Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
88fa0e5affd9158d0461d6a06742a800_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88fa0e5affd9158d0461d6a06742a800_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88fa0e5affd9158d0461d6a06742a800_JaffaCakes118.html
-
Size
2KB
-
MD5
88fa0e5affd9158d0461d6a06742a800
-
SHA1
fa97b08ccfca1489444a55e015cc24e2c976dbf8
-
SHA256
8531c0b845592af83b2a15808a9d18b479872812167aa9d26dbcd114146abecd
-
SHA512
22f08204c9280ee0f4a42d4e59f1731b9b7dbcc8280edb83a53b05aeec4bb9b091cea27c0e1ea5f840dfb8c68e0f32293b8809bc9d22eb4b699c5ed250598cf4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28505161-1FB6-11EF-9387-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207aedfcc2b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bef543dd8192bd4cb7604a608ae86357000000000200000000001066000000010000200000001e74319ba70f860aa185923350a74f579b3be7501e6d78a4b27d2a6b6480be62000000000e80000000020000200000008e26dca708b9d81cd97df4c9a1101e35176e4aa711c963debdeba813e8c6ef64200000004c2893887df907ef4a998484b964b7809409a9bded1d23020011c682c61a477240000000386797ef158fe667c159c717021be5ebfd132220d9a7d481cda037442afc3e8a5b995fb8fe131531d59177eafcab0ff0899cbef1fa3777e672c80c7a4e7d9f00 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423367136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2204 2036 iexplore.exe 28 PID 2036 wrote to memory of 2204 2036 iexplore.exe 28 PID 2036 wrote to memory of 2204 2036 iexplore.exe 28 PID 2036 wrote to memory of 2204 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88fa0e5affd9158d0461d6a06742a800_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b86363238fc0a218b1977b9b8169f0d
SHA115fae0b3aed93b54c0500a6f9981c9051444389b
SHA2560f35cefcad364564bd7291211eda65033eb96613263459d0a13106950572b41b
SHA5125ace28101dc00f06cea04448ba70dce6fc7be7c18e14b8616cbcd685c426442a6e7d78947f0106e882a83632de4f92f1a4cfcf61f525429293cd44a1aedcad62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53101c796d7741ac6abd395376ac9b978
SHA16e003e4d5aa96b2d4a44b4a6cf377a6f5d61d105
SHA256d68ee6146d9d2c6a8880c6c6669d11567810f45ff4bdf51455661c1c881f0e4a
SHA5124c990b35f6b4501b2f3d88312195d78ab19518753a8d1f15a215593c2e0b7bcf08e5dafbe48fd87bbcd3e95fc0669a6504f39876d8d11444dd11e21adaeb9c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e546f6292757990caad31b4367b533b0
SHA19ccf300946aa1ca226d14b98499ed832a2da5052
SHA256288b7395326d5889bc3354f8af4180cf50b6321b19dac0c17be415985c607d8f
SHA51271759f7dde03c9e8089aa73a37fdb7a9f2029c58d0f3ea5d7d843c3e1365ea94061e9fbf42048b262cfd6f939147f47ba768d49468b5be178384dcd26bee828a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c2fdb9db43d0da3cee4de97eabda0d
SHA1405f979ea9b76aaa035293225dea827e4a0a7e40
SHA2561bd91f6df54455f0a1615f162d3edb09495e6bd484c4a2accb98bc9d8057fcad
SHA512bbda5545fa5c7cd5783d6a0e7945562f4124029408ab256f647d080395cbd0ee5923ef9841cee4bacd203b2ba913014a17bb2db221f7a4515a43b96e771eafc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21b01471271069019f2960ed2c6da67
SHA12e86a50bf16791c453f97da0e089df9d0025c82b
SHA256e07631e506ead4d5d6a10215cd826adfe4db439e1daed108f1183b365aae3e48
SHA5128e2544c3ee9ea6f2343dfc88a103438dce472a66edb833a71e22286af466b79335f9e0f91f7279d801932350093b8e0cf4132afe3b6230d3af5c646abf60aa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587679e439e5d5987095a758be2caf098
SHA12fe9b030983fdc7d4955db08792f2ebceb32adab
SHA25611aca60b3eef2a8945a598165677db054ba972d83e1213f56295ada39e75ff34
SHA5122f47cc1af3a3c581324647aaedcca6d5cd85eea5a8194fea2ba3eea79942c373f2665566289caaf83367c6a519edcc619c408149303fd4b82d5f2aba855b96be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd75bc7ed1bca53b1b6c2ae11e4d5375
SHA1584a69c85e21e056d93a22d0851162e321bc5c67
SHA256a7f25a7b3eb8a259d74920af05dbc3424f87e6f2348d812c8a04f657f64747aa
SHA5126daf7cf153225370cc4bf8aeec48484525a1012e15d82b292f97521d172f8ba94321e2902c23adbfd7928d2ad0f58d6646b9b3efd70418005b3710398a4a8f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570b5d9214e11798b8fa8071efc589f5
SHA18679ccea2a543ab17b77b8de188ec2aa9ffc6be0
SHA256a30077308340f15ad5a20d60bc14d04aa55be17ff5a857aca2531c9252a919ac
SHA51251287cdf9e959efe07cf6cc5be327a42c7591eed2c0af52a17afd893633ba9fb9fcf8ca49211001fb29153eff65405b2c869c231e634a05d6ba7721cc12db858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20a1212a15d1386de6c8936b92ef398
SHA13fe2127ca3e62416387a7455512d60685b183085
SHA2564501aa159b89fc72b2b404ce351a50180cce405be3670d2be8ecf7b052d1d68f
SHA512dea4287cde0c520d3f35af2d8ae2ce74a281f8c44dc16ca2b4f5b2a7e4786b81dba8612b981381ad727727dd098ddc194ffe88a749c458934424502f77169e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51406412186a6c474c08156bc8042cf32
SHA167761a5344694d5bde01893a0f68cf70a5d8e508
SHA256e12bdad2963c54b183fe46a5912a31ce68b1105a705dde7aa21195342ccc5d92
SHA512daffd844ccacab92c0d3aef6bf450914fe19fba7506b120c7f6f0f7bbb2f3b1caaebb8baa534e5eb6598c224e99c5f6a9b158f7dc0755c026bb4926fcd4d5446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e38adac8f278110ec6ff5f88ce8ace
SHA1403052da6f7708ed75e45954817c471bfcc832c4
SHA256fb33615a9296a46c716199936f9a1ca44565cfbdc47a683dec9c6e2934982923
SHA5122232393442556034ed818f2698f575abd1e7089e64c0c60421a34a9bc121afc6f646cc5c81e47738180ce9ff714ec1bbd3574d2082b64b4d3ad977a9da9b813b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91359c94f51a36f8390df6a01b69f66
SHA1e6afbdc86944687261542f81ff91725244e9708d
SHA256091fbd9016855e3e256e8b9027b0c0196a4fd7a232b724b6527351b972e24b9f
SHA51250025e2912161e90c4abf5489565c667a70e73c3e27288a3e03ed31bbd94694b4348c10aab194ff5201048e8579f87043a47e5d99888a2acb3b8289addb37531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d9226011cda107abf814f9a58747c4
SHA1bc4db1c4685f45bb1abc4519e02c4b07cb84487f
SHA25658e56f6389a408347f45070af05db8f29d4afaf63c13051eb03bfde202c6e32e
SHA5122ca29a7151b9846c04f4a9cfebabc79823ca70d3536b3a4c398700fa1a3888179b3b8a513aeebec72fe85dc60887856c00eb623b011b7baa3b435c0c5c5a33dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4d79feee4c24b34bdf8373e9a6f5ee
SHA150c6e88363dc9eb8bda8e18a8fc6296d2bcce655
SHA2561c128653bdc45603a7954b2edb2bd322c264100ddae8c6ab8109e8bd491b234b
SHA512ebd1cf1d46e532f43b784b4da547ec51b0721bce444a8569131fbc3797a64e0105999996584e3e1a3ab204414583da4151752534fc1e144e1c6fa47b67693ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51633fff79495addb78a25651cfc47197
SHA1296acf6d3b746e1a2106ed5e83da8459e8958141
SHA2564c2dff055cb35ada9fd6e21280bc73ec9861ab14a19732d302b1e0c05d14a8fb
SHA51202628218cebfcce7e4c790663964fa9d84efcb20d58de0dd2b39bada2e55c9d50ab034530f219e2934cb04ebe920f0530e04383350baf840fd94917648e37a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55512447343f71ac3faadac0bb49ce9d5
SHA15513ba2478dde428fdec607f196b1c25dd0cfb4a
SHA2566211dc0d4ebfd008b431421a56ea62b6413f54a1d955ae5ae6bd8b59b4389c3d
SHA51246727af3c5c16458baa971e3381f65922add3f8dd9801ba8fba8158d98546e660c9f9d80cecb184051103a5e040b8a5ffc4a98004fb725ab764d55dea1412c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f811db1e0b5478147b403c6a19261cf0
SHA12a3de40def63476a52ba3b43a96e51da08fc6820
SHA256594ec6afd9c18753c95d348e060925fce7452f8fb6154e587fb1b65a760375c3
SHA512c8c99a9106d0e54b8f0251eca0e7760235b4e5d2692eed5c1fec7a6d7cd1bae4a816520cff85934cbe69c3b9716e43f8bf7e17ecb070ea44162fd8cd81ef36b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52adb11dd023843743442f4e0164780b1
SHA129cd0fcc716c461b051d733e207725f8aa1d575e
SHA256bcb3935512e0abeb9bf9420e5fe4c8e7fce4f4057323607b15c21ecd404a01dd
SHA5124e2346076d8ffc48c87f93bbe1a1d52f703a6a2a3837433d5f5b25949e5153426961a6adf543ba99f0e1bfc165e3d2954cd799a2cfb03d40b6f968ee3098d4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c7b896c5b5e1199611dc6dcb25acb1c
SHA10598c91b6a94501882c19fc584516a811d2d0546
SHA25654fda5e8b245c9aeb68574dee7dcc92a02835fef6f59f3053b11daa3c3bcbab6
SHA512edb7ff50482b7262896dc98800511be039ce50babffd038f311e1d3366e1be545531ffa978d75eed5722bdfd4826999ca4ec69313182387641f25819792a4fa1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b