Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
8ff3dc4e163fc5645f01b733f034204d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ff3dc4e163fc5645f01b733f034204d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8ff3dc4e163fc5645f01b733f034204d_JaffaCakes118.html
-
Size
7KB
-
MD5
8ff3dc4e163fc5645f01b733f034204d
-
SHA1
d8528d749efe90c1acca9f980bb4e0b51f049b63
-
SHA256
85e9d0280a516ee935ba6849ad292f4bf0a88fab6a59e65d26d14d3f0363c0d6
-
SHA512
b00e714f2a473a5f381d1df7955ce160e5c264ac44502264642869c41fe392491dd83f54396307effd5482943f15fb6c364cbbe340cd3d607e79a93e76e686a7
-
SSDEEP
192:QU8BFw/0AVOLncFdfbtYpU4bMcsALO8+qLAyKlf4bkODn:QU8BFw/loLncFdfBYpUxuLOTqLAyKlfE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423536311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70531bf24cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BE4A4A1-2140-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ba49308af430ef8d09cd2ae1e3b7a86c46225b2dc08833ccf6d0e9d02563c856000000000e800000000200002000000096dc0f753a5c16a2781315147586432e98ea5ca25bbe18e6df7d3906686ccf7e200000000a8659c08a4a85d6150971a38074324d849074297e78dbdfe623a177e5b6a97e40000000fb445d94c11e53d6a5c9cc8a3bd733254e2688cdf6921688be8e26dfb588c2a6509da343476230d4854017c9420bfca04130c8d555edef3140f88aae9e334220 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3056 1608 iexplore.exe 28 PID 1608 wrote to memory of 3056 1608 iexplore.exe 28 PID 1608 wrote to memory of 3056 1608 iexplore.exe 28 PID 1608 wrote to memory of 3056 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ff3dc4e163fc5645f01b733f034204d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5bbd7d58c9ef37381c352514bb5a72
SHA175d75d35d81e0163c620e643e2605004d560d505
SHA256d808c13493d57b44a8fec0336d6b5714f796324bf9698480f9d2971508f6df9e
SHA512fe22d2479f402c54b8981902431e40aeb0d7860d1233598fbfd1f9e7a57b903dc99396137b720be47d8afccf9c7d15d9287f49984aba4d9642b88c0249286756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf6f36fc8713e50fab06adf91a2dbcd
SHA1efbcbeea40a24a37e6ca830391b8e601620fc091
SHA256e4de28296d3d5601cd3c27ea2dbbf9ac289e84bda579d3d428b2ab8ce38bc90a
SHA512aa3d6704eeb8fb818061b950ebd5c5f4b31529eaa5eeda1ea66c5a84eadb4e80ff831bc03cf14b6dc99be7919de18ca0dc49dda1ed995dec95a039f930ebd912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb277e7fbd29a407fef7573af9d951a
SHA1efb6849a85bcf22dcaafed9e66e439030d46d828
SHA2569756bc3d990bc7f63b7331d24b71d4b7d57e11194925b3876ee2b7f76cc19ce0
SHA5124d97676a978bd63dbac4835a721189045875dd0ae4b3ba88a0079715d3667758a481748a5bed0014b3f021c3ba9c501c6a082293397398c2869eee3b67bd67d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796bfbb04b32d0a84b599bf747a3dc39
SHA136c857f6c0a48cc73275bd664695e1c8d1e29485
SHA256011135615f27bb7dd0c0329552f97ac5e42790765cb6a88f2081f39410b5296a
SHA512bf938ed95f4f3c93cc96504a5f7f9bdaf4cfd7cb348bb216d9ab571c9c2fefd84ce58e7a574fdc9152ac32f927d44fc11676f7c51caf1da4cf5984f97018da89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edd1e8a57142c8a7ab6254b2fed40cf
SHA1511ec9e237c94e8d251be9946147875fedaab907
SHA256137b758093d3ea2425f321d0516c3023bdaeb8ecf2897a5a11ad4aaba2236130
SHA51211069a7acc7ab6b34559001983b86e589105863025e9228e4950a361a1eecd8fc9c5ee3e221ac6f879ab7f48529325b931a56c7fe93598aed5a9d5bfac4ec7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9043ac460beb2c6fc4f3c3ea0631e17
SHA1ef1301eeabc6ae0e73e1345a5512ecd69983e29e
SHA256f07a3abc3f0c11399b21b396fddce4429e78ddd2112d713dc83202e4f1768c4b
SHA512005fc4ba300a4a4bb7cb480de21486dd360d1cb102c342048ae7d69f804819440f21a195a0b653f37e06a0ef1af3acfd5be529dd83890ecfef92799f939bc004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe5870770ad0024a9a3af2708ece9b6
SHA11e5e545b212a45886fb639021d255dd37c602150
SHA256520c08340aa14b9e8a0ee3613fa497d0379ac8977d3a4049910fc3a36735b2e8
SHA512d54327a0968d0d40bc7d0eff725dfda4aa0c2d11f6dc3b4f1bfb1cb22592896eec67625589cc3f9e70745fb3f1ad14d4b4c9dffd13848b6d6cd6fa7b07b4781c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544431f1adb0f930554ac59a065415229
SHA1c798f13537890eec3baccc34027f2268486003ea
SHA256b9674e2a4a46bbf7ea0af2486f5c20d62fcc3a0e49a14cac9ecb9b8bed447bef
SHA512f2cb554c859bcdf7e5b7390831d4b953c53526bca6ea44bcdbc98f4218240b52c764cad3d5337aba98097a3dacad2bce0fc83ee59d3e8f44426961708a6e4553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0268b1bd364e2c00b2e856edacd70ca
SHA10009f417b1f5e8729b704b53afb941f6358e21d9
SHA256c190f59cceedf24a3273698ae24dcee0b966518758af296f0392e3097d44a3a5
SHA5126c48ff9dd15ab8f09143c2b1bf4c9b76bf6eac91da0a96823ab9074c59ff18d7617f4030558bca4900e6ae7735a3df5e88ad7319d3ee7a9bac0ef0a956e06132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071382f89f34111ec467af7592f56b66
SHA1c90cebf26e91ea966c932fea92da3bd847b04855
SHA25693f0e15fb5b8697e19fedd09c1784bdc4d2b9b1c340dbdab4e7101a436ee7230
SHA512c8e834cfaef58f452733e2f0ddb7c943e7c2725682ef63a4e6f37d6ea06733432b0eaab52ee63e1370462bade1badb24c11227856fe233185a6c20083f15ff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbc06d150b6f688b2af297c59ce18a1
SHA140c815c343b51c3e603c6f54e4a8c1c4a190d66e
SHA2566caabcade5e8950671f6d743180e55cc85bf75a63ad06cd3d3824191cdf9f9f2
SHA512f3faa0663b2660a606390fb8d3826c156527c023601a2affd2480526b24c893790e5d275f1468cbb6bc51a408b00ccd39ff2fa074d072beff5d16cc97304a0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb48a5dd6d31f0369327aaf60cca101
SHA1e864ae500f892f49a767037d5308755684dfc79c
SHA25614cd190f6ee89fbafdcb86f4b25ce4cdbffabe499826c9a79f910b7821503edc
SHA512b039000fead4edec34de42156a3ab3d36a1c2bcc6f3caa8ceccc49aa2c4fa2c20dacc625cd08a941fe2d42c854c0187984a37ad745faf75ee8a91ab6f298c76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e26f308432192903759ead97498036
SHA16531e576f9b8ecd3279cdf149d503c18d49261b6
SHA256758563fa61b749e540af844e2564a121f25ed88d6832dc3f579b9cd7462348c5
SHA512af31ee8ed4e08da803ed46df09cd1099d63f0a2d375bd9f9b8d1104d505655fec5a53686de7a18b617fb6520217ad0df82d802f17f6fc1918bad953f87d7e343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abd2c35c8dfb44f083f03fa1532b1f2
SHA1b038db2d2b41e998a26a1d48ce525d69af1e6e24
SHA256bb10fe28c7cba3903a6a10f8139c37328536e88dc3ede88ac8abbda599f252da
SHA5122cde7aaeca2a9178112c1c26966875cf0e9cc63d240e4953383d533e7494e974ee47509ec1f6e1bde441cbde583d630ace15f158b4ad55eacdcb50b2efdd8c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab53948ca7d79f9ba30afd2857ff0c37
SHA192514ae8d41e026eb35551094d15e24b7e7709d7
SHA2566729475d83cd1ee5ff06841d7e1442a753b403f15e6991b59c5651081bff13e1
SHA5129c1dd60fdc5b8b2d5a059aad1b8b85322d7aa04e7e8a90ee3f68706783cca2317173e243b43744efd0e4a2e730dbdf548a0f9ff0c0aeb0c6d0611c2ea28ff32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bffa176c40adfbc834213875923a886
SHA14abcbd853278a7c2863520650449c6dd4a165961
SHA256c76060b1a43260586bc040ce9f154ab75b63493d41527ffb7d275e46bf64d574
SHA512cd92d53b5631e79e0057b84a62ed27cd8c2a81d292b866c33a6a52991d7ed99fa12111c98c3502485b4094a84456b19ad6c85af639dc92c4151d83b2e47460b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de0d99d448bea8b7ef19aaa5bd7ade8
SHA1121fc0fdc2145f9ee4737758184b36aa6fd17576
SHA256462b8e0e3c6d50dd7028015bfb0d312ce0ac4fcddb98fb991016d62c797c3a02
SHA5120093cf73561bf5641800875434f21e4bc031d8a5cb8457833d61915fa3645d70e602fe49a52c209807cf1517e725c6bd00162f516e4968e6fce4d53d37294d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5d4a8668dba68583ba959db3bae3e0
SHA11510652be7c9c326765094892e5b8364b87b07e8
SHA2564449ec2c7f2f6be676eabf8ee7bf72782e5ee7ec89dbf58d8f823bcf7798b0ba
SHA51282191b12c191fa525dd673823ec2ebda5b67e8652c6de5e18b75cc57dbdedbc5bbeb93bf6c1370c66f9f8516c946027466be0e9353ca4d507901a4bf0c67dc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e82a879ee3fffe713ec64db6a76ebde
SHA1e1987559f05b7fdc6a7f7a69202aa265cae912e4
SHA25675ef4ef55e0fa4ad9d228e66d7420f190077ba2bddbb90a49ee6a9fd9dd91c6c
SHA5126cf0ae51af2df1d2b744685f72e3ce7dcc6d379a386f2ba98b8a2eb9d20e436a08d877c583f28a2fda2203c91057df171bb6edf481f97d1cc1f531f449015099
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b