Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
8d7f5ee1e23c75eeeebcec4160e374fb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d7f5ee1e23c75eeeebcec4160e374fb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d7f5ee1e23c75eeeebcec4160e374fb_JaffaCakes118.html
-
Size
17KB
-
MD5
8d7f5ee1e23c75eeeebcec4160e374fb
-
SHA1
be60d801b19116f468b6283c94f1e40887082da1
-
SHA256
19c0e424be013094881f9fadf92e37581fe420e1de77643267ceeb43bb9e1892
-
SHA512
f3b08bcc359f4b1e953a3a7fc1dbdff15e1cac1e04fa9b70ed8a736cbdc799cc8150b1a8d01c97bcda162333a99921868dfa6aa407e5e802c70c63807b024d2e
-
SSDEEP
384:7Ri/Tgpi/ojR4OonuARsSqIpJakaj3zzE4fWywzIKAASIFukX04QfkU3e:UU0QjR4OonDs1FfWywzIKAASIFukX04H
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423479782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DFFAE21-20BC-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c0edf55ec0c65ecf48454f53f65f636db67ad0150823cd581b97ec4829778caa000000000e8000000002000020000000073d325eb72c6ced49886c5f9409b7c9a39888448ba5e84c404b508dfac0188d20000000102dc8b06750053406dd88883164119d533f985de5cfb220ca01e83506e080534000000037628da18fb1240b4dd5ef17ef3c5809f133dd83080507f08a341e8d67c52065bf0a553588d86aa81693c9c0ecd63ff05497d737524935c7ea2e0bf305ed785e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02bb242c9b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2948 1952 iexplore.exe 28 PID 1952 wrote to memory of 2948 1952 iexplore.exe 28 PID 1952 wrote to memory of 2948 1952 iexplore.exe 28 PID 1952 wrote to memory of 2948 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d7f5ee1e23c75eeeebcec4160e374fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136225586f0cd02d5985a9658a0c43dc
SHA1348d72d763064e467d12a762f7ac06063c712676
SHA2564f114a943033cbc6f74b660427655dd2a7fd16ae217b92b77cf004cbf5e2a171
SHA512ec6558cc87645b11bda7251c5997d7580a28735cfb167ccb01ac531842dd89b226d4b74de897b47fc722e5de4550ab68b5beed8da35033d9e5e218771036dac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e1131023dee650564a71a16472725e
SHA14d1fb4d91733423b0b17a505ab236910e217226c
SHA2566cf4c5ec5e3aa0bdd51ec11d94aade444d1418d6201176edfb60d10212cd6000
SHA51288b0bf4acc82070e76e8a3ceff78938a5d0a4f05c5babc06141cdcbff2472bf199e77eaf417cb2c98f86e5fe731b5ed3b3b1ed3fceeadfdac885b41548cfe816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6eefabed5c2814c96837b260e8adbc
SHA16549488092063fae98355c812c0cc21ebf41ce1e
SHA256e7b2cb45d14c26b9cc18342dbebaf251784621c3974cec50817a4dee661a4a10
SHA512c175ae4078ecc2c3589a4fe3927900be6512fa7c3545f51b0b129bb8b37f9afd937285ceb1e3c353936e2d5332569541b55a0321782dd92f6bf756a2a37e91a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e022b99c4823b319e2e3734e875144
SHA198b447804c42ce4ea4a1415bc7e1775b6aaf5db3
SHA25609bf3f7dfea3f7bcceef3611c2de70ab64d1c0ed06cc52568a63ef1408c7a53c
SHA51205555c3460a8ee3bb14b18f600cfd0f73f3e05664377b0fb1421a8d290551d8dd35815fac57ffe6e40ddc5610810c04e3158c9c5210eaf44c33798e31d2be0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501532e77eea9c1ac09cc24015c239ed2
SHA16e02c99f926c14d17890c8f4e99ed23cb8ade0fb
SHA256137350998c0781659543a6f9740c4fb9f4c314d83ae46f099205346b6fe0587a
SHA5120fc6f966e9cac86e59e293ab79b8d5d588ccdc8920481fa5c48ca51341bb102b105454ac84c46a92f7c5a19fbdc93ffb347784a694f1caa95b2bfacced3e29c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7e8c4248b81d72f2c0bedf17fb40eb
SHA1f1dcf4dc22cb988753f0d0fde9117f492889424e
SHA256f0c4597d3abc704de6ad94809b29482dc26357c4ecd051cb95b2aa3678a8f288
SHA5120360cd47c0078fbcca9dc601d78ada247333db254c3b8355a5493bd5625a4ef538cbd90aaf64614e87603059baed1ad55364536140d971ff0ed6b24f4a5ffbb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e53d3e9580734c9d17a2ff9e9af4d04
SHA1ee05067c06f829ea769ffda5968eaec53dd42957
SHA2568bff60a7b8f8b1652d1f26e8158742f8ce59118d92d9ede6ec07bdcc665b939d
SHA512b6c6389a1d2937652d325a059206e333c18afcd52b0392b8dbbb87739af21253598d1365404a24bb554d5c7997f10d386b69aa024bd57d44dccc6b05eb335725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9539e4afd67005f047d878747d0c8e
SHA1d3ed83a4c3ec01583712d0e1e1e3974a2d6d4209
SHA25666dcd5b48ff6254498a9315bbe0ec7d9205fcdfb0aaac206af4e5e66f7597de5
SHA512555111a6145192cd9fd41dbb3af5cb6ceb14f674d3e711b63a5d12433346f4118801a4b28f574d61d4a822d6513f70741848e1d6ad65a13281457bc9a008e7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff7d6df7b18637837591e5fd07abed5
SHA196968638ed1b2b98b4d3b8809c50a2fdabec2289
SHA256081436a813536ad6b94a6c2f42923bf7e64c3207576c397690a7200a1fd87358
SHA512a602be907996fc78f1388edd4f2d535f62b1fc89de71d9877ceff43fa57c124ce3fdbc9017f078d65d98dae00b404645fc27b9a791dfa53271365b12db545ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba248f450c1f11f5d190b0292f30da0
SHA199e022cb2c0af4812a3515928abf59066f041010
SHA2569e746c5bf9a876ad7c6723664f561d930864475896163e8f9a6d78934e90264d
SHA51251602ac4a15505f0cc21408f87f6f08b5588ad2963b55fe016fb1d7666896fd71dc43ec4885db2532ec011fce22b8888463c79d4ed0b2a1ffcd00681df8703ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53617799a4f71cb6e6513a2bf5e9459e4
SHA1194f5350f7d4c2a4290aa3f28ae6d370a17c1a6a
SHA256b894366bd052ad385b2e6d4f5348cbf7d45fc3baf79882ae2fa249911272e0b7
SHA512403c8c1cbef6b4a4aa28abecc0036ee10c79663673b00368e4bb4bb51bf386184974120ba2b812af621a7381624c1f2d524548bcbd48ee0ebf98e179ae3ba7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789c5ec111fcbf0ff11ee07e41683ef3
SHA11bf65a3fab6012fcbdd88f49f5feb799b160476c
SHA2564708e7d4a0ceb3eb68e4ec5c84808565d7d9aca087c2c65fdb895e9294bfbea1
SHA512c48d572bd9eb2b9a7869260f69f66ae0a8ff1eee225f2ac1190096a8d30cdb71d56aba70305c187207ef91a33464c9b9798745e54ce876dcd63c7c6bfd8b58be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55684b71a8f0460444701a1f358d4129f
SHA14fc5e937f2c8f30813000da714571ed7bb660932
SHA256c271f81cadc2006e055abba887f1580b4cafb651b1c1f77a2faf0cdb1026f3a7
SHA5120ba1f62cf8762c41bacbf620b228a2495b8bcfc261381693f13db29ac1da0017c3d7e95fcf80c216a02f64408eed2fb98815b0de71b9baf36bc7a4c2896b2b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55032cc43e6f9151ef445c60c5d410979
SHA13a7a2d9251f6c1708981738f977ede90948ed419
SHA2568c770f9627477488b7efc760c0400eeaa615997a3d508a82442c6cf9f7a25c07
SHA5129d95eb477a702b9afaad3f8f051ffc32c9876a89c37ca70257ab385c7d7067d51d7a8e33e3426db4a0b705383427d90eda52267fb75337978ee6a290c66af05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50497448eb2ee52d0dc358e87cbdc22b8
SHA198fd5e3247d468b385bcdad38767e00e0207dd7d
SHA2560bca79b4db86da77efba756e7951ca1c4c32efcc0414f3a25af6eb3b583d76c9
SHA5125eea40565b335b7d59beb322266b921c75d46c33456deb945c60f9a27e4963f850b013146832929584ff7028277e032cda7c6938504945fc102c904b836a0e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c6adaa97b2a2c26a342d11178fa8c5
SHA12ae684ec9d2b6066f983f94e9e8819532bb34241
SHA256d5978cd691dffe08d99d4af57912bb4a5345b399c67c59723d6b2eaa9038680f
SHA5126f6146839d8e86ba2c9bff45d61de37649fe02fa621e145595b54aceadc38dcf8db23c017d5b5ece359d3e97010b4362beb1b45f5ae3a035836a0b40af99c585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57c883e81f24d1362d793ee1f3b63c0
SHA179fbe02a81a1432a9a2cdf45ab3b17fc2d20fce1
SHA25672c6c098ebbe502c3a8594f5ca322043dbd4fa9d4133a53f5236f5a1fbe809e3
SHA512e0a8d0ffef6b2969a39864b7ea28daf3a5fcd9b282a9c06fd4bd73fc1684e52b411251a6789fb34fb9d973afe9f8ee69fb7d53884aeadd3a933f1ff422c3d135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1ce2c88531987050e8a15f1bec5cd0
SHA1e80c4b7fe59ccc5b2dec6b2c7d06a34a2e16319f
SHA256ca7ce899ea30d3c798dd2d8a74080e4d65f16f4187374dbafb87cafacbdb9214
SHA512c0d653f0c583d7af1a542cae2e4dd8cc973a07594405fa1c5b72d51b018780ea34430b95088f985970052dc612da8f1af63c8bb4433cd59053420829eecc1068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574156a6bd9deb34da49fbae1b8905043
SHA106eb0085f6c5d01ff1ef202e7010390b51fe4589
SHA256a17af1a36a6ebf06a20cc896a1f710058634f35905a0307b147086724da60164
SHA51275008c3159b09a21b8e493a7a08686896740ca12a802dd8c09ece0a95c959b11ae242f760525ee75e02ae9869a5f49ac281a5b3789c23d2ee220c4c29e0f3697
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b