Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
8e63b01515f5ea0dca0c136e87d97d4c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e63b01515f5ea0dca0c136e87d97d4c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8e63b01515f5ea0dca0c136e87d97d4c_JaffaCakes118.html
-
Size
70KB
-
MD5
8e63b01515f5ea0dca0c136e87d97d4c
-
SHA1
c4666a307388e095b2b41acee11268dd6bd67a6c
-
SHA256
8014289a35c7ea3000addb6a8227a1c0481e75bd76685a00e3da494004ec378d
-
SHA512
5dcd146fb800d8fa28eb10c210d034b971662e69b57883e3fc700f3488d852837ae573787268a494d05519f7abbbae68ee8d7c1e707671e165550ea62dbac2a2
-
SSDEEP
768:JiSHgcMiR3sI2PDDnX0g6sK6mN93ZhhoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J0SKTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a021a748f9b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423500407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7406BCC1-20EC-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008698ae068a969aebc04fbd7c0cb93d03a3a783b7068df5238c5c1584304dee25000000000e800000000200002000000061df2e521f7aac08bd235ccdc7a186b6c08f4c2072a1d749b3968877b2ce3fd7200000008118be6456714af95e3ee48fea89bd241b4e2e4db1ccde65633f28ec20370fd0400000005437818d6aadfbfe8c18e54c627176fb45a4abe5ea4accfd66a703d68946b73633aa61d3474622fa3ff5aec050646fbb98f56d9840125b32333ad8c70e766f0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1236 1672 iexplore.exe 28 PID 1672 wrote to memory of 1236 1672 iexplore.exe 28 PID 1672 wrote to memory of 1236 1672 iexplore.exe 28 PID 1672 wrote to memory of 1236 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e63b01515f5ea0dca0c136e87d97d4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b6ac2927a13fc81a66ac106b958f82
SHA1d1e52123f2131db2f73583a5186a91d191f7e20f
SHA2566b00e09c0cbdc2f0fb439bc7980bd2617ab334a48079a365ff77edd62b1c5d1a
SHA51269a9f19c8724f921cac450e9bbc62009f94a9b060ceb210f8df7dba1cc7ec802e167385f299265a31a2a39b72ae9f007e2d90b46684bd8357ea549cf9aed273b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e669c1e6539615aa189665065d939c7
SHA1e484da030a442b9d3335afa280b3b865ffaf6ace
SHA2562ff36f854e975a374c8def203462cbc6c9533429777e94756d9fede6798f2e2e
SHA5127bdd635fd03e0e09d1f7c67bac0714adbe84401d671e74154406e01f67a1d27d1782dfcf92914dc140dddc610462b9fedf73aa864633b0a56e9cafb237b4fab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a985089cab27e821b44a5c36ce78397
SHA1dc4e2f67012d0e0e7db3261fcf05c3468fe00e6f
SHA256d3288676e46117bcea81d5a292180e5dbb3991fc9d59ba2632cbe96be97d3477
SHA512ddbc273533e8fb7fee5f760d0d8b13c02e60f3100350514fd5a0aedd71eab758d34fc843bdb874a980bf106558ea441d773d9c9597f12a7a41922e325e5b4c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51719cbf275d755b9b75bee69d9900bc5
SHA11c7bc38167c986ddd64eab84d7ee04bb5607fbab
SHA2561653d6ac31bae283e94e8c23c981545a5bb9c0189b8fc408428fe706f5f8d251
SHA512ae7224024437b7eb59a6e1d5b086cb2209ee05046b0b05e3c69ceb9d7d36f847573880d7e04fd3d25bcde7bf581c7bb310b02df6e1ea6b852fd302fee7d795f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495000cf66b2a7751e60cff4b0b55d49
SHA18cf617faab91a96c5a1f115e07b5f1d7cef31dcf
SHA2562270b4ec2eafcb8c61c50c6582eee99054c125d52e85bb88af388674171993e1
SHA512803b32d9db8667a1e1ac07b8c44077af5d3e4ece24e3680c005f03229941cbf7346e7721502da1abd7798ba0790b02b51bbc9a162a8f87c81f239cccc80a9f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c856daaffcbb6d6b88777f51ca4aa847
SHA1ac5728217c6ed0bb682c79c6431b7e12ae00ef13
SHA2566a467e416be62f63fe87f7df991e461ec2ad7ab1215bc3eaf16d5798edf5247e
SHA5126757aea256fcd5cbf335fc0bc573476cda0c01d7db0fba8db88eb898226f3eb416cb484896d763a42e605961bd0171bb99e1b5bca1c9b2c5284699e3d37d0dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f26f4c4083fddd4eb01e800cd59504c
SHA17a4b46c0c7253f17f586f092b92931ac4383a548
SHA2567dc5d4d095d854a87ac9bb0c0c79d08166a2d2b304ff471915304706b31715e8
SHA512657589e2e434a58cdbc110967a582503ca3b477d8655ff691e98a97ba78ab0cd40991ac5d9f15bff593396eda1cd0898e6ccde02b36769588f78ddf82b0ddb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d84d7e5106ae7066dde241879c2470
SHA119370439a5a4f31dce11c3b995d0ac4ca6404075
SHA256d70da84100988eefe30101fc8298f56101b4525a42ae9de1152e77a24dc5ee80
SHA5120de544be41041bdb16aceef7c74e3ab71291dc0dfa1e6bc64eb191d33fe4c6e811472923ea41474905a40c3b15044540a9f93a45a2224346379b726e0773b2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54447991520fc5949b704bdcfbb875c62
SHA13e3d3bf6ba45d781c285efedacd166e00c5169fe
SHA256c0e2b70364900d168c22e7614d96bc02ee072c0e9c884b96cadf036e01247fac
SHA512a6ac55fda6ff1123876b58cf16b6a002d1daaf68756a57c7552da7092fd251a5a11eb4390cabf9618d5042a077407e4e117590e2f2da1dba1968059e45ff507b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df21b788f6484a1c1fc0ebb07394de8
SHA1d731c5eaa495d5c36c129f482efdbfce9a66d6eb
SHA25617a19304aa8497e95755992adffac185a38a87fbd32b713c28f79a0cbdac2a9a
SHA5124a7918abdb147bfe2fca26a21bbca23a0d1e451018b492b8c0af6119f3a73181e6089edd2c91f35a63015aa34f225d75266bae60af301c514b275937bb709094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d37e96576391e331990e22039fa31a5
SHA10aaba4f251600d1d397189a4e52ff70cf00c5279
SHA256316e50c2efa3fde923af9eef2bd282adbbc26124d50071ed84753c1e0d05e214
SHA5124939ac4ac5023d1e5ccf61a71a31f613b4162b665edc48f7607e2f17db4e2554d5353f67210da36882cd2ab7d242db211959742eba73d2f07e1a4e248dbf5822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69d2e742fb733b657dc2d3f5d213cba
SHA10326dce6b2168e5a8e096ea593f6baf140638244
SHA256e4a4cc04e82c2751a4e6b0237b975267535dc9d80343c06a513dcc02aeb44fb5
SHA512c2b74426299c99e22b38415d3530d4a896cef84f05287d570d0cd727544f4819a70be435791c65fe91b2abf9509ecbdc9413e940296ed0fef39b83696c0ae346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc47755d1bad95492cea52c6e1615d06
SHA1327703d9565e0f5eafa7ff23dacc73303192b77e
SHA256b65e714f3733638d889b4676fdd514d7e019cb262c72d7cf105ab0069459cc0c
SHA5129874c534a50b4aaa820968801c65a74c2e5ada8a616130a23b690a5f9c240ef5bbb65a9f078edb2a9b12881dac0e6cb5655fc4e4bf4aaca87bb0a3f022df54bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578684a29edaeb26e31b39bd0c0275f9b
SHA14c9cd17f76714498dc5b0b511ab8c4bfe03fb5ec
SHA25627c737f7e483526b202d8ecb1fe8da85ddafa95e7faa6ec989959157c84885f4
SHA512bbdd051295ceb63b5414cdcc1477c51251c31bd5578097564d72be9508a47d5355ca0868f0208de8ee7a1d8a46806b5c11b640e7734cc8e94f6f84c19862cc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2b31cfcbc22b70f7c6f0be38731394
SHA155a50f8eb864f0d51228291eadb79d33bb84e6e1
SHA256851c827bea1ddc81f5de4670d905ed2061c1e6e2e672ec4df05aabb35c762d81
SHA51294f9910be3d065c6576db3b15ff51725db6c93c9cb2820b2e1c3e3b75898e244165f8a679f51c27c25ae5997115ee9b60c207f98a6997bf93ff8532c38d497b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116437ad1482d30cb7830deacf7c5cfc
SHA1480fcf973746f42fbf6bcb0dd54789fb37abf6a4
SHA2567ba37377baf13ec232a6512a067377e5ba1dad9b44b5f655a5a86b08a88c4120
SHA512f30ee198d54e00510c3239c3c808c9136aced7bd62ce753ca1351c91dca511745d5dcacfddda72f3c1656c2b40824536642977e074f5e2fbfd06c577da58224f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2339825bdfb403781c3a8408ba56332
SHA152667231d5b1d74fe8c2e14dbd3e83a0aec29fe6
SHA256bd38b57a3973f51372015a64b34e5587cdd1ac99f06cefec8444f212739d1f22
SHA5127a0acf2d09944505dc2103fd5f5aca411d373acd9642bce3b35e13de14bed571485db1ebf0410c0cb65fc19052c112fc9ad6e69a9c8c168acd571bd544fbc5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59522c30ad7b135acfc8c79c8aae8319a
SHA175fcb03297aa20a63c48ed77eb2391bf3d41fcdc
SHA256fb233df4e4a6cb54345c353c9bdc05a22c8ad26ec5a10517dde010766560ea70
SHA51218839b356cc0924cecf991dc4fdfd2517b051bf6993ddd5c7ad119bb083ddaaacfb3a6416092f91e3641c60926bf831744e711d86fb8e218ecbc1bc91f6a8a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a18d2a353ec48696087db5844484db
SHA18caaa33e69ce1469ff2b489e7771d614750d835a
SHA25666d8fece7d41b1061d0510a7dcd7bb4cd48e1cca6b24d6310272ef1222849918
SHA512dc849a9c2c941723d235e1d58970d04a14b1c0db50e57966a9f54116420c05bfcac3ee212570677f481a7fcd20f2ca43c28d98392775ed07c1c38b65de127e58
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b