Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
8d7932a61770c236e81af8446f18078f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8d7932a61770c236e81af8446f18078f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d7932a61770c236e81af8446f18078f_JaffaCakes118.html
-
Size
461KB
-
MD5
8d7932a61770c236e81af8446f18078f
-
SHA1
7de358357942100a7e61ae3b09ee8b73e8e804a7
-
SHA256
962cdf631332226746b1606c21f713f8efce2a03c1737a583013ba4ef0b494b3
-
SHA512
222376bf70563f5d5c38beb4d244e15e7839ecfefc828d46cf6fda9dd3ae79529c42d1c50394aaa718b68cbd0f87c95012e199cc675998edbd77506da9a55b5f
-
SSDEEP
6144:SosMYod+X3oI+Y/QfsMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3K5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423479158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000bb01151f92441418f5b1f86c23a8fb9000000000200000000001066000000010000200000008b656e00820372e7a0afd46a376f0055dd5f8c051e3ab8b7ea0e31cf23022d5f000000000e8000000002000020000000bef774fddf1308d90e9c98aa828ea7ce05abf2da3aff7fb17b9e38223b3486942000000016e6f4e4a4a94628aec8a84486a70b947135a2760d9758c9f3a074dfe8b35eab400000008fbdaa5159ba3abfb568a0d56c048698ff0809ce91c97d430881fd2f2c882279ce26f02c2cc02c7aae662d89683a56ca25b8f1c1e7b0437d8875578478d77bc3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA11B8B1-20BA-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b099d2c7b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2544 1732 iexplore.exe 28 PID 1732 wrote to memory of 2544 1732 iexplore.exe 28 PID 1732 wrote to memory of 2544 1732 iexplore.exe 28 PID 1732 wrote to memory of 2544 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d7932a61770c236e81af8446f18078f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba9b358e185d438cb0d58bc6fae3f6f
SHA18632bab967f422358288a4d9db8ae64adb2148e1
SHA256bfc04d45d6bb5d781bff2ecda7eb1022d6b1eee196c6b7074006a9facd9c4640
SHA5126aa9ea45f7bfe43e563ea1cbcd3cb1de24b92cbb698cf25b7d4a0a999a6cd5290714bb68b55a08645226514644328cf6c13e4b2293eda0dd2e3349152d706dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c5d9525c3efbab634c6d9284e63c01
SHA1dfca0ffd56f94ef092658c1326b4fa86f4556dbd
SHA256f9366beecfe4f17f494ca9f6dab9d9328c2e040328c63f553d80e269ffa258f5
SHA512b70b06cea009707d04835e93f9f8f88b42add6e822948b29d8e27bb5808bffd28a787ec0261966d13fc794cca0e3ae91f1f2db54a0a0c8356efd28b55bbc3448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4237f79c9c416347212b581758aa46e
SHA18e5ca12fce1c5c80cfba8316ce92d7eb37a9362f
SHA256bc28f1fcf60ed873ff197e6fdbe9e8be846f49a7d3bc40fe796ce6912fe06e38
SHA512976295365200984aa41f0b66790bfda55b1b4bfa016988e6bcd41acd140d9c9bd4468ef3eb92f80597abace513db7289fb375d9c0335f1314653efa7237cbc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806d54c56fc881dab8ef87d1b94e475a
SHA1c926337bc4cc1c225c0ae31eedb6d77f5aabbe15
SHA2569825150e7c6d151f1f7e421c8af952f3d694c9b5cc37dd55032d5e95ab3179b1
SHA5122bf92b103fb22b81e541794f3a01a1efdf97a7c74b02d2723092f4cc841552e6115c2ad928aeaa41d5d79affbbf807a87227c06b3e585ea7be2f229f4ed5a9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a2759f5fc33992843d7cffc6d3bf80
SHA1f5c7e007c8707863d1e6aeaed38501a5c4c5764f
SHA256946143ff56cf34e2a9a0490405cff2226c1f7afebc9329be0e562d2244f693e7
SHA5121dc54e1b686d1ca3782a1bc798156a9525bc859d361ac875b67b78dff05f3b52d735810c84b0cf2576b02051c41ada78eafaa461e20f8510b04cfe0617c3ce34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b392a00979ba2715258769da38f0e3
SHA17af1a174ae4fcbfd0fe2b24dc663dd3a15ac6d5e
SHA256a41c7afe48e955c7353c6624a90b2a21c86a7dd5ec0ebb71a5918a8f93c05e6f
SHA5120013ef0fd581a8c09aa35f63da1538637abbf2aa2efb6578acf5e46b4affef878a6e89b103984fd5b613f00d27ea573adf7d59ec3618902eb65bb79e74aab8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d256a7abfe92333f1a0474227fb3318a
SHA1c9d7b0e5686e04e2e2b661044184f66892f7212e
SHA256b4741b01d3012d75522d4022b5689883bc4f1abd82e49509c84cf7e8d5df5c8a
SHA51262a268d9f58fc910dccdcc6c721e7d0570015e7a3c1a1a559f6a51f2ddce399bcf75c1c70635d5e386ad0e769d9bc97335e396b2593f187f92e12b992d44142c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a397fad40ac26c7d120833be8457a4e
SHA13f3b6fd78d8835602a69d7fc88cb16881607fa65
SHA2565b9ae9ae4416598d28856717f526c0713eb4c52a46acff1efc57c1b2591e951f
SHA5125762a3e5b89c10cc7fa914032b4c5ed84029d3625b18bd84996c54192e5209d6d94ea2055c6431efe7bf9df1c20b8bc9dd8c1775eb066a1f394e2833126ef4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30716b8980069c5b1bf2f35d74a58c0
SHA188326df08add7181b748abce48e05d4917737c95
SHA256ea7ef18334cf68ce1c38fd72496b5c554f83bafd1da125cdc176ff27033c3201
SHA5120f9e5ca86ee4596b6c38b56a556b0ab6f42ad6952d43fb54e93761997f7b9e1582ec2367cd2f6bf4a69c83dae5908825d4f1b914865ff710c2eceaaf2c6a8d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1f64cb776b8974774acd8bcd26d4dc
SHA1892d588a6e20370af23328b21d6c8180c179007e
SHA2568d76fa4eb47ac0f2a41a952f1918eab7665026547c8d7968c8d7ed1912128b6c
SHA512b1df40ea8b05715f7eec91b34db4a4a3282b090b97fb25df81325cfb2b0bab8e4ad39531f1705e3375e7476c7765db4a0497342254d335c81583367058fb2a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ec5398d8dfe37557f6cd8ad20c1d72
SHA1a5a357a12e7d07708b5133b094c6d1c14c8e6194
SHA256debb4b538e32b0881470564282c5c5bac97d2918bbdbea010e6184c2b8d268de
SHA512a0cbdfa490a5bded615535842e68e7488624f6d05eea0962e71541cc89595ba9b9dd29f50bc8a4d55c3848d6ebc9e69539e4d6b70f68406c58e35b4d919081b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41a52a346b91dd5c0f0553abab3288e
SHA1a357bd414e07d1cf199457797688fe077494e7f7
SHA2566c746f7b25f39da0da5db626e4cf53a7635582ac18a1280411ee53fe978e1a37
SHA512a6cd5385d2a10b50e6b5bc4913e6072cba3b879c7e1e7622face82de19aea8bbecc6601c9bd8302040980451736c4fdaba4f2bb90a5243aed12b3859410e8377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a0995fb11deb6909b6768d17663143
SHA1cc2d7fb68ed747fe0b84df025d5144e333cb221e
SHA256b600d6e7b463ba924465008d12e7f913365e382cd8f90cb704c2cab92cb664c2
SHA512c0bb0e39271fc9d436779327e6ea05b982eb4479355c17824eb8716d8d7799179862fecd5409803ef3402963aed6d510a17bd3fafe5f4ef6d73710aa4814fb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4badacbbc823415dc49d28921c4936
SHA19b2e4002ee137aa5c3f02150e7464966b3386554
SHA256adbf05bd7845449fb3c41af819cb8dc48a2c723816c489c7eb44e05062d70e42
SHA51235b739d2cc10f3fb61a836e57e233cf45166e9858fae2e66132b35136434227be37ee98af45eaa05afffa92752918f2d9f1764eb4f70cfa0cec5b4482ba9849a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ac56e1d9ecfa2b7cac1d6360519b0f
SHA186a2159cccdfba4a68f855a766ed7ad32156bbd7
SHA2561242cbb2458d86412f212312f6a0a5023370801888674dd51416dee757954294
SHA51247438baaae3e8d00ac59e576a5a62ef89c67b2cfe3f499e74cb491b8411c92acdd0e5bec9cc4d87125bd0cb5d876ce1bfc2118cf044e1fe663ed03254b0ddf9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55404ad5f80b19ba335d46982f664ac28
SHA17da487bbc2ff94a3afaed98dfba2756a35f6bd31
SHA2561b3c5097de650a34dba3199c51a168915de0c52162036ceff6ba2986b336613a
SHA512f975d40404b7b782d5aa86d4f10901bee07f086b2c2d705d8acd0b086d6735e8b3ac49c10a36a8277521299b77452a096243a69062f3e1bc5bf8bd3ff0644bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa648715f12fbe8e14093623f43b107f
SHA19a12248d1bb8283d1ca596cab98d0489225a274e
SHA256444ad4b3b99bc8d49a7e0d2c9b42feaa9fc263633ac7f79dde7415a6b2074ffc
SHA512e40a61d2314424e894da682cf5267875138fa7ce756d3dbfcc9a7677a256a89fc6417a4788708dfe730abb10a11107709d9697831c51d8b4238e3d5326d90fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539a5f2a3752a1e7c8b7565bbfb964a7
SHA11e8f9090db5e4ee315f3c7b634e00201ae0f0b43
SHA2565dda26c30bf565dbdfea7af1c8f12b2ac269a12c4598b43803c31b285c9ba07d
SHA512343ed4ef659a559ebdfcc9e8aaa55939a68e91a0285847a80b1fcef6f367a2f89d083e061185cac8e8e3b9cf1b638da9f1df708e096ef8a9f7306ced3db7ec96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ca1da3dd67f18cfc574a4040237a8f
SHA17174442e3ff6d442bad865a3faf4262d4c15e76d
SHA256348f3bd0764a9b7dc576f939fe34a79161d7f5220467c4a6ad9f9361aca6eb3b
SHA512e6408c25bba320e699fa9c7f66e8aefd33b322d49eed328c41ca17e27d77654323ae5d4da768247a8b5d50fffc867aa833e963dce43b743a09a4c57be48e5a3b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b