Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
08cbadec081a0c08cae9694c122078f7_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08cbadec081a0c08cae9694c122078f7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
08cbadec081a0c08cae9694c122078f7_JaffaCakes118.html
-
Size
159KB
-
MD5
08cbadec081a0c08cae9694c122078f7
-
SHA1
2df3d9224c97fb1a5ca82fd68685cac7e2a7c83d
-
SHA256
d6cc76462818c6696237a05df958afb65b2bf63735c56d133cbddeaf1cc95619
-
SHA512
6b6be2b1390bcbd4936193699e524acfc094fed318c5fce1e213b1e7a4a5e83cc99541e63b51b4948e6fdc11499e6916dfb0425f1ec73e31c2b5c912f187cef4
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcdpyHAK3cL/BpOVcZorzr1p:sdvsLyVF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425071173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40336a9a42c3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACF302D1-2F35-11EF-9FC8-F6C75F509EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000060a5970148c04c65456938d76ee2edda2304eff83b19339d99fccde8e7df75b1000000000e80000000020000200000002c67026420b671c093521f92a7364c786fc4a67aade769b9919f0f1064c541362000000078c48d73e545035dbd44dd9fb68cd69608853747b676c096a161acdb02d76f0240000000d4c3d467e15c270995834276c1a6952dcbdbbc28281e7ad6211b6f3359afdaf937e135ae96984629b22b0097eb324c9350d33d4fa1dc669aafe7798c98fc7ded iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 636 2596 iexplore.exe 28 PID 2596 wrote to memory of 636 2596 iexplore.exe 28 PID 2596 wrote to memory of 636 2596 iexplore.exe 28 PID 2596 wrote to memory of 636 2596 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08cbadec081a0c08cae9694c122078f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc2e17a98715f55d359bca8c79806a3
SHA151ff855d0230f7c6ae45ec40b4eadf92eeaf7b82
SHA256ee2d6b51a6067e6e9874d107a39eddce388e932e08697a571853af99a78d5fc5
SHA51219874d25cdd2f8572b23b315f00e8e1667d4b5c990ccf7c05f4eec9d3b16988864a7383ee8c50cf3b253c22b1913a1ec0bf96ce006f920ef4e5836217bd9d148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d76e0b29644dc7a44ea75ba755eed5
SHA1758925b70b5304aa65472b5cd45ad29cb963eb88
SHA256b7b02157905c823d83124d0dbc5c338a55726ecd4f089c30169e66b7d0253133
SHA512a1c091387081413f81784f3119a30e86b6876aa5491e950148bc1dcd5497c8557c775a179ae91321c3677ad201b77dd1de65d83753a255e69f961aa04a02633d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598253c0b57eba9ecd82e80a4e3a2d1c0
SHA1a35a67f063f30cf9d89ea72e3eff35c57c032657
SHA2560cff3e52191216e564a4372001179fdfc472f2aefeb911b6c19bad816686300d
SHA51240644457bd53b78265b0fb2fb1b6d3e72419f4ffbcf12385b169a8982bc34af34be627afae81dd80abbc4fc0103f54dda2cc39442aa1926418ca5b544f218052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8e3e08bcc5bffd131e3c808bba4bb6
SHA1d26c218011f5ba9db91d1274427ed8b32a5f4ea1
SHA2568fabea70d0a42d8c8ffd236acf85955718a43188e524cebb1d5072e58825f37c
SHA5129dd8b9e4dcb1093d13ee4f98f7d5d9fe653336a6478e51078139ba9c0c08f45aa5242031e04e02227654e9d73f7fa367d09b459717967047ac59204b9dc79d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7eaed171085c3406f6eeeeb41b81e3a
SHA1bf7645b80cb4a66ffafb95ea328a30486a9c87c3
SHA25696419c27ac9c37a92e4921b8be111c2540786cc70c683dee08904916ee3058c4
SHA5128cec60a12452bea4d494dfb41a3bb194be41c178fdb39b6a543064759660156ba9de0cc96162d83bf96dfe0907fb1ec9e0011884d7c9fc033fa4126f633509b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57559f871dadbeca2bbcc0f4e1f295c76
SHA181aa65736ac52c0ffc5ca000feca1fcf2d835687
SHA256a3d31fc6ae569f8d264d010b34ec9904dae1bdc483d8365379c3389aa145b5e3
SHA5128e2882598ce9124b6111dbf42baf7f3b7597b91b08ef1fb50d5bb5772fc20c1e9920f9185a90c93432f4f1c3b47d276dc2818f723d2eaadb681d9cc6faaa2610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c064ed86dff84f09586fc9aca6806b
SHA19cbde2590a599ed2c8b92b65fd1d7d583e9a91c1
SHA2563942e2de07cdaccc3a7222befcaa57f7f988fd96148c42be992f098d3493c266
SHA512d87826a8f1c797996102baf922d3a3b656d9f3c72f6666527764dc6ea66384bc9d06507401f64f756e3fa82c1050fb7a8b150eabfea65a22ddb522dfb7fb1939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f35ac9f0fcae1883205a1b3e23b83af
SHA1ea1ae074246dc6e1df3bc2db2ceb8632a58ee6d3
SHA2569f14ee1773099a997a953859ca44699fc4b9f25836e123bdc41d1a71142c3d44
SHA512ae8913c0294fd74c92fd738aa84adb561e433ac9208a3baee4e33eadf6a1c906deac768551dd56facbc54f9e7884682d599f3cbfd731c18c3fe6eb76c0e9a893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2313826f2f1f2767dfec634a8f51891
SHA1480fdb34909c128d11cb7bc383eb2b8faca8aa1d
SHA2561754e151d2b21604d2d588900d74109d5cfdcbfcc360a9eaa13401d196f1ed96
SHA5125d824e81411cc984c6a57463beefd30ddf259322d1830390b469eb28751a52864a99869493da695b0af05070ecd743a160eb942026b2ef2b328098d8198bb9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af3b4f72de32b78d549174efbc15017
SHA1ec3214d7382b74c1f5dab08f626ae30beee0c8b7
SHA256138bc441573195d52b03274ffc829e77ceb7a838696a3154cb48c5b7baf9bbb9
SHA512df7ee91294e9f342c6784db5c3729ffca52f423e506d8fe83884f6317df4aa394118b674b529b989c95e640c376de6a408d989e0b4f060c471ffc30eba1da190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c830aa6df307ca53e35321e0350917d7
SHA1d30785b03798e94304c06e86d2585fbe52427c13
SHA2567eaabcd6feb2f461ff94ed9506de631de85391e4b3b6f1a998415ee64fff1b33
SHA5126642ec23f692728fa5462edd3404ac3c3188cdccec6c2bbb158dcdea118cbc18886423f3e48b2ebd60c0c60224640dc603c242e4664d0cd4cf39eea836d907c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52418c062342ca62676ea216fde16ae47
SHA17135e48ee9d193a891f9cd9b74da48707d8594bc
SHA256fbcf3af3b2fa88a372843269920b3866633d8356734d8e265249305b5fb2c7b8
SHA512af372b1b7fe31bc476bd0655a793c395954225d662ccd6118a88bcb168a1e76f186782482256e57b0c50e13710eaad78c570eb81de6252aa967040de5ce372e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f8e8c5cac3da82977acf803ad552ba
SHA1fd15f7417fda82646159cc5bb021e69ee6eb87d3
SHA25667f2bf6a5fa34153e3cddc0b6f8457e65130088682c06edd4747719aa20a58bc
SHA512e6aa7ca835e4c13bfaeb09f73bbeb6fd0a610e4d148ec5ddd226909b41382d710b314d9b5528a6ca787f0f1f6a4be4f7bcaf9af4eb2a89657e9ad1aa971571f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0cd91e7b15b7611af5df30684e88c1
SHA16feb085014b8a14ce43dd34d27991c998f4e6940
SHA25653eccc876fc6eb53036ad04eb1057128de32cac69841faaeb4b1e7b7c118885e
SHA512b829fd47610484659ef86553b39bbbd389011b788b7a3cefaf7eb4d3654547bfaa967e21747b95ff510584774c7ea2b250234d92fd2999a68f214b1d1da473c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ed93f83f52a52edddd5eb9f8bc63a0
SHA11cc35b117f5e02d7886fe4386f1b6e2e4a9ca149
SHA256a49bd9c2327d14f375363f62f64974c1ae8df663cbb9797c37dedc3ccbba32a4
SHA512a491c4f7771804f7100d6c2068864f8ff9a8fe8da6e4de32acbd6feb9bd6a7225ac5b9b8d7439c2b3b7d3853a88d37d44eeb017d0ed9f059521bcea38d56c17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555c92e8c5c5462b8b3d40aeb6820987
SHA1a7c0f52b311e24f968612f739d0537fe9929c6c6
SHA2567b855ea9de4d10e6229a8df6d5363d5ddf0877278a26ddc0ece8034eddca6d31
SHA51252d34448de23378ec439e8c045e9a445ae75d7ef6c81eae24332fd9f181edc2dc0931e3273fdd783df96b5e560527a47faf8dfc1b1fc7091879ebf334c49e18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e227d4e10f048377b032241224fb26
SHA19b9f58c4161ee02f789d7f76497eea1b38534bb8
SHA25647c46b1cb883cf34b9db22f89d55de7578ee4a5759092bb171c7957e2066ce54
SHA51210b603efa5bfe23f7b21f69bc6c62ab1412f381444effc63d4e943ab6e54c8788c08b9f76dfda46434c360e5361518657d9d55bb8055191a7692e7b9db8db50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59616341f9750ccb5bf08633631c5b56f
SHA109fadf3f753e0fbba788e06379c84881f688ec54
SHA25628ec4178626503129d20f793e671417215e5e89d815670cf86f2e3fe48bc124c
SHA5120e16a885a278e9eff692effb608ab6a929f8224f74bd0ac88e03bbe7f4bf4d5d96a7e899fedeb629da41ec0262cb1ef16614c814d9a0231aa4f3c504d87cbacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e2f5533aa80c1a0f80fad04de9c437
SHA1456f2899e2ee4ff6af4371fd446917e32b9aa020
SHA25695d3afa1b43c5398829fa53173e838e8be567710ed84110b23812a0ad744562a
SHA51284039e1653b77dfb032f0bb03b77c93405fb0efb37ad354db86ddd25eb2d678d822b8056bcb28c70bf05a6976c2d9886c0201cff7b40051bc8eb6e80b55ea86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e0382d596160fc84a3c7d722a96569
SHA10b743db15d986227a617d5f2a86c087113826ca6
SHA256b6f3fb7a0818158cb71914fb6afded08360d15df962b0e4f0e46218d066a818a
SHA512cfe6760499fc91a5b983310e3c7ce0bd82136a21682f4224dd0c448a86c5c3e4ad57c4132e89a8e1d2b6594d766756741e5dbbe8f8ba14bf336057c347217f35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b