Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 08:07
Static task
static1
Behavioral task
behavioral1
Sample
a8a99b9b099a34d58c4d8026ab26566b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a8a99b9b099a34d58c4d8026ab26566b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a8a99b9b099a34d58c4d8026ab26566b_JaffaCakes118.html
-
Size
4KB
-
MD5
a8a99b9b099a34d58c4d8026ab26566b
-
SHA1
e493127e9a39ccd5a5b146c96ff3924f6b1ee12c
-
SHA256
f19f0ea26fc539eb55b2325ab6b9f418f7071630c335da23687cd125a2d88d76
-
SHA512
1f0fcd0021affc03a8aa745122534cea0a14ccfc508b3a258415191570bbafe7f785be4de574501b8c58cacbdfc80e3eb2fe90b41a41133c8d39c2dbfe70df71
-
SSDEEP
96:BjBsBm9iH37yRrSjzohh3SQkFMlsUTkLSd3tFaYkJaHfauk:BlsYwHLyR+jzoh8EsUMSdtFaYdSX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c82ad3b3ce184d4990701680207e8a8a000000000200000000001066000000010000200000006e358c4bb72266feb0d6b1a2515e46c815f8db0f4bb6dee429191f1da5fc5fd5000000000e8000000002000020000000bfb16ab0910056845bc4c1a9e888b44d7c10d6a6331b3ed52d6dfded530e72e620000000ac1bfa8f6417efb60e12d8614dc2244fb89037589125fb99e33b8123a5b1269840000000d1dbea21b66fa4ca4f0f750136a824c5b5ee1d9b77f84ceb3ac1c82fd9e71d3f8e805577f02cc1e13ca9ac12bc030da48c86d16d2defc0ebafd5dbd723b43fff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80aff5fe31beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A5327C1-2A25-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424514326" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8a99b9b099a34d58c4d8026ab26566b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d847ff1205edbb6b2901fa389944c2
SHA14402cc08e0bef01b48901a18584982d6731b24fc
SHA256b0b7ea7da595b2ddfdd6b096d8abad5d507212562a0acdbeb665390d574a577c
SHA5121b262b9b02f921755e6fb8697605bee8ec00b954dc072c635cd8c512827429f77ee24de949b323e4fc624559053d8553a1d311ec9834696e58854df1919d3b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fe72a0d7d5efa9334085a02507d499
SHA1bca1ad6920908111e8bf0fdaea538f9890fb4878
SHA2569652e82b26a8f4dd4a17dbbd06c400248137218e0112bd0bf02e68d22b2a2e49
SHA512b3fd6a9298bde3cfa72f4e833610d45ec3c6ba6f35785f3c518f2dfb73d9fe04b18a3a2d939ada642c98c5a570f71c3bfa59bba263ab00c7043babeb6919d532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5f895ae6210668022988fd05ded4b5
SHA13c23d7c59c458d9cfb6deec4d7a176a6bbab5300
SHA256c12c3975285adce34c1a7314fa4232b4e1212432e3d971e5e0ed909814d1e0f3
SHA512c876a346ff512b83293f89e302d9a627eda04ff48b63e704ef520724ca9a281a29a04fe0cd25c78fe1e6fa25ce67c75ade11dbdef5af28a1e5e9427c23f540e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e809a9731df3b898ae53b905488b0dd9
SHA180edc986c27326db821b7115a690a5b31344649f
SHA256b25d58bbe91742315d9eea77aa5699430251305f363c7bed50a377528e081290
SHA512b34e306bd8d5c5a3629aa512c33aa599a2f0272444a91a2e3f2c73bcaee0ad3452d56cb1f9908ca08f1ddf5adc20abecaeb8bb966d154dd9784c8ff97efea9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560931b59e58a823b765ed01ecc70a999
SHA12088fc679d4243f4b84e3ce86d3935628a3d8b66
SHA2563876726f57e3ad477667d6ec781ce1383bcfa2bf431c672f456928ca45e50ffe
SHA5127829bb0653489c5d2cc18b6419fe3886ebdfcabbb194cd96078bd775aaf9f44d7cbc84c8153fa22b3b563fd8c479f42f6e3a4016eb56fb36389f6f0b6514a210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ed7f60599dd38bd5e3dcfd7a1a25d3
SHA176e930352fb6ad54fc851065fd2cee3c69d05f60
SHA256996c589a13d5dc24cc9d4eae80a463efc6d0aa70bb8f53608ced4c5870340793
SHA51203143b28e5aead5d03e532087b0f07a93e548ea46d0496cadadac57c9f5a5471b2d65a756d7e94dc7e22a9f96e1fa29eff641634b2a97d0e32efeef09baafd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb10a48c748f1be0cfdc44a41d46fb0
SHA1da012e9be01dee03cd24a62764c9bcb36d4c5d21
SHA256ce26430d32b360a7a58b12cc6200f7fd9f8ae949a3101c8cb832ecb721cfba3e
SHA512fe0a8a025b7d65f5426e63f35e32f5c4f044b70f80e429f460ad613216013c9f7a76843785d631d1a70b40a7e918abccb20799a9c70774da1b4324d09fc7b684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60a288fcadac2fa0f65db1738f84cde
SHA1fa8f3f9906ac35d8d97f8499533833da3f5881ef
SHA256c79be4d218b0f0d01fe7f731335af71ea69b0330e6f57cf71609627af835e010
SHA512f419f1a3a8ed44f91f8702ab86538bde84c4efa755771c875b021476213f820f8f97170006506d7962f9c22652ed114242d09724f24a8b665535918790bfca19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cd05a0ff7736b0ded8956c9170920e
SHA1b2be9cc59363f9748b05f1f9dbc15e39858dad59
SHA2563fcf8c34b55e13a01e044fa2909b140ed27207241b4073d3cbc290f16f125cec
SHA5120d56015f194793394b8e64505736d0910fa079f9cdab10668a76cf121f838f77d435d55c47e1c9fcb34764ddbc7dfcff68cd4db3d6c5eaee6794a0b1e2777dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff0f45a353ae916ee3381caaad8b3cb
SHA12d91af231fb24458ee8ce6743faf4c88f8f7f5c3
SHA2564953be84b21a98341a0a998f5959c3499d28a68565690d6cec31d98a052d3da3
SHA51263c0f6f694ab83c0c9fb6a5d8d5fec6fd9dfdcc5b2f59909d36728878d63a7d46acb070abf7b798b5c1b1245c93c9f0cbb388f6c178d0c2600f0b18d6528542f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b7d34f43a887bd38db1082b00369cf
SHA1fbc3f7fe76d23bf7c02ac9030e177f79855d396e
SHA256ba2bc4fd9df23c6626631da1958304c1ac39012b094e44370427d9e7ff496b45
SHA512150ed6d08206f353142b8ad36bb999d5fd14b04a137f196b82ecb38b396c0e1afa6e169d8487b1cdf3e15b82c5d83bb2042edf8d63eb0907b4bf2a56c8e91e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe47851ecb6e7f4667458a909fb71da
SHA1f24819fe453f5badbb69be9e5ccc0b8efdc8430c
SHA256aa4b880cb90c989b535bdd6bb68136e9aac6c0cfdbc24ec73e8d1611acb5f32e
SHA512269f24cd405ef6e34cb2c8f60d2051f803282b658ba4d80991534875e1ee9b6969ce66b1af8206c90c0f08790408be336f2c5be0225475cabae02f617cf25433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a800af511ff60f32f053e46e89e82cb
SHA1be749e3680a7a825f64f26a91e7a55b3bea83ddd
SHA25619144e47b5c4e1d0396424eb529d4df34517dd04385d82fd28a97cee0dd51aa3
SHA512d0e6e6c46c320014fca31fd0fe1b3e0a2b2ea033f6bf3a7559aafb79fef950121d58ae5cf9a0bef9ed96eeb87581bc4c6c88a0e191c32d241b91e7bc40ff787b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa247bac9580b97cbe59ab568f926b8
SHA1098ddbe39ec6d8a2ba4ac2c6321b01853b1b4230
SHA25641b8922f68f2c7d99d3acf67ddb62541ffd9363103d299aa8d770fc9e0c496f2
SHA512a0861731a151c8e121049cbe59d083ecefca4b47180217e91440a9cfce587b61d580706e2ef68447ef2ef073af037f9fbf628b638ac89e0db6f4bc4ed145c65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3b90b8561fa9c987fa2d9b99317008
SHA1a2a1698e55ac052bf8548517be9b98485ef381b2
SHA256cd824853d131838b9d4740a0235113f60c351619f89e295631f246cae008db97
SHA512af0c7ea07c10de18ac35bb1df714ae5c5cb57c9ef7a9c5614f9a2c81203c71ac5c5c7bb75a140eeb0e18b302438daf49946f0783eada480ae7be86af25a4d51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087674362dc12fa5808ef170bb3d99f1
SHA115fd79aa2cdd13256df82b83338eb61fb041ae79
SHA25623872c3d74bfbf73810c76db8ea40e5923fe269379d9ef5b2c1e498c1397755d
SHA5127d087005681059ade674668d298da79f8e64f5b6703a03c0cafa61db33a6c152f62bf68002523b96e6d712b922beed3034c98967b0c7783acc51b8b720334376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bad778c139a049f7f6e8ddddcc51bf
SHA1875cd0590f30c3407bb3fd41de287e21386aab14
SHA256e1c59ccff95a331d04b9c6f01f41ce5a0cc41593bd08e56f1efcd1e2bc4849b3
SHA512e4410fb6bc21d3334e54a1e32b73672ac23ea187cbfde8c3a0a8490d3e42fb0d2f58ffc0f9c2069ce7eb12a60b999ee7cd9885b0367d611e56dd2f515d9f245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6914323c028f294f4c4e12643b782a
SHA12ebb9bf9abdc402c6a52ebfccbb66c3bb47ea594
SHA256617889a067d7f2bcd31961342bcbfc610e3f4e1f3138d1f397d9d957c7e08e45
SHA512180a3b4ef7197d45362b15542e07b46d5884484e8adb6908c091ec25a94bbdfb91e7e0fcbfc17de3a686da87b3f06f0940580ba3b3501afebf9691272385f0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c1570fa44cba74adc6c6e4972025c2
SHA19675dc2f68a15729224bbc3511e872b1bd21b2f2
SHA256e86f2a84752e624dd6fcacab2d381037e03a77080cd2401f5c12d955948fb18e
SHA512db6a9dfc45fcd5479c018f0f9b7f9913f295ccb5d7572d10e02928f04627301299e30aa6276fa9b76e6f6c4119082d6b659490c01820c0528aa68adcbc1b88fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b