Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
88eda45555e8683657cbff95b10da790_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
88eda45555e8683657cbff95b10da790_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88eda45555e8683657cbff95b10da790_JaffaCakes118.html
-
Size
462KB
-
MD5
88eda45555e8683657cbff95b10da790
-
SHA1
bf5d937424a7e16f6d9c5d270fc103ac15ac6da4
-
SHA256
e5120b8bebe81626dba28e6f54ce72a02fdf9f6f2c032cc9a9009007889172aa
-
SHA512
4eaf1c0fa1a6d6e8399a987c3af9b1ecd9c1d155b03ad9858dceb53789198a4578ae1a7a91185ca4c2de198a4dbbf15fc57250ee05b422d118454ddb00e26b51
-
SSDEEP
6144:S0sMYod+X3oI+YGsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3G5d+X3N5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB200FF1-1FB2-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423365719" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70adb6b3bfb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e08e61af29d41b40b6d33ef7737cc2fb0000000002000000000010660000000100002000000039a6f017bf81cffbbd42fedf6e98e33cfdf2696103d835c1437fab0169628d55000000000e8000000002000020000000bfc7eab3e64f7e805fb3e87ac6806924df190f21f3cc4754e8ca3737fb2d158920000000d1bb041990d7f2199418e297f2c0ba1e104a4d47459a413ae50ab6b8953ac4b340000000a47d3ae21d5efa796d01073b8d6bc921f38bf183c4c50043ddcafe8387024454831e0c98d6e064249925425c6399a2d8ab52c82bd03f8a8af0741371fab0b993 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88eda45555e8683657cbff95b10da790_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565418f7519079f5880615db9b8f0b946
SHA1769e76a2dcf1850d6ffa16c591495a8828baaf4f
SHA256de04968b42dd74d18dd12b9b4d60798be2536b24a2fe16ef214191ff3b374f3b
SHA512f3444d42c39d11ceb2d45a3eab2694c3696677d91c4db78d3482a4e13c1bbb564923894fb14e610584f1d747619c7e3378ec781591bbe4b39990e2d54acced56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649ad823659e8d4da703f6045fa0355a
SHA17ffa5fac38f0a22df447dfefa838608b217f810f
SHA2568ebf14192c30f99e35c1c25fcb377d8fe98212b6449e5f0af24cc7f894cc5bf0
SHA512011073f6f603391fd72a2aa4d70c9ad2a98b7393633fa4a8d7b895511a42219a1ac102339939b7d94e4c2e9419e3aca53e23c142020b802ba289be421785909c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6a21b519caf31562bf5a4a2792aa84
SHA1a490cb40e9fd40418a3a777253b55c4ef9c292f9
SHA256862beb196bb5b3320a2be4eca69252b5a56d3a76161748a95b8d119bac912205
SHA5121204179361770c6c501edaef9400917d427079674bd77410d9ed2d9b8a2480db8bc0554ad7ed932303e0b9f0e62166f437b23f4148ef010cdcd324e7e0da7919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb6d6233bd3a569e00c0c8f074967e2
SHA1b01e6b5d07df1b7c0252bdcaa6e54e8326a31690
SHA2560e2386a8bdb545430b8172b0d19494bdb7a2c7f1e401631a8d7482ee97c149c3
SHA51211ce923a661f592796598dd9f9f17eb76ef3212afd5d2a8745b02c8255e6dfcd568b0f7f15ce00361c58d30629a112ed56856da77b87aff4c783d82d2789b2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c022f93e249835ef8e919a21b6f09a
SHA1091f2220d69a4df7fd28487e2ebf715ec3e560d4
SHA25646f6a182333dd6aa301fd5b2da41f75e0e9fb0bbb46a8c9bb51095ba99c2f9bb
SHA5127e5a90f6b968b63743e49ebc27c6f15a4135b75aeeb291c858c121e188d80b43a2c4588b6d04e373aaa65fcf8b4a32c373083bc00b53112775730da59eb7892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457f54baebe906a878640f25932844a9
SHA1fde89a7d928ae2255d5e4c8ddcbf9bbfbd7415c4
SHA256b965d948167783afc2178fc7268fa6a9502ae5c75a5add9730bd1130e0a34b35
SHA512c3d8267294869b7ed284071b902316c312f78d9c3a35e8946f79027bd11dbd414f8a9471ee5ec0216a88f05db4df9e02401b5f040c4c340a99ace3d1a433d0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868de8fca54247fef928644935100984
SHA1f37b46c8c39b4036d2d4cf06772591b742575195
SHA2563a1f38f4099343b94882d2f670addbf12c19dec0995c5f18f356bdeebbbb614c
SHA5122e02a7ab7c89f09f19306cbc65a03ea228a80424246ac73b8f7f645eb7a84eb8ed63101513441715380549fd7c38a15e7aa9a82ba42a0a3a0b66179a590dbc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58bd63b6921e104c31a89f2e4ae0373
SHA170a63f03cf92a94d2995f89e9c543578ca0ae3b2
SHA25602f149be1becfffc0cebbc98ef267eed8437cb3a85155f28fff483d55578ece8
SHA512de8dabf0469352e614daddc397f4a3a61b436a398394d81342e5cd1ce426ed11b6843a70af62b9ca9dbf547830a9614796eca949980baf6ab49ee3b0bec89067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4d6e6e48d4f16a3df84efa423886c5
SHA1f88ced4683799873991b9c7e6ab4d2f6e3ce228f
SHA256e67994fb2ccc430d0894a529abda386d1bf1d841463061b390207f153f22dd0b
SHA5127aa0f08063507cd503d852bc2593317adafb849a0f758db3bd0a0342706d8f1894fccb6d1508056f772b2e942db7c04e3fd2c4140c06b999451756d32d9b3d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59990f8a2a84543daa6f0fcbfba7c5743
SHA1c718317721e3203173d1e23270c4627077ab129e
SHA256a3a7f3484a1d41ab1a45fd5ba5bd193bee70060e733fe36df37af813d94ea347
SHA512ba1c4df63d14df6d8058ed97d6b5d8cf4777e3dee838f8a0697a86313b008e61f246f4cd349ce599542a8c4c71d1edb14435f8996908008b35cf6f7ac7c09872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eeb254091307f5d3e01e6d5364840bc
SHA1d6ab757984296c1d062248832f561ca7e736f9af
SHA2563ec328b6ff420fcbe92c6cb89406962571fea0c0b58ee5359c5577243c99aa49
SHA512272f317ec748731310ff6f1ecab8fe101a45c30ab6e5b2465547b3e9e4dac6297fc4b3d0a8c4476359b9ad376503d586892888692db79b3e183fafdca4e8ec01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcbf3f4292f905d56ed8bc71ea4669d
SHA131ebc362196ba8e3a8322062904443350229f74a
SHA256c8d85413ca03c258f562fdbe611194de440766811c0ddf6d4bc23a9a5bcf14d8
SHA5123953946f89f63ffd41661968e61d7a00c0a8ba634760c469cb14ecb34ae0ffa96192925a5a8b019ccb8451a4ea8781304b9da1d0f30713df1f6358e8f3d224ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666276b660abfb8fa03b7a120f1f8662
SHA13615e63ae20e64535c61f0473e68d2a9f714e0c0
SHA256a1196f5b2d989b78c00869ff9e1502aa79255d5bce14f93c37c2cab23c3523b8
SHA512b40bf861ce8c5f008574858df9ce3eccd99a22ab781e0efc08a626776ca2313127f33eebfcbe6418935d7af4c3e55615907bc38394641c5cd4306862ce87b163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54181fafde5c6248e8919ecda43141b34
SHA1590982fd635b9f1b83ab00fabefc7672399c9c08
SHA2563f8a1acd26c372de5fba8d9766cea1508333c9f753909c362f4df27d8b4708d3
SHA5129d3243ff2081ed67ba024f24ea4d67d2d3783000d25bc42f8bad20bdc89c9e66cebf0501125cdee8c25a9ac7498ec868fccdaf4505fe12cbb2cdefd45660cbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d418b60d9cc1f5f69b14ee8d03b990a7
SHA1213a7bf83d5f3637d8a1b82f1f2901bc83635890
SHA2564eb2b5310ac249ba43fc3303b2a5dd1fd922be2a7ae2342d8e1ed6f13058c940
SHA5125af15152ce093d092c147f7212b2a5143b8c1e2c55392b5d3943eb033c912459ca156c8a5420af8f54a9e3d28d0ab1461943bef937daeb87eca24bcc8d072eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf58a04d8c21c305b7d77ba7ba0535c
SHA1ec83ddf74de61853ba426df767e4a5a3687bd1d0
SHA2562bc2b23054f6a6d7ed8e95c982dc3675a06ae01bb2164a8bbd7b02590550e008
SHA5124e06ebc38870b055dc400e7ddc1028b3a73e29879ea959ed0ec4c1997dd248b6c7c9cad055c5937a9193fb752a2528ae47d8a38718f006a1b1f36ae901cb0fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcac53cd64d7d1f2bbb5fe03d5527647
SHA1c4f6f04492a87d532f5a26a9d030d5534de36879
SHA2567120b11d444f23a973aa525f8b379870976ad01ac2c9f51e593cdc6318347a55
SHA51283ecc7452eb169c74c619150e919fb131cd01ba70cbdfd0540edf8825d0e6950ee113cc86bd2edc206147d04561b98f12873f849b8d25b79e39ef50618f7e79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb25a1b3d89a765049ee5377393798d
SHA13cc648eefec73144abee2a20180880a427a621e7
SHA256ed5e2b5c936a12065b8bc5736f08ac7dd346fbc9af2f709e25ae9e09f4f875a9
SHA512a98e8a12f8035970e5cdd75b4cc759c66a192b0e1a81211d2521bbe1b9986cdeba45e6be6c18d0ee8c023f947b0cc95c155434ee1c447555cafb75dcc67f2ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1629c07d35148441cf1e62c81f1ef1
SHA11b4a0d28ca66bd8ae411e3031a79474d8dbe0c0a
SHA2562c812b65e943dd05198c43908a7dfaf8608c0aef0a26baa3e983e23117ba82b5
SHA512d901aa303d88c5f1d95cde9eb7546d9f89e5d5be36ba370f7ecd1a7583a1a9fd8fbde6e770b4597307c3c6272cf76d330eb1adef133fa5372fbcd747e67d436d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b