Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
8feda467a440eb4b4eef399078f122db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8feda467a440eb4b4eef399078f122db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8feda467a440eb4b4eef399078f122db_JaffaCakes118.html
-
Size
460KB
-
MD5
8feda467a440eb4b4eef399078f122db
-
SHA1
f6461c9e3361760e102e87b4b060580ab9e0c643
-
SHA256
35a61337811a3ac601a62c4d1528db2d1a33dfc65b67c5f540ef8a0943de2096
-
SHA512
b6bd657987c15d388e038e73ca24af7c149a299892e4874fb8cecf1bf3e5db4eb781c48b0b9098c8d386ee3e3387830f5ae3f180ab1b72a883bf10ab2646a225
-
SSDEEP
6144:S0sMYod+X3oI+YEsMYod+X3oI+YnsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3U5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906357504bb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77CFC9D1-213E-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0bbdefd71f5294b91924186809976ef00000000020000000000106600000001000020000000126175cd3eed562f83af3309c543b4838ae2e306772048ce2b27faede7791e53000000000e8000000002000020000000b0942ac203b7d1021913677b2e7442bee217754719fcdd9a44dd3dc8bdff501520000000ddbb771897a9800c3fb477acb192be7041fe141af257d9daf1d212ff88f4d82040000000613334a9ac666ac9f9ccc654c77967b4095dcc8ce1952e4537a2fefb86edf078aa0b6d2350066c1c248a670003b1a9811d35f4592b56b7b9a8290b95f0d0d61a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423535633" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2080 1040 iexplore.exe 28 PID 1040 wrote to memory of 2080 1040 iexplore.exe 28 PID 1040 wrote to memory of 2080 1040 iexplore.exe 28 PID 1040 wrote to memory of 2080 1040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8feda467a440eb4b4eef399078f122db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59144918e4a85c63faba2d2adcf222c88
SHA190d9466f79f068f51a7ac8da6d38cc38a6554497
SHA256421fb49e125e890551c5e0c5214677345d4b5d68b83eac390e9bb48a4eea0878
SHA51298555b0b72f2c8296c06ef6ccf5069bea6f29bc2a9882962507f8ccdbb84aaa19fcd4c020ac38bb369755e4a2cf8eb5315ae61997033b34af62f7451b742f498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449407426b54f595f3bd248fa7a36be4
SHA16e9781e0e9afdc10b076784955677057df2d221f
SHA25626f0e48e4415ac0707d69770f622a6f5bdcb78b7f1849be0179a479853d1b643
SHA512c3cac08926065cf6a9c24094077e7438ab3054b474e5ccccde5171c57d0713af8348d354b2c55bda5167343913cdfa70930af99e978e3af47ff9bc77be0b647e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b62f0607b198b27553e9985009a209b
SHA1b50f60295fe7153b8745a07f39496e89a2036d74
SHA2562936424ab6258b1ea762856fa5e1e6b5a6e9c0e9a57143329239c200adf3af15
SHA51278975ed05930382fafcc34ea564c344975b74efc673fc4e57d8a13f758eb64e0c55bdfecf728c682d901ef9ca6524efc0f5e4597ecf88e682639569361734ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572af90e9a6bbfaec66e5dd044177d733
SHA1961dd175a8515aa71feb237a6412bfdf1851f4bf
SHA256d6d9681952dae1feefac5eb9c88f5dc9ef06dcb687f6054f238b6c0046d350a2
SHA512a172e85f53ac652e594caa67dd3b9b339ff109c0af81f2b9670bc1ef424c3bf21065be7e00fdb5bf453030db6a7a2c757ccf3a4e21802afd9e31b54a3fb9d095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df26661787d07e236bd379c7e76eada9
SHA1d3ea46dc8e32fbfc415212db8a3fd425073c35cb
SHA256d3e245b852240d7e534ca02e500e3532ec768ae95f6c942631cdbf37a7b88700
SHA512366ed4ba336b10f6b5c59e504590adfe22e49e8ba4b8f0469c405339f74648bab18347c35a1424f8e9ca706d66b9fecfb15f9f2caa57f3b82a32b104fd8b003c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0ade8c43faaf11aea4f3625b72ac5f
SHA16f5133bd350b4abfa36045c49b02cdeab9bc19db
SHA256552e46726536e923f638d4436358bae0a29415615e8c68472b82690a0cb90533
SHA512d55cf11e52244b6b212a74ec7f920f6c0c8c0296e3a526d5a3a11a1aff707659f156078d088e5394460ab88d7749b8fd4b81e6e34b87f48656a06c1fb315be74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6122499b3bd73f3010a71f86b8ad281
SHA1175413eff7e1ef193a331a45c6881be6c008e9af
SHA256e383cddff1378c2947a905bdec7eb083d9210a946f79b1e726abefbb3029fbcb
SHA512b0edc8053f7a6836ad9a224c67fc43052a1d4cac0f833b81b76ddfeba17690a5b9186e4b46d72770d0a55642d84f3b9902c2fc2b349d61a0b79797ed7418b931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c59bdafa6ddae9ac5c13d409cea0949
SHA1ab382900c7e95e7ce50b82fc30eeedd03e63455f
SHA25680594bf99055fb953e7e56a68f7e822ebe9ba00025f04463e003c87a98efc570
SHA512ede470b39034c32dc44aee35bb1c21b9499ca37869f75fa285b5202e257c7a27f1b2825df82db617fd64eaf0e4c37cf08f256c23e2f06afa68dff39c9f32b81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603a6db157ab23629dd2fec466a89d03
SHA157375cab3901fe4e6e60e69ed793b6da6a228ab7
SHA256fefcfbeb4d39983bed924259e8cfd2bb27427c2a593000aba763b5c746011dbe
SHA51225fde67ed14aad30ac708817a30f9f40c538992508f4c7a467abc58dd8148a5bb3b7d57b2fd769cc781aa8a828e743def6aeac59c23ae261b9a2866722091129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d658c9490b4d57c272b3c676d59fffe6
SHA1dd9efc0afee7622492a8264dfb346c98e5f33585
SHA2560d7f07772a0a250fc9309d17fde7390daf799ad11233e0677e74e71ce1910e3d
SHA5122eda16e18a28aa367a17af2cd23aca5e4a6f68fca9e55d5665a5ec8db6c58f305c6943b08f307314c4dad227dc35eaa5a950c909d598926d33900df76030e8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc947f90405f5aab0ac9eaf758ea09eb
SHA1faf881e320ebaae9d2857f2e27c6a51611f520dc
SHA2560690ec5a0558c1b9b57e23d27137676354badd75e218bb674f13f099e634ddc0
SHA5126645a5bda35abad56cac40affbdd88d70f413983a14d232377495d77407f6604258c84f1e0f67e1b2bc67b880e506e5d378b4b4987b9144f4657e4f51b26e611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b540278fa3f13bf5999d1efb5ef45525
SHA1998b483361a5ec7cb2cc1d0cc2db4e3d28c7aa6a
SHA2566a0b5f920b444f5f6a68b94779f9916c23be473102ba590b682c1a70ac3fbab8
SHA512d422eb051d515f9d2e590dd7d2c0151fa610fd6b097cdb16fb6807cfb80013e31350c5e9c36e5942ea9ffa9102e13ad3c2584376f4fe35e3ff0560365c85cc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef5b48deaa1f2544949f869774fe751
SHA175ced0dcacc7ea6ebe6212a2adf1685580c4d097
SHA256a641c4d2e1b7ea51a616999fd1918771b23ce0880fc9a05a6628d80e6521638c
SHA5123b4a636d2345209c7ec231094bb1677188fe0ff58c30e5451ecbd0267ce2a224efba37bcb6506d56d5848e59fd3161fd9f5f0181a31d6428f8fdc05ffbc1fbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506071d6894e36992f28e4aaedf49fabb
SHA183384b559481795ed2bfd96de8a46da4e2c1e9c3
SHA2562e4d903f00396710e50104ee0d667a1691c302932c5f8b826cad9baefab155d7
SHA512c5b1340b8dcab7e67ec8f629829d42a4021fd0f2ce5392567731001c3a2e807910f38397ade15d75aad177f07a75de88e31fb8f2e9475fcfbd8a3c7d5ac162bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff509709408fb8a1e7f458125692830
SHA1e6a8300aefee7673d3250409d6f0ccd73b8631ec
SHA256ffbfcfee58b733f8c236c7cad6030ea273d57b4b9247f661d4d75dc3e745a169
SHA512bce467ac9c7e4f30a2cf94e37a297e29303913fab0ffffccb836c4c0040bdff685dbc5ecf41e674606df59cbd9f715e4c84d276e849b9ce69b01562119b7b3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109d4cd41eedaae9e15ae3c704d37df4
SHA1217a30149eefe6b350af1a952aefe96de0d32196
SHA256f5385f4b6bfe4c5737af0dab03a11d01de6577d7332c125db95c468c7fcc2bf8
SHA512d689f9c511bd152ab226f38945d6fd5266dd45ecf47f0e2968e67113641ff18f4b1071877959e07b96ed6a10fdfa479045ddfa235268d9bf950a342e351060b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4bb3faaf3387b72e5db7b261b0d44a
SHA123c0c78f7469a6526b152ef424eb6c9139cfe072
SHA256d6439797f60de05fd3b5c62f5fdf587d3b754a89424e1332bc03857366d03bf1
SHA5129125c8d3265cd41854ae7d4e6ecd398c6f727fd8685368fb49a02220811fa2c2db7f7c8fc9841ad1cbf6207a02b547d6eac07142c782cc998619f7e54ad66379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f03acd4c9a8458938a45ad8b8ff830
SHA1790be91c6cb3156d0a3186c3989a5a22eb2a2bc4
SHA2569c10a650560be8dcd0f7431af740bd1667f5dc63f937d7da4da4da6003f430ad
SHA5121faf2d8470017ae68992e67ff397e20899224340208ef9d5c682f228c167b6361aac6c5e708992c9447cc1118e5ddd962debb46adeefd77aa8603525c840694d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de0cebb5616e1f7e6453f5870872486
SHA158c3142d8cc82db8ca7f0883763f87386dd41b8a
SHA25646d84b2c28fbf1a6c7e056166bf503eb85de6020ce80ec49ab9dfe0f0e2f14ed
SHA512e2fceffa94bdc86e47d0db441e575dbaba8e8fe252b8613410c287540c282efe0da8e3b3e2db74b0cddb9d7520227b68021d9921d20e05b294783d71cd7ccd79
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b