Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
008dd3a456b444e5fc8a18c4f4b5fcfd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
008dd3a456b444e5fc8a18c4f4b5fcfd_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
008dd3a456b444e5fc8a18c4f4b5fcfd_JaffaCakes118.html
-
Size
1KB
-
MD5
008dd3a456b444e5fc8a18c4f4b5fcfd
-
SHA1
ed778506f505b5bfec0baf89d916ba2957ac8f5b
-
SHA256
46198ae8cfe527e947ddaa8770a9dffb024851dbe7942b2d622b52fd4052ace2
-
SHA512
4586947e84e309ff8da4800159cb429c5cca1266152dd5fc30d1f35e935c9c1da667b08ed3d28681f467b9dfba2147b02cb564f79a539d006a522abe83bacb36
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f010a2b68ec2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF48D571-2E81-11EF-8132-FE0070C7CB2B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000021f8f0f2d72e5e32ef3eef7e003a1ae90341c9e3f2ac3aa98523411894bc32ce000000000e80000000020000200000005f56622f69906b65c9fa75659b4e2cb5c590427517cf2489a44f8feda70a8cd8200000006b8b64e11b7ccd1a3363b0cdb550a0ecc541c7a2d9ebebe7e59bdda876113a38400000004487a80cf69bb240a088be57955bef1ff6631fb2cd39bd52ab71a4abbefcb1d4392360e5744c8a985d39b2842c787a3e60e9e4c5ea31313201212576e0e3b400 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424993948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1144 1716 iexplore.exe 28 PID 1716 wrote to memory of 1144 1716 iexplore.exe 28 PID 1716 wrote to memory of 1144 1716 iexplore.exe 28 PID 1716 wrote to memory of 1144 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\008dd3a456b444e5fc8a18c4f4b5fcfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0059853fc2bd88fd4ae56dbb718ce1
SHA1e7fdb54c331f4f89650f67ede538b4a2eb25b57d
SHA256527c74325e6ef5aed4a93c573b6a073092a7ba4682e8aeac41a7d69f648274c2
SHA51267122863f5408165e56c934841cb51f735904fd15263510f8bcd3ae2642554559a885eba76afcb60b267ef5ae6b846249b545af827c5eca3c65b76775b71c5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdddee6226ef88951b66b381abe119d6
SHA173016fc905f6af8c7bf06c77a72c8ae0694a8834
SHA256b326846362471c38844f78f078c3a32539d1a048141673c6f63d8297d4ccf356
SHA51254e92928e34472788e0b032193fe1f89b8543b5f4107e7141eba4323e8afc168b9162b6e893ca9083ba5cfdd6eee08fd4efa94ce533409ef3ad9ee87f89e594f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9654e078c2584960512689f533a155b
SHA189e06e8f4647fd53a2ca8149871c938ed7f3be31
SHA25654ad394ee639781bdad3ca56f1cf926249aec09674f8261c863ed9d801e35dbd
SHA512ba2b01b2e3bdbce4475bca41450308be8370574a6c7d5d7d027340ca99c6dc0edc8bca6141eacf4f722b233292cbc45effb7a57b86c395b5e56a2f8cf97fcd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44f97974179d3ce92709276c6143602
SHA10d196a9759790d3b63ab8a8bc5ebc8b872e51ab1
SHA25665fb6d0b4faeedbc4725e2c5cc0ea3a403e119e2c8cce54b6a29d7103025a5b7
SHA5124ae35374599079aa5916c8fc8771f8acdad3e2e89cfbd15055e581aa8df82e21aca3215156e48f381b74a76fa0f7030c02a5d4fc833368a24d5c2c45dd4ee756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc6c3c6519e48ffcc6f3376c952ea5b
SHA1f0825599daaf606daa2965ad36e77ebd0d478fad
SHA256cbb247f720f9e0e2be9040cdac0642279f5bae198a80d89ef0a8f05c25f9686f
SHA512899f1685196de642059fd30cc009483f18558c6881d1a7606f1716a979a1bffb9e533973646528ceb03bc1467d0aa1c292fd68b007f64bd12ba06b0050603dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da005037aafbf66845046501df6e4bf
SHA1a7caeaf8b7095d8b5a47ef8efa79ea6b226eb2e3
SHA25652cc8dce120f4347e3983981ab322df69d8592848e9b8afcbd901d40ed532df5
SHA5127b710ab34b2d4da76af443af948c2d042bc97f41382d4dae2ee06f781fe1822bd2ac6af63c631a4669d97974128d279fb81c7cfe0d024f513e3e199c1788ebaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08ccf406e9ad4069dda85de7012287f
SHA1724a6012819d03c4af59734e7950d9d5edd855db
SHA2568f8869d796716aefa63c3ef759d939f66be76ab979e7d2af440a933b1e4ae671
SHA512868ae035c7484e4bf62e4383b5e955c9b61275dfd5597be3bcdd44b2aac32f09b142f64bbc5929e54a4cb88603c3e491657dac352a078c82b7ddedc9130584a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f99a0e2d6ba52150afc9416d969597
SHA10d3ae91cc0a09720307675f0d28b40276a544212
SHA2566800db8452b0c304735d5bde3f547c62abf3e20f52f5fd5f45a3e7cda6007906
SHA512cbd009c83f12a01cc1f191afa18ab1d3b8d96a5aedf3a1a1241088dcd18e386cc61bb57e9975886b28efa94308846fce64422a12e736a6564b9b390d89e616a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54284a3c1f8762ceca9d9772f032a48e2
SHA1dbf7e2680117f2e354edb11fe9009b7df8cccabe
SHA25634c7b635344ada47037ae8aa241a2e2023b3b2ef66f7e38b4df325f62e6be3d4
SHA51271336a7d669557da56bf0c6183a9a798666d5172f7a4d9021f9a9416325fcd8a5e0ef19227ba5c9d69a17b0cdb450887edeb092c1863092019d112b4437117f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f9ee098985ced433315ea8b603b64b
SHA122b1decf07a4c41572d1e69113826fe6ac2d3685
SHA2560084fdabfabb5e2e1208a135bae2bea99f8bb1b2646f3c9ac73cf94ddaf1903c
SHA5125e204fbe7f17a393594ce2f0f32b74b285a9329b5189a7d401c5372ac0ba5f128d2f820c723d122f90c0f9d31a0d713b36485c1ec2878a3789dcb4f72b9a9a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35e930e4c956ec9ec2d55df10943ae1
SHA14a1968f744b5d50069ca8595fbe189a030387fbf
SHA256f404224c54b001a5f69acee487e44f1354224be5523b62ba9e545126a3371377
SHA512df16947c3355bcf8a525a6adf1b83f6c7a3dd6f7d16209390c5c1edaad23f66105860b035efa9035c625ff4e77e31ba3e0d3c624511b2469a61fc535ef2650a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56477f2b1f876e2aa14ffe7bba4ae02c1
SHA18af9a3c5f2a6a7f37253557ed2d6c4825c114757
SHA256bd7c68499938de919afb7a4b1f6d75e59a6e14a97ca48f8672c166d1f41f5866
SHA5129c4dd1f1f60793ca65aa50326774b62b5846cc3af4929709f0eaea934ae87c73da3f224f7434898cc34df65f466fde443837a8647a12d5a239d17f1b26f0fd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528a048362ac60d437c8ca36cf4491f8
SHA181533ab81159d06952b25c2339fd4a04a053cd02
SHA2567310df2468918b921d829f9a511be8e04dd05a0f3971d05309a2698a83361927
SHA512965b9fcbf6f859e9afa8d2a9792fe9cbc7e6079f6b8014fd3923285a3797404829416f74fb072b87de2106f9aab5bb822af5f0f728c10a2e76e0539570947e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4c34acfe1946056dc018c0378fbd77
SHA10746c2933f99111dd912699f4022c0ab9a63ecbb
SHA2566bcb00ed30964eb78f66c3417092a7478df23fbebb380cc9202f3d9fa3dec257
SHA51206c626b3aec406146d7821e87a7fd2810af12a9a9f15f46f03a1fd9115d4b44d3438e558149344d98bae1f79fa5efec376ba48ab3045765e436fa31248226496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2350ef90be05b5ff5e482745bcfec7
SHA16756320dc2c8cddfe029f911f877f652f7e7cbd7
SHA256330ab5b23bd7222dc1efb3adcc27e57a3463533170cafc11449924f8441ab25a
SHA51254a706a6b79d912e099a0b22f65f23c441b7d3f1f15562cb33d5b289282399595e753dad6689b2d7ac22fdda54ff3ce895addf2cf971d271892fc4aca646e02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0effba63c4f2ba65b4d827126af35f4
SHA14193ebede35498954ed1aa40ba906e12a7e79ca9
SHA256546f944311fd841d7a8fd5d3a580c90c0fc6338b40b9cd49cc823015a6714ccb
SHA512edf6f21fdf944b4bf863c2da4086a62aea1b597f153ab1c761ffb214a818ae7324f664e6789aee5e8c2159253b484a73ac1120faae1162825fe6815c108b1632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9635df7883e2b9defb3ba28bc05387f
SHA171fc19736045c60881599fda03b953bb7a6b4334
SHA25669686ba10c8be636c0fd7573e5014aad752017fcfa224b8564c167488cbeaa24
SHA51248db713931e61b818566b1e481e5bed9ed003637dfeed51c4224a68b6dc5050fc0babb1d20af960cc3381f2ea53cbf974fb300e3447810fe4ca18b3c1ae3e69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473b16e0ccabf8544b02b3e6af3f3354
SHA1534bb312a115e8bea9e9d8fd9cb43ab4bca67204
SHA2567bd77e0a62d03d1ae3491cd00e79993f11333a4da90af302b6a7037bee162d67
SHA512814f0954d207ece4097f306fb31f4cfd3e2acfc0adeca708991fe73f136a273cd87f1a10e52a1dc0a590950ce58e1ea01ae3187326e00d1944ef7ce6a9b87c4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b