d9d5
SHA2561d369a4250d26e571769b25ebfa4ee636d176cdb0a39ba4c3298e0272cbb4974
SHA512c3e0c797aea43e6065386f76a2a3e9b653e1e782b82a2b302df67bf1b8a677e8dab7bab2aa2eb4513a0d0200b7984cfac980e7aae2a069d003aff4c1e6e583f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93c79ac75c77176644f10ad78414ac1
SHA174122632c3776599e1c47c1037fcc72f68ae01ec
SHA2568c3c154cab7510e4b8d8cf866bd185ce23c19d981836e2f4d9b1e188a11254c0
SHA51250a067be0e3c654556b1aca68ba801bc4ff278020cc18dd01b511ca17dd05f0623638a6a1e75ac8a1b94c584cba8aff9eb5039281b432f9fa09fe7453f8e41e1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b