Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
8d33b6dac06d00af433c33ca61fc71f0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d33b6dac06d00af433c33ca61fc71f0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d33b6dac06d00af433c33ca61fc71f0_JaffaCakes118.html
-
Size
461KB
-
MD5
8d33b6dac06d00af433c33ca61fc71f0
-
SHA1
f8b512ff7c5e6578821c66380996f4583428fbd8
-
SHA256
6c2fd4a506e370fb85fc4f305d63ecb560e7e8ded9e7f9cbb6eeb38c242f57f9
-
SHA512
edfbe725fad53de4cd272e89f85f147e29db9cb14106af95322017d237f6b193377ecd39587a336a7dae8ea62471c4f7cf36966567ee29502071a43673b3986b
-
SSDEEP
6144:SUsMYod+X3oI+Yd9COsMYod+X3oI+YWlsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3t5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000bdaad1079117d4e0eb0c101c5704c89db663eaf836a0a72c4fe9354f39636c0c000000000e800000000200002000000059ae85d87128aebc4b08a30060191dcac5ac6824b1c49fa1e8aaa4e7f36bdc5f20000000d1487f25b5bb9fc635343d35d02feb708ea18a84c778e21b8e3ea694d45e8ed04000000034a0674b70df1951622e02330365aa7662e035fbd4fbd647cea9b09e97f783a6b0e3345a4452101004a2006f598fb61927598a06617c4e51d37b7bce0be62038 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423472640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c734a6b8b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDA5CB91-20AB-11EF-A233-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 iexplore.exe 1116 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d33b6dac06d00af433c33ca61fc71f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff67814c1d68fded07c05ed67d75884a
SHA1145541cc6d4c9a8bb01fea597491947714fd2ab6
SHA256b0b29c3346194ea776728cb94d932e4d03e42360cfa382a00a6960dfbac005a6
SHA5128eb9bf0f11394f8262ea9c9109c6d84a89b519c4f19c49f830b10c03940c8850b9721a2f1aa3473cb3695b566f2735c7eb86df2eab9e59311834abe1bdf252b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fac1f8bde47f9835b0451143de94f7
SHA1d368a3fff276ab3f45c2ba545ac5e0d5d7d1488c
SHA256b8238e6f25bae17dc0cfe2776562e5cc6b933c1d2e3e2eeacc8b02a8d6867a6b
SHA512081127643933f43ff6f34593d16c175145de578bc63e6ee5ffb3a18a5e5551506b4bdefc54c2b701889552809e7b1243451cebe41338e225f7a77a78bffde706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7b222863131ff0f912e269b56e7b82
SHA1eac52e5a365e00a9a9fd3f3539740e7d4ee7be2f
SHA2562b7532bacad657966b9f679b5938c15ebca44cfd5fc58d98ebfbacb0ae231023
SHA5123619d30aeb568423994ca528ceded0906007b2d88dff5cde830804c9140ee44045f6418cde9d8df9d450856935e55179c722434d28e4b3013cafcecaed364ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1c0a6fc8e6898abb1913d463c575e5
SHA1e03e182bc16f16be0bb54d4f35dcd37419597087
SHA256b19bf57a5ff1c72bd204086d054142ce1ebb73a0fe83be66ad5d9cf7756ba9ec
SHA512deba1bc9cf7c79cccaaa0733954703e8e8a1414281a7c6170c37b509bd620ff3357d6ede1d9aa956bd02dce48e67fa6498376aeae25745b7ae45f0dcbd7e533f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142e48b65d867dac8ddf57daf27dba4d
SHA10cf4f20d1ddfa6fbcfa915f6534186ca0bc0f1a1
SHA256e16278d6173b5150892a885b798d59101dd71659766d743295e8291841386ca3
SHA512e49bdc55f32c4e15ef1d416fe209ea48978072b5722580bef928435bd7a28fccf91c4019e5a9873d67b34399d88a66f9fc36a955abe8b985d081d9f29fa9f251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cd6c8ff14210c23de0689bf78ea5f1
SHA1c886127c49c93230d9d79c736cb9904788fdd69f
SHA2563d2615c29c8b082c3d45fe0a7c1251eb6df09d3523ccf5284c92b16b4371da67
SHA5124d86f385f5ef3e5b3e309c8542ebf8fd309965c8f8c737b38322ac34c9b92e723e59b4e5bccab2c6c8f00feea73d5ea16aea6efb0091c220e4559f087dfc6e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f54e256e1ffa543f63ad97469ce058f
SHA1f5e9e62ff351d2e4cecf24257ad7e7c7cdec73d0
SHA2569fc548b78bf3fef6ec9e4f7056588ca1f47bfbc2a75b5a57210175410f6b6ff5
SHA51261e7c121c01b9e3913b1bc49969954ee90cba38d2a573c96e3fc486bef254c0ccc38061b8d7a9c789d7be0aae2ddadbb94639f2ff212355808559de1e29093d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce876324ae9a6ca4819404fef127f4af
SHA19fc33a0a53582099abdfd65b2570164031b3e011
SHA2568a6ed0e6e0b7c5324c04ea3e8f1d7994c333a57209131e0b868892cc94f57784
SHA51226e0d119f4885616e53fa734ce00e4165b885165288601a3732ffd1a3316f993353d04b991c5a9ca61f687d5de336b8ab7a8869570c0d149dc5bed9b2b54a3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e741b59f1c015348c61aba035445d00e
SHA140504d2f93282a509fa7c86a2b15680187e5c4b4
SHA256fa721c2fe865de72bf8c5a0a879bf90f9d666d5ac1b7ff34c64e699e69586c26
SHA512f2208b332778d20c472193c2ea00290767ba6b82a04813bc995b66d2f12087191f94664667a823ae0a482e2bb5f7385454d352f6dd10d683c4d748d62dfca920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b6cda98f4e231228911bc17e6aa30d
SHA1346208c77731330c449f93648a80a86f70b83689
SHA2562897592045dd287dcdaa2da9b2e4a5e0ffc9607c34f589f5ee3409bef7756f64
SHA5124a3047c3f18b5602093972c24e46220ac6e754df6937aa46b37283ef44f466425588c4b28c816b7045c259059a6015f5689b4dedd7fa30c9606b8c8c7a40fb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a512d0826c8de123ed486bf04ecb2038
SHA1aaa5f1f3a35aa4dae1f0a486ee04770c56eba2e0
SHA256b15bc6a25d3eee342cea20cb773ecaed207afbc2823d9806d96d0f9a1b05178b
SHA5125511bfef9813ba33977faff5c171228072d63522c25f8af88ad64bf699f70778f7eb8ca7e60e219a895fb1b76d9075cdd08d22b41ba98598f1438cb736ebfbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9de49ffb729d94bede0fac95aa8446
SHA1ece6ea27adb48d904e8d1c08053658aa65d4dcef
SHA2569b37c2948cd2e1245f00033fc7ef355ffe83f2b4bc58e50cfe1c4f8979f189b8
SHA51293e516ec5a14f02912ea629dc0967f415f8a5b39c611fec949dc1c16c8c8d647c92b63f9a63d2541b95c901c7020d97b0b7b68eb40ca8d3dca248a06b40b0c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516eb6a054b88286820978d831b7d8a33
SHA18cdcf94ce47fc32b8fbf14fcd61547c637060ede
SHA2560a76688baed945fddb229fb0c37eaa7b992695d54e85a59e577fe466f7486c8e
SHA5127568929882509ba444567fd377a293108ab768b7c7f155dcab089e14156e449d3c108db251ac15769160cc2095868c0ef6e516496380f395c0e4e8204166a517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a3eeac4060829309ae35382b28841f
SHA16879cd33324b4ad39ecafd02f75de4b4c90cf2f2
SHA256463d91aa42f09fa17dd5ea9785f398b4fd4d8bbf4008a108b240cfc69f619baf
SHA512d648a57ff6a6a3fb2a1919938e5d1cbcf58ab5ef3113a67e7866419c139994d8804e27031b9a6954cbe9d2abdcc82bee0cb8bdf127d0e6cfcfd660535b32e035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d205a7b93c7c196cd3246ddcaccb9d
SHA1945567c5df8a48657073f4c652ae48e43126f0d7
SHA256609458618d8bd77fbdd841dfa86945a1f5319fbade7eb3f6590addd42c3aa05a
SHA51201d4b551586b60280c35682e624eafc79f5fa55b401846697cc6838449b03e1e940584af3d63484efc5c9bd7a3137e1731d3e61425274c67232df945005afc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6762645e79d451c52b535d46f02150
SHA1470f41f17b8759a0c51df073b440cc28e41ee711
SHA25672ad6fb2a52670f17f9bdd9225183a368c21f438e7fc564524fe3af44da15eeb
SHA512156e723692fc1f71861f61e84f643fd1d93c4a90557380955465e4c0bbd93ea69d392bd02395bdc9a3cf3f8b4d7426a5db1526c2466b73ab6c082b832f605e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873f75694183f665d9ea6ffe0596d931
SHA1d48faa3cfe1304fd18c8bc06c70f538611842fc5
SHA256346cd96169d9c1f58455620f36ade2b948c071c0e3def89a01a0bdb969d0533e
SHA512d761e2e0c890eb88453b28563a8a9e3929ccbaedb9f0641dd96c7668878eec379f29cb3415b265056c35fa72834d77fa7d270f8840f26dcac963d5cdcd025bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8850ffd94ebab23edd8714650d57f0
SHA1e1f5ef649dc7383307867af044e7a92a5bf0d0cf
SHA256d43ac1c26e8a853526253235df880a92820f041adf0f929bedff59fa8f299393
SHA512c14b25d4169ecc7582407bf4ec3b798631461e011d2f9c58740706e683252c48e79b2e76208ecbb1e55bddba0a3c44c19387074b9d1095ab8553fc1207d6a47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52087e1cca08fd91fff1b610d25e8e855
SHA1ad40ad1e76cc2397ce4c38e8a9ef1ec7e71c2f5a
SHA25613200155fa47555b75b9bcb130744f237ac8a48e7258e50ce00aea680b816fad
SHA51248691b3064c170aa53c29e2131760a5734da9e88f65492cb03bb4b4c6cbb7f09a60003dcda924a6f2a5974d9cfa36f2e0e6bd3ace4ed78df3f128d6088ee9edc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b