Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 00:31
Static task
static1
Behavioral task
behavioral1
Sample
8ff662777692a59933e1a35262c9ad68_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ff662777692a59933e1a35262c9ad68_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8ff662777692a59933e1a35262c9ad68_JaffaCakes118.html
-
Size
102KB
-
MD5
8ff662777692a59933e1a35262c9ad68
-
SHA1
7c78975a89ed98f5a1f79eb339cf5a53e8aa623b
-
SHA256
e42ecec014f0666fbaa9bc8814413ae2cb8d66d839e8884e205bb95f1e840996
-
SHA512
d650910ddee087248e41f9ee022fa152b6345d347e7498ab3bc50e649b090efaf2b3b5f286a6fc681d2229ab36c6ac9ed7e95696c658e13d18b5336b56c1b59e
-
SSDEEP
1536:/ggOqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZ3:/ggTpD6Vxk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c3cdbbb05ca45f5e6f4d1fbcf8d1d286dca85a419cbdb3f3862e2b32336ec61e000000000e800000000200002000000075cfe8d44f81999ab0373d05e794393e2faf378a9ab820c06f385f2c92b8572420000000b3d0504b99f7283bff3b6fbcf1ed24d0de78d3043b5218ae3b1623cb9b1994664000000084057ea30e47360e40e615af3b0bef9eaa156d8b227cfebf69201fda65a73bbdbad11af5ee7e5320f90fd6998442bc9d8c8160e24ecd4b8fd5b1ef956b9425f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEAC2EB1-2140-11EF-8F47-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ecfb854db5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423536583" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2144 1688 iexplore.exe 28 PID 1688 wrote to memory of 2144 1688 iexplore.exe 28 PID 1688 wrote to memory of 2144 1688 iexplore.exe 28 PID 1688 wrote to memory of 2144 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ff662777692a59933e1a35262c9ad68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12ee58e3b3e2ff69710c70757e1b070
SHA1ad002f9f114c3ce5469df022a59774ca27740956
SHA256a8839be32134eac8c8fb3878e21a088aeb3687c598408a506b302b597cd1f8d8
SHA51216ba7b567a58e52236195bdf0b1c2005713f1dd34604742b0ebac23e5792ba19b71472c1fec22220af4280b3bb3d926465ff8ee4d1cde54c30e784304209b0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74b47b28981f5515e380029531d3d48
SHA125a7c6b9af5185e00e1540d1b7dece874cfefcb0
SHA256c79ad264aed27924a71d8956734f23c1577a2c3ed645712c4276b679ac3bd3a8
SHA5125b95346b14a712767377eaf375d75b0a31a61bd29d29f1c2fefb755a674ee461733630ca3335888bf20d956645d017319e50d4cd6bd6415ffd26cb77581c8e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9116e6e6dcb70e9e09974e23dcf6ed7
SHA1c2fd706b98b58539457d5262516f24d9d4afb2aa
SHA256f2dc95f873fccb0560ca014b98f77d0c1dfb28c7e37b176144e760930ca2f2ce
SHA5128d960a500cac5c8c11a226faf68a2b0152777e627378598cbab22bfcd837f154639f58f61bdc26305edc5e11d280040d588d4d293bf08e871d7dae62c338581f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02108c948e6d420dd222320fdd5c66d
SHA105d688249e1159ddfbac787758663e4bda5a7eba
SHA25675b4d24113fba5535eeba23c2a08f4265e163b1d727b23ffebe8a5da670020b7
SHA512cd748832b5fdba2c2d3ad3edd2f3d7bf7bd0ffd41617a4be53f4c9c3c0bd98cf6a38589e5a45a7d00944fe9e14c496218f17d6435234e62b11c2dc893f3acc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811913b93009968e4f78b0f90dc3369a
SHA129369a9b3aed8f67e73340e1e90daa3caf5aad0e
SHA256efe6bbca489372a65a8fdc5db4d6c573adaf695c21cdbeb980dbecce76941f97
SHA512311ede11ca4992c9ba83824798f547d70b3d8d17913079f135e9b71d44b6c3d80c2b316acea1b9398e684150a2611a3db67378d3f0d6c6a6f66fd8184101d341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a06699a34ac12fde88bc70e032de0e2
SHA1a2b56600b6ca2f96651fea9c3f4a488a40f8b676
SHA256e737b61862d870d5af831189d9544802f68da5c5303d3e0f8e65447e6aa8754f
SHA51281b679ba0004b8ac216863d3c37bdb224d8016ad096996a58fb02f8fb3a4e7553a69af44df484ce3efae5dd414949961e9b6496929cb6b2eff26aaf43f07d8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f89bcc8640d1e832af6ac53c0a04afe
SHA100bbad34e2a9450d52173be19fbec68b44fd68ae
SHA25665ca2ebd23519b48d8d557efaa0650bcbefa8ed2151a96bc36fac347acf44535
SHA512beff74143f22cda641cb3204e9afd8a6723e9bd2fa1e02a1e296f25366dc6f5d2f94a18c94c73794b3e916421a77f868ce8470b5cbfbe66f67697bad4515798a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350c0fcd0ee6e9efc34b7f2995b423a2
SHA16e489d3bd28e49817ebcc16a6cf99f84a6e38da0
SHA256c2a2ef0c53fcfbac0dbc0318a0b1c553e32b2bdfa41124cbb832b804e3becede
SHA512086b35f8c09f602dfffc89c8ac80ef17b0aa0956f6e91632bccdce947fcdebcc99e880acc0b59b58854610fb9b9159d89e58fe133bc338bebf172bf27881d026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91b4877194a7ecd2a87b0ad8b5d44b5
SHA17e6e1c225e1b9a20abdf0761e4fd0447f6eb285c
SHA256036201535c987b2cd425a27b94c4f4a404705c7d199065788fb9864b4c46f340
SHA512304d1d788c519b048c0544fd41fa0880ed02656c8d55d4c75258f7ea4f67d8b1984523d6d105749e40b1701ce92cf8c95e32fe6b57cf86d4b3d1261055cc7aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1d0a739ce549262bfd5ecbe74650bf
SHA13ab52595695a277698b817067edbcf96d19b5600
SHA2569faa39c8ba0e4f36b26b5a4dba822911ff62fa9bb84526c0ad78efa83d87f02f
SHA512879ac2f5b7269a9cd3e55a70ea87d752c1a43e7b9179299ecf84a7f23225dd8c40bed6c20a3997c3852fa99f59385d56f312572600fbdfa4cd44e511fdeade4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738eaeb32d75f4f312335992be0e657d
SHA18e2af127324928ff187d5d5fb123c9ef25497a9b
SHA256a278c3ad1ae2ffd07ed2f6fc5d0b12243e99a2aa7b53692a1547193257273624
SHA5120799ae2d26e619c7ea4f9bdacb8cad4f58fac07ed8f25667701a587b0fd8f385c914f93448e3276d487f3c440ffacfa10144d94fc62c260dc0a0a222ddd60932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545226ae326d40082f2ea8ac98813c903
SHA18e2afa9b0a2bf56aefb25f78f03ba8808435ffdb
SHA25693083036339ac7f150e67d070e3d0cc9d2a0ff2c344b7dbd64c448817ef43593
SHA512d4fbea12562cc13e532cd328517ebd40d425c07a3c063ed0a5aba7b9ec3094bc17256ff505092779d0395d2651b6f91138a829068565794356fbbef2d632042e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d739e0547d1ac8bcb1b9e591474008a
SHA13b95be90b657c20d187ea155c93f0464cba9d066
SHA2567652120eab2680caf25a1d5e7c31fa57316ffee84756eb84d1ab11e7f2184b99
SHA51295e951ebbb505083cf6f862bda023e810df0d8cec97f0b83bdee55efda511e1a4dfe4f8f9805f4279691a118f4cba55c66bbe569aecd50b6ec82eafa4872701c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8bf8341482fce4c4ccc1b4aa489547
SHA1a0bc02fb065918649baa3f871ef3636d7f3ec598
SHA256b975bace5f21a1e0a3a0e29393a52cfc3b36cf7239e02bbe64c594f3a6d2f736
SHA51202f92eed7719d920bb1a82fde0f1c8f616aa0a4934e08534af414aabed2916f141b1bd0bb7bcb9c2b988d14ebc01d6ad3b58bf42ed5ff56201e0e2d4c81fad59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd8366ecc6d263c9cb65a2fb3e9b1ac
SHA1e3dd6fb7e77b09e60e949fe4c6a85b7588647cf3
SHA256dc495b81c67c720f06e88b33aaf771057659182ca8aaf80d46047a36698fecbc
SHA51256a350a25152f4e6a5fbf1b1f5206c857843c5a887a017bd7ad6758bfbf16fbb7fd34763f47aff259e2c1ecc7f3ae4b4195e72add91ddda30aa0674c6c5c2d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb5cd313465ee2aee98cad93a6e42ed
SHA1d2b25b80182871f170497840e36937bcd0828658
SHA256e95b66379560102ecc4d8ff689e39595c63c44c12c51afb23d03854ddadbce8b
SHA51239bd2a450c945daa28f77222f122b5094f1a670b9ff6032119363b1146496a781481161626ca44feaa3afa8d345d15c8a027a243705f94350f60718ab5ddc819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543191dd71c85ef8626c31b04fd77854c
SHA144509f27bcac27eaa87e77669b58da9f735de197
SHA256488e989e2230218e6b2551b9401950447e1ac5712d3fae37e5a57ab17f2f5407
SHA512c0da1ada91ecb3211dc58c4c60b3e5e2e52d3c2d6fb5ab144d37fa6e1fc1b0827bb6313c0befebec395fead489949695ccc5b54d604b400a9736cccacd413b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4cfbaa9b0016e8c409a6e42684b805
SHA10e46c593b08aad978beba866830fcef1ba0c5cc4
SHA2564fc9fbac4720ae08c3c5edd7a61ba3c7f851adb9fee6d877ada6b90979a22c98
SHA512b849a1d7db9e29faa18a9ea138ceed46c272ad09524408358235f8b361241069f46e8e0b3bba001afa93dd98b1ef052005d20956f227a46fca173248cf43f222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af9a8620b0109e5670e1b21ed1c6643
SHA1dd700f4aace1a4e1a88b09289cb4184c750368d9
SHA2565150ec4145ea75eaa9ced33827a690187c205dcad48d2da5a936c479688e2287
SHA512f5e731b764468dd9c00769919b8b0e258ca6b7bac93053c458d46f8b890c837b50fcff6cdf7b33ae576f2d96ee6d45ffa686a51fc8cfe59c440611cd72ffb10d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b