Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
8f0bb6994ef69cebab942f9cf600dbb2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f0bb6994ef69cebab942f9cf600dbb2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f0bb6994ef69cebab942f9cf600dbb2_JaffaCakes118.html
-
Size
8KB
-
MD5
8f0bb6994ef69cebab942f9cf600dbb2
-
SHA1
7ecca0e1a0b96d6760ee80c4447c797fe83dc1bf
-
SHA256
5afd7cfdc1018a0a15e61befdfbc43901d9a690337b63ddc0f3e71e28efc040a
-
SHA512
52a242535a2fb3a5a36d614f1bbe72574168059124b16f837e1cf39a8ba874ef109d729ea100dc19fa2366976401c7047428b903c587483d47572088f9bd214d
-
SSDEEP
192:9B9fo8tgbW2ZWEMJNj8wqocXg98OnjqJUXs0:9B9fnr2Zajnv40s0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{548D04C1-2110-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60220a291db5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423515816" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d687258cf71cb124febe810cbd648957a125eab05e16f6de853384b1ddad1292000000000e800000000200002000000073e28bfdf47817338a5b1939b904aa747940621595ec5e1ca7eb44821c4e949020000000aad981c9464088558851563f37791b6d49b526681eff6512574391a0b74fc55240000000482cb3531b4fe10fe5fd8d0ba90b515abf446836c6a86cb26d9ba23a0ea1f14c5f480d3baef3519d9d798a4f95892166ab26fa750df507aee3674705363e2c6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3024 2972 iexplore.exe 28 PID 2972 wrote to memory of 3024 2972 iexplore.exe 28 PID 2972 wrote to memory of 3024 2972 iexplore.exe 28 PID 2972 wrote to memory of 3024 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f0bb6994ef69cebab942f9cf600dbb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b92a42384e6723ebaa3f253ef93d7dd
SHA116a2015265e1fdb6f85f2870e64bd237d7a3fda8
SHA256555a149f9e6234498f516a646b1ab01a735cfae328373b734d29f11b6898b571
SHA5121666ff8e494c61ce97da548790d7114d1bfc745cf51b6b6291a1e2396f8a741cbd846f2e8f4223ec5e8d5c398dd91adc0d2eb98472b6241bd96dc9ecca70b981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075ff5a626bef8a001d33cd0319080dd
SHA198ea513a2522b615f919451ae9cc5b78bf6fb8a0
SHA256b112e7b5661c05ce864c5156c846e316894c18f93cc9ea4590e6d1d4cc64a80f
SHA5121ec71d2c322017833611208c8c0c143d266c09a7769bcb8ae3994a9ac16f405a21720e2027129349ff371eae24dffeb68310c8fbe4f753be07ee10d8a16bc43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b49730b93dbda3be28406f731f3da1
SHA163eff36aa308db6e01a07245c07ed28099df9df8
SHA2562b1d30af905577b7fc875e1a4bdd8dd011fe0e558f2f17554a38045b4cf3f4e2
SHA512806c6062640a8902344a3809073476c125ba62951347f210b866253f2a897742627459e2a4d2a7035e6df4a0658c4a57b7a784acb8c7ded0d3ada2854f728b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb7a637fabba8f6c17c01296443f4db
SHA176bdb8afafd6709aa4b4f5b921752c114ab63499
SHA25694889a4db85f0c9e0e051e3700f056adcd9d8b1e31d9707a51611027bef4110c
SHA512ded0424f5c355b94f11153ac9b8ba94051334646c87380c44ca5ae6c50abbfcdd7e51d3372f5ab04c296b4adcb3cc02333910dd1f9650cf3000ce09889c25dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb88aed0312b48312a87eee4d1271ca7
SHA11902428ebcfcc46f6368b16b11ad0524d7e6677a
SHA256ba3cd04ccd89a1b1927aa31082730095fdeaebf721038b005c066a550567bfff
SHA5123a219db3e90d6ea1bea88e78aec2e7458b21b95d6fa68708f7dc87cf3fd1eed8475ed552f0197d7fb5c4c1747eb8cdfcf474aba31231e8da56aa8d1fab035ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e454b5207beaa3d5a4bb8b744aa9528f
SHA160a06b670f1020c66fbfd177e4ddd5c144606980
SHA256d1dc42b3fe1ea691abd21cb2028c52c48a5f4da927f185d5b7e67e2b2f09e602
SHA5122bc5a9df6b66894aed876915a5688548dd6f2da7000a2b001ee5a47888e97ae53e05042ecc577ffceca72208a9056abba19d1c76f071522765f43fe1bb13f090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56220760915676d607f584d33548094cd
SHA197fbfadd1b6d1b50ccef3f4777765361154f5e7a
SHA2567164f096709cc77aaae428b9f064eeb196449bca5202e8a69f187e1b3ae5e91b
SHA5125ddd1ef60b8582ddd0ed46e6e26d46a70cbb27bbd422c1d209d6f5710113ef7a6ef36484fc5c32360e02c622f8cf68494e89080c0ee94e1ad4683690c5d46de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc409d9e9865656ed8d6588e1b29b8c
SHA11df27da7355ead61fbad24e475b6eb74f1265dcd
SHA25648abcb59921afe8354f35d9dc5e04a6e557aed5b4fcccab7ccbafa3fc9600dfe
SHA5127b066cab0a4f20705aae609402792c151c13da8d93e9acfa4c4fd1dba8ddfe7df59f06918c7d3131558cdee46beeb3f466d7414f1f89995d8916f586b950d4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56477577d7fbe6459cebb7b5ca16511e0
SHA1e17e737bc1951369bb66a3d950116957ef7ac875
SHA256db37b3116a8366a290a17801ef882cdcfd42a93fff3fa30b48f8af519207bd89
SHA5127d1ee9e9d45e680a4934f195be94a0df667ac8fd40c5a5b25463f757f96c10504c9c1f88f4b9a3c4c39b09805b76e18b7ab0e0cacdc774d83a35c412fd047ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff8b455b699a1031eced261cbe3b695
SHA19b316448b66ae939274a7ca091d4378b7b4a1b02
SHA256cda26c31b118da4e1e1fb84adcb99abc9b2eb0dddb8a476a11bb3ba8f28bb4c5
SHA512a776cb9c96470796946ba537a1fd6eba23605399ce6465aaf936343560ecbb3bbffebe208cc2fbc77bf168c39b07bcdb60b1983f0049f57fad191c442e2665a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713aac7315338859c711cc89696d6415
SHA17340cccea4b7fbc16f3f66101aa236ec8a4eacc0
SHA2568ef94abe1e4c4ec0ebe2c8c4d62297dec7611c6470ebf7bbd7aa53ecdc1c1a90
SHA5124fdd65b9f2ca280ebfe6fd5ecb8064c44dd033c65a55afbcc2c78dc22b6d47fa9dcd40218619474bb668a735baeb9bd0e936f840a0876a4beab824f354c98d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3638f5ca5828bad577e12ee734b967
SHA1ad00389870df7b97a618667bf871ad520106b115
SHA2564db2692de559b1c2538fa8ced0e6593f2552502ee8a4d7f993fe4a3d54884510
SHA512ac64c0fe4a22b3b6b31ac490325077f9314d947aa26cbf508a14e81c747611d357aadf7bf01f802fe393d63d0444a412eef1c211260dbb3af415d316a6520bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53832a5494c49c51c8b0b737bcf7ac68f
SHA162b32362bb1eba6444ccdddd1bf507e09e302f95
SHA256787d2d62fdea527ee905d8a2ab9624f5ae665c827db0f3c638239fb7fc2883c0
SHA512e06d67c4ebab9f7fda88528b08298bd8279f968ae44b9bdfd759c5a114d8d64fa6a58d1f76cdc72ce44c28869f1f0b4568b84dcd3ae590048c3e5fda688c829f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db241d1ca90302f0eb202cb6c22dd6f
SHA14e430cba725b2ea2f03eeff899e1007202e9af29
SHA256c9e844fe576a8d31b3da7dbfc44b5a35fe52f25e47fd27ef4dbe087dbe98d045
SHA512f721bf00e5aa8b5d252cf5fe29a1013278bb1db566d1023de266fe998d068c72eb435b59b569716f499ba72c7ecb777082ddf01aa5fe472caccfd9e832ccd0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb311b634965d94a96077e42c8a1c90
SHA145a6ea363c7792b8b8163451af72977fecda9509
SHA2561947bae3196f6da90d2695ecf0b35050001f4fd9410c95e55fbaa6dab57bacf6
SHA51215ab93ba81edbff8d789ae44681cc38cc230594976c74b69212e3e5d533ea7d95e08c020bfcaba6e44f1cc9ef9ae120f1a2ee5cacda6b0ba93a657aaa61e194e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37870dab697c42ad19a7b91fc51dd29
SHA18bc140ec5b3493c9383b6b461d9bff23a97f8c7b
SHA256bb00f390fa9fd1adacb1f44fcd12f8162a2ff3f01dc5e6491e188fe1c2f51b4c
SHA51293e7c7d1f7023d177640c430c3d436f75ba40816105060f34954bdef790a93803813d9deea6c74bce83d430c032e9f78925ad2e4ad880230861943380e8bb539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262fe2d9cefeb2e6d09f9a6d412aaf2b
SHA120f575b9a592620acbd18f13e6be569188475bd7
SHA2568ee850a1e187e7ef606af1f1eeec838ad9786d8c915b53327b46685d85625313
SHA5127c2f4b03dda9c48df9f35464a20a7e53146deb9a64d217625fc917cef9432e30e4ee5d4a8613f4b9a12af87aa864dc821cb1255f5d7498617153a391d75e4cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50848d6acb07aa807e39b95b2356b0a42
SHA13decc3c9161d4ed86fff3a7bd186dd91b374e423
SHA2562ac8fc0f0e5e5dcaa07f33773b3a87c32d876eecfa98076fb6547850ab0d8431
SHA512a699bbe664364244ee358d8c0858f6f9588e87a8cba08619a7a6646618fc8837918cea35fca2b4d641241bdaebfb165cc89e1b08292cbc69f0087c4b62ead129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517688cbf9b186b8fc4b2a9d787c020ae
SHA135a3b4cf3e321e0e35b2b49af778e5848400a4f9
SHA2561454d6b6c0a8598973df156b2246f25f7a14ab0b00643d8d9bac419b4f69ed15
SHA5126a29be5268d200e6f82576608060ec5847e6d70dce6fdf0414bbef5e7519fcfa8399dd52ef976b84e3cb1b910cd955acecb67721cdfe9e43b01b75dc2176ab8e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b