Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
8dd76fcb3ae491f415d5438007883853_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8dd76fcb3ae491f415d5438007883853_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8dd76fcb3ae491f415d5438007883853_JaffaCakes118.html
-
Size
460KB
-
MD5
8dd76fcb3ae491f415d5438007883853
-
SHA1
6482e0dcc9bf1b60fab6421321e2d22aac1821de
-
SHA256
c0a2997ced3f138fb874c543cdd29ef257b3649a2b750254d3342f3335593e29
-
SHA512
0965d8228658e0ac3c918c4803ab1dbcff4175c8471c987f9f40ada4a71c8b7fb722fafabb69724d42e1514608db2ce07f58b61fd6d5d6402df77a42e10e6517
-
SSDEEP
6144:S0sMYod+X3oI+YWsMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X365d+X3i5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423487821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25A072F1-20CF-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000011f63a7c6c8b704b91d0762033efe3ac00000000020000000000106600000001000020000000890b3c9972ffa701eb6aba8cde1d1ac694ccab60602800c6660d0b14c85f25c3000000000e8000000002000020000000f6f94ef02a083209cc86142f6f7e7d66d6ed550ce71a960f75d5e5c3ca6ea69c20000000395e23781150461bcbc1e4beb8a4a47d31d132ae97b7952efb94b49b372b77ed40000000c258d5dfa63968e18a504c6be6d892f1036890575f85caef5531fc6dcce3117d44a6646464e77daeed48c4f9a6a201404117fc8ab01c93cbba0fdcaffc809375 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ee46fedbb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8dd76fcb3ae491f415d5438007883853_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dcceefe56d3bfc9b486b255352deec
SHA157a077d1b9cc4a30428537c13179581f8f4eb074
SHA2567c1ce304371a86f886e48e33bc6ff4e6c3bc5307a6a538befbaf167e9d50468e
SHA51208df42134109ce390bf4a7c22b3c485f5298874ddf40b8719f1bf94eb08ffe39fe1733481a9028c8f88c3acfd9a4380de8c50fe51c15856284d6f71a91b08361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ac2b55614539f379438665231fd0b9
SHA1f939ee9ccf25f3c2addcfc229130ca1043bb38b2
SHA2569105d70232dde9907919b2e3359cdf1f97ba97c31d7adf1034856e60a359e302
SHA51214e2112aa67bd08c9843e723955fdc124824eec09c0b8d1485c6b44884f60dad6252f421ecea4f716851e759aa0b683dd23252ac1bfcf3c4e382172fa210a719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca35ab7b03f707c20d2e775fbef22be2
SHA18f65f8730a2aa4e5e7bf57d2488dc6316c723bb5
SHA256c5a48260664827fa59e3eccf6be2ee6203a58a4b422e6f56941a3b4ff4f1572f
SHA51281146bc63ce2dd6ca598575f2a0de11f1011d8685a3b57ccef8763978c5a47913ff46f8a66f88a5b46a2702b6a76c2018b8ffb282cdd291c4636bff3b537016f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584952c3767ee9fe4c1565c5b982b2eb7
SHA17b3e8ee58b4865315b98e4834fbeee896ae20036
SHA2562dbcfd994f863041d06d22a9418ef989e2b2179ecfabeed54ae040c80593e9ea
SHA5129543c84c1798ae4a29426711198e69e56d555cbd369716131b3dfab066b1c7a84382dffa0e8ea6d2d9d122fbd30bf4d62506047f4cb501af30240977b312ca13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ba2e2838f597ba82c408a26fdd579b
SHA1abc6472d6e2ab3766070841221d4171794bad744
SHA256fd5e3ac75a1170f3b261285ced62b37d1d2f5b8fecee155005bf7815255a109a
SHA51265d219d344bff08b25411a26a950677d8e8f50dc23fd16b100e5f58d772f534a1b3365e8a66a4615b851db23542d9b163eefa8e705f4d8c34eaa4c385f3d3481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc500f505dabf7a31e2bfd564b397263
SHA1f0bced2070f882249c5393eb4504bd4d8cc5a020
SHA2569769804b39c6a49604a59ffc45e09cfc193a5fd19d274e6137a6b280ff94b1fd
SHA5121eb6530a763536e170bd4df073ab8f8f275c1fecdfa75b9bbadb98eb5fbb32c583f905070e0413f693e73f603a0bfc366a9de7b058cdb313f6e7078a07c48183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fdc9aa1f3dc64afc28b560be40deab
SHA14bced5efa13aa687d1befa4488c68614114ab189
SHA2560b0d8c41410203a5c85a316fe43258d2e7045c3134b9dc05e390481b43e8c323
SHA512bb150c1d4694644f40dd5432c28a5b89301bc71f3c2178691b724947dbc50cfd5f2d04911fe13b90f5254b0607dd33c7580609c78b61758467975caf0a18acb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab2f1e6be66705a08ab13563ae64333
SHA1ed2e6ea45d6de2c1608c7757d35b266751fe1fd7
SHA256716d313893d285a5f67eb4560abe4f69a5f5a33aa187300ca75aaef38c0c7687
SHA512fc1a81918fb14292910166b3c44c47095494ab8d63b974c249bb7485c52047b9681c74a1ce1cc036939384121570d649369b449b871672ccb258d7da3afa1d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ad6bdc6dd52dc44191c31b947d18c8
SHA1427a2bb5bf4c87c88d6f6404472e684dda1757d7
SHA256cc227bfd86927ec8713c39631a124d23813d752befd04f74325a14cce2d7f25d
SHA5120199c31386ac38b50971ba8c5621f0d95d66335d54c487ca1bd3d26f71dc61091bf700b9b8d93a08448e7da2c04ef6e7c1d62efec03edcc354c68e787a59e379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840786a6109a6bd758e438cc08ddb2d8
SHA1806aab22eb4c5aefcafc207bbaf994904e93f3f6
SHA256741de29562a475eef44a13964e4fee8ee6b2f0027628f20db6fbf698f5638ad4
SHA51214d69a123ecd89a5dcb92b297b9f50c073131ae4c4d5814fa79b54bc3e5ff53095720471f00c67cecc30b48e215f1b051a8b5990684cd0492c1c02f37371ab71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71c7c7e35461ca64c3bd8d351508489
SHA1d8e11daa91bc8420027e406c9292655db6239996
SHA256cb33c817343bd330cc1b6db4776079b9b23ef2dee29fe129f76e020af1d64fa2
SHA512a98631f9938e70225cada70e9ec1638a62594faf824764eded5092a6650adca15af8af2bff95b32edd441f8c396062c40fc5361d7895937015b412c6b35e81ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06ba350737070fd6a8c03f2672dfbef
SHA1794eb2ef886e289e4e4c84a70d70d1cea34470b6
SHA2568a044a2cc46c787c3eafa34393cc4343eec4cfc936dca1a9e4b1684f72aa9a5a
SHA512bd95881c0f294beeed5a0ba33171fad586e00d7e16a058a7770f5a21fb95defad48bc1558109fd0b953b60cba50b903dc5ce9c1f7ed45b1f91f02d78bcee7166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e83ea82485799f6a6be79600664b4c
SHA1459d70e77bdef21cddd4bdcf996738aef9e8ecfc
SHA25646e90a2e039d66d9ce8077b252a6278eee71e4323ece23e4ba3f9b1c32a07d0d
SHA512741dc1befa83ce083ae22465b08f13a563375d174e143cc2473a62c308eeb7abd1d013577d2723af3bc6244c2a217604a6e9ab65d34ec1f00429d0407c4ce6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cad68a2ae83db3b5e3e7049ab9b938
SHA13e4ed2d15424babe8b0d938618d7109f0a1e26d8
SHA256558887551e9b0ecaced6e46ac96bfb41ef512ce5ff200a0e60ef0831bc392bb4
SHA512a6d475490946f5aff4d1c9ffe05702184908b23abecc3f23cadbfcf4e71d88260d175b600b05266cb39c1f6d1c4ddfcc81b3fa3fbd6eaf2b67e273118a5cd50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d86e3a95d03a10b717a0f2be1deb1a
SHA167fb27eac1a116f6b08e0096748815ab0f013d05
SHA2562d2ee4332c1dc292cc1605e871da657996d0664db5c5c376c86ecaca22889606
SHA5122a75561a443719aaea097c6dee0a235ce4710af1d52f229b710039e4877dcff6fab8230636550ffa3fd585630a8f32b9075c4c2fc196d3f95afd33307c0ca818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54971c5fb0334f7e2b3d0fa66ade9daea
SHA183a715b51c96aa84151a7926c5da605c51efd46d
SHA2565aff95a35ac18f995488d7871a4bfc15361597457e3868a598f0217345e3e949
SHA512f4460c563ced39227e8c02c4b0e6ffe35ae54dec9d87484ecfd65b91f2715ff4a30b3f06f9dc2a9efe543cb51f622a54dd239558b66d55834343ce4454b4293e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403c45d8c3138848ddc9ede52e518247
SHA12c3ab86f4f35a85757705f0cc85eb4f0c596dbd8
SHA25687ee7bc72d6399882beb7ebbce18478d77b1995b0ac958d356f98121cf7b6e01
SHA5120bdd4b78e0bc7ce087d327c8abcebeb1deccc018f47ea8cc9525dae98ff29ba0f9eaea9a62b6f14dab8b0625bc56492ab9a2dc37d4592237d4dabe0e4c8f9802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc830ce2a327222c1bfec313903a76ab
SHA1a086cd5c30498865de3541a865f21124cf6fb158
SHA256d36f17e351544139954f194e1087b6dc3ddb9e8e477cebaffea8f9a55087d565
SHA512241ff19e8500ee67189501cb0ef9c8a9c04718316c32243ab598c6cd58e4712cb41e72f7107e7056f8ed5bc4c3be2530234dad0a5bde248810e44d29e6aeb14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d3abaee228a855ecb4fc9b7193fb8b
SHA1854e3b6593eb02baecea97a1eae2d835825a7aec
SHA2568ce856f5f56aa602368c4f36a9a00fae61ad3fe21cde5e3578ca458c3dc63be5
SHA512f24bc1eebd339be58854bbd9a70545e03a4fccdf9f577c64c9e189d8641abec51fac69bb006b6b7991f9a56a8ecc6d1f75dd5109f2fdfef334d9a3525e897f0c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b