Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
8f682c9ec407a5a6824afc85d48b427a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8f682c9ec407a5a6824afc85d48b427a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f682c9ec407a5a6824afc85d48b427a_JaffaCakes118.html
-
Size
73KB
-
MD5
8f682c9ec407a5a6824afc85d48b427a
-
SHA1
473a2736c8596839cd94d8ac0e4bfdd67ff4c710
-
SHA256
1cb2b80a3bd3eae50ef5d9fc022916aa030f60bc36fbe53d8a28ac786517a58e
-
SHA512
985882e4aeb44b927287008b7c3441abed2054d8a1dbd4510d08621da0841699f1b78f7caa5f4fea813e8fd7d66d5885b12689c87adff0e4c494a7583e232ad6
-
SSDEEP
768:JiugcMiR3sI2PDDnX0g6saY6K6GZwEZloTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JCesJiTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000017977dd6d6ae324ca5c70a153caafbfc000000000200000000001066000000010000200000001dd35226f61ebad66a40114f3febfe099a198e610186c46a6a63522bb13d29a4000000000e8000000002000020000000fa24cf8524390620a025e89551045a21e621a06ce538037e413835ef771509fa200000009ade9b87cc4b62ab156b279a805b4dd02c693bf95a72b971f8a3618458136a954000000065cc6104c62b69dcf9a1574e68ae89d2c035e634c6486dc604422be4b4c5aae459247b359528101bc107b5b34e936e170944bb6c73cbd0d247f136ddb812adb4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423523954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e6261c30b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{469E1D51-2123-11EF-A296-4A24C526E2E4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2936 2272 iexplore.exe 28 PID 2272 wrote to memory of 2936 2272 iexplore.exe 28 PID 2272 wrote to memory of 2936 2272 iexplore.exe 28 PID 2272 wrote to memory of 2936 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f682c9ec407a5a6824afc85d48b427a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134e248b92e7a7e1d57279251f342534
SHA1b1551fadb528ed876659bcc6dee57c205c4bcab9
SHA256e9c7a9bce9f0c20f1b8ae18a0b601cdea375759ae65a9b16e63085e6269a90ef
SHA512c591df221747d8b7b9802a1a736d635eb61e6a0b62b0e9d6dc6a39a083d39b9fc11be33112d94c58008568ce1a403043769ca00365acc1bc312245d0e7a1bc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed82fc62d90f359701a940ab32a4506
SHA14921c1b8fe5684ed3178accb8a79acca03a89547
SHA2567599ff7532c1b365ee4510afe93a0a246bcf933550a39a4e1281ab4bf5c629d7
SHA51231b8ce17aeb7ff04345e203f8cef7424a6eb2f3333ff4de4c26bc58ee32be25a48470239be9aeb89786e646d55ec47e91430d03336df59418260112a6da4be5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a0038857998c792a2d260a6ef4375c
SHA14e4debe0c9855146fd2a02fbb279e00a9c379a4e
SHA256545914cd61a54f65768862cde493a229bbac230d8280b95ed8472d3e25369f52
SHA512758c41f41c5d276c32c2b6f7d8d3c28a50035afac02312ea1ca705a5c57fb261657ec88405c563c6785ddbd8f6ed33cdd9e30850786c8d16f28a2cd94601d7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af25e162f40f07bcb1f10515c648eabb
SHA17c838600119f32a68fd2c7a4ddbcea417228b24d
SHA2569cb5d726bf0a60f109b84d0be4c6cb988d713d0290c9e5f65f2f2542ddd50125
SHA512c244d6115852ff1248cbac2f2769ba0cb5a804c30ff594b7608a6394b2d6817ef22c815bc9d768ad8e25950a3abc4874841cd722b69a8c310372c646a7c365ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f3bcebe0a97e47fe19a2eb2739a869
SHA1635c0a0433c728818722fcaf52a9cd45a167130e
SHA2564d49be90461719e66fb2bfd2cc68165dce75f0c2aa0e6642b01240d973dd7670
SHA5123298c23a55a3c186aae69e994fdf61d56cba2911c72a8879888bd09052a32fa5567bfc34378690315cf69499d247d6efd2e924d05f39d81c61e6f679f4f30af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3f78347c644682a4ad40e8128812e1
SHA19d1d06549e0dafc4173706bee813c7be1412dfbc
SHA256463e21c60f8ab6cad12b654d2f4a7ee0da5004cb059418f1b28b6e6c61d524c9
SHA512a4e050fedc9981205fc2e4b119244da93ca0700c73730233b574ad98a50bf1eddf0b2d47ed73269e263076f137b436dbbe89ee84ac0b3b072a2aa3288e9dfef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d668e46994b79f6b5fb095652ab88ad
SHA1c1f102ffc7c90c3ee9b8ffbefd5b62283133ffd4
SHA256f44ca80652d0766ecf9139d68c1da9a47a8988f70ca40b93c9b7114f0e6457cf
SHA51244a3d04438f0a309f417827fe046ed4b68b1b3375d3e1643410885f2e50584e137f016bb0629fcc5173384e0949d79b00f4d7ebf4af6cf2e5f9fd37c17a93b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e1058488cad8e1af7062b66cde1449
SHA11581d364bc15e3d8931eefae284618d593b4aced
SHA2562a97df942c210c090caf05542d09866e481c60ba4372344d0f0db9bc31b5881f
SHA5122da4cc37d78565aff7d4105c8f005ec22b362bcb5e9853be6303464a8a091a091635ad314a8a5163d18eb37f86bd0f0672d887ef3a55c834ab8f70ce02c4f551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0b7bcc11882b0a45e7b9fefa3a0618
SHA136ccfa29f0c3b16f06a12c0152f5d2c6d1dd038e
SHA2560c5045af040ddddf96f7ade83c0b79c41ff05e0b43f815da8835f8bab9497d2f
SHA5120970b928f9e51243cc8201c8d381143b319d6f461e07b495e9d91c9e3307e9c6e0fce59c68e821c3bec4431828cf44e6d72ad76f7e37a3c136b207c499cebd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506dfbcbfc2843b78307a6d7bdcf85062
SHA159ddbbe57d1470de2f18e1b6afd745a0ebad22e9
SHA2565eca5dc693482af25cbba67db4d34573f04ae141b391963eb1f03379477d1932
SHA5126237c1e4308f12d2656319d9a46b3806ee558871bf149e08adfeeb9c02e7b781b50d99104a3cfd153d9fb9037abcd9960ff4842e3627ce4a8d4e66b613e98fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380f1d1be18442a7eebaa80eafc21e56
SHA159af27c06ae7c8c75f18a4dc72604dd6df5e133a
SHA2561d79776dc30c883d4d431e2a19595a39af50b52846c179b17acd6a4d65973197
SHA51291e6c2a61c4c91d19f6e6232f98b0f8064a555bda336eb0dfa47e32997cdea12bc30ef42a92c7df6e696e12c4fb030f33c6fa0f5b299d75809725ef8d35fbe79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5c3584921aae320fd76d553523e566
SHA14121fbb079cca32bd9605d33d2e8bbe795418b1c
SHA256bf7556374503c6aae86b7f0b135c4d31ff3416a8d40ee232daa498b36b7adb42
SHA512bcdefb7fd722f6171d6dde99a85a36218158ca0d4f6ad4c0774d8d795324b9f423830ce29823469b6ac32bab586625ee5abfe07b0c414066d8a4939bb5db0d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea4c8c303912d05a8c5d7f0d96d2e5b
SHA14ee6c80c051af2ec6c5f548c2b949329af8c1bc6
SHA256a8ca83802034c676ec5de57e876e18e4021e15b0fd02d3316422c042df7f6a26
SHA512b1ea5a9b06a46d2511438e933b114959a79652d84d7dfc307cee3ee69ac0a8b333ac1a9bb4599dc1e779e19ca369935145b453db9c20981cebd1cd842aa3c923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cad782d80fdad7e534813dc65e93cab
SHA120eed4f6498145d90ad5caff0636425120a120a1
SHA25610e1421154f598e69e54589f6ea2463f7658420992a4f2ab4dd02961bffd2a8a
SHA51259e54357a9d8d9bbab6d56314215011cf63700866e04a2d33979693cafe56d54da78a8272970bbedce61f1f0b94c1d09a1f565b3ddedeef8c505b7cdcc64c256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f75f8a34f9c5abc0f2f0751774680f
SHA1a7df90d627c48ab9bd78a66113f75da9cba852c1
SHA256e77624021a92e0152adf9ad3f1dfb96d71daee440772d296529a8325774ec270
SHA5126278501bc7e9281efbd3d06667fec76c0ef88aa5b56fdda1b60351cf8f676df633b79750235eefbbed958f9e266f7b1b164d3485f4126ea227c2cd3200b84481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a795844bfe7da9143d9fae797e4fba
SHA10b4293e1debe6d874d2f386fdf68e2cc3ab04978
SHA2561a65f9180bd4e77dd871ddda2a0437ca436c429e20e27c817ab4027b14905956
SHA512e625e7fc1cc34bd3a0964e3f884eecd5d1470961f3d8dbed3fa65db86dacb4db0309a0a35f190c2d3c10a12ba42e1d2da8890e4d9469cde7658b33a29185aaef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9f99f054b01e1668269334699c332c
SHA1458e6c95a14fe499fc9617079fa1d31889c1b851
SHA2565ce056fbb4c325ce3d693d762577dfa1e0391f247e3f84d856c263f0548bbfea
SHA51245d3fee29100788f2af0c014a5ade520c50ecdbefb788008a38ee0f24e17b8552f999359bc96f2d76a27f941016593545a6913d528f06dc9298f8ba609a36a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57174525092e41a76dccaf883fa25a940
SHA1bbc928c1f63def53da1ae4a85f1ef0314eab38cb
SHA256b7bf9995741f3f7cf9ba35127253c6b55d953f613bf70c363e9d26b7f5afc651
SHA5121ead8ccd3362a370098e4ed6e57e5e62bc5957452d75643ebb3805eecea2c19a07558a5f4b6ab6972e28ae51daeb2b856610ce5c81ef57690153f8cf110aa082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d18ba08271e149bd4d957322b4babe
SHA1807b75cddb6b3bdf9df6044879f7cba000aafcd7
SHA256e47ecd1f9080ad03bc20f324060c01ad4b91cbaddfeebcb71a6a06bf8a8fa414
SHA51260a6eaffe048eb97c7ac7a5c87d72cd42ed3c64d9693e5c7a044ea7c842ad1b202920af95868f4663c5fb0e199127fc1a7297777e96226d0e281240736659daa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b