Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
8f0575c910b730a59eddee3bfeb95c4d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f0575c910b730a59eddee3bfeb95c4d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8f0575c910b730a59eddee3bfeb95c4d_JaffaCakes118.html
-
Size
26KB
-
MD5
8f0575c910b730a59eddee3bfeb95c4d
-
SHA1
8d2321ef28203c03e7399c755bc0e8300d1a35f7
-
SHA256
f33b3d9dff28eadb0090e499ce30111eb3e3b7a7f2be684fdd5de3b731d333dd
-
SHA512
549521751ccab0beb31cd5e3934d0103d44f3e162ac1ca99e5a40a2043d6cbee8169282b8a93b6ac8a545ef81128299dbc8f105ffc5ca058f9b469f40d706a7f
-
SSDEEP
384:ZHfUkXdGiwLuBS5hEJe8fcZdzwda9cxFHLDZ3ZhXbP9xubiu:hfVXJYhEJeZdzcDJ/bP9zu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f3c2d6613a3664eb535f6605971003300000000020000000000106600000001000020000000f84913f0d83755b66ef04670dceeb39256755dd97fc7ab5c1e8e8b65309346f3000000000e80000000020000200000005928c6ff017c753a507c22ee860ba6c216ea9c555af203d5825a683b4bc31aa720000000ec7b883f6a0d3ec677b85fa0b124bd06ac1dc1df9e298602fe1fb360ff5adadb4000000077991639561b2b38332016f80961d097425d94c7fcd65c9b6d6a69c9001ccc41a7eb9fea82157dfb3ceeb45074b316fa05586a9015931d1088dfdd0120cccf57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423515241" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD3D1441-210E-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609b8cd41bb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2212 2756 iexplore.exe 28 PID 2756 wrote to memory of 2212 2756 iexplore.exe 28 PID 2756 wrote to memory of 2212 2756 iexplore.exe 28 PID 2756 wrote to memory of 2212 2756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f0575c910b730a59eddee3bfeb95c4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce27303f94a8e9e720953d6d5fb89d7d
SHA1663c50fdd113ae5a2b6c655e3809100d32d511d3
SHA256fc39ccbcf290bb2c58e8c4ddced4cf03356527c84e38bdd15e2a1e6e801b75b0
SHA5126853e4c6ab5b2dd4c7379b3c4c00f92a36fbb89c40b1f63989f12a06876849a558a189ff8a80dd5d1ce898d2d26903bc8c6b7a5d9cb331325b78f91e2e1c85d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55251fe4488cab7eabc6138b62099f60c
SHA1af7ef6e9b30dc6463b957a58389335a32cfc8bda
SHA256eb983fb551fabeef4fd2b765b0e07ce9cda37134698dc2f9908115152f6e723d
SHA512726cb6eb51bfab5f6f4ee60158db1e9bb8886488deba265447ab60fbb774c93d8a7b6067ea9bbcd3965d50144e89c022ddecb0e628abbc92a70ca0325a0024d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f5b44be74043b1f4cd532d843335d7
SHA15b065b51684a9424ae428e6267f4abba15cd9474
SHA2566a9efdae85fd4607e3588399e5d9f62c5d49c56c8f9fc07b6b228c3a6b66b7d0
SHA51231ac44d8852b9a2a556098ea8182fad671e378b172792f4f42a7fe539a01e475f2a77f499ec2847ab20097c7bb18c6d3c1e02b6f156f523e73badd54909b2079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596972ff17b888aa62b58fca95a049659
SHA1a2466654e029839df8f71a123416e53373f0744c
SHA256b5c68571e09166e5e53a762a7cd91b5c5aa1a81cb4c08025e45c25cba7fc2c83
SHA512d7308b19af39e8392d3094b82b95bfe2d473afff158d683806ff71c5e8b586d9df2141599d68d1823c5c3b37d8bd9b6970748ba7bb47835263e6b552a6d7f52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa23ad5434256a811d5f917777b4bc0c
SHA1ee50a31eb4d65a968a14903113c5627122b00315
SHA256fbbf813100e28b0a83c92d30beaa0d3aed39c5ee718bbb3826d46726b84a3dd4
SHA512e72a76e60d296d8a6fa4fe9bb18da5b331a886cd3ba4c9ce0e11582841d6727706f7112315ff552d980db86a4a6caffe7e97385ea1dddd73420f9f6c8334fddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df131fbd7c8e372ed573a970462de67a
SHA16af361ad0c12133048d6de68173541b6d03b6147
SHA256c172993f5311f1c3847986b8916a5b5b59f4e0b32e7bab55197bbd4beffa98d4
SHA512c53d1cf48656d4f320c9a70383a50a433bb6c2b322e9097129e7fb21053dca546bb2ec84051b66377e64cab2200d67c9182a9d0dd9cc27950b0d12ff7e5abfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f14cf700ee2b01134861bcca159d9f
SHA1ba82f8da376832c116ed644db6442e3e5211e7b2
SHA256225857834cd5e0eeb4ea2cf19bddf817dd62ebcabedbdd4e2cb501651cf677b9
SHA5120d95afbe6da1755967275b22701e48c8081c7542d6edb77b7fd46f28b36bea2b4abddaebb57df8b9fc2bd811204747eae3a387231bbe8f35bdf3dd36adc1f8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e043c19911a4cc022b632ae1ae3d98b
SHA1c31932bad4a10485052799740c0954ffb6494188
SHA256e9e8a78fa4d43df18a80d26a917cbf9505259afc69f8d7b43f5d221b0f99c3cd
SHA5129a6323a1fa0b99a7a8a06f6137db01624b0be3e75c127901ce725e785f72e6993cec448e7120a7e482354e845054af69d09a1bf9705b4fff0944864b52175765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6477dfd9ab2ab7bae81c81b4193010
SHA19de311490db6e7c20fe7df223351b3bd229e0ed1
SHA256d9618857c18eac87c279dd56124d4f274e4bc38e2a6d74e80117b07b5765dfc5
SHA512f148f5891e62c3ec979beacd8ddbc588e14feec164a0766ab8e54a2c5bc9c07a739f511c6fc26baf2da730973cce87e8f49ec6347ba1129f0c57bab536d4f315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3603c539ff0f1b3bcc4c93fc53f13ce
SHA17a5742b2c4c2b1d665d9ef19b3e4d8fc09db3903
SHA256098b3c4a053ed75cb13353b97c71649b491a20f5bd79ccb5642bf076c230e642
SHA512c14b0cb0b8a1ec7abdb54f1e4e8266047410c7120135a886755d31ddca6c742e6177c17752d37e1b8894efc457a0c06419c014f343b6ce3b9349ec254cfaeaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822b32d4e48e6d7ebc6aa869cc9e7124
SHA15a71a2c9a74b4bf55ea6e616a982757826dfe229
SHA25682a7e2c764911b2afd6fb857c97e993aa1f6370b8eeffc24c6e2b51c9726421f
SHA512747e5c1dd22ec567f1b0bb7f3e4d0d3d72c4de2e012e96faa9211aa9745d399c5a54169af4da6aa81a5797e4916294f7dd0558e360ef3e683cdd22af51468688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539129f9416aea6502ecd21194481d19a
SHA17ca40f28a6d9742848f63afb8297d55fe4faec14
SHA25683f280ee8859a39d6fab17376286e4e5bbc03c395bf0e402be6719503933a3e3
SHA5129ec7b42f4d0fd4f2511215bed5c62f1365b2b7c9720feb72d0f451cab2a83e5ef643639e46b2961affc5e9ae85e458b322d6c50bf1cbfc3ca5262ef55d7744f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6947c9887d4c407dd5f1c106fa4879
SHA15d78d537dfb4f5be439ece25611c3f47c9bb0435
SHA2560055b8724a634127bf3130c53a136193f86643834c39c66a9a22d408f3c27ba2
SHA512afa7792d26ff119b0309821d0779153b0dfd62eba3e02df513c468571b1acbd65f433a475c35bc97c81d68f908a91631b77b1db54e656bd3fcb0d852e65150f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574674d289d4acbabedc3f80e5ecc3353
SHA1b545b510ef3638b1a2456721798d0410c0388f39
SHA256a2c321253b2453e6afe506580865570a46848ebbccfcd4f48fb428046758ae80
SHA51296e38f3953b39068b77e1c813e06eb9d448da76ae52a0eaa52e80b6fc430af19f3268277218275f67cead4daf5e0183fe9606ada84a615e3a0d44b34877f24bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b48ac5d9ba7b85b50d976e7b005199
SHA18bcdee326d5adfad2231718cd9516ae07b1273bf
SHA256b8e5b098721d8fa5efdfa08e3fa958fbb752e4c6a46a7855ea1062ece935a150
SHA512e91edb797165c9419a5f0f88d96a09aee378247151c661d7106799241cb379a9280758aa2736905c8f599224216c6261d966e76e523a33e613d81fcf4d0472d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59874aa8f01dacebb732cddd29e33e385
SHA179a067548ce7f1d43e422fa7f09fa2209e856cdc
SHA256b4fa7a3beb433783acc087cf896cd6d1fceeb14082ef8dcf6342a5ddc0cad1e1
SHA512254fc06f2b50b4f9435f459479108d40fa42fae0c4f0dd78748c7ce92a333373149dfda67f4b9a5cca030338229f358a7d99aef29a54cd33ab7324f880829099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d79a8108918325b81d78d65e9593ab
SHA1f64d162ac8490b2321167e9d5e65aa78b3ff581e
SHA25648b5e295970a0868b3c637d97395ef8a115621e43f7749e47caae114b23a924b
SHA512f6b96ab8a8cb595abfa8b8f01c4757228c5bd2fdf65423435f798a6cf53256c1a63f4ed3e26251e4d15e5fa247227eb57f1386bdeb07f93c6471ea4cf0de6d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542089c4667e844f5ef18adf33d103739
SHA18a8405f5999c63b13ecda5ef4fe5662516a8be59
SHA2567a42b8b9306ea173084189e31193e04bfc1fadc467fc9b455002692d59b8393e
SHA512b9a835bd3ae7b653f788dabe18505d16a893b1f6acc84dea39761a0e0a7e6d966de9bc0c0942bfa632c238b7537e0947e5771a4d34f5e529290fdae756439aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655c9af6fce052b10a78c24221a3d807
SHA1b8b6cae74b3cef476486c16da9f5f1485cc6bc7d
SHA2563ec71b6a26c42db867066f1085f9be02c88d85c36de481eb0738ada048f97554
SHA512bfd26b09cd352ff3cf2d68ea65d0bf3c2155c2fd13ee58b98febf31fff5e32e84fa3578c9f1c043919830e2a18e0f3323a09e367fb129b60953b35c200a5d9c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b