Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
08244adc30bf3811f75837b5e5311e8b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08244adc30bf3811f75837b5e5311e8b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
08244adc30bf3811f75837b5e5311e8b_JaffaCakes118.html
-
Size
6KB
-
MD5
08244adc30bf3811f75837b5e5311e8b
-
SHA1
f64e26fada5b55dd2d9225e7e418669d33913323
-
SHA256
d49e8c371ef34ee635fdd19c3cf4177e70a8b5489a2e5d06b8c5fe9822a0b56f
-
SHA512
429341669a7a9cdabfa8de0cf73487219404646611c4635fb3c605307093e2c3f2878dd1dfe562d82d94e8b50fe39f6dbf0db7855bc9da027db197b7687979e6
-
SSDEEP
96:uzVs+ux7p6LLY1k9o84d12ef7CSTUrCo/6/NcEZ7ru7f:csz7p6AYS/q4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425389023" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0abb7a726c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000033cd72f7f6b9c9e0fc0f7c30499e76d5288db26a14bd85ba0e9e15799f5239a000000000e800000000200002000000060acbbf91c42e52a1e51d3db65d9d5b180d54c7e11e2281f5d797779a4f9a34b20000000c017806a28abab7806a3abd17f8971c62917a92422a23706beae69b0aaf8407c400000000f47605199fad5b385943575f85a71364d99418daf45cda6484ad08d0ee618220776da232146042e893dc423c06ea6f0fad1b40e8b637c541f6683fdc63eb48c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9C28171-3219-11EF-8F1B-D62A3499FE36} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3036 3008 iexplore.exe 28 PID 3008 wrote to memory of 3036 3008 iexplore.exe 28 PID 3008 wrote to memory of 3036 3008 iexplore.exe 28 PID 3008 wrote to memory of 3036 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08244adc30bf3811f75837b5e5311e8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac71cdd326340e56f50351c67e32297a
SHA16892b6e9632cde977cda123c73a355af6465a15c
SHA2564bb314cfb5007540dacba42a241fc0e8ce5aa5e705541f3955da70e02ac9392e
SHA5122a669f9ae151c98190ac29dded359173cd26cf83a4607d0ae3c1a03d966e5f60c61f8dce0693eb6fdb510a977f3bf62626dea2f191f0162a5c5ca276403703dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96eb973f59a016baebd69e294e2e1d3
SHA1144fefeda2eef443e2352cd9a92290ca7fcb6f9a
SHA2564d0490abbfa8f1ebb3088e484c99172f2eb74bd673dd9ccdedf61a66c8143355
SHA512645ccfa225cce67b52ba08f6d01dbc24d659f786f4b5093e983a053c37d6a04ca3401c61ff98b1439fa3a54111edbd754ae704cc185c092dcf4fc9aa01105643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56711c8db3b69d2646660ac23a6325d37
SHA1d7ae88557dd046f749e0581d25a1e3f5d29f8a0e
SHA2561269d37e20b358992bc27a304570cdc5e71fe6a837f62e6d83ed7f0927446f5b
SHA512e9ab51da398c034e9e9e6a13d949a1dc5b9c9e4f48f7801d67fa04059f643d712515d1cb84b035819a0acd449f4df6f39e087f004bc0389b78b3880fb7b502ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6badbb1e076465f0cc7f8a4b978865
SHA11739fb9e22adb01ed3c97111293f20b6684a4056
SHA256dbc3881657c68183b5d3c1f991074d7c3a09a24e82293de731730b942679faf1
SHA512ade6ced9f6f16faf787125975105847868bd5c0dfbe3f28ab0f055eab565fdefcfa5d11861e79f898670e46a32f7c36dca45bb65810ff8bcc56d02e50c73ed39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bc2869089e6b69ee05b0e995bc14a9
SHA15e4191eeeb82957e207a3ade6210d046cae1a4e6
SHA256770b2b2e0d6ce26267219476663d80458537226665bbf809703edeeb379fd491
SHA512d4d43d77cc9e15f40169f4e0c429ab8095ee6c05e84493ce533b67a0a7d0ba90119922e6fc18402cf7a4d940d8141466f9317e27ac1b0fa99fd7ca5111859711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd35fd4fc8733e6d4afb1bace883e6b
SHA16877976f1307c98fb149421357e6a7bab4077c8d
SHA256a48ee063e811aa5afad1b771244de90ce1a61daf436cc3ef81b1abd6ee0d885e
SHA512fd708f5cc3173f758282e1ed634bcaac5bbf4b1126a159118ae21c7668e8a54c0fd9c9d88953bbc970c3a53d51169f2ca4e375c5508b279aae56a37281052f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1e19c0649f5a1b2298240896a84776
SHA1f5ed13d90cbae79bbf34d4c61f63cdb138693dab
SHA25647c3ab99aff011da3b0bec7aa8529e38e55e79c7d6231630ec9803f7f76f550b
SHA512744cef2223e15e200bd9f930dd4b05d6ce9c2fb02602c50d505885722948d9f87498daf60ec40f4443f5ba7c72389b1d4b776f2ff2c729a272a664046fa7c77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e977863f00b85930398abe6ba20339d
SHA1602212a8330572fc6bdc29b5d3cbb9581b20c453
SHA2565805f0163aa1fcd744b2dea1ae4faa263163929481ab73bf21f8d6f8d7b63697
SHA5125fe04d66027862f12f3b93e8e5e15695dad5bc1dd487b213766f6bba749608fb7f4efa334b6c60f2bf5f17de46adc61fc2693a86a85c4a029701134cb848a6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd89447fe51e3e2e76767425d6dcc158
SHA1ac8ae9f0ab7f8b92dd17f04fb9beb681735327cd
SHA25617c85fb6f683858a52ec423c5d00f0362878850abbc206d690e605a1e9c7cc0e
SHA5121cdebe5d7f3dcae0f66ec7cc20a0b9844b6935a06ae89304e8b0bb6575dcd351153605b5b96fd5757b7320c37685ddbb591e92ba5e6f1fd791b5303b2cf6f0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3c3a4cd14b874b8c7a2d5768f96e2d
SHA1ad7a88c6dc33337b08e1d042425d0c572366837a
SHA256d4df9ff7aa37a8b81cff23ff3dba25a4d84a88f300a001834fef8d21443d8756
SHA5123f6ce3dee00ae0ce448fd33e9317bd9427ec9e4f7ab6959b5723412afe55a2da26c9e3b6fa70c3a326a2a12f764572babc3a48d3ba2897039b055bc9243ffea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784630361951cac2438d0eb0d2834f84
SHA11c73f473ffccf566b90adf26a7d137de6aca3eb4
SHA25635eed633db99f27ba8932dec2828e72d1a3e31471a504e962b6bfa41a1805d70
SHA512a21c32713c15eb2a3f3052f04738d3bda05d4270a10ffed4476e45ae4675190c4addbb42701fdeba3cdf4d0955591781464bb8a3a9f4fd48950aeb8ff86b4a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc49b7c4401fbb0b7a6db019c20c62c5
SHA1714ae56463d6426254b8576c2d1692967eec38e6
SHA2569a02c806ac8544faf68fa34f610f5543f530844dc146f185bf74bc1a4a8853d4
SHA512e1121ccc8c1e71aecff0c8a4acdcf1604cf0ae9fbd44ce5020286866b44fce4607bf59eb2c5e0c6623d7b572c889173d50c75731d4a305111604cb364d2c4f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55369a513576c4abea143d4f323b032aa
SHA1ba38fc6057383ce9273c79b411b9f5c956d65012
SHA25661d621b80f4a7448d41827568a27939c14537aa86d6d9675d416f178e7950cf9
SHA5127443221bc24a2bc8fea815c3eadda1272468d461231ee79f9bd06114720b9bd8f333c57efe7528b6c0f42fa082287f43fbf19b9359f3b02c8d5c06101370622c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e93bf858ff20f8ee53c58330cf77de
SHA1810088da18c60107c05089903d63b2e3cb1c3585
SHA2565bba97f73fdbf80583fc82913b5772173537f5daccc8b4c45a2f88a0663ad0ca
SHA51232a83388a1df9325850d7441dcb27d287a5edb9c912a6d72f53d3b3357f876f34c202fe2130a0689fabd3f8d33b31b379362d3d783299a2380ce3f28d6228189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af8256c49ebc4aa5b90af61289e83d0
SHA1bb669f0ee1f282fb7138d9988d229b9255a32d99
SHA2567db34ce295bb039952e2b8228703173730c98d06278dbf658e3c8b4b6bb7a889
SHA512917ea78e1ab21f8d0da1977f75645b39c86fa5ce7e4f1746da222364618a023779a868117546d0de5380a39808335c2e706fa459dc7354b43248a48815be93fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db85bfff9ebc2ac22be468f62c0a393
SHA17f9ce5b4ab3ffee9b907c6116ade7c12b90b87f2
SHA25675aca58281673fdaae780f72f346ce2c1f1973f47f6dc2c601568f8aeeb39d75
SHA512fa53043b20e6836ac7b0e130b50f34accc6b974f3c4f22e4978e4a803a841d3446a0360e8c4e6df461579c0e27c35c4555c4d2fab8e4861d989edddd4215de48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a769997d082551f1d794401a322d08
SHA174c9974b8e7a5728a604c6f52ad6268b7043ca57
SHA256898e3ec4d752db695a9c66c62106e16298a0419ed76d8ef5f458ee671dcd6f23
SHA512c705e9638441b909a39e03312fabd715aabcf52f53e2d591ee5fc28702e583c27a28b9934bc2c8c7c5245ce09b9a34ad44e976d98cc28c3a61f3839f7f206e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514d58be1689a7638bfe1c0b2a68b2d6
SHA184998bbd1d577210e174486ba55f9fcb5b2f8837
SHA2560ebf796c431128b3330ad00c7a03fb7e7d308cb18741d386acb5aaac8c792823
SHA51204f1fefe33ab3a9fc0726f4936e33556b3e9004f9772890270fe2e0e93df5507bff99145f4cd7588343c7e9af69b050156c17ce765f5c382623341aaa8242563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52476059e7b44383b18a8c945917d49ab
SHA19df41811bd68d34035965fb39aed847cd9e4d0f1
SHA256b26ac936a6d34174b7e5c510a468ba7b3481271791d3a799ece923ad0d0748f9
SHA512ff8efc69662ddd6d88162d8b29eb7c5a2ee61938f8777c9a0463787a898ef889b6ce037cdb5d1bbb2a145b84830fa536ae19271513a954e293a197c563975044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d127f71c6bbfe7f003d32e638d0c2f
SHA18669bb6a891173c3f4a49d4332d4b342e7ac1e36
SHA25686d39ead9225a0fa01b15cf51bc0dd6b8db3e58bba9b64fa9328c05b846b6be6
SHA512c3e447fe169b4c2da1e90888503f7f06f2d292235b83809560809256607cdacde34613dbaa5e6bd3d363d0205ce19ddc01ecd03e6a322798db0b7b17259fcf8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b