Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
8cf9b5f6c6485b64e0aa137f995b7ad5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8cf9b5f6c6485b64e0aa137f995b7ad5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8cf9b5f6c6485b64e0aa137f995b7ad5_JaffaCakes118.html
-
Size
461KB
-
MD5
8cf9b5f6c6485b64e0aa137f995b7ad5
-
SHA1
6249dcd497538dd55f623b301e8d8b4fee07a5ce
-
SHA256
b0b5eb84fc2646adcd3cecbfa603153120cfddf1cbb4b6f1b40b989a63737536
-
SHA512
98673fefb9cba6ed69410c550c936214efd0b9055203fad5586fd99e11c174945cae184fee2c79d921208244623efa2dfc24b9910ebf05375995f335c6b959a6
-
SSDEEP
6144:SQsMYod+X3oI+YJoQlsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:x5d+X3Z5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c54264de834d043d031e43d92080b6d212ddc1cf18d3a2d7ed214d99d677611c000000000e8000000002000020000000140e1bef2d3c0e85cc177e624b3258cad5501d1e5d6aa038d7aa11508e0ed4d62000000056bd4769b5045c681ae756a8d31b4b275aac4571467bedd21661ae1aaa5ead684000000036ae32584b89d53db08d8e26b411e262e371c01cf27acfcb8c84e5fb2db7cc8159c404d1cf3d938eb63de506b1a9a287678419b0d929780dd72a1188e1aa4a8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8EAD671-209D-11EF-917C-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708973b1aab4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423466646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28 PID 308 wrote to memory of 2392 308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cf9b5f6c6485b64e0aa137f995b7ad5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7a83f084713d13c78e1fddfc19da48
SHA1a3f7b16fa2156dfe4c801519017cf4e544c5a033
SHA2563cc6c8d69c7870bf4a9d08eaf2e5655db186e117c369767d2112ade16c1f59b4
SHA512f07fe7e41c89d48915d08db03e4aeab5a84b703f3ee6e395aa6552bb085f439e96ec12047a713cd0608f9a677fece1a0a292810bf3fbc05b9b8ee19c95849337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e8b414cf8776cde6c8a587b4384e37
SHA1d5c898aa14635cbe2803d0900bbd208ac70f7d78
SHA2567b9949c574cadcfb5462e5c5144f0d743cb1a64b3130cd7f42bd2466e2abc9ad
SHA5126f42e23209a73d93b98cedc13c95082e0d62e56d38d74f2323c28096e3f854aea0ab293ff78fd39051986d295351cd71285e0814928919b1510e75a49f1f3389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54583f28053293967f999a5c088d6293d
SHA1b76bce2346d4ab092b5b96974e9b6636617ca1e9
SHA2562b94787f4a731ab62850d406388f07decf7b474296d269b99ac8ff859857b5a6
SHA5126191cc8ea275c20af9c8b4cf0621b9f1b052a45a5843845f67b64b257259104288bcc5c732ed5e7700ca426f450e043b4b14cffaf52d06bf3f9fb894ea1ef894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a5438b727383a4692435e24851a4fb
SHA15e52b892503472dbf36cb2221e2d6577af0d3f19
SHA256e8c5a899150caa8722ae3d418b24a4647896918a6e58deacc51a71cc4cfd11da
SHA51226da13172f57b3f40c116b4693f28488d2bee0266805fcde05f85449b66313c60bf565bea11ee786a6d3cb31c86f9127aa05b99a8bc0f87a71023c08a886abba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56911f9d58038e8bcd40d6b25f65a8a27
SHA1841aeff1bcf526c766b61350bb050746a753b54f
SHA25633a4c811873c6c52bdbaf82a13060bd13df6cbe95ba57989bbc5db83783ac713
SHA512f0f0b5e3a0854ea79e04217a8032219216ccc4eea19cf42d6f09633838f8ee8529df9e01f102a611ae656d94c092a6af16ae90f900bc4747b48015f8c04ccd2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062f76db8f9a379fe3a607399c508189
SHA16fdc9670ba94d8764f8995901468de03a0188452
SHA2567b84848657f29cef5daf715e55f5a2bc16045df7f86c35c57c3270ce087e5698
SHA512c5e7050cb62da53685f6431159be55cc7f085f1aa3e47d1a762c688ee412d8b543d4529b52bbbafa310521b793d7ea8caad2dd51252d473d9c94f33483a1f426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37716b2146c25aaf6121e504403dad1
SHA15adee2a9e2fffdd4f4b7d7e1c39f3d902f7859b1
SHA256c84f7fed791f4af4615d1dbc3e6b2a48f46b12b029cd1d27d3dd4243ef433a6a
SHA512537dfe547fb5f2ae3f1d44e038e4d9631097223980b70965ff663f04e7bc5423902cf297243a7248ab58df8b69bcd4ded019d89d3767b4c3fdc646ce8f28c091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57806dc8236e45ff55bb9b692c39ba5dc
SHA15eb698e57109fa4c386866373bc455dff7a5ac59
SHA256545483e37dcf750823713bad8fa545a80c4e452b2f6aac44115574fa23a67832
SHA512dc4f8dbcefacdd8e864c9e8c9d6070db05e88e2c8c576d086c8080a231fb7bb3e6baee698a89fb0ded22b9f31ad3127151103db1a38427b83c026956561f8b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33651dc47f026d4af91707dfed9ba09
SHA18de98453b448fe3cee4c734285a0c2a41f32d77a
SHA25669deef3c0cf6889297b52c16572f6a2a9ff7d03566e80a5c514a1e0a5de2ad17
SHA512330012d9de322bdaec725a656a7902eeda73392ebdaa1a76b4878cccdb38a64e9986c11c9e9328c588563957dedf3d61d2416786ec37f44e413d8310cdaa743e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d821453403c7a0e6402e9a6d9508ca3
SHA1ba91881a9c778c7622a4fbd2dedc872b947a70ea
SHA2560317f0f70d0e889eaaa3a7ffbce3e36a0363146fba0222151023d3f1e646336a
SHA51298efa86a60547f967e77a899821785a8266426b9e4d98384b8dfe3cddc5d48ca3cb01ef237ef399e525efe5eb85fd20f77a44f3a634ebdabe8620caeb6863368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ec302ba77f2f35335ea04a6f016ed2
SHA11c1b9337124676ae668f4bb3abdcf9c3d4c7edc0
SHA2564acb8c4e9c7872d42927dc6e6eb37e3b6e75ace35cf960ea35f3f58d21a6f528
SHA5122e204ed00cdc001aed35412358a8406c9ef739306db66e60ee515f5e580f45f6f9a478d0cb716b8a3e682b756204ef6dfee5d6eabe9be3ea2bda623a1da573d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57575d8696463364e266bd2fc4aaa1d68
SHA114acd4035c65937f0bad105b1c6001edc090c9a7
SHA256b36a269e69fd8bdeb32194d2d6ee1f066a6583a810879c85b576c59aa86532af
SHA512f38232c00f8a3ce2ffa0131d92918a94fc456ad64d849c77557a89066eb62fd8819c763ddcc0e116f792d2aa8fff8099507597bd0384a7409c4ba5cf81a4dcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d3ae625512a2520b91762e2e397c61
SHA17b6299a9c5e5d6aac408fb6189aeb7c826c9d4b9
SHA256b6deb44eb8e7e8a21231bbfadf13bbabe9f50178281aa0169e95c5e681864795
SHA51214d9950b55d46dc13b6e5845d97561516a5cbc820e6274cbcaca45208fb7b35c17edeaeeb65b7647bb1a620dfdc6993f12f27d67a9f8c737134aaf8a408da952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50454af1453256a4e531212f46f902c97
SHA17f47ac345984664635009c66c9d2a5bc93dd61a7
SHA2567273c5307d26bc474712b439dd3c6a39d4d77b12cfc568627716fba7c8e8f07a
SHA512607dcb78a154ed1b650bb5174c2f49f90bef054a15e2a953c64e2afdde16bd2b4bc14690ddad7c0e05573ce6a2da877d4a73a8cb5c4c0be4cfa6d5deea668bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59221f2ca83786f20b8b1b360f2bc58e2
SHA1cae6ef94ccbaafe62fe0fea42fa0f1ab11227b79
SHA256d886cc0ad6341e7634f38c77acd29222303a2babeaf38fe3fc617bd8b9078d88
SHA512498d87aa96afedf4495b5e2ebe4dc68c16f16ce976a9aa117aa7fa9e89200ff16eaac89114e9ae7c390420271fc4286d9bdb362c8fa1598d772e6730f02687eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fa01a954137b0d3e95c8e71443bd50
SHA141a7a325961bd398c8f9fbaafc0bb2d24a87112b
SHA2563b128448cf6688e6e0907d4d88ba1863fcf147a74bd30ab72a50bd49738c96a7
SHA512c06d63731d5b7eef3a55a4a7a7a57b8795d8bcd807e8ba0363ae68b2dbc591f87b576c9d87c959ad74a6c3510378328868a97c38833f83bba92028afd01cad0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58825051769501ecb1a692e458926012e
SHA1a1cd1a84c3937b96b29f79cc2eee712726ca85f0
SHA25635e3b9424ffdcc10cb0e0ac5144f939d14dc88653618c1670b6d6a46989c16bd
SHA512ea6cdc01aecd0aabe0cb864b977007f6cd836ee56d55ad2946fa102691f3d65375d0193fdd3d99a80fb567c6d7aa83b9b6cabfd37e7b218f11cccba9a9b2f42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554514385d0cbd3bbe26b5cab8195f925
SHA1f2878be161647293a522ec734423f5ec4db40003
SHA2567045412c8aff28bf8d23e0d347bf860072e0c59c2f4615bc21be96b5b57fd404
SHA512f34ef7a623125fa3ae82cbdec8ecf135d1f008a6b43a78cf9857d7305224c1a2c8326b4b943fd25764660905c3f6fbf7365e90df0f2c45e0849e1646696bd2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c86a9e106514e081568b82c8d491d1b
SHA10b7a86a3774dd105cbcc92d494bcc95a159288d3
SHA25694d33bb0f14c3efdccda78b62fd0227c9ce0302e9e8ea791156f1f0ba3b2ac7c
SHA5123b189381644fba609dc6322bfa2327694a56a934272a69b68897b17c71fdfe6f270c8124c00e728496ad8e61cf68f01771a19f9ab143f5ffe987dcd2451bde4b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b