Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
188a7c7a08f189fe0240e02e399edef6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
188a7c7a08f189fe0240e02e399edef6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
188a7c7a08f189fe0240e02e399edef6_JaffaCakes118.html
-
Size
121KB
-
MD5
188a7c7a08f189fe0240e02e399edef6
-
SHA1
574fff55acdd485e95aaad7ceef3bc0916cbdbaf
-
SHA256
4e0350518007633aabf5bf748eb571ba9363749c1d632a8ab3e46fd7d3482ec6
-
SHA512
70ce91262fc91ff223fd6da4a063f9f3614387b7cf149d9843b6d135f63f1d55fc6c01e86477d6da66ca3433836a39505e7ff19dd22bae2164fe57b72274e0a8
-
SSDEEP
1536:Yx+YydnQtt6+S9QGC/mxHE2p1G1eCoyNHIRG4WGFJThgySGFfnnH0:rBIth2PRjm4a4zdFJhgyjH0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E4F8591-34FA-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000022c051f0d88950ac9fe81c6a2792b258b6d8a5649ddb76b7bbede3759bf687d8000000000e8000000002000020000000389a642a9ef26da1e322ad735b96e7c1befa79212f580795339fa347dbd63058200000007c3dfb66e76d48c9a0101ba8419be833d4575858319f354ce96c699661d60140400000009613c8d8c93a50f58afb056b9aa8f42beadb3145d3099557f1fda3e998d2d73b498c8dc4bae5a9bca173acd495915bdd925b227ae4fc7e06c25ec357a3dadc01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00eb22907c9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425705353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2860 2180 iexplore.exe 28 PID 2180 wrote to memory of 2860 2180 iexplore.exe 28 PID 2180 wrote to memory of 2860 2180 iexplore.exe 28 PID 2180 wrote to memory of 2860 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\188a7c7a08f189fe0240e02e399edef6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a1bb00d9236e0658a0029744d3607b
SHA1bb7e6d3c0bacdf16002aea8098b7a2cb03d3fbc3
SHA2560d2e79d33db9f0dcdfad29c75adc56fc8efae056ce5804f8460384a89dc9e0bb
SHA5123b8bfaa621854454b51e44415daf8d95072ca0c084d600c9cc52579bcf2347367af55802ee9c98dd4e8d8de72365a257db372e9e2345e23bdd26b90ff59f0aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b628d5d5a52cdf637fd08eef902c4754
SHA19c60676f227680f90fd821529c52b6bc5d5783a9
SHA256e778b1a0084e4cb815c2a9a475e99ed6fd6a8a4f77c4af28922c9c737ef3ed02
SHA51243ba1838d1be4d182bdb9aa9d662c07821c21c082273e27cc7f5bcde6bd8cbdfbea6a6ee660b38d05365197c0674e5e473d59beb2a381834df091cdd2c39a58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcb85724cb2bbc9998391abfd7386e6
SHA1357844c07d2dc6b4f86ee0e97116c75cc2b3365b
SHA25665b63f966a1c28ff1fac03a203ec90be2fb099a3383449e737b359b6c35db616
SHA512f1fefee13c10f018b2d3c305115abfef0ede72d11862fee6a1e8268e26ce97beafa46cea93561f9933ab50a81da10e7e1c107adaf0dca246596f437d3b871cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610779fe5caed12c68f9df260aef4b44
SHA1cb7553a056f1b8e6a6db8b1ab44e76c314feefc2
SHA2561ceb4000e646ffe3ee8cad5cbe32947e1f08afe38160f21fe6d453b51e4edd0f
SHA51261a0ca47c9ee82298a57a04b2847f7c0249049ff4d87c5b4b011c082104c7d43f910d9dd472e2ba19306bbc34a0b3b94356c81751857e7e4cc8667e414963c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829974d6a7c1c85666f6ba1cd1095df2
SHA122661c64c4cb82f3fe1230d65d89503f4243ce1e
SHA2564cc9bb9a165d090eaf24081d14b11639226fed26db7a0bcbeb08c8646dfa0539
SHA512f816f063d9982ce5271f02c94c927ec9ba57381db464c3843c5440d3368ffe3b8b1a4c45591192a801e5d65513865211764d8a9a7080d70eebb726fe1b55400d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c066de1de405ed43df033d7744584e
SHA151d05a7d9c6043b509b384aef8cd5973fcd85db9
SHA2566eb36aaca187a53912e437da124f902900910bc6c22575b41fb09187e48c9a7b
SHA5125f072d345b9c33cbeeb092feb155b2f2506d29ecdbc96e309bf52d49741dd2a21f3714b779e26f4df0d57de4adede10782c059379659c026996e6375449eeace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b215b5a18f42c83352df6a713138ecb
SHA1d88103f709172737555ddb67cec0e3267688d4bd
SHA256c5ab7dd9807b100f9bc0fb794b3bf6d86d79fa1a941dedef5e0781edb24957fb
SHA512ffae8d7b06ecc266609f759eb756080a85c19f8d20d0e7aa23b4fe0c95fc0f04953384e11cb8aa31676c814cea799523d59d16454c3eb7147494e6d42630d42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f576592403fdfe8a23c616af32ac93
SHA1b59197825bd1f214b415e92adf15bd9f1b760c4d
SHA256b1274c320cebf019eed8d9735fb3edc328cc5c3ec37ad48783432994236ac12a
SHA512d80f6d624150853f0e5fd981ba2831bdf5a367ef3cc20b5d2fb9150fe53042d5f079d01f767fe6c8bcfb2164a7cb01f6dcf8310216a60d2d004990d5a444e28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d534f20416ad7957da2cae32aec01a2
SHA1961d7f2863a4c110adf1a1564f98af9d34c2658b
SHA25637971d529c116a281a9ecdb8db851059ed9ffefb827dfb0468fd8fbe1b2b3f35
SHA5128c1401c2a4ea33cace9853ba4ad955d31d93bfa2d377e5eddaad324c48ed7991c8741d62649e28e9f528f28eae7e1fd1c264f05ba10e898fc0216ade92f0659e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55252c45191fbcb547446210795a26377
SHA1da2b3ea4217c7f9aff79c0c8814f5e5e0f82eec9
SHA256681d309a92155cc78467a847f0a7a083bae34854b3c501dc9ced108523b31c42
SHA5124a239a093cdc71590cad741ef77da0348b7a6ece0ffb8ec4fb411bd4c57341000ae756079fc2331f03f65d24bb1ec810d0a0881e720338c926d61779d7df4d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9e974a1a848adb7c9c46638db0701b
SHA107f77d35b2aabbe8a93ba8844434c4218b50a940
SHA256165e7a0d0dfd4af2f09016aa5ace6ee7442adec8bd0c64417a70ad5d4059cb58
SHA51200104c543966e88df22519858a994159e9731b67d1990f3cf348249f383e1bf493c17384ac88546daf2510f2d587e72a2462a6cd80c0065b05b4fb336cbd40e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da1af57c162e47b60c14c51006cb2ae
SHA13decdb305ebb0b331350ff1e1957d1f269bf77a7
SHA256205557ce1cce3029a39501e3297d10db655a0e42f2e927a8d257f6ba357a6a89
SHA5122014a729335955f3f77b346631965161fffbe1dc0facef440448c3033692653b8c88d578d4be4afc09fabfa8c3980818c1bc5fc2c00f9d09ea361a688a1a8b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947f85de0afc38801a465b4ed1fbd492
SHA13dea3707071155a14c4b434b44398140f124c825
SHA256af09cded86827f70092cf01acdb3401cc3cc1242960c01cbdddefd7b18027f76
SHA5123f203a7a668b420ebf5e04311a31f4e8204cb612d65448e551646e5ce08ad81168d2d34a67792fa7f1b2dee78d0b33c9af34e362913b3901c32717a7055f1cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6675aa8209d30d928cb42657259ed4
SHA1e78f0ba76b81efd059058e5141a57d20da1c70a7
SHA256c8fe5e307e7db8f0479a0ba2680edfda47632d1c729387602154937fd0dc8e32
SHA512e9ca57210e95877db61f42afdd040ca5de68913da3c05eb79d5dce5bd89e15cc50ba8786e78d8d4f0f4f89699879be0e4794269e5c7f8cf0102be1631f33863b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2128997b388c893b8632d8784564769
SHA1e1bb9ee8598878e968f3044a04d0af83da3d6629
SHA2560293890912709dceabc533bfe497dc9002da37315785b4275a3545ac13515ff9
SHA512c851fd456315b0622e2c8278182d3d4d900dd59ad2f9ccc09a854dc489b9b5be7d1617d346cff660d856556a0548783623bfef9ed208d64cb08b7fc0432a37a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6cccaa23f28fc48f545ac0091c1f16
SHA1f67107be5fc50c2797f4b1d980e10f4dbba76b9a
SHA256b31b79f0ee6a5eca57d4b4d42d2c70af826432e69d8e75e729ed8af39553c327
SHA512c85599abbf9ccec0fef232334483d1c87df92d6187243b73a5a82d2a645073a76b72799006593d214c76469f908ef98eace8be1fe61f3c169b55785cc1e01885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e478be8ffbaabd0f9e4bd1eebbdb86d6
SHA1b389bb4e611dfe559ffdb0e6fe9cb420658975bb
SHA256bc2873051fc90bc2d22f745dc24657df921a2ae6fdb61ca4fa7da9d5371b1cb7
SHA512bbd0e2aef6c8960ab87474401c48e1271d0fcb33f17aae51b8f930fde785154f47f695c0d3b3f60f047669b534c6b9c0cd63695ee2520d0a9c0bbdfc7640773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547387079ba46bf716f7ce4b12ffdf53f
SHA138b09ecc0cc84c88fdf9a9b2c216836ec5429b6c
SHA25647f9a710475f8dae11290cff42738c39e35656d132432f9b12d14b36ed76e7b4
SHA512917a530a1981b0e4e523061ce0dd7592806f9fc5f68473e99347531dd477b765f1c25c592eb880e92088b2d69f2b3a77dfa000d14f6bc8457b5be58aceef7cac
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b