Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
88acb169f559c7a3ec4b596db1f128a6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88acb169f559c7a3ec4b596db1f128a6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88acb169f559c7a3ec4b596db1f128a6_JaffaCakes118.html
-
Size
461KB
-
MD5
88acb169f559c7a3ec4b596db1f128a6
-
SHA1
d30996470b103052f647558af0c9772687c0a0b2
-
SHA256
972d9c4c2898462224fc82359d0564dd7823c43ec68d8cc1530f81d81f2f501d
-
SHA512
d2c1449e9faa13042c6158ef7a060fb095bc26b00e0df2970377c6b29001407a6b936f7f1e5c554bdb2892fec69846ccbd4b544a8b43f0226b555b6475e1ced7
-
SSDEEP
6144:SxsMYod+X3oI+YYsMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3I5d+X3K5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0af4d41afb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000086838686296532f2794e92a5f97ee1ae879e14d86721aa32b43d363e90b84956000000000e8000000002000020000000ecea55b6233c5527a854b87d3fe482d757b2e63e0852536305e11c32e0c70cf920000000e40ca021e4d71134418dd7d254b4047ae2c5a598189406d313fe97b8ac1fead74000000039ad4a2c3964ead903f038432993d792bdd428492fab8832d891aa7252eaf37572e80ac7042eb5586ce6daa67141436c2fe0d314496ff703ece2483824bd8d8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68B925B1-1FA2-11EF-A649-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423358655" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88acb169f559c7a3ec4b596db1f128a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553da86bde8aec40e2d5e887c7f73a39a
SHA182441a9e75033e13acad83e8ee42d5f2a7e53fdc
SHA256566dad3f5a841f38d7ec0166aa2b17662933898b227bb2d81cc009f622a2ca03
SHA5125b66d2661b2afa727d10b6c6b01cd5b01dcef145483e1d8cb5d37d0bfaa7b453d95bd016a9b17c250db9f144d4804217a390ccfb6360c5af720d554e38efcb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba08b45d339b2297445885db8e657ed
SHA16796f407d5943170580745275275b9d8d0ac5391
SHA256fb367d089fff249b86169515a9be72ea123bce002ea40c78a19135cf90d33d7f
SHA512e0154023513ed96deb93fc5dd8ab2e6735b4570eba12eccbfaced10ec2b4ff9e2036cfecb755c4b670594c306eedb6f2c91ac4aa5a3a3fc4579b447dd4742505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712b1e50d5eee63737dadf74727991ed
SHA17a8821035a35d8f90239a793075a9888c4b937b8
SHA256936081f1fb521426ef1cd029d29d4489e1501d166db69a8baa84789386ec90a3
SHA512da58f9d2e20999fb47001e44bbc1df1cadaaac0fa13f49c3f4789e0e1fd592368b14777270214f57fa26bd698d2e8ad1b56b3627cb235cb94833341c5f928fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ff75e42ac5e362bf26064f4b7478d9
SHA14d7380cce78e7686a8b0f17cb9acfdfb2b096f79
SHA256c059e048ba8ebd3774c0829d5343c113cb94c02fe751e97070edd8bd68078a80
SHA512508bad6e445c64a8a20fa5785fe1c3a758df4ac45cf67c8c9a6ba5c5e529eb1901592ba89ff65df6761a5046606c754e47f37a7385fcde9ac3e1e195ccc4bf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12c442a14349cc398e37ace954137a2
SHA16b92ec3be8a15ea982f9c27c70fe0c832ff2b688
SHA2568e0a9dddfa07c3c2ddba01a20ff3f7a44f8425a78a00a180e54d74b0a36d45aa
SHA51256879933576748d8a30d6febbf4eced845ca64fcd23ab5232a332534790f115ca16174022e89dc45792d76cf375425d0ab1c7797734e47156e6b0d326fdc9030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ab25452021aedfde641c4dd23f7f66
SHA14dd23ab80fcc78790c50f9043b9c789a52ff21f4
SHA256c522c788bc0386e901f3a97529c14e2d4fb75d317a08d22441cabfb569a2cd42
SHA5127ba33a8962b88d97473fb1c1c2d3b1686b116d4d00bd67655c6ba0b5a31346fa93f27a88dd4bc1318196ec4fe6a7c97d6a730cb4ab8f830ddbb28d0bc64fea01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548202344db8957fa01bf8bf287f97094
SHA1f0dc5a31c7d5b5bd34209e2b31e8367287ee1039
SHA25653d96ad225e63d18d2969085fbaf1a4195bd5bb01dc8c5b63b7e3a3489531a9a
SHA512fcb1af7317e00653dbdbed7bbcbf2a2120b9bb3cf5068bd9e79aec3812adc07ebe948a4cf9e035b0f521bf0e9dc3c316863dd25f770d9f0a25f43bf1c6335818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8d8645e820273cc7e41350b7a516cf
SHA16293e519acd451be023d884bde1e1a6feb41c81b
SHA2569af9f7a4618f1b937c9b1e72d53775a57712cba5921b827a9048c75436bcd449
SHA512f8d4d3fc55af015f2379d52f4fe14716cf3630a6cb6d20c16ef152cdbc473c941d4969f26e1d44ef578e6f5fd3d6ff73696e39cf4b78db53a79bda0f0b942a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43d81fe5d6b4169439964e4d1fdfc94
SHA15b96a152e0571f13cec1f2b2ef77197aff9f5bc3
SHA25636a2f3de4305b9fe3053b2b990eb9f1f923f956cdee7998a3d8444fbf10f1979
SHA512b263bd3d36768c9798f0f46dd1cd665f68968c4002cc7922a6991e2e467fe7d3bc75664c3d057bce390dde0a15cc277c472f253b9578f0374e7d743324387ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9062a17f5403fa2b788c46f49304810
SHA1ed899918584e69528621c2ca8fa2779e75d48192
SHA256ab9249453f0c93a673cc033f6221f91d31630280279d11add6c5ba4256d2fa43
SHA51202f750c238f5ad5757ab01ef473f1630d24986bb68d2c23cc6e9daf3ac03e5609ca38a3f395f3ec42bf78646db1af4c544db7e199bb9014623494a0aae853599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae7e4d1c2acf54b589cb3172f5edae7
SHA14439a5648d5d4d3ffd6fc7a0e9234256ef8b2ef5
SHA2565310c9c72bb8ee1bd7f3898267fa137a9371ec123f2f12922ed8f31584099ec6
SHA512d15051c7439d1054ecbdbac71ba596b2df1b83d1b424b36d325b8a927be6aa644bd71f9f1e40367bb61e6f0ad7d9a37ad8222b571d07f4b675dec7ac97c59f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a3487d50237024a19a7ce231d333bf
SHA16d9989f5d4e8f12965df55cef5d19e4f63906ee6
SHA2562ced83888f722fdcde4974fd9003d14d164f5ba6f872cda1d7941572c81c220b
SHA5128490b3dd467db417b1f0030258a9a89929d905cd8ee8ee08912d2d2687e5cd2b389b1bde730358fa22aa1b86cf01e15550978af32deb62402511ddbf3ecd51b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87756de9eaa289edaebaebf01992db0
SHA1407ce238a4fb8a1906e607830e8c9a4930c7abba
SHA2567d38c788b1fdbeea96a29d038a1289604665525f0bcfb70b97043a38b49f793d
SHA5124a9fbd0838794eb2ae624a29c16138d053de261e20c127787d63c9dc19ce8609eaa88d3ff9cb41a9ce638657600231a3e543cb23c0eb4903ab438ea02992a296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c9542dffea1e3db065d4d88555f08e
SHA1e00d23b56258b061c75b6e964ea30cdd3eb02c1a
SHA256919379112bb44e3927634184c44118f93a06c22d3ee03c6a7336bb66cd71209a
SHA512745d8806ed1f27380e6a142554692f189eb9c4b704dc01600c262a2162a8ca8d940cae61a2b8ce0191a906969d2bc07704e91de36f4ea353bde740bf92df69f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a983a24fea3fac6e5e4017911b835d45
SHA1dca30b7f72b7afe908fbb817af94e93427a9c515
SHA256918e177d3c4aa9af00081f7f4279d31457275f55b69b26b4b617ee9ed5d6047c
SHA512a0b4e955097d053fde150f19b1e0a921a48480201c20128b9c3632e64891ed648819a3800949c9a59059a32b6a180aa20bf4a337a21c8c78542a6447831e0c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57942c9bf900ac505396b8c3a549fe887
SHA185a7b6692d3183963dd6486a740e7a47494e14e9
SHA256389889ed35da1a3d14d16edb3c97dee44af118f0ed0f79cb42b461e646c2d6cb
SHA512aaf62f95767489af668762a3109ed372c13c9ebec0d260d981fca4c2b5c5ac8ed17fca77759a244878111b961e93d110ff8eca499472dc9cb653a5f7dae34719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984ae9e8ce727bd44603fee115e5924b
SHA1a6490abfc1f13680252191298516bd12f0fe6f2a
SHA256a7fbedf18e92c083a8c925303736881bccba9d2ba0cccb4e3d1cb8d9b244dc37
SHA512b103b94c582771990b257ba6b4c4952cbe859582005fbca2b87b91e1af58b55d5c2167b6a735fad63a308b69c15bb41cc2f6343b96769ce749f6090157e94a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c046fb7e4faded775217854e5d63d33
SHA191a0514c639da13dce0dabde74070507928feac6
SHA256d1b9b40219410c017e1a34d0923b8e4ae0aa4441003153b5e45a4a0b7d0caaa6
SHA5126efe9206968ec5b474ebd2ce4a7c121b7432dde31a3f0e87da6d874a618e590369759f34a03a8ca53d9aaa4e367ec52548521b8e2c93b6d98be9d1a886e63e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55183b8f9343090bf0c2f289b1a3b9d54
SHA1a1a10be4ded67884989380167b36aaf0f79ff800
SHA25666140e2b045f98820a4ac893cabeb9a61e730eaecb1c5ddaf9a380cba341756a
SHA512b7c6f271d8a7710314ef0392c3eaa1796d0bed2a744a6bee313a6196ce24250faf3dd7c2d0f974844ddd30e93bc0f8dac83be6d674c8aa00614a98ee427bc7c3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b