Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
8e707ba9dcf0dfcd128f1894c9652895_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e707ba9dcf0dfcd128f1894c9652895_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e707ba9dcf0dfcd128f1894c9652895_JaffaCakes118.html
-
Size
460KB
-
MD5
8e707ba9dcf0dfcd128f1894c9652895
-
SHA1
f72606266bd8a5042ec06f2c29170492c8a0a627
-
SHA256
85cf4bcaecd80017bd152f7755ec0a5a4900da357a867bf9d1f13ebee5ee9692
-
SHA512
9838e1a08f6cadb9c7275508bf8b86a657028a85e33974ca80d8f9e16f9c42147dcf4eb711084cd9f93932bf6ba38fcc217b1edeaf0bf7a23af21f45de170b4d
-
SSDEEP
6144:SEsMYod+X3oI+Y2QEsMYod+X3oI+YVzsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3i5d+X37H5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423501433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D707BAC1-20EE-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e025a9affbb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008d823c2ad014d4aa5f4e9a4732f803600000000020000000000106600000001000020000000ec4419c2b85e3d29e30d14b6e4ea9f451adf5249271706f71e5b2bc515ed6ed4000000000e80000000020000200000006846b1d2b0ccb225130d30e223f70f57b395257d9ab52e7cde5ce6c219524ec920000000063432ce74dc554860cf2bd07310da651c8900ca68cc4a356f0ab9c12cd1b75d40000000a6493e08bb522b386b1fc5052dfcde8dba38782442ebfd5cd3343572b32cfb183adb65a3ebee388cde44b86a806f7d28a5637ec882f0e955fc1a47fb0376e40b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e707ba9dcf0dfcd128f1894c9652895_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bed0f47eca094c8aac495da01b94ef
SHA176418af2ecf8afa06107a7c3917c5a8726653b2f
SHA25612c3eba722d35644515ce2d9b901b2a62866e143f4ec8a523ce0adaba80396cf
SHA512518be899e422b94d2fe36d5f21b5e3d2269ba868d7bab49fff33c684b2a2e4f35e20c7d38dfa33bf44318be63c5e3901ff8c7b148129c1500f7dfd48150c4b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3bbd43f0234ec449198fa40f4d9dfb
SHA1648825c839b2e074456eafd882e552fffcc1257b
SHA256b300232d6c09095b278d5618d78772a174e1de970fa1340d9508afa92994c700
SHA512a501c96e6dc22034fa34e072382663f16ee1556b4c71e275d4248f32f5dc6cc99bc3212df91960d1d942c14d4f3427570353691077354356647a98b12ce71c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abfd8394e07cd0cc1c70228a213ba7f
SHA12b12cf04542e35cc1f0b2201ab5ee6d9922fe799
SHA256f1620d337577126f632c7883bcdf36901b8a3bc62ac29059e17758b6c4749dab
SHA512a8ae99eaf2f738455d69f13df22e5396565e21b3960120022f3d216e077925658117844427f9265377a933b09a1cebfbb96e936d65ccfcde0cafd8714260604d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2835a42ff94c8b75f1c5c1ea1c5068
SHA1b77841874e53f69953258e07c34c7e6ba5febc8f
SHA256b7d13527c4654aca800142f6cf144538cd4c2a645a146d4103cb395f89350091
SHA51286e510710c10a93ea7b103df8dd62d0f1a29e1471d0ff5e0c2b6dad0d08adac589f3f3ab6aadee4d23b2ad51682a6ab673c8bdc2cec3ea5903721614bd83e795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59835e1d81b865ada107a72ebc4ac74d6
SHA16eff4a2f64910b17d85bb6aaec669f2f8e358623
SHA25653003614167caeaf0e0ee91e7c89f2b4a88f4d40fbb738fb4fb497dd70be4bd1
SHA512479e153bf5f5994570b90a23b9df9d4da3f74061d536c40aae979f2f412ae498c09503bb325bdb4f4ea8d302f090a851509a4a6fc5e8e5f017667c131fbe365f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753b8c19a0f7410210d3d280f84092c1
SHA1b6ab4b765a383f129375d3c70f422415c0c96136
SHA256010a42eea514e80bcd60614c3d0825988594f8cc74e3565ba7178212d6f1ccc1
SHA512501277439929d46fa81438018c0c662e76016e6e19a7f349ee0b0ef3e39b2bae5eaa8d718374066ce255c66d42e980ddae3e20c45870732b96304275f6b9987d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2439672600e29d5c31963e293ddee0
SHA15cd2838207426f287cb5db9e62a1ca3dfa9068fb
SHA25682fcbff6bd47bdaac7c9cdd2de9e9d3238088a645816b6594952004c24b9e396
SHA51278d187d622c5dbde26446f0b8c40b681a9a50754feebabe203c63c8babc407d8960359c3bb9f412aaf3b867b33a96e2a1855481b91228995e6ffe3f4886d020a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2240110f859178348b2af433a11df1e
SHA1e0954da788c1f9f86b9b729c9f4b4a8b95941c57
SHA2566dc431cea4bfc2796d58f86ea80d105ffd070da8d29cfd40a8cfa11d555f6413
SHA51274a7bea3e319e47a941d89500fd67af4f5645486971a7e77ed278e7ef9ecd7d334c5292c4a5347544fdcedd331aff25760e575c60788384e73b5bcd25b6e75f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267fe5140a084ad5d63291c99fdbcb62
SHA10fd8ade5c0f102f402c16741fb592312d9bb9a5c
SHA2564f40ca0e5192364b4de0008e6718720b321c347ceb785b1de8ef90663fe868cc
SHA51285ebe325a2bd94a31d2f6e39ee9350ddb24db5f2d44fb16f84c1a79ac4f87a10796f7cce37e314363fedaf8fabff41f002cf51cda1f4742e027ac419dfaf86da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d41d920c314cd8b2d906ae3b5f28e9
SHA1fb15d0b7745756eafe582eba35face1cd165505b
SHA256b5430044898d2a5f4432bfc748b7e1db4d97e74c82f6ba34d760371445a0f501
SHA512e8a745eb36ea2cda155908ef4f0b57b92e2c8bc30390aeeaf704fa0da9b0fc8d8cc5d4b8386209b78768766ddcf0a86ddacf4761743181e07ce8af42f9a82d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf8099e7ccd5fbc1ff27ea9bfc85010
SHA109dbba8f516f9c985fd8a124369d430e4dd8e72a
SHA256b12bb9aff05fa8ad2650b425681cc7bdd2de09793fb082ccd250df1528d52e13
SHA5128aac51f4772daaf6a93e3a9551f054cc5013607e13fc135f64b4b511d9d68d906e896e866a7f2849ba18e0705f86caeb64d4cee6ea0b745e2c813c0379f2bf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51997c6853e3a359a6eb527efaa4c52
SHA1d336ccd9bacb2481326a9b5296595b7502a02bc8
SHA256d839de21a551ab008883d8ac8fb331da017672b3f26b5c4d48a50ec12e1553a8
SHA51229870c2cdfd55409600a9fc28ab6e2efe40654652b4800453fb3b25da23b62a3e8ab75e79925f6d7d5b3c4d5ce3b0f9b0226b7989fd93e3450d56b0c5db2de5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f6e6a8b4751eaa7bf5f16cb00e4bfb
SHA1c2bdb95d7290ad93e0e9835c9f7c498aab2fb4fb
SHA2560731fd8b3f51656e95ae439ae0035bc35a784d36f9f01e7bc1adad4cec89705f
SHA51201ecd4654a7618ac1216cdfa015e6ac3bd290245b9e650f3c1e9591083d2733fd37245da34d4481bda7fa17ab929e0ebde3cd611c72467182ad6b359de1f3786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff60b7c479088e8ef8ed9829bff3de7
SHA1b24fc12f2c10fe2ba42c48995b6ab66987388c77
SHA256528769b62123f4dc69269e8e6428a4c5e58dff14ee2baacc4e4c0ba9569dcbb7
SHA5123bd65ca152a1a339a691b92ff5d701d7b6e43bea67a702cc11367f6e8fe36e343fdac051e69e9650d1ec17762fb1b02afe21239f71cb615e402165e80e44ae58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b299f5c6ec23f47611e3533c88f6a6ec
SHA13c5545c8c6bacc20d3f11d26c5457068c05c7f43
SHA25659df740e13cdd9714b60f14be8bcf52e35797bd1fb805224be0a28dc3772030a
SHA512302d22bb827539e78703cc05e3ad3d31285290250347d73713acf1e9a11cd05c7a641a079f70dde3f9f624fc2f80f8114c6fa8f5942d50d624d14fc46fa075fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ffc4acf233d515f160fe7c2db0c890
SHA150bd18c3e63b6a838b4b0faa85ce10cb2825317e
SHA256ed2019db112ec6ffe5f2f3677e6bada51801ac6d35ffdd98c3ef743a308088c0
SHA5128677942e2e297406bd49a21847c9faa37d9c7298308e26f6c063820ffc00806ebe537f204edec7408b6127557a8cfadd0fddb23800de7df3fef15e7d69658dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568dbfa059fd0bf632670c7212a899296
SHA1a2128240a0acb38f94c9d2692d26b11a6bfe4008
SHA256876a97f876a68246e56ad8854e210c59e88495bacdb33704eabbb4b5dd20e1d8
SHA512821dcd92fe71d8ec1906fe3257bda70023ecc3f592f72d1ae306b721e707bd54cffe77f0e3a212fc11f1e6ea26a0e9783b437d56edf2641b06f27ce84b1575d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d60b80aa3f603b6ab3d5793d62d0c49
SHA17bfe174f64a0b859ded14dc434b3e69807e5148d
SHA256803c13566b2d7473467d5f43d0c6a9a5b8659d09cd2c6f0f03140f327be9c04e
SHA5123d591ac645625f5bed88ae74ad5028ce987f088e68729f9b6f7bc570b8053a13122ff95e4f32e691f734e717a7a324ff954dc4d33e3a0228e9874336d3f6f849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1e79a315af7a85e7a186dd6ac19722
SHA17665dabe18c8a1541dcd98b5884d47a970088db1
SHA2563ac131acde83c579fd4e7e4bfa588350d7e75bac6bb02b6e3952672d6ac174ce
SHA5128a0079ea4d31632a9b608ebc01f78874afc918468a6144703989df97df70f870b96ae40ecb86e17ac468e5b8b6d1f23c3933a81e221277d808ba2724ffb308b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b