Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
8cabe952f4b34e05ffb84ef6fbe8ebad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8cabe952f4b34e05ffb84ef6fbe8ebad_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8cabe952f4b34e05ffb84ef6fbe8ebad_JaffaCakes118.html
-
Size
6KB
-
MD5
8cabe952f4b34e05ffb84ef6fbe8ebad
-
SHA1
99304b7144e8d3cc8edadf411090a84a0d49bbf1
-
SHA256
9e50a67221abc5203e07ea3c4ff6eedae91678ef8f2623977961eb00ca81706f
-
SHA512
6075e66475bb56c58c0a67de8fc8645c6c7eed3b819bdf61773aeecf8ac4e5e99399351575f55340df826fd7cd45618f18be7a1e47ab81e42803626cbe5cee17
-
SSDEEP
96:KhM3sHfM6jC2Zs029qS0uAESGeWhWJ4Edv:KhM32Ut9qS0uAESGeWoP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423458843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2014208298b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b41845193b92a4a9f5ed8ad5aa34e42000000000200000000001066000000010000200000004d1f8a257fcd6ae0bcbb78af5e07d2d6f4d6d96eb84ec3971cdec371d274f1ed000000000e80000000020000200000007eba631c0d8ce19daec8a79f2e69609a6d21c36c4e460577c351c975e59e8ad02000000033cebe3d14ab5df48ee0188a9d8a61489de63f57bf8c18685562fdff4e34a22b4000000045e5fc7ef4e1b2ce2d1dc264e68c1cc5330259e44410ef57e87c7acc2531a1df93db69502c209db35904b0f2b929a651dedac04a693a8aff761f1c9b56e19873 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD7F41E1-208B-11EF-A30C-E60682B688C9} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cabe952f4b34e05ffb84ef6fbe8ebad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8a0a8e504ff31ca21c61693779ee12
SHA11b62bf3742c1ce3ffa984d86b4f7e36a35d2a5f0
SHA2561c918b5502226bae9b26c67b81e26a14b20e7483de363455f1c43f734d172425
SHA5129222bc948fdb7bc2640ded6a28018583aba5b2c205a5e99e66e5aff4e9834937fc647e690e05797947d27fd767242b5095a5a4a20649f93567edc2c1c926fe1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c825ebec928e5a0e4c87e495788f2b
SHA1ea9184f1519e5ad90315b6f837591f64d6e6f616
SHA256689527aa4508376e9f6e68608ee9216afdd4acea7e2884a3f8881c750782c972
SHA5126765495a6ef0dabac9e53fdf83c814c865ee3a0fd9c2d1ae7a33dd8e2084970e5f6cd78390b5d6f895a06d797b80fba04bf604044813a248a41130b94b15bd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6052ec2372113e92cc141123f45b9e4
SHA19fd83c3355f61d0d224ce1e70b03e280c6f83c41
SHA2569a2c00fcc959491afe3f8b9bcd64b4309977669cf8fdf5f4a13b566a4c35f4a9
SHA5124c7c8781fdc4cc68953a1762788e9e7cf784b6c4c69f7f08831a19bed6cc4680de8c8f048b53ec94f5d249722ba0730c74e8c2168f08719a230ebc70d0999be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9edd6016ed55175cdc839aaa4d68fb
SHA11aca26b33608d30b425b62d538872d7e4fcd9db1
SHA2565858b5e78d4ca3dfaabbe8434c5cf22d6ee77a2e8f0c6a541eec4b38e4519415
SHA5125808df4c080b2de95f55b6e3709f10adb3ca24dacc3928314556881dc8dd90446775d284e62fa83639c4d3fc1cad619da5e084e29774bfe907e9dea16200b957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d40ac5203dd739e9f8d95ceb5a1bbfc
SHA1d7f43e2cdb8e382579fc9fdb3fac373767bcbeec
SHA256849c35ac7b8fe1d639ecf86ac708dbe7fc8b7cccd8db4b9aeca691c0c6153d9e
SHA512845dcc3b175259b76f6cdf7c483cd66a453f067116b5af93d471d1c7528c592256bb02724674b75a39dedb4fda3d0ce8542b9b29bf2bd0eb59a4963fcea39527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19990549899b4299be919390935df3a
SHA1a168c945ebf1208668eb9aa768c0f1aac0928874
SHA25625b7aba9b8d56fdc41d764c1ad07b5dca124e6060a08dda40615452002d57012
SHA512b441140f045fb707d8805a2e134334f267ba151eb0902604c6a3424931cae4f9b3522be809527d76e064b42e8d06e9ca411b39bc1626cee346c11a82d34e35d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc7836dd00beb53d6545a0a4b2f12c8
SHA10e2f92d164ab5e320574afb3009083e6c675be5b
SHA25638fdeb56538076eb701e54e205a246ef8c928a3fec782a69bde000817fcc7e3f
SHA512aafddccb7f6ac168c92c7179c87629c2a54c11a907b8cd5b7910629053a55b4899b0db56ac0c6d0b0849b8bbbb73826eadf4d041e35b720f2eef00f642bc4e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df22b583a025399b180c5f3be76e49e
SHA18966559172f69d99ce66539bc06f8c02090d0aa9
SHA256e4acbe88af28fc31cef06fda0609c4b9a2176210aa15f030ef96f7c494be4909
SHA51269974ab8ece90cf3dff69d75e5c7c6634bb4fc84961d2b6ee938bb1592dbbc75a27d3608f1c3d18988d9a2eec151e5674f86687789588154befaaa8c34be231b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d289e1548b09ac74857fe5df722552
SHA15b16a41d8a1b8a7c3fce884ed484e5cb7aed52ef
SHA2566822f278cac41856781d95856ed1e4ba328aa1f2422cf0b0521322b0928461b3
SHA5128b7a545f5731529a11ae1d25d240ebf09f1a5c5d9b2480143093d6838c802a47c40c23394cdd607902836bdf27fa9853bfdefe5adeb775ac0d1f6f9c0d6e2681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542115785cb020edd12b6746a6270ae27
SHA12a473959610f3d30abfd763dc55ec80428247cc5
SHA25650e22b42a57ec5216e8d0321ceff81e1a5dca65c26daf1aa21f1d3b06e77c2a5
SHA512d3c347bd899028db6a718b063d0394271a4262f93878aded834b0f2390052210e704d1b83280c4d859cf6418213dc4566067b86c184481bfb4374a7412d86fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0d741bf4315f6b0eab281203f77792
SHA1bf011a3f880a48c5d60bc3b51f03846f6d964b67
SHA256e879360cbf212bd2b1907aa51d5d75d2ca644971e790db5f91980f42dc823cc0
SHA5125298cbafa6228c2ee6f1daf7b17dfcac4a30f37208c8c3680c6d8c4c650a0b9e36a8988620ed323803794bdf412c24132e895c86730a43dd3f105dec03555249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e31090941c91e2be21c3dc5c3299e62
SHA1c45b8e9658573b190e37fb308a281f2d5dda1d0b
SHA256852b1842360f30f1e4aebb0d87e3224d769bc7ecb12f022e63864b7d63a174bc
SHA5123310b17615d7e6ac76488322b028360f88e5653930954f241aabc7b71d8bd2e17f9c538abad3f4b9ff379eb6bd418d65e27bab44aaeb5cfdfe2b476bd2199387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef707d27f94740e77581ea44c03c4ef
SHA1c5da1be9ec6bfc02ed6ebc6aea830aa2fd711e22
SHA256615c73c40295c3b59faf7eff28b327af5f672f9a0bd930ba726971d3907ca6ca
SHA5121ee8beb5eb233f14a1330a85cfc927d3df4fb2cdf428dfeb10a2e90611a09cea14794eb9bd747f7381a2110132552a1a87af376e7a4bdcb45c16edd53e2dba44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef83a1980d0e8202d1b8de8e8e2d677
SHA15bc043044581a30f144f81db70a537c4511a357e
SHA2563f9594aa337ab43e78ed386b6b1f0a221d1a2c5b57a924f9d40460cbb8666f19
SHA512fb380d8ebea990ea83c56a26934ba31e499c3338cfe4e8f3b1ecab08c5596c3733a3149a0b2a65b0ecd5d3fdadcc699afc3e6695dda3f37cc325a878e1974557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c91d9463700ad07cd6c429345d54169
SHA124572f4c098395ec963e65dbfb7e24c049e04836
SHA2567303ec2e91dc4a1bafc09e44bb92f868dd03fbb9299be5e277d2b6e16e5c9077
SHA512719247f4535202da8c46ea9b863b6ac24241572160c1f22d662504e1ea1bd838a8c312170c56995c92cbbe35004999b86be75a2ce0a31450faa544bfe8c0ead4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748a8b32d38b2e6e9a056305e9ad5357
SHA164e0855d1388673012d74b92c9b10c4669a3fa90
SHA256ac4ec1e12d22cf8c4793cae82165d19c90d0dd124c882b3a48de8354f98cfca8
SHA5123c40e63e69edec96f2f701b735b2195ab7cf10735eb036b61d9de1a4a69053cb787abdc6000fda74a06986a11b730a3ebed26f1c147a1a5d678cf8bb8755442d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54517355baa895560c76dc5caa7246878
SHA159accf32d1e1bb68247a622b72a0dae341476c66
SHA25645143562d08957331e5c4c9829dfda7f33b41ef8af8074e70834a79c6eeca0ca
SHA51224ad8f8d0b2178d417929de68e1e41a36db3addae49d88c98b752972850e47e9aa13f07468b28988f26c34f63f9e0280ac310caea9a205d2fbe5a70cfe094bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6790e394b31e88eeab84c7995903658
SHA1dc07919e46262c0223262ba13937f51852abec23
SHA256bb5f7ebe670f8dbaedb4acff599fde590b52505925be20a49944fade470f5b3c
SHA5125bbb896747b07ce3401998fe55dcb64787320d2117c67129ed65b5d7b4db7c9dfa1acdab877377bdfc52d75cc1e17d01351493e4cf7e4a4cdf5bc0f81aeb1e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079200f547c600eb051da50bcebf339d
SHA1e6565a7d48a91925a0f7e423b11e1bc515dbe35a
SHA256bc04bdc79f4bb6c99791e66e9b8ca4846be1c088632967f9e4e7c12825711bc8
SHA512a4608cf303f86974170269141250644ababee83b4ff749ab5c6aa8df3a68b722593ebe580295a64fd790c4b900d4010653ee1515374ee341d69eed910d320cba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b