Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
b0b88dca296c77c8a14d6f65e9a4c64b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0b88dca296c77c8a14d6f65e9a4c64b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0b88dca296c77c8a14d6f65e9a4c64b_JaffaCakes118.html
-
Size
14KB
-
MD5
b0b88dca296c77c8a14d6f65e9a4c64b
-
SHA1
06b8dffc08303b2531245e05050568ee9ed23e78
-
SHA256
d8f4fcd5ea59ec811760b73765300ed8446c1c97151af13f14cd46d34cdb5be7
-
SHA512
06dc522f787b317fbca106d752c84ed4c6347ba52633e9148dc61e6e70260219514ce3072481b1271571d5fc373df67947c1a1945f4a112f9c4a7f72b208d1e1
-
SSDEEP
384:CyiLq+iaUYLuQFAi7sy1wzMO2EQ41RTEoeAqMi:CyiLokuQFAi7sIiMO1RTEoXqn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424656767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000080d066557cc71a4d36a7b848c8ec4908065f56615572dbef360f3eee74a94886000000000e8000000002000020000000e28fefb95e95a4e66558026b3261a1f33e2e4966c86e31d681ab66905f1a3a0c20000000330fd82fe4021d49797740e4395b6d1cda8cc81db1583467bed778f456a845c94000000088a2c4effe53ada7f2c895c9ad0e90e81e7593394e2e67d8537bf0abb61cc3e1f15b1acd2f7f52ab125a38cf10557af356570639913d78dd543848d4567e02ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D050DA91-2B70-11EF-A5CD-D671A15513D2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ffefa47dbfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1800 2208 iexplore.exe 28 PID 2208 wrote to memory of 1800 2208 iexplore.exe 28 PID 2208 wrote to memory of 1800 2208 iexplore.exe 28 PID 2208 wrote to memory of 1800 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0b88dca296c77c8a14d6f65e9a4c64b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fea3c4c4b749c9d88e38db40dd02113
SHA19bebd3be9e23a10543130b17bfe1f8a4776e28c9
SHA25656f3e1ce189881f78402ddf3c58241e589e57ae7eda7be5f6e9bf0c47afc29a0
SHA5123a0fd9507f27234c92680cd9480802758acb5da6fb69930eb13167acd2e247bed7d0bdb7995db7a1a20ad529b462bc5dec20bad2ff95fc18c7463023cc54a479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdd1dfc1a34df2f7612bf8655951671
SHA115baf8ddacbf1e9fab21c97ee2dfeaeec1f17f41
SHA256c963e685f0610def65200a11a358738df136965c757439a964e7774b7584ad38
SHA5123e90cf759d831b3f9fca8eb4af475f3d01db3d3e67876139da034e9e2e1355b29440625eff0c37c4ea478c8678c3c649bc202f7f854eeebeb112b84af4980b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691499659f35bca2df24e51adb0167dc
SHA1ae6b40b604cf6f46a9f6da43d4118e3b5b4b9ce7
SHA256f001194d1cdddcb48ed3cbbfa6c0e19e0279d80f1739ba2953fc18d21ca3a11a
SHA512e5c13c019a297c7349e6de6993d9ae1ad1a53ddb0acbd53e88aa2d8f4b9c20269c63130cd5b872cd68985bb902f80244d93e46987a0da8302da8cdfe19ce2fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b1dc9b5035b8322f0153a72d0c4cfc
SHA157bf50bbc26c42a44194dd0892f4ebffd9d2e059
SHA25680b18c6525ecde81db0d539d0dc2e47ec4ea7652e46f49bea692de6685ffc5e4
SHA51204b55affab11d90d02b62f53e92a37a9b4048ab78cae67f05da20ae082da4827af1201e110997f9d1ac80812430e37b63ec4bb47b2f9cfa56b8923626253ea84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e301838187daf4bb2223b400c290357c
SHA17f86efd2a0f45cd97b1f134038f23ad429e908c5
SHA256a1746c8c21916cf1d1310ec321bd61cb5cfd380e7ba58d54ed90da5bd90dffcd
SHA51235c9be8e45374b816bd90349b62ff229449d201ad9b3e043e137de2ad3784132aec3211a5de3034988ee12e9188f88f24683d484e91b0ca866a1ba2ed9edfcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9c089b1804d9f7dd59cb45ce4f8a91
SHA183bab19e806c548536929c5203b4ae9fc6ee86a3
SHA2561704527bd956b67f57542f2577e77b651eb7ca4fb54d795273acdcfe7f4e0e73
SHA5121371dda9e4616c0dc8e6f8cf31132dec46fc4884053a6f038e973d79349fcee77b201546a4a5150d32e86f64c7a1910cd59468df8b713f7ae19758a547ef3bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4517807d6c33500131df65d1fcec68
SHA1036af2eb0d7b5c342bdea49be46386ab1b4eec0a
SHA25629e8a20fe36b3151a37c0922f458689a2ce71a9e4fb04d39119118915acce2f1
SHA512f89d4037183f30545fc2817ced6442c022e06842e0a8af4a38807e73384f700bbc700d37cf1b504c29a86bfa25f2c0367a431642dd4d546bcb2f9e0b772b1f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7624ac3ffa92f038e4bdd746fe1d231
SHA119d03958abced922ced5512858fdd376c8affee9
SHA256804e1582892743dced4a0cfe2b01a27a407735871047ebff5e35279d4bd21066
SHA51267220bae50a57cecb814c8edffce38bf8a6c163e91995a5898ce631b358be9946adaeedb0a6e90f00e362bdfa6863266fce5a041f9e20d06112ccb2b4c2f8fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492db01c0918ce74fe388b7baf38a322
SHA119b0deb95cb5cdb71f95fed4ee946b604750f526
SHA256fb9495ad45e6d5efede9c6ee0f80a35f921838a6d2393efc44edadcca4e1a92e
SHA512616d0dc6f2ce9d01c4d7cee11651ae201fe09a73c9f69a165d49cf4a093fe946aa365ab4a5f707673f202e06d9bd0b066f7ba6e24aed747d247680a3d20a24eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed5dc69fa879bbaad621dfd248e79cc
SHA1c218038062b0fec7e2e15b647b62f3a764166706
SHA25667e85bfe2ab08563db82e4d74ef7703e7b0f47529e2b594f75ca903dd7558e7b
SHA512223634d1eeccb15f110211f21a357aadd08b86d3842764665545e43092a8f29411e5a312e98c2830ff09ad022b59a32eb15da41bc9c405a939b8665fe0cab024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8c72155edcab275e230bf6f5bfb0bd
SHA1b16084d7d2a5300f367b8d43dd35767bfdcae770
SHA2566c6cb6802ad896c3bd4a43970d527d5060ea26e7da1d97adb7639de832e5b090
SHA51238619da77a165813bb4703b3a31bcfc792f9527fb9bbc533b168040202457c04e9dac74d4f68c8091c8183b2f601d888792589fde21d74b9393f7b795cdfd27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52988fe108b07f731b2621f8ef0e2d6da
SHA1429a88b4aaa191582e86dcc9c2aa389651921c67
SHA256225cd3ceb1ae3f6a3684733beb6076583a96cd3dc9b1d65dfacaede36ca80bc8
SHA5127578abc4d2db627772664e4c43aa96f2a7350bcb749cdd743ffeb3fe82ca1b0d0bfd49dcc32b367aec65b931daaf073702543cb4e2fc39760f11a1d3505d686b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3899cf20c8f085e05805f523a1bf0f2
SHA1b483987818fa987c2ef5d54deb71c5947f4e92c9
SHA256f88bdc4c8b5d6565b16a5760795475aa8b3b91465efff51b0b855739c8cab4b8
SHA512b27baec4f0b36e8ea87fe017dcf4e47a4ccc752d156687e37d96a94d0cc0bbcbd002c2cf7191c70be0221f8cf2f10a7f9a4919bb708a4da60045abc1f82eb94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b27d7dd1bbd686c812ba174e038942
SHA1feeb18d0fa843e530eb983200096c20a2b6d7c2a
SHA2562d964c8b60e1bbf1ef24e1a38cf26cf347df862aa1ec4f771c38df895a9d6648
SHA5123e6bef89989fba1b849002bcc5b6ef771e89d2269aa7dc5ca1f8bbdb53c558b241b1b773e75d164eb20f6270e3e5d7eea8f114a30df162da9d0c1b04c1a313fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545087a57359cd366027a906dad387d78
SHA1d91bba4f347ca7e1068ee73564b4af2d36018588
SHA256c2d85251a027ed898bea65d6b4c04bb3226c2162b4820a2e04cbee18c40f01f1
SHA5128802774c3a332963ca3e17b478cc5ad5ce0ff550cab708439ca0efc5ee9887879c091427a7ccb2ab6e0848dc1faee3abf718b815d947fef23464adf779334d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0d7fbfc369e07c0a1332e441c830df
SHA1574639fc8bd4a4f5c0e6362a5cf6418b135133ae
SHA256741d005998c62acbd4740445084830df7f2d099a8351e0a929c1799d8b9e3062
SHA51239ff247276d995e5aa27bef294fa424e6784fe21b384ec706145f32bd667fde43ef270a8991683a70086ac1860e73d9399bba0d65563a278f8e0b74f5141cafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11f0ad566802cf8a5335ab81fe52f97
SHA106bacd7bca40833ebd35da25922bcddc959eb109
SHA25659fe02bf9aa7a1c127b64c68caeb07d7ca19a65a2bff6cce705c002fc512e27d
SHA512cab82ee30fd0708a38f81f2706de973db5a8e010f28b1b50fe1d6f82a82de60f4727f0d742aaad62efdd5fc8b0efd71898ecfeb303d9a85d650a2d2099804c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c834f6dc1b1ebcaa5b54629e926739
SHA138e56204017b169c1e24e8ddec95d1eefc093bb8
SHA256b11c0fc4c79303551e3d2d348dd8d3b2ec3c49863deaa92bc10be5a40103be0a
SHA51272aab216d2b184a932fbe4643f3dac2728a61e0a3fe8a0281e3fad3256ccbb5ae405b6deb8f52ceb0756be365b7755812af0a9a85b0ddab40f71b3e882050e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8e8ab43f996df66013e704f948ecbd
SHA1a19201e8a064ac4bdfb9170d118dfb4f2fd7a662
SHA256ac51b8f4761b7e795be185dbef9ad6344d23010520e7046974a74da80be39567
SHA512d9df6740cb75ff04247a0587249205f50faa35e220c0fb91d6e5b6d3c5bd5a19152bfd66753c7be01225b6e67fe47ab31eee497b43df14202afd89622b73ae3e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b