Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
08fcaf4ea01cbd253af9ff5a45bf43b0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08fcaf4ea01cbd253af9ff5a45bf43b0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
08fcaf4ea01cbd253af9ff5a45bf43b0_JaffaCakes118.html
-
Size
53KB
-
MD5
08fcaf4ea01cbd253af9ff5a45bf43b0
-
SHA1
4c4083adf01c8d3ec8902d14bb1eba5363666831
-
SHA256
96fd19e7e5ee9a3fe99fe16ada65dc27f44ffd1db3ab50daeeb5aace8eec23c8
-
SHA512
d63e63a87d942904807bec7e6c98e877601d7863a87dee04e8a23e2339da2056e5e2b75c99ccb8d08785139eb78729cf96658a51f74efcd415e58e803bc9646d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUvrunlYu63Nj+q5VyvR0w2AzTICbb4oj/t9M/dNwIUTDmDq:CkgUiIakTqGivi+PyUvrunlYu63Nj+qA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a2a75ff0c4748f06b75d08b0f32f11958d096e3eb29a35e7ec4c8c2ae5f48a4d000000000e80000000020000200000007c5a2a147ad49115fc13b188f4566352017ecf1d47383d7a29f3e6e6e37bda7220000000cd22c2991489ae3f89ae1df78b850d118d07ebc7f7aa00d11465bf649ffeb24e400000009fd48888b48ece4394f8f7139fb7100148aa90a6356e75240aa7f93d7b5ce46a060130f00245ec75fa9dcdefb2fdb6e0ef28d3bdb08981c66a849a91e4376997 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFAB07E1-3233-11EF-BE23-DE271FC37611} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425400227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6082c1a540c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2328 1916 iexplore.exe 28 PID 1916 wrote to memory of 2328 1916 iexplore.exe 28 PID 1916 wrote to memory of 2328 1916 iexplore.exe 28 PID 1916 wrote to memory of 2328 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08fcaf4ea01cbd253af9ff5a45bf43b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992d46041bf538d00ac5764c83f3ecc5
SHA14019baa6614994dd32ff0881bb2a799d7ee93c78
SHA25660cf1e0636aedc675607ed38ee3f4cc9dc173b1c3c0eb12e787093e1cb1e991a
SHA512233f66b049a0111f1f4af732baf4209a8d854d07da643ccb79ae6d0b20466960a6e645cb3900e1ab08f9c154f22d320a111a3468112519205e3934fc7753d6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebef88485a6bb023fa9c8b053909fc25
SHA1053e1244e8b2e59cd7a1448a8812d8504338a945
SHA25604d76f09d846b2d0fc7ccf9968d2dcd28d0cfc30364d3090cce4abd553de1a9a
SHA5120baa37b485e55f1b82b56f22073a096e5e234d09f33154c5d6ee0b32c1f1f5a7c30fd367f0bc1aa6b8a02d6f5be76289d838c40c662d073deb7ff20326a67823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b899befa18ac15759cf8806005086b31
SHA14fe88fbc2c5195abe5d0bed78bf462e0abffbc53
SHA25684d81b7d38f196f826c6f73eb2d747822d6296894c9dcbeda5ebc5aab0e97a9e
SHA51267fabb695712878fe015abc6022e0218c9f1558bb6d2d2b623ff7c673dd3e34ec8ab4120f5f0c2941265c867d194772f2c22eda35f51c8e35a138fd43b82b421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501315af5fdba6e7763d6229f09e6e96c
SHA1f8ce3db492d2e1fde756f92821ac22a7b3c5ceaa
SHA256350000f490660f5fc42f94e4ff1c7f79f15aec5ec11ded0ef9deeb6d5d22be42
SHA512b4f6e106c23c355b03c311bca5d4958a503ba296463cfa88927cb9651a7036eab3f0e8f37c428e621224fbe7090c894be5c64c66b2e51bb2b314da3b643de867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f216937e73e1f65bdfa6d0a69063530f
SHA161c204df78b65739ac7d35ed82f15b096f9452dd
SHA25682175cbae00496fe8945da6c1b50bcf5440b821042209af88252ce1554e20f40
SHA512d0d69594f1fd812d48a84c4f047ff49267bab24a608d6fd668fd89991cf93ea3e58752a3da0d0bdfb9a5f6c8abbed7cf4fc6e2a96b0a98c019324cfaadaf4480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2a45f965abfccb084aed5a1f2e19b4
SHA17ae367e175cd88b80ca95eacb7921ecaf9be22e9
SHA256947a0a3795bbe5d5e9ef77835159cc6e332f107d896ce3b1b32beaf8f2f81a95
SHA5120db09e42e9f70626e80dc5d5bc2b1ec4b9fe5539215fc059212c30b640bfb4aa723148afee0c737f0bcc8e70ba18db718b830c3086ff88ec194fd1cf5722826d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccc7bc2b9c8ba01098933f5b52f5206
SHA172ff8c05072a1956396c85f3fcc6503105e32cdb
SHA256ae3ccc2e5d3eedb126c0c9bbd92268a2c7f5e4c5f342ac6af2aecd1eee54ba1a
SHA512b364e211f844c43d166f75927f5102845a01ef54e74a9affc4a4446593119d5955ba0a7cde3358388a077d59e663b66c51701701f020c8b47583234abd5822fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb69681d2bf4137c3d0094db08d31f0
SHA18126fecd4a098579a2ec7b257d2f3ebc4b26abf0
SHA2566c318efc7cc510305a758fbbbffda6824f12f0b3d867fc10a8cf0245efe12f10
SHA5125a338e7cec159ee24543cecd40df1091b5b3ba1329efe79145fe93c8c1d482e4bcca1d1df494546c82d30100b7e0c9a9c75e21617711674e53321f13ad4b537f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c0d6c9486d67d11ab381e4243e10f0
SHA1de67a4a4c155f4ce6e9135ef6e3c6c9f9e0a5308
SHA2569489c821ecaa72e187c306636de977f8520be0981e33ec89b07ea69ed8abcb28
SHA512e037573f17f2b9cc0a63e8e764257bdbe2fc4cd458022f50e4c968e335ea7bd19fea909bf88657505657004738ed62e7c9efa6ce6765a8693090ffb44cb81c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb91b62a7b6815ceed1f548f671d1a7f
SHA17def3454e269d5bb739ecf3d66ff383fdf6976dd
SHA25650c96ca23b5e98e17d9de79161232840533f92578a00c280086986ddb28e731c
SHA512ec256a1420c162b0e4ea6a6af0f728390367c927589a780120e9a0e8e7dd051aadd99653fc9ce0757286fd865050c87f22dd255685499acbfd147497729bfecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faac85ba9cf5ec25393cadba96889f00
SHA1501f39128fb2b8f5ec7350b9a640d6bb006b1d48
SHA256c1ac5d534cae75efdd4283223fe907ebc9fdd01a70b6e82347beafd29259ed96
SHA512b9d867f120f07f92ff174b594e2fbdeade2af3d1c8c3747a642ef07dbb28ffc238ddbc2535fcf50da647f844f21b292e813df240bdb31a8c5f1428c228582914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d60d40e0598c3e8263277fc5d7726e8
SHA164b593da2923e36dd61045dac57a698d7ef7aec7
SHA2569c31ed13f0c17d80eb8df3c3636b12bc8a576e7e4fb55ac5c2619de369033fbf
SHA512591a6a474285bf43fd72a20b492b2dd2754ce098c8b9b27af93387a227a4fa65f915befb64e17bbaa91f6a62a1884a6aadb9e7a0ff7aa4c435b352fbbafa0f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77b4649dddd7d5bbc588204a011e198
SHA1eeb4d86d2141f10e8f47e0e65098b4b9e68581af
SHA25665cda4d35d1e127f457b15bd8fab077af150e3bca3b1736db857b3509e5be788
SHA5120873d4d3b4315312999c047f04293485c46a8fbb99a2b4b600047f9dabaa5c72aa425adcddff7c3205a77eb1c153ea9ee4dcbc01bad18a9f9579ffaa4d859254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3fd16e0b142dd565dfbe617bc259147
SHA120eba8b0b48a7c40ce54ac657844745a278207c1
SHA25672f905cc23fba22abab642b5c6e9a84e61fe2c68412857a33d8da2c3d775931c
SHA512ea34a55ded4d46e4159fd45cb216d5d6509135e253d2474dcadf3a8c652269e8c9ee996951a2699c832b6d0cbe5abf614433372ab2aa3d1adb1d52a85f229755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553aafb19344056c2e6c8195afab46f3c
SHA16629112b503625e3cd7322f8618d4160790052c7
SHA2565fb9f552b9f5387f000fa631787b6e8fb9225ab9cb60b099ab5c2cf092f0b847
SHA51240d9c43963c4bce3a196f692cdf36b88576f89b31b792923b9d8d141f5c1e5b5db35eabe69356b792aee6c8c3b15666c1e60d29ba874ff966cfd501af5c97071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f523fa04899b9dfbe609768c2a7316e
SHA1b35a1dc94222e43e5c61170c4185996197a0b3f8
SHA2563f180814adc571ff607e3461d80e0b8fff12b83dfd19775b20b049549caf8044
SHA51220f8608bae9c144203563a16423dcbe45ab0422c169aec837c5f17a4ee48e71913da7480cef151562ece5d5487549f01f45d5296838fc88a4249534337cb131c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d27a6279618e1591f6150f3582ba3d
SHA17dc4ef459df58548d1dd1e9cc3c19b541f666b8c
SHA2565bfb430dc42295353ef7a48fec58959ae913a411224f886ff8483b5fcfe5a521
SHA512d862ad1c61a9c70f25e6b56e4968c99a8c2233126facee4f199869c5a2fc5d23484c51b885980fc337d85f3f596f04f3b089396986d445d7aef5343f7c22af1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560547d8b28b297960460b6c9d1c83be7
SHA142a14a15f5d05a6d5f0ebc201b1ccac0f899d0b0
SHA2562211b3fe41833227293860441ab87689068d19313341b56048d7683a0b1a8420
SHA5120d54238444dc59a9d8952edb3849667495b87aa4ed31a4f060ef78eb9ef2c0cadb5cf6387edc4f9d49c61b58dbbcc08f54405b41d392b38d2794e7131baff332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17bc2d1c40fd4a3cbcc495859c20e47
SHA12435998a6f7a974915a4a068f22be2c4cd6ffb0d
SHA2568a8823ede7c1a8ea4464a2c7c5c6176b2381604faf401f04722d93578bbc696b
SHA5125c3cd0dd9cb60fa43cca58d22040033b9d9aa7009fb06f23499a4c0c4222f2c2c84ad3862082d9748fc8ce34079fdc78a148814e6f8cb43a52af9c8b578510b2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b