Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
8cefef1e8772b2229111f65c76af6c4d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8cefef1e8772b2229111f65c76af6c4d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cefef1e8772b2229111f65c76af6c4d_JaffaCakes118.html
-
Size
26KB
-
MD5
8cefef1e8772b2229111f65c76af6c4d
-
SHA1
d5ddc046fb32a4b4943e35d7185cdd047afdfe03
-
SHA256
2bb8d92cfb9bfe78f8ba2a3a18059fffd8b36540e74c2792df891cc537a35aac
-
SHA512
45711fd6c415afe1050e5a6b1c06c1386bc2c0416c7dae67740d91ba65c8f65819a09214cc835c5f2d6ddceaf115115b79bd47d840d1485aa0f75ec0ee232e49
-
SSDEEP
384:zcyXoCISAyvFnQrCbfSl1u/yNIsfbYvXXZm2HrHS+4VFL0SzVarn4PfQTM:zcyXo3y9nQrmSl1HIA0Xpm0S+4tPfQo
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF969E61-209B-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ca98c9a8b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009bb0e93ed2338a41aa56aad1296571db000000000200000000001066000000010000200000006c2b31748fbbf32f6db7b694d5f3b372a73aac0cfdc5eb55c4a909dff2014d10000000000e8000000002000020000000922ed379f0f65045ad711359665be761e7462d7270d82a42d8a97cb5603670a4200000008c9f8888f23649d084f4b7542fdf2c18fee807548bd6f445aada224a363facb04000000029aab226217dbc0bf412b4f81afc219eef4df4e15a1214830802424d3e00ebda92300bb0f23c150e8d46a8c28bccd0bd288a1c7b0da681a0537cf30d72a3a2ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423465826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cefef1e8772b2229111f65c76af6c4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74a72944fb3f054b19ccc60f7e840b8
SHA12f7d03835a98d311b1d058e3d5b4745060be263e
SHA2564607545ccd6206189ed66fd36c9381afa2f27a3d0e9ef28ed4c42884e528717b
SHA512d1cda71052aa0b16c0217cf523a336e19e901e6d574d1f3ce4325ee4751ceabca1e231aa74ebe549b8cf41e2b426f28c312b562a8acf9c8af8b3941db2a5cb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b260c5d374558846b8854e8bdca026
SHA17b33214b51fa742052f51975cfebb9064678685b
SHA25602416736a78e608ec79f6c60cfea04b2b27d72ea6f9ed1466b1360cb475ea1c0
SHA512da3430408f3a97b8b56cd480984cd5c6341b561ae380fd35f055d5e57b7ec37fccf1808b9ee8744d421b333fa8d44732621350e1c2b24c986c07dcd95b2881f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b3b395ac08a11dba6de571b53cf641
SHA124ef0ee128bf50fdc8711b4f5b8d3da03b1ab20c
SHA25662ca6f1b4efe087f74326428e6da3f511ff7ba3b99449b0d3b214cb3fdbe6aac
SHA51209f83f83ac69d39731d68db476f7a0fc50ca6084be4dbac23f394f9aa9cea24e59ac745462c107bc856a64038cd866838148367c5c64fe084421c92f3738e5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae773d7967c69d7e6d3d84468a68f15d
SHA1dcb47031b3c8f040e698e4a99f32636b26a0e73c
SHA2565cb33eaf8f9087fb97ebfa9bff8849a1d857f6e24eda1f6e9409001612773700
SHA5126cf3a7e03344a2d3b7cae3abccf51a7e78bde50a8a530bc0a9d6b3bd21450d13cd26cbb2b6e66739713f13b9fc859ceb56e25e0f0df9046bfd2bc04937ec4bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec288dcb3fc926a1d366681ebc7c011
SHA1e7a3d0a61c553d57b7ddf6c81434a78d796c3cf6
SHA2567072e6e1ac1a36d02e85ffc9af9cb680c22bba076586869265e34fb873ff86df
SHA5128be517dd40acb5319f1cc9dcf1116ec9f85ff155c2dcc87334ed2ff11313f33bc082f139c7d63ed4009c7c9ef500802d55035b2524827a78dd728157ba3da2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5908c11708d1a63fad959debe0547a
SHA1260f6a2d425f7f414b5649b29d6b8b1a124e94d8
SHA2560c4f1d390f92766f6362022d178476ee0af69658a1303d440d9ac88be4326263
SHA512ebde7d2b68f1ba4dfdb1a808c7885aaf9ee31b6e6de1e5354cda4b4e9958710db68d150c02208f89f370eea54c4f37edbee046a418484e0a5cfbcf6dffde0e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50f5dd15d19a97efd30de1231e05bad
SHA190001e63801d8b9fe700d6fa5d5f84b07377cc9a
SHA25686edea6303d638355f066539ed8dc38ce06793c9524c3eb58f3ce48bb728588b
SHA5125519f9783958add06a4ddb190206eb9944b328e6b7b6d6032221a9c8579daca0c77c66735b73cb02e93814c2fa27b71613770c324960be02636deae840218b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56123145c4f8bc01bf242b8e33acba9
SHA1041cca5b179bbcabafc038ef5e8cd4344b1ca6e8
SHA25652c0875a6c011c90a40a18bd2f5126670d2fec581bfcaf1c47379b1e751838a0
SHA512f9e151273bb1478e2a7aa40f674d506095312cac5f19f0d85bb7daee4645f2b8f058f9cdfa3c34e9b34f113bf199c485fb0b74f6069986b676edcda89045b7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c796b639aa61ae09471e608a65a2bfdd
SHA17345064c93a373db3a195dab1e55862a8058f39b
SHA2569bd1adb3ec68db371ac68549bbf58cd2f68f17059907a7e5b7411d8a19eb9ce2
SHA512d4f4e8fb5ab0fadf2aacca3cde8140bcdeaea03319d2cbfcf6fb3ca928b3fde753e06e7a95128f27c4ff623fe0145ad180234059b355a4c56f20c50a978f1ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c64dedebf11afb811fba9b06628745
SHA18d0968a57ffd3f591ae72308d904ab365cf03526
SHA25609303e7f6b40b10d5894f21eeb4f7109e268b8a8ece43ea5495f71229a4052f4
SHA5123bae359d3422fa63ded4dfffe11ec212ea753728994baeb6b57400bc4d19f9a43e4411e466a64b528450b358689f16260967610c0ed537d4e7beb8363e5f3129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162dce701c93ad252621a1be4a69e569
SHA100d68bf3f343b7024dcac45827a7dec5f5434980
SHA2560190ac9dbddf5115182dd6c84268e8f43ddb9e851fc54e5e67729ed6de27a7dd
SHA5125e54120aee0e0c025fd0a3076b13693c0e1a25e4e393f23391799d6356d2399032ad58e042ccdb5d93515b2bbb2b2539187f4c04505559e069af5601ce84828d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85afe9da55e59c64ef45ae219e88f21
SHA1e2a70b80ac961de74aca1231c947c535a4edb377
SHA25645cf0e516ee9f4a266d265c4ed6356fb18969eb75ba3e5c6ec089ad44c9043c3
SHA5125750d560f7c469837fb338686623b11027bf5b299641eb1d51eaa0c8af164b5cc4951a1e14a854934d3b895afdd03815fb8c44e4f0c96390994f65b067f75fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b78932584cd2e0fb0f22f8427567489
SHA13948151512176335597c88166e31d41ea7b09acc
SHA2561cc8b41f7e38953732323bab7507465f2d436a67475c3c4555757bd5d6bfefb7
SHA51225ba5c83382ed38528fd758fa162bbfbabc0c05a82d05a2c2b43daa05e80c34e6c6c4e6b0c37d5c619ff5259f6c363c0492420f95a8c25443eb1e4868d015fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f703b46b35801e82f46ddfa739c9b488
SHA1042c2877273093d66cf1a20cc0df06b0e078068e
SHA256a09b58c3ebe12ab3298e34c856b6feed7b04578c3b5820b8b2d00beba4d25077
SHA5124c9fdc95ca9b725fa2eca4a2adff4d16a04061c530a2617d59fd90b797d49bbb18c3cde884edec20cd03f2d12de9423e15360e2bd5988098c8228628a9b2d633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a77a5fdc395f255b009748e06e0109
SHA18a91c60c276543a760273dd31d602d1a0814255c
SHA256a1fed62a02542feebf61748d77388869a07e9115642471ae114830bba0d4dfa0
SHA51253a11f88448bcb20d9b2436f7c900e0a1bc4280baa25a308e0269dfea58d7ccdbbf221ebf87bc96c2e8fd8bd92a022941e9b0d822b4bde77343f4c4458d8c9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca9234514ad7cb8435b9b0247051bac
SHA104579ee2c9b2ea0c196a2dd8a9bfd0b69486a018
SHA25640d40ead7ad4f486e10726073224adb6bf505d01400778b4a4e3b79c39a7c7ca
SHA51283c67d3566da73aa9b22daff7bdf0e455be368d64d14792cfdff56b1f04f6c605b14de3efd694c1efa424fba1610e159b84fd61b3e2532fda640e6720ee31978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5c656198220970e6d6bd52433c29c5
SHA15eeb27af2084af1aa68614dc41af450b2f5ea7a9
SHA25689322484ab754b812ab9ed317c7a4d6e9f3e35a6c3c0ae62f6b9c35f73d6cf25
SHA51217435eec6802675a4b8e8a0afafbe3c1e8337b403335bcb07348392a03dfee062991cd122f72218e43ad729a8505f73056577826ed3ea392e15e46326e1c2611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf8641aa62a640749466f5b028a6e6a
SHA133e407a9bea1e7e77ab3b16a9f03c5ff06268db4
SHA25667552a86ae73bab78f68f4ef74db1fae0c9a6129acc1a60fbfe900e156f3d71b
SHA512320b3f88ba2fbcd27cb94371ae95716eceeca3f2a6bc9d97a74af1a92436d94b8f95cc14b7829b964cab8d3e04b6b492cb09dfbbd06eaaff82f523347f1febee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1573ebafdb36c2ccafc5bc63d83dfe
SHA1eff1d7496a73d0f659eb3560ff35190f0c6ad2c4
SHA256032cd1232ec3047b427de24a94aedab3302d5cda5029f56afbdf18a02ea9ec06
SHA512fd64d2f141e94c4bcbfac9d0e144de8d3a9919f472783f20e7e78832eb20a297b0cd9169aac64adfaedb9081df8848e6225926c19bb902d884cf3687c4a65bc0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b