Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
08b44f45e69f01cb4ade3bd83269ab87_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
08b44f45e69f01cb4ade3bd83269ab87_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08b44f45e69f01cb4ade3bd83269ab87_JaffaCakes118.html
-
Size
459KB
-
MD5
08b44f45e69f01cb4ade3bd83269ab87
-
SHA1
02e3843c23a360577858c51e0269306a51af4097
-
SHA256
1217ecbdb1d5fff7826fa632cdb189f277c88f69a2c478248b1a89c21d04d3ff
-
SHA512
f3a28134f5b05f7a994a4a50eb259cc6a94d488ab642a9b505c1cc0cc3cf79b94626f6057a80f038915cf6b3ddfced441361d3a27eb722daf414a7f6cb85153c
-
SSDEEP
6144:S2sMYod+X3oI+YssMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:V5d+X3c5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420602013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4027d0f09c9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000139d0061c037cbe0a3ee4e7bfb15b1f64808231a912c00c6130440842b1e9c40000000000e8000000002000020000000b8691b6ecb43eb3eab273d2f4f1023d5a6180773b8ad12aec58b88b87ccfbb82200000008e44d0f776f17b1695d9c340ea16742eaf5e970777432c7ffb231f15084bf9cd40000000e5d7590077d0ea93c127292464e2afbacbd586f47eee9e6ed4f33d9e9662d6170d48347a0111106ee7948f62fd32293658d7db5f2ebcc849e65903d4c99b079b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18360F21-0690-11EF-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08b44f45e69f01cb4ade3bd83269ab87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa93cf81cdc0dfd03badf41246fd0510
SHA1997ab534d83a0767dc5c78c7cf67d9412194cda0
SHA25687f3bc267e9e295d7add267067d3faf75f0b9498c5137fa76e9b10ecb82eca3e
SHA5125080e8d6c697f66fc11aa9a6e9ddc26373a1711fecc4195cadd8350fd6b52cc09c08af7309fc3e1ab7333351320e245a0bdbb81a7bc1e156d5a6b95cb85e4e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5727e546347786e630879f3c695264007
SHA17a71a352768bf1905fd5b17a07c53e0b99ec16f8
SHA2562d6d5bea2a44870c7524490e332bae7d059ae295dc5ab6144ac2a98214d8faa0
SHA512f078e7ef7949e0b2d61231189940b6bde46d0afb8614da6f7e6973b92c992afb8d094aa063a68dfe8771eec9477f2779b195e8829bc11b15232ef18a6ec53468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ff22a29ddbc7ddceafad4268447d6b
SHA1204139234f5a7ce6b592333f7975ffc5d63d4b74
SHA256d2c7620006688d6cf2f5c22ea5ea3d6a18e0b5aa62d1499f5d63c64c4e92f3ed
SHA51293c89a66b16ca86676f325150d50c092cd39edee61e85fa2d70255b3dcb05e7f3e6d06f2e6d02c5bed568e5082a5f566f7555386097591adbce1dcc34ea68154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4750206101857b8512ce086b5d136d
SHA196bd373018d40d507953ab12b37ea41ac5e1258d
SHA2560a4fcd0b11d922b06d20c56aff739b5d5336a3fe963d856cdcc75cbcdd4444df
SHA512dcf81821e136af7941c521ae019a1995e9ea5b73c765cb189a8f318d433ea9c065c3eb8160c7f4cafc1bdf71280c641a1261e575100bd2aac09fdcc415ee738c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396dc5e6c9ae4ed08e1cc115a0e5b130
SHA1d05c6b661678cf046a96d42c17612f39e57dda71
SHA2566910602c8909f5fb8c66fbe442b120f5ca20ab5131086020b2b5c82069e3d20c
SHA5121c24e1ed131a6a3b2b947c89e932b8ade1c5841ea14d914400e404efaf89e4406a8d1b4e84c4747cab30e7fcb35b6d215f608cfab17255d505cadd8fa53f2ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477c0e57860194560a11e8e4454c14bd
SHA15ccaae6d57c82fc570947c3f15926b67f629e132
SHA256cb213f12f9ccacfd29df0d9269be50ff33be715718bfe17e6d83251c9a95b4da
SHA512526538cfcea65962c6b44879c6774d3b9ed391dd0865f8ddfc9aa4773682aef9c13dee149759355f61b39fe7cf649d8408613287b9c2c8ed105d9394d25cd10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe338df641841247863164be269897bc
SHA1f2d086c49adcaf02d2b498b421ab1ac0aab146eb
SHA2564e0b055415030df7e775680df73c2163a5f1f7423999f2b1e966d9f614f95c22
SHA5129f4a3251e3ad7ea429eb1ebf18aebf4a739603dcb17766dafc131b9bdfbf8d68075741602c8a06479bcaca34ea22f9499b7825aaa8713aef4e5aec8f0d5a356a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f60a652da6297a188b3c8c075089451
SHA1228c4bd79ffde690c958b67a75ea2e3d932e607c
SHA25677307bfb40d641d1a891f69ea07cb748407156c7f9171ddcc0f5c3bff0c8f3f8
SHA5128252c3ab76ec6c0a349766102cda5db4ca304b7c54b14c3c4044d533abe217be0dd5388def30aa797e5e3a171990f55911cd024a397dc5e5ac1e2e0dadf4a819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e1ab23045a1809a7878b145836437a
SHA1c44e80ddc9c8cd672ff5deec100b1c5b32f340fb
SHA256aa0ab1113f7b2614aa1a880e9c67e195c38031b6a73551c84459b2e3d87bfffc
SHA51264443460ad5d7f3ba04e0c77470baaf39b0daaec198cf5149024d5ac85a3eb56a617fb4af47a8d9323c59c51a24d797f417cdc581cca8d88a064fbde6eddb445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb8bac2256a6682e17e0475e18d75ca
SHA1b4c5ebceb3228503a4bc195d61074711d673a98f
SHA25691f190828f429cba19fcbf93cae39878992092d357ed868069e86f18515ad68c
SHA512ae032061858cb81df3dcfffe6fbe35b53482123949b673d5812e1230750312f37d1ebe3e0c81109f69aff0ee5d9fc917342fb9195d506c4682f690039cd94824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190be640ad49709fc6e0150fb67640ed
SHA191a640bfc06463f1d9523ccb46c02a3afe752d3e
SHA2562ecdb13ac7b54ac0c7be7faad7b549fe85aea83d6a79503771529d90ffc36a8f
SHA51274f7624c25105b4c50a14dc3d8f29d3929cfa530f5a44dea45cc19f28caaf55fc77b321d4dd91d0722435fc9a1c827738f759a5a4807889b12c630bcfa37c141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a5f5f136eb0d13569dc7d4dd24eeb0
SHA139b5afe28dcbe8d3f1ed50e9c043f48c5f70e486
SHA256d5c511997f7aebdb881a89748e728361168cd420fe848164eeee4486b96c344b
SHA51296957b207ddd4734f584fb17bc69c95ea98046745e194f5108a492c8566e349aa2dbf83522c998955350969486825098eaa0db2b0ecc11e38310df70813565a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552cbfeff91fa0f8f1e909c936c269ffe
SHA1caa666d650c6a9e2a074446c70d039f3e8f45c2d
SHA2568e1239981fad54c4e2f5d7d1b602f09452290373354192f3c85a127bf3c883d5
SHA51216c429e06c40373066cdbb540cd332e6299c7a50ef2fd1a5c63a631d5529bd4a8f552deef2bf9ae49b9a6d86d8f4f7fcc1c90b46f9a1dfc25cd1eabf645f7bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b364731771959679c2e32bc7465aefba
SHA18cba345d7058572a4d391191752d2046c3c2b5ad
SHA256c1424174f8d0a32721b4892956b0b41dcf0fd5d772a3ab94984ee435538495d3
SHA512554571843e51234b04b3927ebf8e75b2538c4ec2d1808f3b4c62c70561a5b06877487ccccad6977cae1f215a9fb8dc5494035faeeb96e7ea4aae467e36d0e822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af33ca5fbc33348cd39ad8a9a0c32f6b
SHA1b0f6e192bc4cdd85a1b53789c4e50d0843b8a04e
SHA2564d94073a052c661b1621ea9e35973614c4b13f4a29727fce65adce4b9085cc7b
SHA5128e7fa0a786e46cd9ee2451f531f464ae0b3b13f7857446576088bf5dad9fc5b79dafda5fdabdf34cee5fdbb097f6491ff042e31d56316c1ab0246a2998805e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f2c24e724bc89f9ceedcf7de6f0c6c
SHA12b1835adf1553839c5797f675460adb21d362988
SHA2569a7d75dadcb2531935bf50eb86243475fa010bf086ad5da298df7f9a6777d117
SHA512333e2b3c84f1d5be7b67b0b06f9635987d7848eff36a18f0da7fc7ade1d24737b4f3438bce4827138e7f6c85711f9b48f094338492238a66e16ccd10cc70623a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f650baf5400260e8c86154eaf73f3f9
SHA1bf22d71a45a959ca4ef8f1ea8c55cd2d8e3ca54c
SHA25643e9d461934af89a43a4304ce6f61fbecfff272a704e3294a49c2c5198139b77
SHA512cec798a63c1e704a7141c15b547022a57a2e0f6636001fd7dfaddd6f15b9862799705dbf817dbb666cb5bc5d9ccb2d8a1cf077fb8e4ac6aea0fa1d21e5400e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6efc77c46471a1d0615974cfc7d851
SHA1e6b98133e7827dbc2670f72bdf5189cf34d43d32
SHA2564720722e60ef130d119dbcac03cade200f98433b5957f2a950b400dd73a0071e
SHA512492a0f71a447bbd6e0c43e1271b343aa7b4a2861010f6fd7f53004a8aa3157071613c57af78e65e34ee685666f5327cdeed14c256ead6490059d3e5956fa5cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e01eb67a206370d8698de5f9fa0491
SHA13b46704194f357cece1fd5bf2d4515cc154b666e
SHA256052084067513bade971cce4aa510e5096f17d81aa18fa0d76931d527bd3a7ccb
SHA5129f2b409966ca78beb9a4a88bb140604a8b75a762947243863e68034f8e45df7e7f53df0b6a272b90fbe8c6a97c1917cc82453e107814513d75fa192c0e3f611d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a