Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
08e9a21cbad605a29283c1fb3ea4cc3b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
08e9a21cbad605a29283c1fb3ea4cc3b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
08e9a21cbad605a29283c1fb3ea4cc3b_JaffaCakes118.html
-
Size
22KB
-
MD5
08e9a21cbad605a29283c1fb3ea4cc3b
-
SHA1
889c6fc75b3317548ce85c7cf57c59244ffc03c0
-
SHA256
16db910876ac1aa46f3105df99284716c7bf24b24cf90700a14699b29be7299d
-
SHA512
38714ecb8c3a354d9f17a7b49a10897052e6fc302256c447c9bb25710bc4fd7e6387463ad5c9cee235a1d6411ffa71c5d269603ce3b3ff97a8bdf4008502e94f
-
SSDEEP
384:IzXZ0wX9uOBdZ3h58+J4JBJtSiVkYe3L6Xx5Z+aXQyR65c/yzFPHR:eXZgOBdZ3DifkT3e8aXfR65tZ5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7833FCD1-3231-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b086b94c3ec6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006237630f2efa19bdb4f3f23ab976590124663d65db08cbebd0ffb1aa3c210984000000000e8000000002000020000000269ef2b2823ca7db5d2284de6593b71b416047b1bda3909860d587f345016a152000000074402ff7d8fa362dc6dbc2c6ffde99e7bab409fb8888d3e4271014cdaa20f8ce4000000005ace4f74f0fa05359f38127bb778c29de24f3efd3e4f42cbf9ba4ea5c963ce40e4e0f2e2258533a0a5bb29157100db79d5faff927f052781d07e6b0f33ed0c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425399220" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08e9a21cbad605a29283c1fb3ea4cc3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58363d0b228c0299223d8a61e36f0e948
SHA1a73125235ebdd0b1f0b3497073f336a0053e0890
SHA256787e5204a794c12ab47dbea37297619fc97e65ea983c68c2978f037757ee907b
SHA512744335e8c18a01a7b880f9a60649b483dfc266ee8fe845b0f23c831e18289a8d84b735369a3f7d43d2449eb012e7295bb345ba74edde19739ad2c6f86f08b9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfbd3f1e41ab13603c1865b40cb0aa2
SHA1db14c52f7b33b23fcdb60242dbd9b245d008d0b4
SHA256e924a84d7d8425a844116df2feb73dfc680e07553bddcfac5f0e8cb3911eed8d
SHA5126be348a1fe8bfe026c7f3a512cbb9940b686e61e8af80306d98ea8f4510031b0161b066ade42fca541bc0fa902935310aecc887aacb2a0da957ff3ac7f3a0921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f553ac79c0738693a201fd4110fe8dbb
SHA10a8a3fad20366213353233b80a4e4a9b8cba6bf8
SHA2562d1a7f7b2a2fba4fcb3f162f351ec707db460f9747780f9edfd53f0d9a1fc880
SHA51211c4781f95717021133af58831456ad2138a9d5f29f3dc5210422aaf0b233e7d4a9199ece0fb1c04aee5b8d26ace7718061282ab39cf98020172addf28af2a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a845579801e24b3748f042994977002
SHA122738277428dadab3b6356ba8cecbb3b5807b0e1
SHA256ac867fd7f5c9d98a35cb04d0868d8eef01fe8cc7bea265ed5feaeeb402bda8a8
SHA512a9e6bb442ec680a35e03537c02117fdcb671b5092f014aeb316d8e16e6d5ab27e5e7078ff97388052230eb9e8f419a2fb7b6bed98762b8d5eb602d1c52d44c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63205cd8a5ca1ac33ad1586013f6ff6
SHA1b4c30376e950017b0d30d15126a8b443ad34ba1c
SHA256fe10455545ed4e105519ec8c25d72b8e56a8ded12ba316c835bf240cf099b88c
SHA512e4734b9ca505c7f73fe8e213d768d319536a3f36bd7bfb6422360674049b60018b6c08d758d3e1e30831bd0dfcc6a0d3f1af0e0a062193b89169bdba4a8a7e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee649032444f3655709433141253828
SHA19e7ff5b65c2e519b6ed9772e6d05aa7e438d9eca
SHA25660d6934fea0a46a04cb3c50d5154e13146ef0bf259e685e797b7ebb89d2af16e
SHA5121ec94e0fe4ff5acd766f4be8d26c7aeebc2caab77b5cd3febc1a9adeaebaf8c0da1c369be6e8c6c92358bddeeebe3c715f246914f127aabb571dd03bee44029e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2a2f070640ca56ca87f3da15887cc8
SHA12c068285eddc09ed7f88a662c0aeb40d455431ee
SHA256b0b4610b170c082153ae5aaf35cda486a73ac9d7afaa14ab6734e091078360e5
SHA512473af49f4915f929795e54c26ae6e3b78f7df0bc9d3d8061e539bbf0e6bc70f7d00ddc668efbde0e7fa6ad02d5bf6a8d71e749630f5a31403393da25dde4ee5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f28c51a2552933af1d74dd05a8bf94d
SHA1797a979925a1a9efe854779a32f3204d13fe7a7c
SHA25671c568cbd98ed745e37ffea578196b4fbe540d276a3901351101858c6c309ee8
SHA5120fb5a20c39f464b6ac5bae85dbd77e67f369d85d23c40e9b3b8950640e79034673f98cc154831ac5d3557530d64c90a52e86365d7bea1c7cfd0569f7524df05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023df4cef17637b06b223a17e5cba389
SHA1a152bfc725c5456325c02cbd2eb3272f58528a87
SHA256dffa841451a2bab2e1ec9e873da69ed0a0d4abb0db445cbc5a720e5b955b82c3
SHA512105aaab06043640362d5a679da8cada28ae52328e2c40905e5b6428922f7431987572b90e60596a1048c5534fd4ca5ba14e37c76edf75e29c4ef47a7aaef3480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57390887790626865d18fc103d44836a1
SHA168e25f7855d36144be998fbb5ded8572d5a53cda
SHA256bf4ee1f62ac0d2b5a3a60ea4d7322c683d65dbf43d69875dc93f7a79e317ba4c
SHA512c69707918286f32b0e79a6a08e41a36178ba5c4c98004ae23dec560bcfe349896a2921a96490d2fcf496768bec54d62ca625564e7cf4a06c85746c15c18b95bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72773d26dc1d450288c07a7c249a3ee
SHA1edd412fe5e2b3e0a0b117ddf17a54a5151e06570
SHA256060ceef945aa9d38cda4c623a213701011c78aa78314bdd510a98107ef81d99d
SHA5121de891ef6d4e907250bff97f76c3049e4cfc5cf76792f7deb7e01b9db58ae6e04b0a2d66c223976ba50d231e1b7ab8ca9d0e7c57eaa1d0acfb703d631f5a9692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8240c741f4121e9d81e940fe767fea9
SHA1b88fe8b4c9eaf14fc74e3b3f89c24055ebb7f2e7
SHA256f147ccb67331fb74498aa29123611affd77af51a467abcb6780a42ccc464a367
SHA5129c1eedf496c2b26db832e020148590397ac1d9d8d88e4e41cb5a5fee676fc1f777f43f662de743e7c9dbb9521ca701a7fbd10efdbbcf1b63cbb43a8048aa2299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119f5a001ba78021d1b3c872674a03b9
SHA17fa5de6209ba52c44778187d1bfece0a9e1e40f4
SHA256507dba54973407cf394920a40ea308befe04a9159bc81b6a27bebb02befa3814
SHA512390998d6809ee28f30988102b82c825609fa70826de4d9fac39d56b8fa99a0d76520910b48f04aa3d4e5c65626a6309d87fd910bb51af0d971f1684536f4fa2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f7eee37e90fa3fdf76d50315736a8f
SHA10888cd1d9fa6186384c4e16b32441b086e36aaa8
SHA256bf1cfc55317f89f52e2113b3c396f5c84fd2c3988d12a00de550905f41fa4694
SHA51250fdf2da02642ee10323c6c66757051b26411db9be1e5e4211aa6c56ba04ce5ee892a47478ea9b9f3011c60cd09d14d06ad2110783c3b8e4f21c086f34fed1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7be90095e310b41bddc373a223c841c
SHA13eb0b297e25c3fd2a9c08c8c6024fa9836a3537d
SHA25690f330c3b4fe3ab296b96874b4837cfaeef39e25322313310a36745d5ccbce03
SHA512ccfd55a8103ce38a8f502ceb6528389c77def4b3f7d368459a6ee9ab7bb46a0a7a7985f8b3dd27e0d309817a2e1b05456a260a67cb297fb3a219667be03430ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e966f211785f33d649e1b5393fd1d92
SHA190b26e6848041e216374b890db3184f01d3f13d0
SHA25690bd8ef980fa631c88ee6b25030ed5d252fb832f0ff4046754a81f27260c4d5d
SHA512cda0b0c36d604980d6a6993457ebfc4c0d6eb1f344ce3e777c215ba09b9cb23036e678303bf16522c2fa25a9b51a2768bb279451fb51cb1d64585f685fb3cf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1e1bd4b95fdd90cc6f3b0a83f5073a
SHA1b3eb268830294f1d192b7d5d210cd34aa90e336a
SHA256b4077a7421377e6f8879e93dd4aec67660a67107509a7f15be4cc27a0eda449a
SHA512ba8ca1fa334836c4e29d8841c60c90cc40177176595229a7f72774c83588f33eaf2eacdacd694e86451a2430318b6cd9933d0cefa91112c191b58f89987114e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582af1842b4f72e696ca22db50f32a96d
SHA141e57d4412a37b100ebd749d5d7906400876a4cc
SHA25629174f88bf9828dead4a383d119d1c3916087a19e04242e4c1ddddc9258620e2
SHA512fd6ac0804e3cb5709fc1bf82ef2f617ef8b6dd4f5d223874620bf7b4eb36465fe4b42eefd48117e187889b809ed9791d565c5ac48cda65c4b0d6bfb54a47aa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc4e94e68c68f699293d19878a97a83
SHA1c0b5f183cef7359e09be3da387ae49de474c1b2c
SHA256792da6288d9f978adbb81409ad057b140065453ad8798371bff149dda5db9569
SHA512d1e7b63021d202bf127a1d4988d4ec8fa56bec3a3e9005454b293364ca98b2739f99802d193cc3a68ada65748fcee47fa402d11d60d4747420db71a0364521e8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b