Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
0809bc8098dbbb548003d36898c0268a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0809bc8098dbbb548003d36898c0268a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0809bc8098dbbb548003d36898c0268a_JaffaCakes118.html
-
Size
102KB
-
MD5
0809bc8098dbbb548003d36898c0268a
-
SHA1
00d650fb59d54978ef6cad7c685b2c6c99e651df
-
SHA256
5f46135098224d173adf38a80e69575bce77fee1f1fead14aff4201d0c68d1d5
-
SHA512
73e78c9f1831709e727dae39b44e954cb2030fe7da6de388a497272e7575fb37083eb69e6c28b8f47247bf44de17efd7cf74670315eda825a104c6f7fb82bbf9
-
SSDEEP
1536:/PNkclJ/RmSn2eDFfkOfJbJFuLy2GgAhaf18Vj:dkclhR/n2eD/8GgAhaf1k
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425387660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a2538dc44778329bc6a1655a75fe5de94b91aae068eefe458b6dfbaf86420f05000000000e8000000002000020000000849e663bcf594ccde76db4db6465f5ac7c76baaa99654ed4472a4085341e2d8720000000eb7fc991c49183c20ff08e337df0506094e47034967464b96eb6251a039ba29540000000e7f325ed33f3a81192592c1bf4b7c04a88dfd70d17a6751b706907f4a94fd303c479c67da6413b6a8945187613c4fb614e3fb131f43cbbd92ee41d868a30c786 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8054466a23c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D505C51-3216-11EF-A155-FAD28091DCF5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1468 iexplore.exe 1468 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1964 1468 iexplore.exe 28 PID 1468 wrote to memory of 1964 1468 iexplore.exe 28 PID 1468 wrote to memory of 1964 1468 iexplore.exe 28 PID 1468 wrote to memory of 1964 1468 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0809bc8098dbbb548003d36898c0268a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e284acd803dfdd21530ac929ab066675
SHA1967e62f4897e715ad93a7ad75659d3c14878a30d
SHA256f3b963130f3542a6e0e4460f638f965f311624e220992393258856bf18e8086a
SHA51285b504cacbb1abf1994f0bbfd44eb8e1e83a1328bcb674e77f14afde8cdd3da317bb12dc060c685c7b81cf68f0d633a1e15edc11e2b66462f22d7154f0340dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8593e461078f081312b915eadb1490
SHA1b7b7e5e573ba249464bf5111cd2a102364a50976
SHA256d1f65af04027eaf5163c5fce8c9caacd61e25d89be912cd91b8af97173c54e64
SHA5123d1e5503c6d9745a0fa32cad7da20996afc8609d2985f724c3182db492391ef10059269fd3c93843eba2dfa03f8f9a788d298cf2cead125982955f4c819ba382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a874eb1c2f93f183abc9f12a1644741e
SHA158c0bc209bfa8844c41281eb00543c073df12773
SHA2564fd09e6dbe4662d1aee588a2756d65baf7c59fa7da57457e9e3d88fe6a976f0c
SHA512c88f3720aaee2c421d1868ab00d0a719bfc871846ef18ace10b5a4235509dc369c1130af9759a9903883d55836239df7eddfbf93e61f5f9174d66fafdfa1a3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46b18630583be824e12609c017eaaf9
SHA19d253923a6723e019ea74fb7b3236d280e7c8504
SHA25669fe054d9bc8fb2be98a2a6ddd9e71fab6413f1e316c7f1d01c846a6e6bb415b
SHA51245a79af9e888723751616a17224f030d7cf312cb0725cedc26764b870f4913bf5cc0ed66b8204ce9cca0f709a9cf1e65d504672fa60de07f40a7fedf1b7ed164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d58a5074190f66b65f913d8026b6ba8
SHA14d14aff5f5fcadfa69a58a6af071980c7db11d7c
SHA256372f471f783098c1927f4c059daa5c9ce559baa28cab2d5aaea9221c52813812
SHA512ce9ed7edde998699a25f9d1061ddbd4c9aada12aee92272ba8a9e57021cf37f874a0f544adc2291c7e69d60889809c77a436ed64c14d458018834c911f3921e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f623de99935b41a3dd50a87a513101b
SHA1a25ddc71c018ddf069a0e45da7fe9343ce0b5e2e
SHA256a5b87da005356617e64e6112919d780b93b9aa0260932b411529ee5830d8bc89
SHA5126adb91a50f5cf0b9eb6a839fe4e2a7862a46018077c379e13962572569622d1248912f2756cf099164c16434ddb58547c7ce048ebb5c3e0b5135a1a9dc1e1f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54820f3ffb94fd642e812474a202047ee
SHA11b7c144c800c516039f4cfee2f86181496ac41d8
SHA256619ab85d879a1259177f0d73aec71deca6945901b0e3246c99010970016fa268
SHA512066787dc4e5e2a1bfe44af108a5234f6d8a3b40de600f21e6406287c180170e45efc3e0181f13f09f013f97689f0c562cf332fa42d9bb6ebd3d2d7f3c847b16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2c91836e0679d6f0119e4d35fb5cf9
SHA12389e696556fd5edd68b3368ba53692645a18735
SHA25601f5a27b6a12973ec72b4a62553032eb7454b41ed4b414e62dfc19c1c03b3beb
SHA512f7f8d60426d16f6bea2a6120f2cf362ba1e0b776f2f195e6fdf1be1d8342e79d7b0d6bb3ad06b7029e8bfa15dce6c4a2bd76142b63d168b43f93d20e0c730a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81692ebbe81bb6e4fa2b80a3d284a65
SHA1c86c42e2d01a85b67f0c96e0e8c113b44989bd1e
SHA256704536f5c981e6fb2aceef937607ba7ba0212ee4975946b8723fdbbfd7a29394
SHA51231ddee7ecad87c36b965ef6bd6b2b1876cae810cbe1ec1143cdfc8e87638bcf6c88e6af2ee19718a8c0c42271abaf04f51334e2bf59de279af5c5371b2e3e0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e4ba292586195b7f155acf4686f5ed
SHA1920d2f73f7781b084ec70a8dba7d862cfdf8f587
SHA256592603dcf8c8e2a64fa17fbcbd8898d5072e41277e421cf6e2df72875f72d8fd
SHA51259ce065174d5db675b1e3b6e84e0c6e867c1b78482889f3b2af3773fad3652a02f594cd82de2245ee9f95467c71b2df00f1e604fdd71c7f67bbbeaa60bf6eb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28dcfaabb0af7c819d1c5850211dd0d
SHA1e72cbedb09d1d132a749ab04af7710e0d1a5c906
SHA2562e38bae08eeb7837ccfe2ff2029c4ac13a096a6e16a3b3d7cf4a1a1b8dc9afab
SHA512c789cae97123d7dc50ab66a148fec089c508a8f1fa69358ef7de5b5b0dff986efc6f8798b35f0bcd04e87f40459fba22ee4fe29a3ff21a670d15874a050c0de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838778e090ddb2c63cf43f99aa93a2a0
SHA1542e8f92ade9357f2d973cb981d229658ee04200
SHA256e9ee0fe2bdb60542a4fa7ad205bd1ff8c201b9bc74b1f3744c023a640dc8e33b
SHA512a66a04e8f2426ec0ddb2cf208d0f767ef29da8f1c550634b7c1df02ce305b8f812a0153707df5b4a564d2d856a7a44190a5c5b172214bb477e189f9e0bb565ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181f1235bc292e3a52f21afd8777d765
SHA122fbde4a7ea828195adcd686569f4f6b4b9563a6
SHA256fcbab446e243a2e5078c49d2899359f449ef1370d36c4108e92ce1195f852c6f
SHA51225b52f1879d09843a9c9c71ec5037c4fd8793996c3d348d1cc33dfc38271856e3f2a32195dc4afb272e23ba872861799f0377299cf9f8d76b2f0645be42f721c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe92907f4f8f7d4f428d715edfecd04
SHA180b025a3aa2aa0e3779dc9cb08307df7ea54512d
SHA256f61b13685a7eb4fa69454cb1bc793cc861321925e8ac6a52a5bf816524d2019c
SHA512e070913f5911d4daa5d2d06b8a1457fe0027e33c64525d6f776fe215a3be47f27c5552f4a1b4c590d07277d06705d38fda2d71ed40183118f742509b6c7f0ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e18700a3d0d0a96a36461b765eb16a
SHA1d2d6b0dc9174aa0bd4ba794a7399bac67b88fff1
SHA25649e90bc1d5adc63dc926a7915273cc0320ce302ef24d44c3a8ff02981a0c4914
SHA5129f0287119f590ea1706d2eea53ff1a96bc7368561a87279f899a41cb648c2d76738efd9c319f3dadf6b04048a254eddbe3fe8bf1b577a271f358e4b46bca9ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af399bf2fe5cff9d8a60cbeedb50737
SHA1c23306412550c8d19720884c54b73e6d4030cace
SHA256aacfe937634c1376615bdf8d9b83efc79877daae18ce47001c87f5d0e5603241
SHA51291ee7f5e5fac263c1d1e4f2b3bfad535006268c06102e472a10ede4f92c7c11cd56c7c8c3e36f88e6136386d2c472e576b53821d95b161a4b4b3db208ca934a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915d236c4d5429f0be252083d627c797
SHA1909ddafa0de2cf10750a47917690f2ef80bab5cd
SHA2567ba39e52eeaadf5ffe70a9aac8611e65a47d226d32ddcc42090a9178d6257740
SHA512614ff0b58e8d63a890376cbce7c0f4eecd002ddabc1ac2c713cd5443d3cb4a2feca1e6464c061253f6b897c45188e0e20d18321d9db683ce13f714b917387140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d62a4800f87c7fdc0b5ffb53a9cb78e
SHA17afc1a3af1d855ea4a4036363a9a4ff2c7fa23ce
SHA256c2c4c97f69776b0a51a6c25e2572233b33d4a877fa63a2599ef997683f2df799
SHA512e10947c8f31c802fcedc510f6b704d044f23702b3aa15e73d356e4b5476004591bffa0628013adc81ec2e26081aea811d0480f0ea4877c9491f64204b585002d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523767cc2c51b8e9eccd526e557d930c
SHA1f0fde40ca3803efedab6a2553b7bc8d282eef78f
SHA2562b2d874aedeeb1a80b516f4e8e5c95de17d038cbeeb6f026dd9d563c7af0377b
SHA512c17e881e95c69fd3e745afd4df49934a1eaac4a2a33050f7760046016b6c3d2e56cb0cac4624ebe3576acaeb0eb957ba6cdbb681b0b5c75e11b445025aa40b9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\cb=gapi[1].js
Filesize134KB
MD5f9255a0dec7524a9a3e867a9f878a68b
SHA1813943e6af4a8592f48aeb0d2ab88ead8d3b8c8b
SHA256d9acfd91940f52506ac7caeffea927d5d1ce0b483471fa771a3d4d78d59fda0d
SHA512d013be6bfc6bcf6da8e08ed6ff4963f6c60389baa3a33d15db97d081d3239635f48111db65e580937eb1ea9dc3b7fc6b4aecb012daeee3bf99cfebf84748177e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b