Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html
-
Size
4KB
-
MD5
88b0d0600384458e8465291f5c4e804b
-
SHA1
6af306ec5399bc5eb180662fda4ca10f4fcf5983
-
SHA256
e03581237282264b63a38e3e3b8f26ddee93c3b991cf97c9512d0f3dfa6cbea8
-
SHA512
14b88b5d0a52c525d6801ebcee7943723752a5d549ba265e5d02ab088f7e99efd3fd9066bd053657793f05c2ae0c79a20c88c5246fa858fca840f3fdb67c3ee5
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ooHVzKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423359074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6305F5C1-1FA3-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001b054b5acf07f24d924986b120ee8ff900000000020000000000106600000001000020000000ed0ad597435a81594aae0afb356c3448ac9d792ae53642f95e65d6440e4e5c14000000000e80000000020000200000001e925e180522b6ab2fe938313ebfa8f96da881d8444a40af6fd5c29352753bfe20000000028b9922b71afc04e6565e7bbd0589f1b9099c9a242fce00bb900e4bde43d7034000000067fa159bac735c1356a5040678bffc2ec11dd206aa14fd8345cf0a987626bfb4f371affd0b894240c15086ab4f9e48ae6941c02080e3e99d100cfc73bffb2123 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10388637b0b3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2508 2172 iexplore.exe 28 PID 2172 wrote to memory of 2508 2172 iexplore.exe 28 PID 2172 wrote to memory of 2508 2172 iexplore.exe 28 PID 2172 wrote to memory of 2508 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88b0d0600384458e8465291f5c4e804b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abde6518a1a41d62fbd9b2aeac4e1b5a
SHA1f7dab43d672124cfad034162cdd895f894aeb06b
SHA256b1c7a22aee07fbe77bd39d8c70d341bdb276af0a50e11fc8841c746cfe1cc7b1
SHA51247858876888b1c261fdbb7d5df980bd2b4e46ec3b2d6de8d633c53e265906e69bcfbd682ecd8f738f30a09bc30eeac5a484d2b4e845675a45fc8f4e43f593289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208d08705a79d7e6c97a3fc95ea03d98
SHA1ed61e1c251056ce9a261ae9eb35b349e14c643e7
SHA2568f872ee0977d68ab79c57879a923c18919c3f2c944372437a0fdf22b40209602
SHA51247671f17ccbde0c30604ed001a875bd60ac7a954b8fa880ca05f658dbe4df2a10ea76de9ba0c2f4f0265cd27b9c36f1066d71aa00079c6c36a630eee7226c326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59586325b36904ad46b01aeecd7cc32f8
SHA1413e9b1d8beeefff07e74d33b4c52d167f4d9a38
SHA2560d059f9a730d47a08aab615d76a7520826178813a21a1995aa86c1a33ca0a381
SHA5129bff14d311de2ac83593a8f4f9f9c92720eda0a2723511064991ffee7a994fc8942188b4cbd25976a425b3b31b9fb4df1ca34867c7528a43364fb477e1ccd2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b7bbf872eebaf38f76c66bd3369dd1
SHA100c20ffba381a914b16de84c00dfe485ac32a63d
SHA256e36a75e029ce4ee3c1c6d982459901cfeb1c78a5675c402a1c9d4250ecff311d
SHA5125c2677a0716b1e8188834ccdc5da8092ac8d9b9319a42d0b327c988871804d16c7c66d9c0cd3c020eaa4b139d3b5b6414cd95c27ae22058ab5b43e5272f5c3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a38ce4e9c336828ebfdf10506046b5
SHA1b8303e08ebda62f84d5b11ba0a72b871f6587c37
SHA256e777be9380998d0e0aa5b8ba7afeb87456b377cdd595b35f263bc57e7af480d2
SHA5126117296be354d2caf421863d13c67a98f21cef00eaa24bcfcb986e8773eaef92343f46461d65f31b699758151df1aa17701c28bac4a5ce28549f85e4cf9ccfba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53325321bec01dcf5f146831b821a9ebd
SHA11123a559b30271745099c19337403ec07b931fc0
SHA2562e7ffbb0b6a58f761c0917fa052c0e603138f8fab7f27d4842383ea13e2941f3
SHA5122e5317e7c0eac952aa81b0a24dc2fa42969b68a9a792498828e3dcc4caefc10f6845232fa62cdf2ff347638d651195eb39b2795a1670ea5037035839e337f34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52857c325046a8dc2ff77f1c631321b83
SHA13fabd200494d27630b600f244aefdf081d681cf8
SHA256026f8d2ae4ceb7570cefc3a8d4c6f02c9167f1e125e08eee772cea23244e4fe5
SHA51258eaf48bf3a07e51b1853939302820e02d2df8253d8a304c6617f315a2af3556ec5985bd565d296b1ba34233b5564f972ca806ecfcd2199fd93277505f31dae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88f150df476b581acbad2fb2f107b01
SHA113cff3f8879215b8d75c00fe0f39a169bc9a5336
SHA25695a9ed467a5fc50a63d7cf096cf3521c24897cf4d9dac520d759dbd70c966db1
SHA512f8718c73658864ebe9aa860b422852ed7f2b41d02cf8e05feb6dd78d0bed2718f97716c77604402bf1b302d46c4c338a53488335bbc4f92594846be2e584ba95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7e60469794dcb696da97fdb4a4fbd3
SHA10394f19ed169fbaad84f3e930ae82e2810333d5d
SHA25615f3522513b40e6540a1e93e69b45dcc53313b0b75676c3587455e2ef6ce77eb
SHA5122763554a7814cef009e872d09d0a78865f77b66afdf8fed12802d33f34feaf86e121a4012b6c04d0d54660b7911a6760128ed31b4a51e81108673e78bc0bbfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b5f58f1df33efb34782edc685ce810
SHA14e348622e94535651f9053419cfbb127d8ba26fc
SHA256498cedefb3df02e432871978499e4677c28bb88363c391a5f1d2ff1b9353f99a
SHA5126645394cd608d8b4a7aa75782eedf93de85a50720d32b75bc42fb5ec9fadbe969afad9b20084084bc2d667b0c7a5259d9e2e160392f9ebc89554e65588bb9846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b302953a291c21e55511361fb2c43a2e
SHA18606a223363dfc4eb782c96f92ce5951efc6e99f
SHA2568921ca2e3274d7d636221c0fafade6dd352dc7922cbaa3dc58a692af2049613d
SHA512b97d7967c03c05090fba3f56a24938e775e5399842a6c9a296c86eec8c60880ba22e993a6ac452fc654828d6ab4bf990ee18f0f479a6395cddcd340ec02035b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d69a372aa6ebd4017e216ecbf2edcb
SHA1d5f7ae70d60f8d54fc066bedae0ec238c3a939a2
SHA256326152e7e5ed0233d399bb702ff91f88fe6753b32e9d0a8a74daa232ed82c5b8
SHA512638ba8d3b175de4d9b4147645ca43b046aa7bd3cc64827c8f302f2040393f4154cda992133a5b655da7e220b6adfd31f92855822919be19c8563e1b8d8bb7c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae47ed649d3baa308ba66520b6a3fd0
SHA1d2d28f0265f536bf9c2eca34c02fe3933f99f71f
SHA256df94adf4e2b9e2f4d3e02bee9239f1b2d0518a9e776e11843fd815a21cff6c3c
SHA5120300afae3cf11813f762828620ee13d19806234146519724956bb33faadd7125790f1cc8301690ec61fd8c068276785af3879511f93f5c1644b27e78044c4640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1e4b366fd75944b87f0da784334800
SHA1260956ce560af0190f19985f927dc30c5c317e6f
SHA25667f3da2c42992e32607fe3c387e8154b6a100529a598d3901e999964b8c037ed
SHA5128ea2d359be67a3420369552faba36b8a10a54c95fd32a25ad605dbc25df639e6b2d079347672a4785426c4999ba6d3028af6c38be971c771e6d8c9de91ddb8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7327df036d5bc2224e015967843d5d
SHA147f42e19e5515e56da62d2f05e228b980b252670
SHA256285d61fb71dc5f546008b709dc0f7aff2e6ba8b3e104b635888fb787a1bed533
SHA512355ff5b91007988ee7feb8747ac266107915cb4b45d6d722ae4ceba9082445d69d3a57d307bdb1cf831c5c793bcc711f9934df8092bc852e682b9d3d4311e18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc102bcebbb1087a7a0adc8565cbd81
SHA1e4145d8964d73b71bc3e969c65be3c5409ca8049
SHA256d13adc06355ae057734e28a225897e790ddb73239a2304064f2e2104d9dce01a
SHA512ad7e1779e1c41887d77e37e73cd5a6ad09a72074387bdfbb36438d156782184363d701bdac576a56ddd697349069180cc14089b1e567e4427cb8604b50e4f64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fdf0b8bf4b2fd21b09483cc2812b12
SHA16c78d3949b38a6d4fefcca6115c104edd7621953
SHA256f6c33d9c04a7b6d5ebe68528c86d4c81b0736a668cf626ae0ee33a6be1f267d1
SHA5129a21be4b10518528fab6bd8292c665b5c941f4cbf375cc655bba1c144fcc14ba2ac167c7068fe9b42f8c3910a1b5fbf0fa9f8190395a50913d42f587365fab04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fead7ec37b6d18873793449a21beeaa
SHA1671ffa6051acddd4aa47022aabb84e2fb5a6f548
SHA2563eb3573eaecf29953712bad490f59155f7bcd74b30fb9392a8e1b864034ddf0d
SHA51201cea6cd43ed28214ea294db40ee834e08a109be8c09bbd75e408891ad0417b8566e036c7eeab18cc345547853c7162424cbb63a1d90c090836e9792f36b3d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9fd8733dbff1e1bc6d58c16a9181de
SHA12a347e141330f78ffc78f6fcd50f3c4b0e9876a0
SHA256a76dff968c8e99f5978f98b1ccb9f040874f0fd266a1a53cd82306a654c6905f
SHA51235661cd8ae2824fd84542a611b93c145f0b1797a1a86a536e5563f53e9686e365ea10531723dd4f209e9b0306e123eb48fe69d4ea501db1ee33b6f44cdf9a884
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b