Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
8d17cad6050444e2398bc399f8da86f7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8d17cad6050444e2398bc399f8da86f7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d17cad6050444e2398bc399f8da86f7_JaffaCakes118.html
-
Size
677B
-
MD5
8d17cad6050444e2398bc399f8da86f7
-
SHA1
2af3513ffedb87c40581b65372a783615b4346b9
-
SHA256
d4d42df6e2ee1a4253ffe320dbaf428ccb081c89524b66c8ca68661c562428cb
-
SHA512
f04d052dee823540b9ebee6d161414f676acf2d12e97c27d4d38e09414e815117cb083ec210cedfc22f0e18b6a21b65a21ed921ed7cfd7c407f2d06e947db866
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000088763f8702d947e9736dd8bdb9c91e93c4d00329110c2d91412b53f4579a187000000000e800000000200002000000024a5ab06565ca0ab04e398f9e832f5d68a674af00d06d83fc48ab970b5180d2920000000c3023f7ddbe4d5d4cd31669cbdc3fe50aec86fdda9ccfb526d800a6759278c7a400000005848dbfddb19ff0a80c92b99aadcd19170f84f7f4954db502a25f5b20c7305503bbde8661cd52353608c77247f4b174f81e9f26dfc7d20430af3d0d08846fa7a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70027495b1b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423469613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0DBEA91-20A4-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2092 2180 iexplore.exe 28 PID 2180 wrote to memory of 2092 2180 iexplore.exe 28 PID 2180 wrote to memory of 2092 2180 iexplore.exe 28 PID 2180 wrote to memory of 2092 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d17cad6050444e2398bc399f8da86f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59851d000b36da9029e36029dc464799b
SHA10e87fbde0dd553e1e4bd8eba8860d1f73f15f7d6
SHA256c2a0717dcf8607d50f617c5dae9608c47e9c929509937c447db12f9034841ef0
SHA512871c6c5e3d3b26fb0a7e046db2cb8a726e03d8891690bd5828f0955ea064b4f683f52579493d51a515d4776fcfaf192200313f4202075e56d42f8285475eeb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8e8db34b90e0ce9cf9b2b9fb1f1eec
SHA1e259ed90e5e422551168531557ce2975068e3612
SHA256e524c3ab2ee53c399bb8aa77d422ce04b593192ee4bf03a57f3a1e54635b6b96
SHA5120e47bf8d43c80f7deea857f2980a1ea9759d22b377f2d1d14f728383ddac3aa3fd37cfa49fbc2b25ab2ad8224b5f621d5c8834c619913a5ff5ee11acc4819f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c41f32beba2e5830d63d19b34f6b8f
SHA1908b8f18b779b1b78a78236ccdb2fe6a1b4ec096
SHA2565f4022c30f6293865f7c2fbea80c110ac18e5bbdc00c03f997d8760eab024eb5
SHA51297414c3c88ecd319d9d7397cc8d98b309dce4c81a132b8852025bc561f04d60e3845d1e7a9e3d3b1e3d1612b4e0bda0035b7e3e62585705d787c73115e18ca01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098740de2839fddeced6fe547c4070a5
SHA1a8fba3d856f4418a78a01df4f0029333dd781e5d
SHA256fe55d7ec6e4c364dd258ff54d8972375f5e57b16f5ee7cb83e9050d86d99e767
SHA512329b0894e7732366fc7398b4f14ee4c2e7286fb27e7ce38302f1a341898d424faccbc265193f7e3602cbe32e3d0f733955c05e2c91964da47accaa8ae6b7a291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56079f75c0964e7d710a12ca12a28d1bb
SHA16f95aaa4c01480dc940cd1cd17a6ad028c4a4659
SHA2563a56f71b99477e779242368f98c51f0ea9d5fc61ec42ae3572b3a4fe1badaebb
SHA512ff282c523bc0f633f25451a0030e946c47342c7c8bd73a2f3ff23af0e2410173c9e94028b7075be0aa1c2dd61535f39a039187f35a0822bd983a7d1aca72fdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f37b0a36d1bf6e621389e1feb0bc87
SHA170f60dc626a604ab18f950248789629b85ba16ad
SHA2561e2eb02d03ad8d64f5d24a04a8bacc186acf6b8047d07d60f57dc03c34bd4bb9
SHA512fd7292115ba9f0eace224e1541b54738926e8087e2d30778a5e92136431fd3537842dcaf5beba6c7b0704cd6f8d5c9d2ca50b6bb2972ddf6642454de9e334fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce20aa7a08e997c7cbaf1fdaeb6eb08f
SHA198fb878fa8a1e2a81d14da986c49811b4086df28
SHA2560815bc8d4c5becdbb6be7979aaba5a85f15170493feedda4d17146a173ddf5ed
SHA5129c2834cb2053aaa38080b984ad0f8b52631408e4232bd689f695aed5318c2e54dff2569afec4dd4251985688a53c7d8cdb674aa8cc108762bb51d9838437b18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c511cb3dc125fb56c8a2d3fb679089c8
SHA12df400d4118c16fbb5c0ae36cf1ac0c02c5bbec6
SHA2561de93482a46ed577d7e53fa9572223d3272b1fa6455f3538aa1668759788ad2b
SHA512a5351be099c60d76a09cab7064eb69e016e0bba517297cc119426086ab45b7c5e8bef7a9da592a4908328ffb4387e97272bdfcbd22279975f02b4e100d04d5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01bd5cd7376be7acd1591bf1bb9c600
SHA180833449131c04d90ae986cce33d88bd8beb7522
SHA2569b3189bfcf72a8ae4811b9cbb22a414cb23009b7e8587c61d410ff24071cef04
SHA5128084d363bd1bd328882ef49e624a4b8b48214393a58bcd1b8b94cc25094727bfbc7421fc5a34e1f884ba3ce9ffce3d484f01bdbc4db1c4289b3055eafc337f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6737452d4c2fa62cf069dc5c7a502b
SHA1003cc00cbdb97ac7014c44747b8974d8eb6e4ebe
SHA25636c80fc34fa478bf358d8d2ac4363261b04a5478309c6936a76933d47873c488
SHA5124be1d3e611234e573469d30305c5eaa15fe11178cfe43eb4dfc6e91a5cc026a0f37a9095529271d1f18932844935b349e24f7ba4ecfe1b10ca1bc50a16aef27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a93cee6f61b11e9424685fad160a1ad
SHA120e1e8139db77fa120159a4c28f1b6f233ec1042
SHA256cab153561ff75ec277f1d4d06f14699946b597cad0b7f894c247f309bb95feac
SHA51207b281c8e5949e287e486ef6509aeb19755e5ea37d2954fba49098364aab5a8f1e66a67d1f330631b30aac05d80b72b4910901c02dd7aae84d23c06c9b4e4eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141bdc64ec59dacecd52f212b4afa968
SHA1d166a7bef213e44cc0e7dc5980b996db30dc21e1
SHA256079a5ab936da89176db8be40d3e1acbecf928a7fb0cb91cad054375ad8e0b141
SHA5128943d7f492c279707bdb61d7f8278498b3f8fbb7732176affd6a5f314990eec4029d2a597bf9f4a001b00e50d0dc46499a58becbd2eb40b3c6c8f3a89b6c5e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556ea1c6c6e7361c710315f2ced902cd
SHA1be2fe92abc6e7adb3e4ef717af26a506329d532a
SHA256c6d9372e10474d5769d239ad79a51b4aca757644831d910c8719a516b76d314d
SHA512523c62d77b45ed713499c5257cd906cc553b4ff0cccf7b5b86c890e0e5b786a1d648d8f97a6333dfff44d9a94bc29258b66b44698b828ea04df890d9920ea3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1f5358e3df4f8ee1f1c4448ac94c57
SHA1b5bc88f2b05fa572d77a89ef88622250db4822a6
SHA25624dbd0e456417db5d60f37b8e037392f25deb3801c2d4290e574f331264dfc25
SHA5126ddf0b8de3cb10330916d2ac2c42c87329acf412be45949b9e1f3f4d92228191d855ba042486dea8af915edfeff50b12c6d967a54e25c03a00eb87209e8069e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b5299acbd48b6b8be6be90e411cb30
SHA1457239f2d01c107acbf239f4900a1992e269b62a
SHA2565579786a274c7c48dcb8f151c500029af6713d56c39f25832d351a42ab65f6a4
SHA512949d37233e53a946f94a3592eb8febe1a06c70ccd257e7b84da409ea545f27082350813699d719ee079f277d897e710c1bcdeb6cf215f7c3a079bd18f1616ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079c0aa8b4ea23c33219ec6988349882
SHA1d1ff5d9076505b6638fcd3829faeaab17a344204
SHA256d8391e881f8856c06ca75e4ce9df824424ad8312be897a489036a69c8c5dca7d
SHA512762619b7dace63221bb47588eb14fbab2ca243045af8952d349b4517654ad5ccf9af7fbce7dd977881f0446b995542a252788331865d00638e5a2b01e78c25e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b577a4aebe02fdf79fbb4edd57c86ab3
SHA1328eda9aaccd0b61e319f5a8e6db77389a00c44d
SHA2563c3e73c9f89b6a747e1686f2ef800fa55e723670822cbebb8648aa7ce79e684e
SHA51297590ac69922f07b3d9b549f4b2f19990e132c54e6f4e59b3c8b4185f15bff190d35dd57b29688ece0e3bb603ce4ca930179a765327ce238a0220db8883e0b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5c4eaaea214b18e7a45fddd022d964
SHA19cb7d66966dbfa3bc691efb0970f957edf317cc8
SHA2566c572fef9dbe543f11ffb02d3d1492e01f0c7dd240bff6870c284697c5881683
SHA5128d8078aa19fda213ff9d86aa0455477c56823963704fd2ab4252dec7727ca28ad86961981d2322300b373e4a8ddbe89e27a4e33f2db8d321cf91e6efc7647cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9ffd6cbaf493315f24bb69f60be4f0
SHA11ae0cffcf5e95c0bd6901e2c555eaeb65e270c65
SHA256d27e0e6887376a4331e4d47b66d375af5f152e2beca43f56e1b821326afaba11
SHA512282f2f3db58e0b4c1ba74e990736faf0003f92af4ea9bbefb34976bc1ebdcd23a3e6d242250439d3e8366dc3f364e3e7657362873cc3c15b0741f7499208050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e377962873ff9f9d82e8df8b1f8170e7
SHA1fef5917b9890f1cefd5947afe3b7b130fe439788
SHA25695f4f457d24f2404ef4cc77b78b859a6f7a6b8d023ab3487eaac07e6c1c035e1
SHA512f4d9ddb5d98aa8cd4396443c888d827d5da6d1856f3aa61a7f37eb31c2997c4bf031c233a140b368022c59748c706aff4707b194f1e6efd357873593e4677d81
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b