Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
8dd4942a5c24c90de77f2707aa2ab630_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8dd4942a5c24c90de77f2707aa2ab630_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8dd4942a5c24c90de77f2707aa2ab630_JaffaCakes118.html
-
Size
87KB
-
MD5
8dd4942a5c24c90de77f2707aa2ab630
-
SHA1
e21eb0818307a421bf71f9ca5fefdba4ae520d91
-
SHA256
daf22ccb0288b9a4da10c8c7d603b9737f93a9f91e8b1ba10c1bd3f10667f0b5
-
SHA512
9d045ee03d4f24e7871f3454f6998a4c6890bfc1ce2b69a51ed4e9b1519fcddf91dceab19c0950b882349eff3430a79b4a913c340929eadfc09a7e758e02742f
-
SSDEEP
768:blkTJYO73sobaaKoJQmrhtDchubGQlOf3SfOexeMTGKGexeMWsuNRAUtK3bC165c:IvKQFht7bGQGTexejfexeyuWBONANW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AA73361-20CE-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f1dae90e8ddb1d44a9b9072880a72a5700000000020000000000106600000001000020000000b07a1435c0e915cb8547e8a31735f78165a205536053ec3177f9aeb5d2cb1931000000000e8000000002000020000000df0b571490cb974f36b2bae5d83a75aaff26737e46fcc4870e4ad0e3432aef6620000000c5db77cd44dcd8c1d7708f7af68efede20535f1a1e62da302711bf2279fd2a4e40000000c95baafb9367082b3b808c84fda1abd9d735c7aab24511204aeb9fb767d88e3ff31268799fc48e49f0cb1db8e70bb728ea3e2821c08257dc84566532fac11f27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423487561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e93066dbb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2752 1804 iexplore.exe 28 PID 1804 wrote to memory of 2752 1804 iexplore.exe 28 PID 1804 wrote to memory of 2752 1804 iexplore.exe 28 PID 1804 wrote to memory of 2752 1804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8dd4942a5c24c90de77f2707aa2ab630_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50e6be84fbb264aafe6979cff9ff47f1b
SHA1d60c1fd08c07d66185ceec77ef139fb50d792d9c
SHA256c0c9497e8e19c69ba11a18343f06874641e492e0bb389c9591d2501d1100518a
SHA512e18883aad315604f44ac321d5def696a83c1b0d44dd60f54c1c1a9ffa359e153782f16a571b801bd5cf1c977d3f66a2bdb3cf7a3312030ed2b1f90177b1b20eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce758f56f159fb371ef983253956a6f9
SHA10fb08b548c6b9142e221610b751e6d84d4e34c20
SHA256505a43ce7db8796191f26f09ec345e2bf84661c972cb3de4e4d85c097fdfe266
SHA51264a2d5b7c2a485d8a016694c0efe74f31ff6989c3556f427be14eab17442ece47851780e7b59bae23183a314630cf13cf9fdd096266f421947f97851a26f4811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb93f482c55ac69bec79d6da5579066
SHA150390f1fc43bce80edaf3c62f4d0b0bf417b4926
SHA256f62ebe1225ccda5f18793b26116b1f0f052be080fffa4fa324b92000550f538c
SHA5121e83a6277c2a2813156f706ed6dc68a7f35c31317f7ada7369fa1505ab762fdc8e52c5abc39455f47511f5b960ae65d7359ae2d6ae39cefb4aa3ad0468e371ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b2bdc8a85ab2a5fbde4d5dd88a21aa
SHA1a48b463f2c2c96e108be4472e94c6f9ce4390343
SHA256b5aceb75be36f390d801555fd0d8537e735f1ddaf4aacd0a78698afa07614bd3
SHA5128041ef53d22d5a2461e3d762e8251e78fefb07af8f553d5164b800e211f324f33d4d53228a050b66a8fe607fbc82a0ee76dfec2da46b300b060c8355e25d2355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51994f59b459d6469093e8801746a9e47
SHA171dde79f2190a0d137226b8b5fbb08769531561e
SHA256d01ab18260f052d1b6311d2a14bf078b80a56a1d20771d366404cb9e81733a14
SHA512ecf4fe6d8dcb149a85e23dfe629d105b80d1176d75ca98637480e9644e59a628a692a652cea19ae45b0e1866210b34a6210ecd1d2cc1f38c9dc166bb6d4e89c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e6c76432f2445aa1ba6a8beac22550
SHA13aecb8207cc929cceafeda2a63c73e212c4c9c72
SHA256ee084b7bc376f62978664439b3eb43fd06e698883d4b108bafab8d692a468972
SHA5120c4f85958d7604389c44f5eb9cabef20b1aa44fab8bfcaef4a1bf86c9b7994f8df4b48f17d296cff07f5ab6a78123cd474a746dcf7d6b33e711894f8f546c365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56254ad2b3ac1c9d6bc045b1791edf8e2
SHA177cf4959e9ff5991f9831214163b4fd6ea8c84da
SHA2563e98678b61e420d792fb4283e0ee564af7405bd4171f9c89fa722543bf224cef
SHA5125aa7f7cf3423a42e7d55bb1809f12083f32d1368b7916091a4b8f68892e489ecd9e7b2e81266044539317fa37b13d799a1bc6867ad856eaef4142a01a44fad65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51912966dceb607978650ae9e4e742802
SHA146c748c85407ec06544e91a390daf5d5d90ae875
SHA2565a7572051f447e11a9cb262b90c2cc0995a94b5aff99d5d0e6676d6b09e38131
SHA512cdfa88b79f9cc47f14f6ecde9d75a4edc1bb8e7c8c02c26cf284fb1a5f40ef4d1509919281239c4b1e3387a579f3b54266f3a28af20c90a08dc110647979eeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572bcb73006b3f39abea832991c19d99c
SHA1866bd7447fb457a6affb63f0db835acae2b91eff
SHA2569004bfcd86af3be8509803bd677cd324441a06dc91b616ce8c1f5dea5be7d188
SHA512b695cc90d85d2b3290c04ed6f96cc5074a046fbdc312a249c0c18b85edef92dbf12b05006bbcf1c36278317c92ad082fd18cd7fd04408a1494fd768e331ad986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4eb7f61a288b1b287c539d1d3150c3
SHA1fe452bc140464483a9d0779dec5711ffcb3ae3a5
SHA256935e6def3674428fe5e3d5181485efc7c2138bbe3c850110f59c65b2adbcb4ed
SHA512142a123a79c566b7462adc94d4083b859da6eef6fa2ad60c26aaa112d5636f93583e6b5c2dc9a774cbb20a2851a30cdb52a8ae847f07fbcd92a3d3b23e5142ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3644ade66ec9de7cf3bcfd55e4e5a97
SHA1aa51fe46ffcf83cf74a845373c0c63448c21eac5
SHA2569d0915f33245228cc2980dd66a7282b08dc4e184353323e85a990c7a46adc8b4
SHA51206672db0dda70a001f48d5ed3daa7ad6032ebb261a6008c3a81589a35cf66a56227d6289728334a6c25805b925a945e3dc4bfca5a0a6e4bbe18bc599e584f7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c898b5b4cd87d7e9a75df1265ad18c
SHA124105b3c2f6d124e0035fac23e2c953bba8edabd
SHA2563f71df0deefb6806209e5cf8b7a4e65d578af0a8ffd5b4a676e2eb7cf31e835c
SHA512baaf18a56e80c35b08140dfc972a3a0825e61e8ff9def41af7547687817a5b8ee6b042b994a1bca7e77fda5b48e27ca8e9983c15c0f0f4602ca7046c8c6d5b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25d464c6f38a9ae1cd6213f9d2f44f7
SHA15c6c49ff192cf13185b73655fdde8903ce3f1616
SHA2560fb2e5eed0c34a1f87bfa2a6470faa0a5ae6b03113cc70819b061bab4fae8afa
SHA51274c5fd82d222d4fe51b75312e9552b758cadbdf7a3efbb71c3a3b5b46445b4742b0f00bf40d46660ae94cda1227f214790f99a4d075b0f9a68bf8f3d3a33a607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2275ea6d97283f63cceca571933653
SHA11c19acbda7735b693754944a1e637b09d08ad3e3
SHA256f2c5c72e8fc9101035d7b6d9aca2b076d1f9655ea78eaff69dddad0d3364b9eb
SHA5128eeacbf461c8d7c9ea01f0e5fe209b7fe61bc7df15427ccc671cd9fd1fb3e2dd69e6f488d8285a238fbecea58863547a031d228677304b1160c834082742a361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f03864faaadb3736826c71cc11faad50
SHA13793a2bafd13063c56bc0d564b137ece50e73905
SHA256530e5fe525b2ad9ce9b3ea46373b72d8911965abd25f7ef32b9ad3d150ecd9d1
SHA512ef3232f7a06ab85896ef2f8e80a7fd5abae4739a519f4db5fa60383aa45bfd8a335c8f59ff046bf2f47793632e2bab4f3aa3d88a2ff8440c19c9b2268598fecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD516fb64651a044ae7d2291550d7af7570
SHA178dcdadda5ad732907ddc1430cc47dd2935ff964
SHA256444989b4e9baf34621c111487e01d696593ac57e2b0297185097604012b68dc7
SHA512fcfa7c97a8c2defad10aff25c0c71bacb61821e396ec3931e2294f6e706b7539feb5396522866db11ab1f2c086caeb6ba41269ba678627968112d4c678d35a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59398e36aff9c5b91b1a58cc3624ac91f
SHA1aa59741a75b8658bc1690116570d55fbf78802bc
SHA2565e40ef4807af01a9f1561a34897091e6d898cb23444c7b30877ce9a556cf8645
SHA5126453bca11cf810f26ffb5ed903e11b823151b2b0c8b0151f3fe8982b0e1eca4f3bff100ce6b9f3b9b06345e22fdfe450e9581ea548fd250ea2dfd66549a756cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b