Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
8ef40c6875a10357f78fdb8d21d73318_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ef40c6875a10357f78fdb8d21d73318_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8ef40c6875a10357f78fdb8d21d73318_JaffaCakes118.html
-
Size
32KB
-
MD5
8ef40c6875a10357f78fdb8d21d73318
-
SHA1
86b4cd8844945057ffce828eb152fa49685f0eb5
-
SHA256
fc8952272395f6c23d3b440b0a427e6068c66736ff9d2bbef11f583214051bed
-
SHA512
bebf9324b3608933542fd4ace0cd21bc3adef40ed2cb5aa1af0d39167e2cdc41dcc8d564a0c38292f03a7c7cced813062359aa5d8c184e6a43affdb68d2f9f9a
-
SSDEEP
768:cgMMc5QcVWbxxeNF5lx/mVhwstwKMCfTHXXza39RzihDR5vhnM5cNa:cgMMc53ySNFp+Pw8M0THXja39RzihDR2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000063af882c8a3ad2a45f4e27a200b9d7c032040a6a71b7fa64cbb6ad1517d43307000000000e80000000020000200000000c21af15651d6ce67cc92f66d7eeadee886a6acec3a7f3320afa5b7424dd94ce20000000f912f25bf90e35bb0ce2913ad6abbf3573f2c11730ae8d8f24740ed8407be3e1400000007bb9fe6ac4b841ee6353316f1d3cb3e71f1ec7f7b1a540349dae43e89d21c11b94b5a49104b61776363e9c7b94aa34878891f2159ff528682bc93d40448a0ef5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006ed705e052eeb76732c7394016de3da855eef4394e185ec93c9f98246ebd6161000000000e8000000002000020000000550060147be29a9924118f19b159851c18ac5d0b4a477d71df98f945ed1c5ff790000000443e52d39496e85ad2fd8477040ca59e67376b72512c1229f2de8d19ee736f210b1f3ee8a3c82b2a544744bec5ca8fb33e41f6c730f21ca8da11a5ac5dae6efbc18691f42a20cea7c9c5cfbb354ac0f831bee3d9f45b7b9d888ba1a1283e40096c11b61fd58ddc2f7e6602f260f86c74caa212ae9fad6f491b09b4868ea32d9fb8652722ea4511582cf7a8c3514dee06400000005d8649ac8ac53d93ace760f343c8f6b008e4e1e180da8f81c7de1ca61f62343d680c2a2ca370dc9ec4f7257c509eb716448b156bc15b74a04a3ee83953ab904c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423513508" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ffeee217b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4D3A7A1-210A-11EF-9B88-D6B84878A518} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1716 2168 iexplore.exe 28 PID 2168 wrote to memory of 1716 2168 iexplore.exe 28 PID 2168 wrote to memory of 1716 2168 iexplore.exe 28 PID 2168 wrote to memory of 1716 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ef40c6875a10357f78fdb8d21d73318_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c9685046d4bfb8d00f3b54a1664543
SHA1b2267094aaa1e04ba29b78d2bfebe3b9102f0e2d
SHA256d4588b89ca6e081c724f14e7e5843f738953550e215efbe4669ab922b209bf08
SHA512e39147e778dff0c5271f4c7fc4d5b2cde41ea17ab2c8d02897a42b4c362eeb84cafa9e28060a538789248444ec3001f0cdb31a9885a64f3d13ec0e5da23a70ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b717d454c05a93ce1b02692465293d
SHA1568ece807ffcb630ccdab5dcbc33dd890a188549
SHA25602d0635f9b092f09668edf2035c716d4bf7e8e9e3313b1067657160569c63d5b
SHA512fac2eb249ac5a278b4dbad118ec24a537271a9bcd9bd2199294c62dbf106f5b4688e7bd1c81be19506d026de7d49614d9560bd1575143654f51aaf52b0d95a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0a87f98b58e9d88b94e7cb447be23a
SHA1d2dc6508c41707ac41b63c2d607004578a8852ad
SHA2561e6b0b0578354ad5ccdadeee57277ed251d332eeb88fdc5a477809abc7629d87
SHA512a12a5c5cb5212b439b441fc432c262e53088366ee2dd8cc8954670097c260cbbe3ffe07e586f719edba16dc916b497d4a737c107ef96abb130e8439b20a97c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c73fde9113506369c68db985a6cbe3
SHA17e664be0c08fbcbd966a7691a663822975b9ee6d
SHA256e400ac643fc025bed0ccc1731b71d33112307e8df23076f706ca5656ec18d89d
SHA5123655a4e7025a90f3e36c75b98789789b2811dabd347eb8b8a759ee2edd759d93f6bc72d96e6c0e4801287304514746897b67aae9ef35e0c93d3851069d9496e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58873174f259d1b18afaad272fd9f5869
SHA18fbd7f9d88488603f3306912023428049ff077c1
SHA25623693c4c222352ee00ec8edc3999eeba38348fbc6d9e0c26899f306b72ce8eaf
SHA512b4c7e52d74580d122102e2cd682ab1652eb45729ca2b4ce11c93fc164ae9ca73323d94e15ac24fe152a0c24dc58dce566497a4a58594c144e69e83a4542bec85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446c85438a67964181e423da8346aeab
SHA14108da91c7e9fd6f738e26e905231aae0322a1be
SHA256b8296434809691fb8ab039695febe66a96a121cbc50beec8e0cbe7b36f65be65
SHA512cd1720711a4cd423f944eb6470a54cd4d4320da19445616ee9ccf6f4fcb25da7b75de2e63e6ad3c8f9fb91805262529440c1a0cfdbed45c88ce31ce3c77fbbe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d5773df832437a6e91ef173a41f311
SHA1f60092e9ddda8672fc7f44ea227d527120a4e795
SHA2560c7899e114d142220a79a7034368425f2eac9b3ddddb089265cb28504e7018eb
SHA512c14c12a2310ad10b284ff32902ba0f784ce2cd9e9b60b1a042a3946740e8a8cf90904cf387ded4a4b771d1863b610e7fc140fc478ecf999486d495f3d225578c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57658997ca3c44b0281528ac11dd967bd
SHA1e257f0fbd38628573fbe1d9b91a6bbee10d69ba7
SHA256b15428b61491df0a02369f4b894c590ba2558b7e2624867a5a06029784ebf025
SHA5127b7fc146a2d7cd8307d59e74d08c7242edf9438a4944e2cfe333aafad79fcd78066111ac9c9ec594aa70e98b02a2d5295b85cde454c0a15ba135767314f5be3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df45086e8c8b8615d0966cf18b59f91
SHA10e0a4beb8d3db8c16ccb954d940ebb47f0327f3e
SHA25629d83c8343cc9e973261c0a98dd2c47b28d9644da9f02dfd1d445f13a245046c
SHA5124b7b202c5e6f82caef91d908dc2804fff81ca7879bdcecf478045e4734bc4379a70cbf65bc30f699f5afd864d439df851bebe3d8772286b3a38e4a3bc0a96e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f11c8c9e5958b94b57b4fa4a1cffb9e
SHA15f4a8bd36f4866f17db0fceba106e24454f70ca6
SHA25631d72bf8d9e618766db8f75a54b043bf62d493641123989f2c3cdc162227dae4
SHA5122a80043869920f7a941d03fd0ea1862a29a0f9dd20cb92b24c8597972634fde7080469f462cb14f9500ed50f44432e3d093d991ae98e46a3ac6ccccfe3e5f011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53313f307dc4b6cf3ebd9a1a603f905
SHA1e01489a1c2759a96ea57342bff296245a3c518e3
SHA256ce004b105ff302afa7d873a19bc0ea64032d97bae0108805971e6c5341113838
SHA5125408de19e54d934fe455d48d664a1c7ecbb689b0e3f74615205eecc4f09f9385b3977ff801df268caf0824082305744286c2bb87f447aa6669cba9a40bcddb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3af4152ba48adee0b3f7b801c12978
SHA136d1c75e11ae28b70e99fab240242f6f0e891a95
SHA2567d8194b109e689419a0d52a7e9b85d5c793db8af9cf2a615a8bb1da31acd1664
SHA5120cdc6fd1dde7b0d9ea056f7f64b832a15471d8a9c306640da9dd481e5b71c1337e36a9db9cde582e11b0b9e9f11c64e1a446bb45b64c40dd768788b32f058ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51316680ec1bfc3bea083e3510a58e08c
SHA115af185ac49232d5d2a3b454c728b42dde4a801a
SHA2564cfc65ba7e12d78e9d3934a8f69eb31954642086a4e3dd3caeda4759eae7b597
SHA51222f6f3efffc49dc618d0c3f99bd01f7ca067b1e9234f3d07f4d429271cadb3893b9881ef61915ed7e50f8269ee3a4976f201a70b96c81bc84f003b77f5289fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db278a93f6ba60cc85e737d169d37b9
SHA19349f8d4279a4d3a75bc99425281b3111d1e9762
SHA2561baa1f85f75ae2984ffa26fa51c9063c9cade7c7172b28e081b55adb653d1260
SHA512f5283eb3bb6735ee1cd9f2f689bd4e3b4dd6d9935187370500a0db40a1c0cb3ab554dd4bf38165228b9958ca56e2a88fa321ef5f3a7c75d29e5837c805097e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da327d04fe4bc2e926c61babcf9f802b
SHA1340e9c88a1fd16013515b5b019383e3bb67bd20d
SHA256a0b9fb80f3a23d3f06a519be2c1cbce10bf350b5b1471de50e8841ed9a47dec8
SHA5127431cb1d51d157400a62c5716ca6db99bcb3dca59106c879895303f4a1c01a67c1e51bf879d2103d251942e2d2001d84975b58b93730757e68ccc60df47a6858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa1ec2c8ee3481cffd5eb579c2e30ef
SHA16ac80596595cf05c0e71c32de2a7dae5ffe00220
SHA256156c41b346bf939a15148b24bef9392e5c58459985b6493ec72d414975d8236c
SHA51262e3c0062f185c9ad90a68eaf893b497d9b3d43629527e2bfd9fc53f058234cc6301c8db7f42414e3e4007541aee6b370ad5665472a00c62aacf0450ee8cf720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511853f5e16ff4185d39e552d86984b9d
SHA1a8765edf5d9b6b0f9a63ecd2b2f13af5fae87766
SHA256ed5dd3d66c00b2f234f1a8ca5422d90d77bde424e8c6567252bf6411fa0545f1
SHA51263b5a22de0507f582e7f1c62593465e164eb99b87da819cbdd5acf5dd10ea9fa3630c431f7696a8439495ab5a222f4225edb83a4c57a89fdcea606f322de1c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3df85827278b47ebbde6122f8f8ae37
SHA19aa1e08bddab90f22dded9ca2d5d6ad825d94245
SHA2561598beed59c36be552fe4db77204a1917a60e58f287e6b58d4a8f4a443452fea
SHA512b308d480b3733bd9dafdc4bd8e903fad059296f473ac336b977a62988c4dac48b0d390f9cae512da0402acc62ddb0194c519f5fd9b678892c4fd49d12f60e625
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b