Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
8da948e57158164bbe6dc866504516fc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8da948e57158164bbe6dc866504516fc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8da948e57158164bbe6dc866504516fc_JaffaCakes118.html
-
Size
460KB
-
MD5
8da948e57158164bbe6dc866504516fc
-
SHA1
93dc4a77463486fc5a16e04d1a9c18dadc22c3d5
-
SHA256
c5e13bdd9d76de548dd2524b9ab309b7391727e6d39f69f2e91f68b39ebb511b
-
SHA512
5873ea45311c8035991c06b517e9e7c618526e5df488f8a08b4d78546c1b2e513b4258fe5f1bccaa7db09c727d5daace2b9556aab7d7ede30a4d959c20c9cc31
-
SSDEEP
6144:SisMYod+X3oI+Y7EsMYod+X3oI+YlsMYod+X3oI+YLsMYod+X3oI+YQ:35d+X35S5d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7573DBA1-20C5-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a89d12d03996c74980013eaa8a86d9b100000000020000000000106600000001000020000000fb410cc84181903c26175a873fba54c4a385dd82be146a5ae01d226e91933c36000000000e80000000020000200000009c6506c83d915cb133dd6222c6c2b19bc2faa2ce70985fd26f60efa3c5b71bae20000000bc0abab4fbbc2f219b930a0c542a0139a8d766725be002b7229374420aa8636340000000e275e52b6d71cce15c54093465fbf07589cba0866cc353e7b9abcffb5d639da547c9b89e807cc21aa0647fea72a373941a021c5dc87814957e11d72c259a1abc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fffe4dd2b4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423483660" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2340 2916 iexplore.exe 28 PID 2916 wrote to memory of 2340 2916 iexplore.exe 28 PID 2916 wrote to memory of 2340 2916 iexplore.exe 28 PID 2916 wrote to memory of 2340 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8da948e57158164bbe6dc866504516fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae7a813b581d4ea08cfeaccd471f5a4
SHA1153d05f605d0fd3f2bd643be5b450417c810f153
SHA256a2a85ea6d1ff715bb24d9406ff13dacfcc53e53b8c7b87dd9b070d119cd0e761
SHA512ff8d959ebfd3be1dc03c40d2928f8f11b899d6394d4273596c033543734b35b8e08f4d2a194b848f365c33b4fc863ce761c909e9ede56e13a4ecbad3b225083f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4040a1d42b106fecffbbbc98226640
SHA13d1fd6e6adc7aa4e58cafe2492546199a8017b5f
SHA2560e520e4799d5fc21470493fc9af9b65893b26e9e993d8f631ab33fd46ee21ce3
SHA5125842f61e066debaac589fac6231791912c1956b872199f32af3d78ea9234b568f31aab798a21f9cff68b75ba167be6e2784056a4963030fe0e54f91686787ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1263f68d62d7af2312d737685bd1227
SHA11ed517366fa060464a688d8185a207500af4ff73
SHA256bbe267fe90f69ca6c2634ad3f9ab91f91bcf068fc4090fd6eb195b3e333ba2d3
SHA512e3de4e1cdf5b6ca52eb89541516fbcf035392ab7000ce77f7384988e04c91a8064db1a36dbbd35bd50ab3e6176da9a926f4e1707686fa2750a226f2239d40816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048ea8ab49959fda10909d80f20eb7c8
SHA10e5756a5030e64722dc85d799191f268f5f8abf1
SHA256cda8b8a6813afc996a6a044adbe96a9df650eca86f896284ab28ab942ed80fcc
SHA512f60f81ae28e81dc2b8d289dae50cd0e15a189900619bfbb56e823fa656a46bc584d92a654a1f32ee7431ec1f8fb11b7a712d07bdb5261debd646f816d629b8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1a3131050005c1c915a91a568c5bc5
SHA1843ee54d3e9b8a2a8d5513404148bccca0cc9020
SHA2567cd579792678ff9a1021ebc6992e72b9481097c1b2878a0ebb2ffc6f053a1cf5
SHA5125fa836ed372bf13cdbb9c894ee359cfc3f99095f7d6f2f0b9a470c7ffe3cab4ef723acb9f6280408500945aa407929d7137b5204aa7e44ff39fe9e63f18d4e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43e28fdbd5194b3c0522ae781de2a3c
SHA14405a63e30d47961fd9579806375745c0902f0a6
SHA256dc48174977aa25d2eeacfbbdc5f7eacd23e868acf7f5c7a60e06f8a10ae566b4
SHA512dc264754409f8fc0ef083f1e487e3bc951d6c466552d26adb19d362a177af745846093cd5397b7d956b74038178fdeeb40c6d6ef671fda28f62fcad0e46f3c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c7f7d4a81235f68ddf9dff5a117040
SHA179bdf7964487e699ddd42099446f9a1f74783ce2
SHA256c9289cbda48e60ce353632359f7ff28ef9b7f99af85ad790f72d5d65b49c2415
SHA5120891d276c7e246fe4cc385d4aa3f68143180b4c31cfe9fbf9b602114e55d4c69c2aa5b5e56f1216097eda9eab49192d6bb99d8d2ca011d8b327046eef4b88da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5bb86228ffbbd400388597940da0eb3
SHA1200cef456ee55b20f181e5501ece5eeadbb7c22b
SHA2560a8adc3979516850b4d2345ec8db9e05395b8db2a4073004e9d97a5d41634d80
SHA51268c29b449a7815e80c07ca8ca7ae6164a0c239b221e58c3d51d61e1f09ef9d3e97f5941c7ded2d5196971c0824d81050dfff4570dd12924166e44b1a45d9c131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce4dbae522cd50d132ef6205d6b155b
SHA1695c14adb287e828e68f968f69d327ce332f7f81
SHA256bac6062ad06cbf76dd329983109aa613e4751de947ffbd97d44ca16a5a13015d
SHA5127e5e22fbf9cba5bd69351ab7b2b880ab8cd2983dcd85fc60dac35072d8a22a7e9735d1fcaf2cc88d9bd7041f08cfb55216c69b04b97b01295e8d23d890064541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d674e1ee4ce57857ace11297e74a0555
SHA1dc5a0e85819d78bc5d035b9f4ed7fb55338fe089
SHA256ab3146bfd13e578a3555110a06ae0adf98507d301c4d82cf2f344924d0b426c6
SHA5128ff65a67a578088a47f0c4a454a398e9f29e6e202ebb630c4b7652f61ad0f469b210fea0dde396118818835ad33b9401290cecbdbe7f8b8e1e1d1201e77c26fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f24458e04b97b6788fe1420fb914a4
SHA10f9c85c893175aa9d26b8b6f756851dc83b809fc
SHA2566fb7ee9a6a34da4dbdd441bbfd63bac2fdf8f715c0e73d63b9ae63edc801d4ea
SHA51288bc0281d37ca96d853d9e7073ceef32a07aad608b0fd8a7cba482cc18f3fed7bd9bfa932f6e9aa59a4293380fd674749dc9ad5aaeef36325622deb9fe2115bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3fb040b4e2cf38a86a17a36e14d775
SHA18ebdee3fa08975a509100abdff8589e966d4aca7
SHA25604e58a1ecb866dd73962c8868285d7dcbee40266e3d672d7d804fedbbe575a34
SHA51267867dc619c0ee6a1077629270da58c9cef1c8748f2d5fe1df0a69569194e9fea8e3f71062b7c150c80aeaf40044dbb9c6bb18e8c1aea252bc4a56d57b7bf122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59547fe9db5c81688dd53b40d310f605f
SHA1afb8d60617eb2071eab6927f84101d795571954b
SHA256994399616434fae3dd9cabe6b257f56ca42a7f22859484ef5ef8a9aeac102962
SHA5128e2249a4e0fd3fdaaca5ac3aa62125ac908ff65da98eb97788a59e0d8f10262236615c75d52629bd41518880556cd3916c362e499235f4755e7fe9b5bd60bf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58b9c46850831165aa32eb4061553b9
SHA1e9ede14644daea613b268a508e1613013efd88ae
SHA256c1a57ba3d4cc4e53f599571bd184460fdb78cfdf45540d7131372e68e3c5ab09
SHA5126bfff39652e0d7396944ed84c21e141f82fed7874d0cc0bd9ff84f846ac0bbe1d2318471615c018c54c10dac81e35fb405107219bebf63cc04d45361118c6579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3aa5288c99aec980ec2245ee360fd2
SHA1146d3fb2b87bb7aba23649905e99c3b635bbd1de
SHA25628b51ea3ab1c580718527e74cfd7edf992e54eb859f305bcfb47860b15977a9a
SHA512e32c6b1817e971e2d2d0f96546fc90860dfd61d9601dd2fd74d691afe5e1fe7417a35dda1f9e5b0b131b0221f8a9638e5e10bf6e2acded4455a9034ffbee0d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54158d7ee941aa30c24471fcf7fe116a2
SHA19a8cfdabab69e85f6e6d87cae1b0ec5a14791f5d
SHA256c5b5d3837a33e3fc604e66dc5925595b86b8825e3bf27589daca46133f8144e3
SHA512c68c9bef69f46be2005e2c0c8f7f2bfc7c7fb6fb35de355325caf9be87b696b61050c6a8cd76dd94e969b65a1e410115e5d54b72e73ec82828743f84d740cd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4b1ce6d3543063bb8cc1b941179db9
SHA12284b99fdf165a3c0358685cb19d94fed2ebb260
SHA256dbe63b49b2953058bd12f92ddde33a33935f2b5046f8616c0725ef2d31feab77
SHA51292b30d7c4c17f87437c29f1d08a613b47a95c2b7fdb413729ebf22230d61005f368a64e5921cfda55566bf473550bba90947e983a0857971417a507ead4cd5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4c3dbe49223dc64be5470d96e3981c
SHA14e699819adc9a6e3b214b2d9274ba273723cf6b5
SHA256198b99e0e9fcbe0186cbf8a09d0b1b598baba744233e68240b81b4007cadbe65
SHA51204bcb7cb75f75a188cd78dd8b4bfda456e4c5cc09f8716d1140b5056d6c9290b92b12be158e81284f131ba6e2c10b06637163c80a6bc0fcbbd03f7c2ead97e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1172fff3ffe041b49276d0e71e25379
SHA153e57fa6bbebcaf99c064ebb611fa6b932f1c012
SHA2568a01e6fab6400b73d88346ba5741b4620ead2c8c0b853bf27bbcd41953607893
SHA51211116e9dfa1d8f382fae414241e3514aae48730a06f51df8022943007f01bf3577301d13e9a12709e1b4a2e080f4b8e80ac5c9f994565a057598e214f2a77326
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b