Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
08e7d6e59d8da64a03fcc62db8e3f698_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08e7d6e59d8da64a03fcc62db8e3f698_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
08e7d6e59d8da64a03fcc62db8e3f698_JaffaCakes118.html
-
Size
6KB
-
MD5
08e7d6e59d8da64a03fcc62db8e3f698
-
SHA1
2ffee6821e09f08a6be35a98f40d87a13e83bd59
-
SHA256
98be9f9e8cb395bccc29fa73edd5dffb93d9146e271d6fed1608e23a99c08ca6
-
SHA512
e7e7d86cf237c3050b027f18c835ab70f1bbf56c4b332f0a7cb6ce3644345ef4eb13a75781966d794e6ddb1134eacd2ff03bca02a15bf085e037458576465b28
-
SSDEEP
96:uzVs+ux7/PLLY1k9o84d12ef7CSTUICo/6/NcEZ7ru7f:csz7/PAYS//4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007a821e5140c3574a801a130762eea050000000000200000000001066000000010000200000006e86a81c5955c66e76d316fadf4eb20fc8b7962951b1f3d44363c0acd3a7f337000000000e80000000020000200000002be6e785563af41ec16739577700562ccc118cbedfbea93e047c3e5bdcdf1d3f2000000011764bafcffbdfeed30ffcb73aaa39ddd8f2db3a0ce8f7dc2ec87a08bbcfb0eb400000004c53813e9dbcf1e7fc5bd72f2f5a4d3e724da73ede6ee95d9b3667804448525a881cd12750a906d736a582557933ceb6ecab3a762445a9680be6e34f6e136319 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A3E4B11-3231-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425399116" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1051cd273ec6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1816 2820 iexplore.exe 28 PID 2820 wrote to memory of 1816 2820 iexplore.exe 28 PID 2820 wrote to memory of 1816 2820 iexplore.exe 28 PID 2820 wrote to memory of 1816 2820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08e7d6e59d8da64a03fcc62db8e3f698_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0660a80564e9c52a273992f83e41058
SHA19cf2758f6f4d61a094d8071b9853f56b445a4b72
SHA256f1ef94d78598371310201034cab737ba86fde9a26a7b7ef04953a49d54da0e98
SHA5127302525a79f551dc6c6fc1470c6b8f508a4541f5be3c1f1b2065740aeba8ec6bd455a034d6900b8753f8311d3848e91072365c349f0333161a4d6e9f5792c230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cd3e994ff219bf120fbfe7c21ad5aa
SHA169116c47d973f356a6c78e26127b64c9e925b4e9
SHA256807c3d25da7873229071a6d1fb7066234e1ea7579d984694538318e353080687
SHA5129991f98722302ca2ad8d67f6ca02ee64c786ae3460e107c536aea9bb064b4012c069685be3f4a0a3c4a751d52fdbbc2b5810cee2c753b9417af4b4f2a8e17e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae4a9351a38c20879ee0561253b8132
SHA1feb75e3d58f80d0be438510d83cff82ee7b40b55
SHA256a9c7e3ea2c3ee07b8b675413e3edb8ee38fa04b3c36fc3f0d0093ddb6b854355
SHA512b3820ba28e99c108e143ba7a356b89d13b65bb3862814e50bc2c05fc64af7d9f6bfa9680fca1ec56562a025755daddc189489296d21996f361a86ee2f44d9507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048aa2abe0dd5f8e7fb6d10dc0df051f
SHA154d6598950913a34fd5ce9b00a1fdf61b96e7c14
SHA256efe6680b37b8d3890a8faa0c0eb3f0314e642ea92ca4c5707ed4ff75cd8b8b06
SHA512f0c5e17bdd50f79508dd3d5e0e8b18d5b640eab186e811d3e19596b3c1ef921d6ce6f0094b4c45b8f4bbdf1764c6602a97387e962f16f9f33333b8926ec471ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6bceec348e01b64577fcbde0256b08
SHA16a099420100196b764d280b11354eaf2302f1b6d
SHA256c0b4bddc860d9cafa919814a8380c102e8569d983b84728e1413f2372e434f47
SHA512f7997cede8a814d184d34fb2864f11dd813b38da1317c5c6ca40fa0e2a789efcb10831cb63d01b2870b171e6334273533fe720149f3502613b92ad96d6fb83a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54044e020c4bfd87eb0b147094d3790ba
SHA1756106d6abf391b48eebc7738250bb10885e3c9d
SHA256c1d6bb8a09929403275269dba5dceca413095bfee1e39899eec15757813b22b2
SHA51256b358a86bb92c21caf58fa73ae002eb0cf98bc5e8b85fb2ed67bad887a51313b60d8b915f246bf561f7658d4de868418e56420b64ebf90fc9b17adce85b74f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7ab0a3746f9d88afb1ff7a17743eec
SHA1adf1de87851f821d42afd903be2338bb5415cba1
SHA256314b7d95f8664b0be82e664496ee1a9965f24098ea59e52a2e6e553ff0b44fe3
SHA51250f93df829995924c3fb319213e2799f77bdc1b77d1a7bbcd9cc818ac7af436e90401f517f4443d1cdf89df6ffc8cbdb9604de5e758ba924f782e52621e0f617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572110340802a527418e46b74fbfeacf
SHA18e4d837de04778c8583f7f1359ab3dfb596eba47
SHA256695a53d915d4582764e7338ff74e91ccf00df0fc9b47b61212ea5d84186b535e
SHA512fd9e86a84e74a30a75d16fbb4bde1877677d27646f68e6fe0ee2cd2812858fd4f83e7733934411896ad8a9722705b37a7426f3688bf9f5db92c9bfeab6e4ccf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fb369dd4170f5bd91177c93126c4ba
SHA1b745cfabbcf24f77d324b548234a92f193c16c32
SHA2563d620cc16b7e0f91a535ef636701064b7d0684eeb5c4a59cb1c679bb57be34b1
SHA5120337b1af2eeb129f3262a15e3eff5cd53f656efa1dcdbe68a0da3a417388744e7e95cbc154288c835990cb3b573b8f2982b42f9646979002cae2e05ee37a8c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742d237f02ad5d7bf9aa7613a495c0d1
SHA1d1f3612d31dd71bf9c27b95f354cec5ae00d9a78
SHA256b9f385b356993832c88360515fe2551e6edfc003861654fccf9ab22d8446a9ff
SHA5126639006f4c80427f55945179570ca96e5f6a337753178baa699ca2d9f847c7c91de854d10693832a636d7fd77d67e1c982955f50b1388997878d39af079cc11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198df8aa8a77b92caec7fe4ebbc0c367
SHA107b93f22e95466ed1e9f1ad8c3803a50c2244800
SHA256ae7574bece191440b0960ab23a9a77892d17a47c2b3220894bc9d037384b45f0
SHA512885064a0b6bcde9813addf38870456cf28407f812d2d5129dc157bb0506b725757f6163571e9a01b737ca3252d75d55b8560e32d34e3a5a204e7ba9404332022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c991329b5920cfdc56cdef0ac8ef090b
SHA1db51bb0c60427d79a13c74ce5833f59f2d3a2143
SHA2568ef7ee383ba99808ed3387a2b5fb05a5b023e3eca8cbc11bf77acd102a400965
SHA51280b9c0cd2562d7908e9e3aec4ed549ee7b9e588cd1d20b6d0ded1f12d303f3d15422323bab5298a655ff37c6edaeb9c331f9c6485a6c0cf79bde861ab4734089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0989891ad83d97f75fbdef4b655028d
SHA1195d049823127eae63361b626608325b3a3e03d7
SHA2565505cbcb5203780324663cd9637ed3e96f068645a320d36ff7ac6203c4ea7564
SHA512781589588167e6cf3bf64547006430f00ebb62ac04861e264c7394543dde1bec61484612170a41b30334b86a33a78c1a03ea3b4cec225f9944eff3241b9a0eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c9e2c574288e5b45e773a0e809c654
SHA1398a333621b32c493a223eca0e77201320e262a2
SHA25626c7f1a09cff873355dd2db79d1af16e2b6bf7128936a4ef37083c5e7cd30c7e
SHA512ad6171b29447c46670ba042e7d380cf58640c6490f677da2a8b9c662eb5feb29503338755739082a85658d0d8fed2fec7e70b3c410531488f2f21df94799941e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d07cc0be41aca982a9baac7d88b2c1
SHA1a6b5ac3a94854b34aaeb28437843b7f2a262d71f
SHA256e35d277493c11e24f9d7d75025349d79f3ea67067e4983d475a13c0be2835912
SHA5120b38a1bf9c776456dc1a70fde369f61567b141cb5b2f6a0bd32b7104c89ade48b71ba70463d015cdea1c742f181587b167077897094d177f9d94c43f5a41e9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad15dcc7511ed10d90290ced09048cc
SHA11c33d798d7b4b594019c013f90ada7dbc68491f9
SHA256a8ac00cc047880eb6df1969c977795b8c952160447f3204a883ccadf905c351d
SHA512dbb43ac836b16e199d3abe708f2f29968b43d0dd45eb0da47a215147fa05aaccc2c747adbda7e80fa093d5049e3ae2e0b3b7dcffef5a53ae39dd002a26e39130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd5ec88b9a6b52f4e4868f8595561d3
SHA1664b4faedaed70ac8ebe8795ed2ee30cad8c2cbc
SHA25638a8a3c3b7981f2b147319ccf005fb8e6f0966f574bc4acca168de6fa96f061e
SHA512dd6adb63005a4af8c8365614eebab072346c36d2a371468c38f78e82e97544a49fed20715b20929c642f13682627acb962d3a35bbc7f35c118407f276ecf4b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26208f6c79334cb41d1f6983978621a
SHA1650bc160b5f777513d684abd5ecc6be5db34d7f6
SHA2569ef375bbdc1b19ee6686e6f80e938d4d05ca6b6cd67a6600759d18080c28eed8
SHA512eee772c192fefdb434771507b19e24f3983501a28948e69b554bd8de30dab9e10438c8c3b377d79514e2ba0be25278789ff2ea6dc5977613ebf39f449f403349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad90267455a4f87e7cefac1c6da8f6ef
SHA1423cbe4f4eafd5dd208318911c6ec47bde1bfe42
SHA256e5ac5a34adad23fdd3b635a828196c70feed78b7dd3cd2663721d245c8cc8ef1
SHA512b45021db6a9f48e526643b8ff6f30421e558eaf1ab5c3ee714eebab3344d38fda1f24c8d70ec2cf36c0c168960fd0bb768290d720618b51fb8a21277cbc53f6a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b